{"id":90214,"date":"2018-07-03T11:28:39","date_gmt":"2018-07-03T18:28:39","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=90214"},"modified":"2025-05-29T03:15:53","modified_gmt":"2025-05-29T10:15:53","slug":"cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/","title":{"rendered":"Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events"},"content":{"rendered":"<p>Every four years, everyone\u2019s head around the globe turns toward the television. The Olympics, the World Cup\u00a0\u2013 world events like these have all eyes viewing friendly competition between nations. Operating under such a big spotlight, these events have been heavily guarded by physical security to ensure no participants or attendees are harmed. But what about digital security? In 2018, many aspects of these events have become digitized, which is great for event organizers and viewers, but also for cybercriminals. In fact, reports are already circulating that hackers are targeting attendees of this year\u2019s <a href=\"https:\/\/www.reuters.com\/article\/us-usa-russia-hackers-exclusive\/exclusive-u-s-counterspy-warns-world-cup-travelers-devices-could-be-hacked-idUSKBN1J82YX?\" target=\"_blank\" rel=\"noopener\">2018 FIFA World Cup<\/a>.<\/p>\n<h2><strong>Why These Events?<\/strong><\/h2>\n<p>The cultural value placed in these international games is precisely the reason cybercriminals target them. The more something is valued, the more people are willing to make sacrifices for it. Cybercriminals know that, and hope to capitalize on it.<\/p>\n<p>In cases like the World Cup, fans may be willing to expose themselves to a more hostile environment in order to feel a part of the event. The same goes for companies that are associated with the sporting events, as they can fall victims to attacks just as individuals do.<\/p>\n<h2><strong>Types of Attacks<\/strong><\/h2>\n<p>Both innocent tourists and fans at home may have to deal with threats that result from their involvement in these events. Given the fact that internet access has increased all over the world, many tourists are vulnerable to rogue access-point attacks in public places. Attackers can use these points to harvest credentials and gain access to a victim\u2019s device and accounts. Malware can also be placed within ATM machines, ready to rip off tourists withdrawing currency from their banks. As for fans at home, many phishing and waterhole attacks have been designed around these events to entice fans to visit malicious sites or open emails that appear to be related to the games.<\/p>\n<p>However, for nation-state attacks, a lot of groundwork is done before these global events even begin. Our McAfee Labs team <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/gold-dragon-widens-olympics-malware-attacks-gains-permanent-presence-on-victims-systems\/\" target=\"_blank\" rel=\"noopener\">saw this firsthand<\/a> in the period leading up to the Pyeongchang 2018 Olympic Winter Games. A nation-state hacker pretended to be a supplier to the Olympics and sent out weaponized mail to organizations of interest that contained malware developed well before the event had started.<\/p>\n<h2><strong>The Implications <\/strong><\/h2>\n<p>Whether the objective behind the threat is disruption or financial gain, these attacks all do have one thing in common &#8212; they impact the overall feeling of safety at these events and take away from what is supposed to feel like a worldwide celebration of sport.<\/p>\n<p>Now, when fans wish to part of a big event such as the World Cup, they can no longer just focus on which jersey they\u2019re wearing that day. They have to worry about their bank accounts being robbed or becoming extorted. Beyond the individual implications, the nation-state attacks that take place at these events can rear their head in an ugly way, as they can actually worsen international relations much more than a healthy sporting rivalry ever could.<\/p>\n<p>So the question is \u2013 now what? On an individual level, visitors to these events must maintain overall good digital security hygiene. This means leaving unnecessary devices at home, enabling two-factor authentication, using a VPN service, and overall remaining alert and vigilant for scams.<\/p>\n<p>Beyond that, we must all recognize that our physical and digital lives are converging at a fast pace, and we now have a large digital attack surface that is not yet properly safeguarded. And with both cybercriminals and nation-state actors showing such a heightened interest in global cultural events, cybersecurity must become an essential part of organizing such an event. Only then can countries host a successful and safe sporting event for everyone.<\/p>\n<p>To learn more about what McAfee is doing to help face the threats to these events, be sure to follow us at\u00a0<a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener\">@McAfee<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Labs\" target=\"_blank\" rel=\"noopener\">@McAfee_Labs<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every four years, everyone\u2019s head around the globe turns toward the television. The Olympics, the World Cup\u00a0\u2013 world events like&#8230;<\/p>\n","protected":false},"author":1008,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[5526,76,338,214],"coauthors":[5403],"class_list":["post-90214","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-advanced-threat-research","tag-cybercrime","tag-endpoint-protection","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Every four years, everyone\u2019s head around the globe turns toward the television. The Olympics, the World Cup\u00a0\u2013 world events like these have all eyes\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Every four years, everyone\u2019s head around the globe turns toward the television. The Olympics, the World Cup\u00a0\u2013 world events like these have all eyes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-03T18:28:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-29T10:15:53+00:00\" \/>\n<meta name=\"author\" content=\"John Fokker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@john_fokker\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Fokker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/\"},\"author\":{\"name\":\"John Fokker\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/d4dadad7c176dd7a73390cfce3ce5e41\"},\"headline\":\"Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events\",\"datePublished\":\"2018-07-03T18:28:39+00:00\",\"dateModified\":\"2025-05-29T10:15:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/\"},\"wordCount\":649,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"Advanced Threat Research\",\"cybercrime\",\"endpoint protection\",\"mobile security\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/\",\"name\":\"Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2018-07-03T18:28:39+00:00\",\"dateModified\":\"2025-05-29T10:15:53+00:00\",\"description\":\"Every four years, everyone\u2019s head around the globe turns toward the television. The Olympics, the World Cup\u00a0\u2013 world events like these have all eyes\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/d4dadad7c176dd7a73390cfce3ce5e41\",\"name\":\"John Fokker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/8205fa3ae2b891a459426ee038d61bd4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-01-31-at-11.50.11-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-01-31-at-11.50.11-96x96.png\",\"caption\":\"John Fokker\"},\"description\":\"John Fokker is a Principal Engineer and Head of Cyber Investigations for the Advanced Threat Research. Prior to joining the team, he worked at the National High Tech Crime Unit (NHTCU), the Dutch national police unit dedicated to investigating advanced forms of cybercrime. Within NHTCU he led the data science group, which focused on threat intelligence research. During his career he has supervised numerous large-scale cybercrime investigations and takedowns. Fokker is also one of the cofounders of the NoMoreRansom Project. He started his career with the Netherlands Police Agency as a digital forensics investigator within a task force against organized crime. Before joining the national police, he served in the special operations and counterterrorism group of the Royal Netherlands Marine Corps.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/john-fokker-95b614107\/\",\"https:\/\/x.com\/john_fokker\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/john-fokker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events | McAfee Blog","description":"Every four years, everyone\u2019s head around the globe turns toward the television. The Olympics, the World Cup\u00a0\u2013 world events like these have all eyes","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events | McAfee Blog","og_description":"Every four years, everyone\u2019s head around the globe turns toward the television. The Olympics, the World Cup\u00a0\u2013 world events like these have all eyes","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-07-03T18:28:39+00:00","article_modified_time":"2025-05-29T10:15:53+00:00","author":"John Fokker","twitter_card":"summary_large_image","twitter_creator":"@john_fokker","twitter_site":"@McAfee","twitter_misc":{"Written by":"John Fokker","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/"},"author":{"name":"John Fokker","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/d4dadad7c176dd7a73390cfce3ce5e41"},"headline":"Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events","datePublished":"2018-07-03T18:28:39+00:00","dateModified":"2025-05-29T10:15:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/"},"wordCount":649,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["Advanced Threat Research","cybercrime","endpoint protection","mobile security"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/","name":"Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2018-07-03T18:28:39+00:00","dateModified":"2025-05-29T10:15:53+00:00","description":"Every four years, everyone\u2019s head around the globe turns toward the television. The Olympics, the World Cup\u00a0\u2013 world events like these have all eyes","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/cybercrime-in-the-spotlight-how-crooks-capitalize-on-cultural-events\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Cybercrime in the Spotlight: How Crooks Capitalize on Cultural Events"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/d4dadad7c176dd7a73390cfce3ce5e41","name":"John Fokker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/8205fa3ae2b891a459426ee038d61bd4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-01-31-at-11.50.11-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/Screen-Shot-2019-01-31-at-11.50.11-96x96.png","caption":"John Fokker"},"description":"John Fokker is a Principal Engineer and Head of Cyber Investigations for the Advanced Threat Research. Prior to joining the team, he worked at the National High Tech Crime Unit (NHTCU), the Dutch national police unit dedicated to investigating advanced forms of cybercrime. Within NHTCU he led the data science group, which focused on threat intelligence research. During his career he has supervised numerous large-scale cybercrime investigations and takedowns. Fokker is also one of the cofounders of the NoMoreRansom Project. He started his career with the Netherlands Police Agency as a digital forensics investigator within a task force against organized crime. Before joining the national police, he served in the special operations and counterterrorism group of the Royal Netherlands Marine Corps.","sameAs":["https:\/\/www.linkedin.com\/in\/john-fokker-95b614107\/","https:\/\/x.com\/john_fokker"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/john-fokker\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1008"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=90214"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90214\/revisions"}],"predecessor-version":[{"id":214703,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/90214\/revisions\/214703"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=90214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=90214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=90214"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=90214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}