{"id":91361,"date":"2018-09-04T11:50:19","date_gmt":"2018-09-04T18:50:19","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=91361"},"modified":"2025-08-19T08:33:41","modified_gmt":"2025-08-19T15:33:41","slug":"top-trending-iot-malware-attacks-of-2018","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/","title":{"rendered":"Trending: IoT Malware Attacks of 2018"},"content":{"rendered":"<p>Since January 1<sup>st<\/sup> of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large and small, many of which are now from IoT devices. By 2025, it is estimated that there will be approximately <a href=\"https:\/\/www.statista.com\/statistics\/471264\/iot-number-of-connected-devices-worldwide\/\" target=\"_blank\" rel=\"noopener\">75 billion connected devices<\/a> around the world. With more IoT devices \u00ad\u2013from wearables and pacemakers to thermometers and smart plugs\u2013on the market and in the home, cybercriminals are keen to leverage them in attacks. This heightened interest is due to the <a href=\"https:\/\/krebsonsecurity.com\/2018\/05\/study-attack-on-krebsonsecurity-cost-iot-device-owners-323k\/\" target=\"_blank\" rel=\"noopener\">vulnerabilities in many IoT devices<\/a>, not to mention their ability to connect to each other, which can form an IoT botnet.<\/p>\n<p>In a botnet scenario, a network of internet-connected devices is infected with malware and controlled without the users\u2019 knowledge, in order to launch ransomware and DDoS attacks (distributed denial-of-service). Once unleashed, the consequences of botnet attacks can be devastating. This possible reality sounds like the plot of a science fiction movie, one which we hypothesized in our <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/infographics\/infographic-threats-predictions-2018.pdf\" target=\"_blank\" rel=\"noopener\">2018 Threats Prediction Report<\/a>. As we head into this year\u2019s final months, we take a look at how this year\u2019s threats compared to our predictions for you, the consumer.<\/p>\n<p>At the end of 2017, we predicted that the convenience and ease of a <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/2018-threats-predictions-report\/\" target=\"_blank\" rel=\"noopener\">connected home could lead to a decrease in privacy<\/a>. Our devices already transmit significant data, with or without the knowledge of the consumer, back to the corporations the devices are made. This unprecedented access to consumer data is what is driving cybercriminals to become more familiar with IoT botnet attacks. Just in 2018 alone, we\u2019ve seen smart TVs, <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/mobile-security\/dirty-little-secrets-protected-data\/\" target=\"_blank\" rel=\"noopener\">virtual assistants<\/a>, and even <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/wemo-vulnerability\/\" target=\"_blank\" rel=\"noopener\">smart plugs<\/a> display detrimental security flaws that could be exploited by bad actors. Some IoT devices were used to facilitate botnet attacks, like an <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/casinos-high-roller-database-iot-thermometer\/\" target=\"_blank\" rel=\"noopener\">IoT thermometer<\/a> and <a href=\"https:\/\/www.cshub.com\/attacks\/articles\/incident-of-the-week-fbi-attempts-to-dissolve-botnet-wielding-500k-routers\" target=\"_blank\" rel=\"noopener\">home Wi-Fi routers<\/a>. In 2017, these security concerns were simply predictions- but now they are <em>very<\/em> much a reality. And while the window to get ahead of these attacks is closing, consumers need to be prepared in case your IoT devices go haywire.<\/p>\n<h2>Tips to Protect Your Family From Threats<\/h2>\n<p>Be the difference in your home when it comes to security and IoT devices. Protect both you and your family from these threats with these tips:<\/p>\n<ul>\n<li><span style=\"text-decoration: underline;\">When buying an IoT device, make security a priority<\/span>.\u00a0Before your next IoT purchase, do your research. Prioritize purchasing devices that have been on the market for a while, have a name brand, or have a lot of online reviews. If you follow this protocol, the chances are that the device\u2019s security standards will be higher, due to being vetted by the masses.<\/li>\n<li><span style=\"text-decoration: underline;\">Change default device passwords<\/span>.\u00a0As soon as you bring a new device into your home, change the password to something difficult to guess. Cybercriminals often know the default settings and can use them to access your devices. If the device has advanced security options, use them.<\/li>\n<li><span style=\"text-decoration: underline;\">Keep your software up-to-date<\/span>. To protect against potential vulnerabilities, manufacturers often release software updates. Set your device to auto-update, if possible, so you always have the latest software.<\/li>\n<li><span style=\"text-decoration: underline;\">Use a comprehensive security program<\/span>. It\u2019s important to think about security holistically. Not all IoT devices are restricted to the home; many are mobile (such as smart watches). If you\u2019re out and about, you may need to connect to an unsecured network \u2013 say an airport with public Wi-Fi. Your kids may have devices. The scenarios may be different, but the risk is the same. Protect your network of connected devices no matter where you are and consider a <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/seamless-security-for-the-connected-consumer\/\" target=\"_blank\" rel=\"noopener\">suite of security products<\/a> to protect what matters.<\/li>\n<\/ul>\n<p>Interested in learning more about IoT and mobile security tips and trends? Stop by\u00a0<a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=235367\" target=\"_blank\" rel=\"noopener\">ProtectWhatMatters.online<\/a>, and follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u201d us on\u00a0<a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener\">Facebook.<\/a><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-68611\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/01\/Radhika.jpg\" alt=\"\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg 200w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-150x150.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-50x50.jpg 50w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika-128x128.jpg 128w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large&#8230;<\/p>\n","protected":false},"author":674,"featured_media":64078,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,1838],"tags":[4452,32,5588,4131,5084,214],"coauthors":[3973],"class_list":["post-91361","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-mobile-security","tag-cybersecurity","tag-data-protection","tag-devices","tag-internet-of-things","tag-iot","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Trending: IoT Malware Attacks of 2018 | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large and small. At the same time, more IoT devices are on the market, in the home, and are therefore on cybercriminals\u2019 minds.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trending: IoT Malware Attacks of 2018 | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large and small. At the same time, more IoT devices are on the market, in the home, and are therefore on cybercriminals\u2019 minds.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-04T18:50:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T15:33:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Trending: IoT Malware Attacks of 2018\",\"datePublished\":\"2018-09-04T18:50:19+00:00\",\"dateModified\":\"2025-08-19T15:33:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/\"},\"wordCount\":622,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg\",\"keywords\":[\"cybersecurity\",\"data protection\",\"devices\",\"Internet of Things\",\"IoT\",\"mobile security\"],\"articleSection\":[\"Security News\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/\",\"name\":\"Trending: IoT Malware Attacks of 2018 | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg\",\"datePublished\":\"2018-09-04T18:50:19+00:00\",\"dateModified\":\"2025-08-19T15:33:41+00:00\",\"description\":\"Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large and small. At the same time, more IoT devices are on the market, in the home, and are therefore on cybercriminals\u2019 minds.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg\",\"width\":1000,\"height\":667,\"caption\":\"IoT Devices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trending: IoT Malware Attacks of 2018\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trending: IoT Malware Attacks of 2018 | McAfee Blog","description":"Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large and small. At the same time, more IoT devices are on the market, in the home, and are therefore on cybercriminals\u2019 minds.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Trending: IoT Malware Attacks of 2018 | McAfee Blog","og_description":"Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large and small. At the same time, more IoT devices are on the market, in the home, and are therefore on cybercriminals\u2019 minds.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-09-04T18:50:19+00:00","article_modified_time":"2025-08-19T15:33:41+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/01\/Radhika.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Trending: IoT Malware Attacks of 2018","datePublished":"2018-09-04T18:50:19+00:00","dateModified":"2025-08-19T15:33:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/"},"wordCount":622,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg","keywords":["cybersecurity","data protection","devices","Internet of Things","IoT","mobile security"],"articleSection":["Security News","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/","name":"Trending: IoT Malware Attacks of 2018 | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg","datePublished":"2018-09-04T18:50:19+00:00","dateModified":"2025-08-19T15:33:41+00:00","description":"Since January 1st of 2018, a barrage of cyberattacks and data breaches have hit almost every industry, targeting businesses large and small. At the same time, more IoT devices are on the market, in the home, and are therefore on cybercriminals\u2019 minds.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/IoT5.jpg","width":1000,"height":667,"caption":"IoT Devices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/top-trending-iot-malware-attacks-of-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Trending: IoT Malware Attacks of 2018"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/91361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=91361"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/91361\/revisions"}],"predecessor-version":[{"id":220511,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/91361\/revisions\/220511"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/64078"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=91361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=91361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=91361"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=91361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}