{"id":92160,"date":"2018-10-24T09:00:38","date_gmt":"2018-10-24T16:00:38","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=92160"},"modified":"2025-07-31T23:06:52","modified_gmt":"2025-08-01T06:06:52","slug":"android-timpdoor-smishing-scam","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/","title":{"rendered":"How to Squash the Android\/TimpDoor SMiShing Scam"},"content":{"rendered":"<p>As technology becomes more advanced, so do cybercriminals\u2019 strategies for gaining access to our personal information. And while <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/common-phishing-scams\/\" target=\"_blank\" rel=\"noopener\">phishing scams<\/a> have been around for <a href=\"http:\/\/www.phishing.org\/history-of-phishing\" target=\"_blank\" rel=\"noopener\">over two decades<\/a>, attackers have adapted their methods to \u201cbait\u201d victims through a variety of platforms. In fact, we\u2019re seeing a rise in the popularity of phishing via SMS messages, or SMiShing. Just recently, the McAfee Mobile Research team discovered active SMiShing campaigns that are tricking users into downloading fake voice-messaging apps, called Android\/TimpDoor.<\/p>\n<p>So how does Android\/TimpDoor infect a user\u2019s device? When a victim receives the malicious text, the content will include a link. If they click on it, they\u2019ll be directed to a fake web page. The website will then prompt the victim to download the app in order to listen to phony voice messages. Once the app has been downloaded, the malware collects the device information including device ID, brand, model, OS version, mobile carrier, connection type, and public\/local IP address. TimpDoor allows cybercriminals to use the infected device as a digital intermediary without the user\u2019s knowledge. Essentially, it creates a backdoor for hackers to access users\u2019 home networks.<\/p>\n<p>According to our team\u2019s research, these <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/mobile-and-iot-security\/fake-apps-taking-over-phone\/\" target=\"_blank\" rel=\"noopener\">fake apps<\/a> have infected at least 5,000 devices in the U.S. since the end of March. So, the next question is what can users do to defend themselves from these attacks? Check out the following tips to stay alert and protect yourself from SMS phishing:<\/p>\n<ul>\n<li><strong><u>Do not install apps from unknown sources<\/u><\/strong>. If you receive a text asking you to download something onto your phone from a given link, make sure to do your homework. Research the app developer name, product title, download statistics, and app reviews. Be on the lookout for typos and grammatical errors in the description. This is usually a sign that the app is fake.<\/li>\n<li><strong><u>Be careful what you click on<\/u><\/strong>. Be sure to only click on links in text messages that are from a trusted source. If you don\u2019t recognize the sender, or the SMS content doesn\u2019t seem familiar, stay cautious and avoid interacting with the message.<\/li>\n<li><strong><u>Enable the feature on your mobile device that blocks texts from the Internet<\/u>.<\/strong> Many spammers send texts from an Internet service in an attempt to hide their identities. Combat this by using this feature to block texts sent from the Internet.<\/li>\n<li><strong><u>Use a mobile security software<\/u>.<\/strong> Make sure your mobile devices are prepared for TimpDoor or any other threat coming their way. To do just that, cover these devices with a <a href=\"http:\/\/app.appsflyer.com\/id724596345?pid=Blog&amp;c=Global\" target=\"_blank\" rel=\"noopener\">mobile security solution<\/a>, such as\u00a0<a href=\"http:\/\/app.appsflyer.com\/com.wsandroid.suite?pid=Blog&amp;c=Global\" target=\"_blank\" rel=\"noopener\">McAfee Mobile Security<\/a>.<\/li>\n<\/ul>\n<p>And, as always, to stay up-to-date on the latest consumer and mobile security threats, be sure to follow <a href=\"https:\/\/twitter.com\/garyjdavis\">me<\/a> and <a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a> on Twitter, listen to our podcast <em><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/hackable\/id1257232208?mt=2&amp;ign-mpt=uo%3D4\" target=\"_blank\" rel=\"noopener\">Hackable?<\/a><\/em>, and \u2018Like\u2019 us on <a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener\">Facebook<\/a>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As technology becomes more advanced, so do cybercriminals\u2019 strategies for gaining access to our personal information. And while phishing scams&#8230;<\/p>\n","protected":false},"author":674,"featured_media":215107,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,1838],"tags":[37,4132,214],"coauthors":[3973],"class_list":["post-92160","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-mobile-security","tag-android","tag-mobile-app","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Squash the Android\/TimpDoor SMiShing Scam | McAfee Blog<\/title>\n<meta name=\"description\" content=\"As technology becomes more advanced, so do cybercriminals\u2019 strategies for gaining access to our personal information. And while phishing scams have been around for over two decades, attackers have adapted their methods to \u201cbait\u201d victims through a variety of platforms.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Squash the Android\/TimpDoor SMiShing Scam | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"As technology becomes more advanced, so do cybercriminals\u2019 strategies for gaining access to our personal information. And while phishing scams have been around for over two decades, attackers have adapted their methods to \u201cbait\u201d victims through a variety of platforms.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-24T16:00:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-01T06:06:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"How to Squash the Android\/TimpDoor SMiShing Scam\",\"datePublished\":\"2018-10-24T16:00:38+00:00\",\"dateModified\":\"2025-08-01T06:06:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/\"},\"wordCount\":475,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_2239226127.jpg\",\"keywords\":[\"android\",\"mobile app\",\"mobile security\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/\",\"name\":\"How to Squash the Android\/TimpDoor SMiShing Scam | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_2239226127.jpg\",\"datePublished\":\"2018-10-24T16:00:38+00:00\",\"dateModified\":\"2025-08-01T06:06:52+00:00\",\"description\":\"As technology becomes more advanced, so do cybercriminals\u2019 strategies for gaining access to our personal information. And while phishing scams have been around for over two decades, attackers have adapted their methods to \u201cbait\u201d victims through a variety of platforms.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_2239226127.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_2239226127.jpg\",\"width\":1053,\"height\":702,\"caption\":\"Travel, suitcase and phone with woman in bedroom of hotel for vacation, summer break and abroad trip. Online, internet and app with girl packing clothes for holiday, airbnb and schedule booking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to Squash the Android\/TimpDoor SMiShing Scam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Squash the Android\/TimpDoor SMiShing Scam | McAfee Blog","description":"As technology becomes more advanced, so do cybercriminals\u2019 strategies for gaining access to our personal information. And while phishing scams have been around for over two decades, attackers have adapted their methods to \u201cbait\u201d victims through a variety of platforms.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Squash the Android\/TimpDoor SMiShing Scam | McAfee Blog","og_description":"As technology becomes more advanced, so do cybercriminals\u2019 strategies for gaining access to our personal information. And while phishing scams have been around for over two decades, attackers have adapted their methods to \u201cbait\u201d victims through a variety of platforms.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-10-24T16:00:38+00:00","article_modified_time":"2025-08-01T06:06:52+00:00","og_image":[{"url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"How to Squash the Android\/TimpDoor SMiShing Scam","datePublished":"2018-10-24T16:00:38+00:00","dateModified":"2025-08-01T06:06:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/"},"wordCount":475,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_2239226127.jpg","keywords":["android","mobile app","mobile security"],"articleSection":["How To Guides and Tutorials","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/","name":"How to Squash the Android\/TimpDoor SMiShing Scam | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_2239226127.jpg","datePublished":"2018-10-24T16:00:38+00:00","dateModified":"2025-08-01T06:06:52+00:00","description":"As technology becomes more advanced, so do cybercriminals\u2019 strategies for gaining access to our personal information. And while phishing scams have been around for over two decades, attackers have adapted their methods to \u201cbait\u201d victims through a variety of platforms.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_2239226127.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2025\/06\/shutterstock_2239226127.jpg","width":1053,"height":702,"caption":"Travel, suitcase and phone with woman in bedroom of hotel for vacation, summer break and abroad trip. Online, internet and app with girl packing clothes for holiday, airbnb and schedule booking"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/android-timpdoor-smishing-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"How to Squash the Android\/TimpDoor SMiShing Scam"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=92160"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92160\/revisions"}],"predecessor-version":[{"id":216654,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/92160\/revisions\/216654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/215107"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=92160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=92160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=92160"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=92160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}