{"id":93346,"date":"2018-12-21T11:00:39","date_gmt":"2018-12-21T19:00:39","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=93346"},"modified":"2025-08-13T00:22:23","modified_gmt":"2025-08-13T07:22:23","slug":"apple-phishing-scam","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/","title":{"rendered":"Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data"},"content":{"rendered":"<p>With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends and family. What they don\u2019t expect to see is an email that appears to be a purchase confirmation from the Apple App Store containing a PDF attachment of a receipt for a $30 app.\u00a0This is actually a\u00a0<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/widespread-apple-id-phishing-attack-pretends-to-be-app-store-receipts\/\" target=\"_blank\" rel=\"noopener noreferrer\">stealthy phishing email<\/a>, which\u00a0has been circulating the internet, prompting users to click on a link if the transaction was unauthorized.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-93347 size-large\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2018\/12\/purchase-confirmation-1024x634.jpg\" alt=\"\" width=\"1024\" height=\"634\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/purchase-confirmation-1024x634.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/purchase-confirmation-300x186.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/purchase-confirmation-768x475.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/purchase-confirmation-808x500.jpg 808w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/purchase-confirmation.jpg 1236w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>So how exactly does this <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/spotify-phishing-scam\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing campaign<\/a>\u00a0work? In this case, the cybercriminals rely on the victim to be thrown off by the email stating that they purchased an app when they know that they didn\u2019t. When the user clicks on the link in the receipt stating that the transaction was unauthorized, they are redirected to a page that looks almost identical to Apple\u2019s legitimate Apple Account management portal. The user is prompted to enter their login credentials, only to receive a message claiming that their account has been locked for security reasons. If the user attempts to unlock their account, they are directed to a page prompting them to fill out personal details including their name, date of birth, and social security number for \u201caccount verification.\u201d<\/p>\n<p>Once the victim enters their personal and financial information, they are directed to a temporary page stating that they have been logged out to restore access to their account. The user is then directed to the legitimate Apple ID account management site, stating &#8220;this session was timed out for your security,\u201d which only helps this attack seem extra convincing. The victim is led to believe that this process was completely normal, while the cybercriminals now have enough information to perform complete identity theft.<\/p>\n<h2>How to Protect Yourself From Phishing Scams<\/h2>\n<p>Although this attack does have some sneaky behaviors, there are a number of steps users can take to protect themselves from phishing scams like this one:<\/p>\n<ul>\n<li><strong>Be wary of suspicious emails.<\/strong> If you receive an email from an unknown source or notice that the \u201cfrom\u201d address itself seems peculiar, avoid interacting with the message altogether.<\/li>\n<li><strong>Go directly to the source.<\/strong> Be skeptical of emails claiming to be from companies asking to confirm a purchase that you don\u2019t recognize. Instead of clicking on a link within the email, it\u2019s best to go straight to the company\u2019s website to check the status of your account or contact customer service.<\/li>\n<li><strong>Use a comprehensive security solution.<\/strong> It can be difficult to determine if a website, link, or file is risky or contains malicious content. Add an extra layer of security with a product like <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Total Protection<\/a>.<\/li>\n<\/ul>\n<p>And, of course, to stay on top of the latest consumer and mobile security threats, be sure to follow\u00a0<a href=\"https:\/\/twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">me<\/a>\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a>\u00a0on Twitter, listen to our podcast\u00a0<em><a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener noreferrer\">Hackable?<\/a><\/em><em>\u00a0<\/em>and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends&#8230;<\/p>\n","protected":false},"author":674,"featured_media":92050,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13,1838],"tags":[40,4452,142,4185],"coauthors":[3973],"class_list":["post-93346","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","category-mobile-security","tag-apple","tag-cybersecurity","tag-tag-identity-theft","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data: Insights on This Threat<\/title>\n<meta name=\"description\" content=\"With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends and family\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data: Insights on This Threat\" \/>\n<meta property=\"og:description\" content=\"With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends and family\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-12-21T19:00:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T07:22:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/consumer_digitalretail_caucasian_female_transaction.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data\",\"datePublished\":\"2018-12-21T19:00:39+00:00\",\"dateModified\":\"2025-08-13T07:22:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/\"},\"wordCount\":488,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/consumer_digitalretail_caucasian_female_transaction.jpg\",\"keywords\":[\"Apple\",\"cybersecurity\",\"identity theft\",\"Phishing\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/\",\"name\":\"Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data: Insights on This Threat\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/consumer_digitalretail_caucasian_female_transaction.jpg\",\"datePublished\":\"2018-12-21T19:00:39+00:00\",\"dateModified\":\"2025-08-13T07:22:23+00:00\",\"description\":\"With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends and family\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/consumer_digitalretail_caucasian_female_transaction.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/consumer_digitalretail_caucasian_female_transaction.jpg\",\"width\":2400,\"height\":1600,\"caption\":\"Young woman at home. Phone. Credit Card\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data: Insights on This Threat","description":"With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends and family","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data: Insights on This Threat","og_description":"With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends and family","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-12-21T19:00:39+00:00","article_modified_time":"2025-08-13T07:22:23+00:00","og_image":[{"width":2400,"height":1600,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/consumer_digitalretail_caucasian_female_transaction.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data","datePublished":"2018-12-21T19:00:39+00:00","dateModified":"2025-08-13T07:22:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/"},"wordCount":488,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/consumer_digitalretail_caucasian_female_transaction.jpg","keywords":["Apple","cybersecurity","identity theft","Phishing"],"articleSection":["Internet Security","Privacy &amp; Identity Protection","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/","name":"Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data: Insights on This Threat","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/consumer_digitalretail_caucasian_female_transaction.jpg","datePublished":"2018-12-21T19:00:39+00:00","dateModified":"2025-08-13T07:22:23+00:00","description":"With the holidays rapidly approaching, many consumers are receiving order confirmation emails updating them on their online purchases for friends and family","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/consumer_digitalretail_caucasian_female_transaction.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/10\/consumer_digitalretail_caucasian_female_transaction.jpg","width":2400,"height":1600,"caption":"Young woman at home. Phone. Credit Card"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/apple-phishing-scam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Cybercriminals Disguised as Apple Are After Users\u2019 Personal Data"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93346","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=93346"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93346\/revisions"}],"predecessor-version":[{"id":219291,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/93346\/revisions\/219291"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/92050"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=93346"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=93346"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=93346"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=93346"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}