{"id":94299,"date":"2019-02-26T00:00:23","date_gmt":"2019-02-26T08:00:23","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=94299"},"modified":"2025-05-22T21:22:03","modified_gmt":"2025-05-23T04:22:03","slug":"2019-mobile-threat-report","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/","title":{"rendered":"Open Backdoors and Voice Assistant Attacks: Key Takeaways from 2019&#8217;s Mobile Threat Report"},"content":{"rendered":"<p>These days, we seem to have a newfound reliance on all things \u2018smart.\u2019 We give these devices the keys to our digital lives, entrusting them with tons of personal information. In fact, we are so eager to adopt this technology that we connect <a href=\"https:\/\/www.forbes.com\/sites\/michaelkanellos\/2016\/03\/03\/152000-smart-devices-every-minute-in-2025-idc-outlines-the-future-of-smart-things\/#608e8d4b4b63\" target=\"_blank\" rel=\"noopener\">4,800 devices per minute<\/a>\u00a0to the internet with no sign of slowing down. \u00a0This is largely because smart devices make our lives easier and enjoyable. But even though these devices are convenient, it\u2019s important to understand they\u2019re also convenient for cybercriminals, given they contain a treasure trove of personal data. To examine how exactly these hackers plan on capturing that data, we at McAfee have taken a deep dive into the mobile threat landscape in <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-mobile-threat-report-2019.pdf\" target=\"_blank\" rel=\"noopener\">this year\u2019s Mobile Threat Report<\/a>. In this report, we examine some of the most significant threat trends, including new spyware, mobile malware, and IoT attack surfaces. Let\u2019s take a look at these trends and how you can keep all your devices protected.<\/p>\n<h2><strong>Operations RedDawn and FoulGoal<\/strong><\/h2>\n<p>In our <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-mobile-threat-report-2018.pdf\" target=\"_blank\" rel=\"noopener\">2018 report<\/a>, we predicted that attacks targeted toward mobile devices would increase, and everything from fake Fortnite apps to increased mobile malware has proven this to be true. However, two recent discoveries, Operation RedDawn and FoulGoal, prove just how targeted these attacks can really get. RedDawn, in particular, has set its sights on North Korean refugees, as the spyware attempts to copy photos, contacts, SMS messages, and other personal data belonging to the victim.<\/p>\n<p>The latter attack, FoulGoal, actually occurred during last year\u2019s World Cup, as the campaign used an app called Golden Cup to install spyware on victims\u2019 devices. This app promised users live streams of games from the Russian 2018 FIFA World Cup, as well as a searchable database of previous World Cup records. In addition to stealing the user\u2019s phone number, device details, and installed packages, FoulGoal also downloaded spyware to expand its infection into SMS messages, contacts, GPS details, and audio recordings.<\/p>\n<h3><strong>A Virtual Backdoor<\/strong><\/h3>\n<p>Our smartphones are now like remote controls for our smart homes, controlling everything from lights to locks to kitchen appliances. So, it was only a matter of time before cybercriminals looked for ways to trick users into leaving open a virtual backdoor. Enter <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/android-timpdoor-smishing-scam\/\" target=\"_blank\" rel=\"noopener\">TimpDoor<\/a>, an Android-based malware family that does just that. First appearing in March 2018, it quickly became the leading mobile backdoor family, as it runs a SMiShing campaign that tricks users into downloading fake voice-messaging apps.<\/p>\n<p>These virtual backdoors are now an ever-growing threat as hackers begin to take advantage of the always-connected nature of mobile phones and other connected devices. Once distributed as Trojanized apps through apps stores, like Google Play, these backdoors can come disguised as add-on games or customization tools. And while most are removed fairly quickly from app stores, hackers can still pivot their distribution efforts and leverage popular websites to conceive a socially engineered attack to trick users into enabling unknown sources.<\/p>\n<h2><strong>The Voice Heard Around the Home<\/strong><\/h2>\n<p>Around the world, there are already over 25 million voice assistants, or smart speakers, in use. From simple queries to controlling other IoT gadgets throughout the home, these devices play a big role in our living environments. But many of these IoT devices fail to pass even the most basic security practices, and have easily guessable passwords, notable buffer overflow issues, and unpatched vulnerabilities. This makes voice assistants an increasingly valuable and potentially profitable attack vector for cybercrime.<\/p>\n<p>For a typical voice assistant in the home, the attack surface is quite broad. Cybercriminals could gain access to the microphone or listening stream, and then monitor everything said. Additionally, they could command the speakers to perform actions via other speaker devices, such as embedding commands in a TV program or internet video. Crooks could even alter customized actions to somehow aid their malicious schemes. However, some of the most pressing vulnerabilities can come from associated IoT devices, such as smart plugs, door locks, cameras, or connected appliances, which can have their own flaws and could provide unrestrained access to the rest of the home network.<\/p>\n<p>The good news? We at McAfee are working tirelessly to evolve our home and mobile solutions to keep you protected from any current and future threats. Plus, there are quite a few steps you can personally take to secure your devices. Start by following these tips:<\/p>\n<ul>\n<li><strong>Delete apps at the first sign of suspicious activity.<\/strong>\u00a0If an app requests access to anything outside of its service, or didn\u2019t originate from a trusted source, remove it immediately from your device.<\/li>\n<li><strong>Protect your devices by protecting your home network.<\/strong> While we continue to embrace the idea of \u201csmart homes\u201d and connected devices, we also need to embrace the idea that with great connectivity, comes great responsibility to secure those connections. Consider <a href=\"https:\/\/home.mcafee.com\/root\/campaign.aspx?cid=223304\" target=\"_blank\" rel=\"noopener\">built-in network security<\/a>, which can automatically secure your connected devices at the router-level.<\/li>\n<li><strong>Keep your security software up-to-date.\u00a0<\/strong>Whether it\u2019s an antivirus solution or a comprehensive security suite, always keep your security solutions up-to-date. Software and firmware patches are ever-evolving and are made to combat newly discovered threats, so be sure to update every time you\u2019re prompted to. Better yet, flip on automatic updates.<\/li>\n<li><strong>Change your device\u2019s factory security settings.<\/strong>\u00a0When it comes to products, many manufacturers don\u2019t think \u201csecurity first.\u201d That means your device can be potentially vulnerable as soon as you open the box. By changing the factory settings you\u2019re instantly upping your smart device\u2019s security.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>These days, we seem to have a newfound reliance on all things \u2018smart.\u2019 We give these devices the keys to&#8230;<\/p>\n","protected":false},"author":674,"featured_media":89345,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[4452,180,4132,214],"coauthors":[3973],"class_list":["post-94299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-cybersecurity","tag-malware","tag-mobile-app","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Open Backdoors and Voice Assistant Attacks: Key Takeaways from the 2019 Mobile Threat Report<\/title>\n<meta name=\"description\" content=\"These days, we seem to have a newfound reliance on all things \u2018smart.\u2019 We give these devices the keys to our digital lives, entrusting them with tons of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Open Backdoors and Voice Assistant Attacks: Key Takeaways from the 2019 Mobile Threat Report\" \/>\n<meta property=\"og:description\" content=\"These days, we seem to have a newfound reliance on all things \u2018smart.\u2019 We give these devices the keys to our digital lives, entrusting them with tons of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-26T08:00:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T04:22:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/McAfee_consumer_1male_tablet_walking_home_72dpi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2078\" \/>\n\t<meta property=\"og:image:height\" content=\"1386\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Open Backdoors and Voice Assistant Attacks: Key Takeaways from 2019&#8217;s Mobile Threat Report\",\"datePublished\":\"2019-02-26T08:00:23+00:00\",\"dateModified\":\"2025-05-23T04:22:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/\"},\"wordCount\":923,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/McAfee_consumer_1male_tablet_walking_home_72dpi.jpg\",\"keywords\":[\"cybersecurity\",\"malware\",\"mobile app\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/\",\"name\":\"Open Backdoors and Voice Assistant Attacks: Key Takeaways from the 2019 Mobile Threat Report\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/McAfee_consumer_1male_tablet_walking_home_72dpi.jpg\",\"datePublished\":\"2019-02-26T08:00:23+00:00\",\"dateModified\":\"2025-05-23T04:22:03+00:00\",\"description\":\"These days, we seem to have a newfound reliance on all things \u2018smart.\u2019 We give these devices the keys to our digital lives, entrusting them with tons of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/McAfee_consumer_1male_tablet_walking_home_72dpi.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/McAfee_consumer_1male_tablet_walking_home_72dpi.jpg\",\"width\":2078,\"height\":1386,\"caption\":\"lamp; current; home ownership; tablet; adjusting; kitchen; man; illumination; built structure; building; house; residential house; computer; people; Adults; shelf; remote control; home; Internet; Lifestyles; Mobility; modern; security; Connection; indoor; technology; waist up; looking down; casual clothing; comfortable; confidence; Wireless Technology; power consumption; ecological awareness; wireless lan; control; digitalisation; Internet of Things; Energy management; mid adult men; one person; 35-39 years; caucasian appearance; dark hair; stubble; modernity; looking; communication; mid adult; 30-40 years; Photography; Color Image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Open Backdoors and Voice Assistant Attacks: Key Takeaways from 2019&#8217;s Mobile Threat Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Open Backdoors and Voice Assistant Attacks: Key Takeaways from the 2019 Mobile Threat Report","description":"These days, we seem to have a newfound reliance on all things \u2018smart.\u2019 We give these devices the keys to our digital lives, entrusting them with tons of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Open Backdoors and Voice Assistant Attacks: Key Takeaways from the 2019 Mobile Threat Report","og_description":"These days, we seem to have a newfound reliance on all things \u2018smart.\u2019 We give these devices the keys to our digital lives, entrusting them with tons of","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-02-26T08:00:23+00:00","article_modified_time":"2025-05-23T04:22:03+00:00","og_image":[{"width":2078,"height":1386,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/McAfee_consumer_1male_tablet_walking_home_72dpi.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Open Backdoors and Voice Assistant Attacks: Key Takeaways from 2019&#8217;s Mobile Threat Report","datePublished":"2019-02-26T08:00:23+00:00","dateModified":"2025-05-23T04:22:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/"},"wordCount":923,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/McAfee_consumer_1male_tablet_walking_home_72dpi.jpg","keywords":["cybersecurity","malware","mobile app","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/","name":"Open Backdoors and Voice Assistant Attacks: Key Takeaways from the 2019 Mobile Threat Report","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/McAfee_consumer_1male_tablet_walking_home_72dpi.jpg","datePublished":"2019-02-26T08:00:23+00:00","dateModified":"2025-05-23T04:22:03+00:00","description":"These days, we seem to have a newfound reliance on all things \u2018smart.\u2019 We give these devices the keys to our digital lives, entrusting them with tons of","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/McAfee_consumer_1male_tablet_walking_home_72dpi.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/06\/McAfee_consumer_1male_tablet_walking_home_72dpi.jpg","width":2078,"height":1386,"caption":"lamp; current; home ownership; tablet; adjusting; kitchen; man; illumination; built structure; building; house; residential house; computer; people; Adults; shelf; remote control; home; Internet; Lifestyles; Mobility; modern; security; Connection; indoor; technology; waist up; looking down; casual clothing; comfortable; confidence; Wireless Technology; power consumption; ecological awareness; wireless lan; control; digitalisation; Internet of Things; Energy management; mid adult men; one person; 35-39 years; caucasian appearance; dark hair; stubble; modernity; looking; communication; mid adult; 30-40 years; Photography; Color Image"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/2019-mobile-threat-report\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Open Backdoors and Voice Assistant Attacks: Key Takeaways from 2019&#8217;s Mobile Threat Report"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=94299"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94299\/revisions"}],"predecessor-version":[{"id":214141,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94299\/revisions\/214141"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/89345"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=94299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=94299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=94299"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=94299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}