{"id":94351,"date":"2019-03-03T18:00:26","date_gmt":"2019-03-04T02:00:26","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=94351"},"modified":"2025-06-02T20:32:20","modified_gmt":"2025-06-03T03:32:20","slug":"mcafee-protects-against-suspicious-email-attachments","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/","title":{"rendered":"McAfee Protects Against Suspicious Email Attachments"},"content":{"rendered":"<p>Email remains a top vector for attackers.\u00a0 Over the years, defenses have evolved, and policy-based protections have become standard for email clients such as Microsoft Outlook and Microsoft Mail.\u00a0 Such policies are highly effective, but only if they are maintained as attacker\u2019s keep changing their tactics to evade defenses.\u00a0 For this reason, McAfee endpoint products use a combination of product features and content for increased agility.\u00a0 In McAfee Endpoint Security (ENS) 10.5+, such protection is enabled via the \u2018Detect suspicious email attachments\u2019 option and maintained through DAT content.\u00a0 This capability goes beyond the level of protection offered by email clients by not only blocking applications and scripts, but also a variety of threat types in their native form, as well as those compressed and contained within archives and other formats.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94352\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Configuration-screen.png\" alt=\"\" width=\"885\" height=\"487\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Configuration-screen.png 885w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Configuration-screen-300x165.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Configuration-screen-768x423.png 768w\" sizes=\"auto, (max-width: 885px) 100vw, 885px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 1 &#8211; ENS 10.6.1 Configuration Screen<\/em><\/p>\n<h2>BANK DETAILS.ZIP<\/h2>\n<p>An example of this capability in action can be seen against a recent spam run.<\/p>\n<p>In this campaign, a malicious email message contained the attachment BANK DETAILS.ZIP.\u00a0 Inside this archive was the file BANK DETAILS.ISO.\u00a0 Malicious ISO spam has been increasing over the past six months, and while it is common for ISO files to be blocked by email clients, this is not the case where the ISO is inside of a ZIP.\u00a0 Inside the BANK DETAILS.ISO file resides BANK DETAILS.EXE.\u00a0 Email clients will typically block executable files attached to messages, but not if they are inside a container.<\/p>\n<p>When the email client attempts to write the attachment to disk, ENS scans inside the ZIP and subsequently the contained ISO and EXE files (ZIP -&gt; ISO -&gt; EXE).<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94353\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Toaster-popup.png\" alt=\"\" width=\"364\" height=\"101\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Toaster-popup.png 364w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Toaster-popup-300x83.png 300w\" sizes=\"auto, (max-width: 364px) 100vw, 364px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2 &#8211; ENS Toaster Popup<\/em><\/p>\n<p>In this case, 2-year-old DAT content proactively stopped the threat.<\/p>\n<p>If the system had not been protected, an unsuspecting user might open the ZIP to reveal the ISO.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94355\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/Zip-file.png\" alt=\"\" width=\"510\" height=\"420\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Zip-file.png 510w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/Zip-file-300x247.png 300w\" sizes=\"auto, (max-width: 510px) 100vw, 510px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3 &#8211; Inside ZIP file showing ISO file<\/em><\/p>\n<p>The ISO can then be accessed via Windows Explorer, which appears as a DVD Drive containing the executable, password-stealing, payload.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-94356\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/02\/EXE-file.png\" alt=\"\" width=\"543\" height=\"458\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/EXE-file.png 543w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/02\/EXE-file-300x253.png 300w\" sizes=\"auto, (max-width: 543px) 100vw, 543px\" \/><\/p>\n<p style=\"text-align: center;\">Figure 4 &#8211; EXE file inside Bank Details.ISO<\/p>\n<p>Since the advent of policy-based email attachment blocking, attackers have continued to seek ways to evade that protection. ISO abuse may be the latest chapter in the story, but others are sure to follow.<\/p>\n<p>Tens of thousands of new and unique malicious attachments are blocked each month via the \u2018Suspicious Attachment\u2019 detection feature.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Email remains a top vector for attackers.\u00a0 Over the years, defenses have evolved, and policy-based protections have become standard for&#8230;<\/p>\n","protected":false},"author":906,"featured_media":93271,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4989],"class_list":["post-94351","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>McAfee Protects Against Suspicious Email Attachments | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Email remains a top vector for attackers.\u00a0 Over the years, defenses have evolved, and policy-based protections have become standard for email clients such\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"McAfee Protects Against Suspicious Email Attachments | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Email remains a top vector for attackers.\u00a0 Over the years, defenses have evolved, and policy-based protections have become standard for email clients such\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-04T02:00:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-03T03:32:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Cyber-security-concept-circuit-board-with-Closed-Padlock.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1365\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Craig Schmugar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@craigschmugar\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Craig Schmugar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/\"},\"author\":{\"name\":\"Craig Schmugar\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/63dabecd2685a13fd731e54ea3c5e94e\"},\"headline\":\"McAfee Protects Against Suspicious Email Attachments\",\"datePublished\":\"2019-03-04T02:00:26+00:00\",\"dateModified\":\"2025-06-03T03:32:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/\"},\"wordCount\":400,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Cyber-security-concept-circuit-board-with-Closed-Padlock.jpg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/\",\"name\":\"McAfee Protects Against Suspicious Email Attachments | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Cyber-security-concept-circuit-board-with-Closed-Padlock.jpg\",\"datePublished\":\"2019-03-04T02:00:26+00:00\",\"dateModified\":\"2025-06-03T03:32:20+00:00\",\"description\":\"Email remains a top vector for attackers.\u00a0 Over the years, defenses have evolved, and policy-based protections have become standard for email clients such\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Cyber-security-concept-circuit-board-with-Closed-Padlock.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Cyber-security-concept-circuit-board-with-Closed-Padlock.jpg\",\"width\":2048,\"height\":1365},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"McAfee Protects Against Suspicious Email Attachments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/63dabecd2685a13fd731e54ea3c5e94e\",\"name\":\"Craig Schmugar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/5c6bb5f55db2401e220f005c853d55e7\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/2017-Schmugar-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/2017-Schmugar-96x96.jpg\",\"caption\":\"Craig Schmugar\"},\"description\":\"Craig Schmugar is a Sr. Principal Engineer at McAfee. Since joining McAfee in 2000 he has worked in different areas of research, from Malware Operations to Innovation Research. More recently Craig has been focused on endpoint product efficacy; assessing detection effectiveness and seeking opportunities to make it stronger. He has over a dozen pending or issued patents to his name. Craig has a bachelor\u2019s degree in Music Performance from the University of North Florida, and a master\u2019s degree in Jazz pedagogy from Northwestern University.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/craigschmugar\/\",\"https:\/\/x.com\/craigschmugar\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/craig-schumgar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"McAfee Protects Against Suspicious Email Attachments | McAfee Blog","description":"Email remains a top vector for attackers.\u00a0 Over the years, defenses have evolved, and policy-based protections have become standard for email clients such","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"McAfee Protects Against Suspicious Email Attachments | McAfee Blog","og_description":"Email remains a top vector for attackers.\u00a0 Over the years, defenses have evolved, and policy-based protections have become standard for email clients such","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-03-04T02:00:26+00:00","article_modified_time":"2025-06-03T03:32:20+00:00","og_image":[{"width":2048,"height":1365,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Cyber-security-concept-circuit-board-with-Closed-Padlock.jpg","type":"image\/jpeg"}],"author":"Craig Schmugar","twitter_card":"summary_large_image","twitter_creator":"@craigschmugar","twitter_site":"@McAfee","twitter_misc":{"Written by":"Craig Schmugar","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/"},"author":{"name":"Craig Schmugar","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/63dabecd2685a13fd731e54ea3c5e94e"},"headline":"McAfee Protects Against Suspicious Email Attachments","datePublished":"2019-03-04T02:00:26+00:00","dateModified":"2025-06-03T03:32:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/"},"wordCount":400,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Cyber-security-concept-circuit-board-with-Closed-Padlock.jpg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/","name":"McAfee Protects Against Suspicious Email Attachments | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Cyber-security-concept-circuit-board-with-Closed-Padlock.jpg","datePublished":"2019-03-04T02:00:26+00:00","dateModified":"2025-06-03T03:32:20+00:00","description":"Email remains a top vector for attackers.\u00a0 Over the years, defenses have evolved, and policy-based protections have become standard for email clients such","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Cyber-security-concept-circuit-board-with-Closed-Padlock.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/12\/Cyber-security-concept-circuit-board-with-Closed-Padlock.jpg","width":2048,"height":1365},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/mcafee-protects-against-suspicious-email-attachments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"McAfee Protects Against Suspicious Email Attachments"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/63dabecd2685a13fd731e54ea3c5e94e","name":"Craig Schmugar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/5c6bb5f55db2401e220f005c853d55e7","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/2017-Schmugar-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/2017-Schmugar-96x96.jpg","caption":"Craig Schmugar"},"description":"Craig Schmugar is a Sr. Principal Engineer at McAfee. Since joining McAfee in 2000 he has worked in different areas of research, from Malware Operations to Innovation Research. More recently Craig has been focused on endpoint product efficacy; assessing detection effectiveness and seeking opportunities to make it stronger. He has over a dozen pending or issued patents to his name. Craig has a bachelor\u2019s degree in Music Performance from the University of North Florida, and a master\u2019s degree in Jazz pedagogy from Northwestern University.","sameAs":["https:\/\/www.linkedin.com\/in\/craigschmugar\/","https:\/\/x.com\/craigschmugar"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/craig-schumgar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94351","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/906"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=94351"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94351\/revisions"}],"predecessor-version":[{"id":214969,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94351\/revisions\/214969"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93271"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=94351"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=94351"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=94351"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=94351"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}