{"id":94534,"date":"2019-03-12T06:00:47","date_gmt":"2019-03-12T13:00:47","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=94534"},"modified":"2025-05-26T15:48:00","modified_gmt":"2025-05-26T22:48:00","slug":"voice-phishing-tricks-unsuspecting-users","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/","title":{"rendered":"You Rang? New Voice Phishing Attack Tricks Unsuspecting Users"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-95037 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-030619-R3_TW-1024x576.png\" alt=\"\" width=\"627\" height=\"353\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-030619-R3_TW-1024x576.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-030619-R3_TW-300x169.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-030619-R3_TW-768x432.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-030619-R3_TW-889x500.png 889w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-030619-R3_TW.png 1200w\" sizes=\"auto, (max-width: 627px) 100vw, 627px\" \/>In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to get ahold of personal data and money. With this knowledge, we\u2019ve become smarter and keen to the tricks of the cybercrime trade. However, cybercriminals have become <a href=\"https:\/\/krebsonsecurity.com\/2018\/10\/voice-phishing-scams-are-getting-more-clever\/\" target=\"_blank\" rel=\"noopener noreferrer\">smarter<\/a> too, and therefore their attacks have become more complex. Take phishing, for example. There has been a dramatic shift in phishing attacks, from simple and general to complex and personalized. What was once spoofing emails or websites has now evolved into something more devious \u2013 vishing, or voice phishing. This method involves a cybercriminal attempting to gain access to a victim\u2019s personal or financial information by pretending to be a financial institution via phone call. And now a new vishing attack is proving to be more difficult to detect than the typical phishing scams.<\/p>\n<p>In April 2018, Min-Chang Jang, a manager at Korea Financial Security Institute and Korea University, made a breakthrough in his investigation into <a href=\"https:\/\/www.darkreading.com\/threat-intelligence\/whose-line-is-it-when-voice-phishing-attacks-get-sneaky\/d\/d-id\/1333982?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple\" target=\"_blank\" rel=\"noopener noreferrer\">malicious apps designed to intercept calls<\/a> to users from legitimate numbers. This tactic puts a new but troubling twist on the original voice phishing cyberattack. To be successful in this venture, a hacker must first convince a user to download a fake app. To do this, a link is sent to the victim, luring them in with an amazing offer around loan refinancing or something similar, which then prompts the user to download the faulty app. If the target takes the bait, calls will start to come in from the financial institution following up on the possible loan refinancing offer. The call, however, isn\u2019t connected to the actual financial company, rather it is intercepted and connected to the bad actor.<\/p>\n<h2>Proactive Steps to Improve Security<\/h2>\n<p>We know that as we adjust to the world around us and become smarter about our security, cybercriminals will do the same with their thievery. Today it\u2019s an advanced vishing attack, tomorrow it could be a different type of phishing vector. However, users can rest assured that companies like McAfee are working tirelessly to ensure our users can thwart any cyberattack that comes their way. While this voice phishing attack is hard to detect, here are some proactive steps you can take to ensure you don\u2019t fall victim to cybercriminals\u2019 schemes:<\/p>\n<ul>\n<li><strong>Only install apps from authorized sources. <\/strong>To avoid malicious apps getting ahold of your data, only download apps from authorized vendors. For Android users, use the Google Play Store. For iPhone users, use the Apple App Store. Never trust a third-party app with information that could be exploited in the wrong hands.<\/li>\n<li><strong>Turn on caller ID or other services. <\/strong>Numerous carriers now offer free services that notify users of possible scam calls. And a lot of phones come with call-identifying capabilities that can give the user a quick diagnostic of whether the call is legitimate or not. With this feature, users can report scam calls to a database too.<\/li>\n<li><strong>Always think twice. <\/strong>In addition to tips and apps, there\u2019s no better judge than common sense so if an offer or deal sounds too good to be true, it most likely is.<\/li>\n<\/ul>\n<p>Interested in learning more about IoT and mobile security trends and information? Follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u201d us on\u00a0<a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this digital day and age, the average user is likely familiar with the techniques and avenues cybercriminals use to&#8230;<\/p>\n","protected":false},"author":674,"featured_media":94535,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,10661,1838],"tags":[32,214,5698,5699],"coauthors":[3973],"class_list":["post-94534","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-internet-security","category-mobile-security","tag-data-protection","tag-mobile-security1","tag-vishing","tag-voice-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>You Rang? New Voice Phishing Attack Tricks Unsuspecting Users<\/title>\n<meta name=\"description\" content=\"What was once spoofing emails or websites has now evolved into something more devious \u2013 vishing, or voice phishing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You Rang? New Voice Phishing Attack Tricks Unsuspecting Users\" \/>\n<meta property=\"og:description\" content=\"What was once spoofing emails or websites has now evolved into something more devious \u2013 vishing, or voice phishing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-12T13:00:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-26T22:48:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook15.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"You Rang? New Voice Phishing Attack Tricks Unsuspecting Users\",\"datePublished\":\"2019-03-12T13:00:47+00:00\",\"dateModified\":\"2025-05-26T22:48:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/\"},\"wordCount\":555,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook15.jpg\",\"keywords\":[\"data protection\",\"mobile security\",\"vishing\",\"voice phishing\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/\",\"name\":\"You Rang? New Voice Phishing Attack Tricks Unsuspecting Users\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook15.jpg\",\"datePublished\":\"2019-03-12T13:00:47+00:00\",\"dateModified\":\"2025-05-26T22:48:00+00:00\",\"description\":\"What was once spoofing emails or websites has now evolved into something more devious \u2013 vishing, or voice phishing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook15.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook15.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"You Rang? New Voice Phishing Attack Tricks Unsuspecting Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"You Rang? New Voice Phishing Attack Tricks Unsuspecting Users","description":"What was once spoofing emails or websites has now evolved into something more devious \u2013 vishing, or voice phishing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"You Rang? New Voice Phishing Attack Tricks Unsuspecting Users","og_description":"What was once spoofing emails or websites has now evolved into something more devious \u2013 vishing, or voice phishing.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-03-12T13:00:47+00:00","article_modified_time":"2025-05-26T22:48:00+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook15.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"You Rang? New Voice Phishing Attack Tricks Unsuspecting Users","datePublished":"2019-03-12T13:00:47+00:00","dateModified":"2025-05-26T22:48:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/"},"wordCount":555,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook15.jpg","keywords":["data protection","mobile security","vishing","voice phishing"],"articleSection":["How To Guides and Tutorials","Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/","name":"You Rang? New Voice Phishing Attack Tricks Unsuspecting Users","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook15.jpg","datePublished":"2019-03-12T13:00:47+00:00","dateModified":"2025-05-26T22:48:00+00:00","description":"What was once spoofing emails or websites has now evolved into something more devious \u2013 vishing, or voice phishing.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook15.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook15.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/voice-phishing-tricks-unsuspecting-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"You Rang? New Voice Phishing Attack Tricks Unsuspecting Users"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=94534"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94534\/revisions"}],"predecessor-version":[{"id":214361,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94534\/revisions\/214361"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/94535"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=94534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=94534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=94534"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=94534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}