{"id":94780,"date":"2019-03-26T06:00:30","date_gmt":"2019-03-26T13:00:30","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=94780"},"modified":"2025-04-24T23:30:11","modified_gmt":"2025-04-25T06:30:11","slug":"social-media-where-cybercrime-lurks-in-the-shadows","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/","title":{"rendered":"Social Media: Where Cybercrime Lurks in the Shadows"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-95041 alignright\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-032219-R3_TW-1024x576.png\" alt=\"\" width=\"644\" height=\"362\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-032219-R3_TW-1024x576.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-032219-R3_TW-300x169.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-032219-R3_TW-768x432.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-032219-R3_TW-889x500.png 889w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/McAfee-MobileBlog-032219-R3_TW.png 1200w\" sizes=\"auto, (max-width: 644px) 100vw, 644px\" \/>When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark web. Last year, however, cybercriminals made the jump over to social media and cashed in big \u2013 <a href=\"https:\/\/www.helpnetsecurity.com\/2019\/02\/27\/social-media-enabled-cybercrime\/\" target=\"_blank\" rel=\"noopener noreferrer\">$3 billion worth<\/a>, as a matter of fact. With approximately <a href=\"https:\/\/www.statista.com\/statistics\/278414\/number-of-worldwide-social-network-users\/\" target=\"_blank\" rel=\"noopener noreferrer\">2.77 billion<\/a> people using one social media account or more, it\u2019s no wonder these bad actors have followed the masses. While the average user distrusts the dark web, they do trust their chosen social media platforms. Whether it&#8217;s sharing birthdates or a current location, or accepting a follow or message request from strangers, users in front of a screen feel secure. Although, as the line between social platforms and the dark web quickly blurs, the events behind the screen are the real issue.<\/p>\n<p>Since 2017, cryptomining malware has <a href=\"https:\/\/www.helpnetsecurity.com\/2019\/02\/27\/social-media-enabled-cybercrime\/\" target=\"_blank\" rel=\"noopener noreferrer\">exploded on a global scale<\/a>, with over half of the identified strains found on social media sites. Utilizing apps, advertisements, and malicious links, cybercriminals were able to deliver these attacks and earn $250 million per year. Not only are social media platforms being used to distribute cryptomining malware, but they are also used as a major source for spreading <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/security-awareness\/cybercriminal-social-media.html\" target=\"_blank\" rel=\"noopener noreferrer\">other types of malware<\/a> \u2013 malvertisments, faulty plug-ins, and apps \u2013 that draw users in by offering \u201ctoo good to be true\u201d deals. Once clicked on, the malware attacks. From there, cybercriminals can obtain data, establish keyloggers, dispense ransomware, and lurk in the shadows of social media accounts in wait for the next opportunity.<\/p>\n<p>That next opportunity could also be on a completely different social media platform. As these sites unknowingly make it easier for malware to spread from one site to another. Many social media accounts interconnect with one another across platforms, which enables \u201c<a href=\"https:\/\/www.cse.msu.edu\/~enbody\/ISACA_JAN_2011_Chain_Exploitation.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">chain exploitation<\/a>,\u201d or where malware can jump from one account to the next.<\/p>\n<p>In short, social media is a cash cow for cybercriminals, and they are showing no sign of slowing down. What it really comes down to is social platforms, like Instagram and Facebook, attract a significant number of users and are going to draw in a criminal component too. However, if you take the proper security precautions ahead of time, you can fight off bad actors and continuously scroll with confidence.<\/p>\n<h2>Tips to help you get started:<\/h2>\n<ul>\n<li><strong>Limit the amount of personal information shared in the first place.<\/strong> Avoid posting home addresses, full birth dates, and employer information, as well as exact location details of where you are.<\/li>\n<li><strong>Be wary of messages and follow requests from strangers.<\/strong> Avoid clicking on links sent by someone you don\u2019t know personally.<\/li>\n<li><strong>Report any spam posts or messages you encounter to the social media platform<\/strong>. Then they can stop the threat from spreading to other accounts.<\/li>\n<li><strong>Always use comprehensive security software.<\/strong> To help protect you from viruses, spyware, and other digital threats that may emerge from social media sites, consider <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Total Protection<\/a> or <a href=\"http:\/\/app.appsflyer.com\/id724596345?pid=Blog&amp;c=Global\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Mobile Security<\/a>.<\/li>\n<\/ul>\n<p>Interested in learning more about IoT and mobile security trends and information?<\/p>\n<ul>\n<li>Take our quiz on best practices on how to stay secure on social media<\/li>\n<li>Follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a>\u00a0on Twitter, and \u2018Like\u201d us on\u00a0<a href=\"https:\/\/www.facebook.com\/mcafee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>[os-widget path=&#8221;\/mcafee\/how-safe-are-you-on-social-media&#8221;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark&#8230;<\/p>\n","protected":false},"author":674,"featured_media":94782,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[76,4238,214,4222],"coauthors":[3973],"class_list":["post-94780","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-cybercrime","tag-mcafee-mobile-security","tag-mobile-security1","tag-social-media"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Social Media: Where Cybercrime Lurks in the Shadows | McAfee Blog<\/title>\n<meta name=\"description\" content=\"When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark web. Last year, however,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social Media: Where Cybercrime Lurks in the Shadows | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark web. Last year, however,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-26T13:00:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T06:30:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook60.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Social Media: Where Cybercrime Lurks in the Shadows\",\"datePublished\":\"2019-03-26T13:00:30+00:00\",\"dateModified\":\"2025-04-25T06:30:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/\"},\"wordCount\":529,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook60.jpg\",\"keywords\":[\"cybercrime\",\"McAfee Mobile Security\",\"mobile security\",\"social media\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/\",\"name\":\"Social Media: Where Cybercrime Lurks in the Shadows | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook60.jpg\",\"datePublished\":\"2019-03-26T13:00:30+00:00\",\"dateModified\":\"2025-04-25T06:30:11+00:00\",\"description\":\"When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark web. Last year, however,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook60.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook60.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Social Media: Where Cybercrime Lurks in the Shadows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Media: Where Cybercrime Lurks in the Shadows | McAfee Blog","description":"When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark web. Last year, however,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Social Media: Where Cybercrime Lurks in the Shadows | McAfee Blog","og_description":"When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark web. Last year, however,","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-03-26T13:00:30+00:00","article_modified_time":"2025-04-25T06:30:11+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook60.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Social Media: Where Cybercrime Lurks in the Shadows","datePublished":"2019-03-26T13:00:30+00:00","dateModified":"2025-04-25T06:30:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/"},"wordCount":529,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook60.jpg","keywords":["cybercrime","McAfee Mobile Security","mobile security","social media"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/","name":"Social Media: Where Cybercrime Lurks in the Shadows | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook60.jpg","datePublished":"2019-03-26T13:00:30+00:00","dateModified":"2025-04-25T06:30:11+00:00","description":"When you think of cybercrime, the first thing that comes to mind is most likely cybercriminals operating on the dark web. Last year, however,","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook60.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/03\/facebook60.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/social-media-where-cybercrime-lurks-in-the-shadows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Social Media: Where Cybercrime Lurks in the Shadows"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94780","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=94780"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94780\/revisions"}],"predecessor-version":[{"id":212214,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/94780\/revisions\/212214"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/94782"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=94780"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=94780"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=94780"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=94780"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}