{"id":95008,"date":"2019-04-25T09:46:24","date_gmt":"2019-04-25T16:46:24","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=95008"},"modified":"2025-08-12T23:46:24","modified_gmt":"2025-08-13T06:46:24","slug":"instagram-hotlist-phishing","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/","title":{"rendered":"Something\u2019s Phishy With the Instagram \u201cHotList\u201d"},"content":{"rendered":"<p>Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages almost identical to the companies they attempt to spoof. We\u2019ve all heard about phishing emails, <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/android-timpdoor-smishing-scam\/\" target=\"_blank\" rel=\"noopener noreferrer\">SMiShing<\/a>, and <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/mobile-and-iot-security\/voice-phishing-tricks-unsuspecting-users\/\" target=\"_blank\" rel=\"noopener noreferrer\">voice phishing<\/a>, but cybercriminals are turning to social media for their schemes as well. Last week, the <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/instagram-nasty-list\/\" target=\"_blank\" rel=\"noopener noreferrer\">\u201cNasty List\u201d phishing scam<\/a> plagued Instagram users everywhere, leading victims to fake login pages as a means to steal their credentials. Now, cybercriminals are capitalizing on the success of the \u201cNasty List\u201d campaign with <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/the-hotlist-is-the-latest-instagram-phishing-scam-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">a new Instagram phishing scam<\/a> called &#8220;The HotList.&#8221;<\/p>\n<p>This scam markets itself as a collection of pictures ranked according to attractiveness. Similar to the \u201cNasty List,\u201d this scheme sends messages to victims through hacked accounts saying that the user has been spotted on this so-called \u201chot list.\u201d The messages claim to have seen the recipient&#8217;s images on the profile @The_HotList_95. If the user goes to the profile and clicks the link in the bio, they are presented with what appears to be a legitimate Instagram login page. Users are tricked into entering their login credentials on the fake login pages, whose URL typically ends in .me domains. Once the cybercriminals acquire the victim&#8217;s login, they are able to use their account to further spread the campaign.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/the-hotlist-is-the-latest-instagram-phishing-scam-attack\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-95011\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/hacked-message-str-576x1024.jpg\" alt=\"\" width=\"400\" height=\"711\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/hacked-message-str-576x1024.jpg 576w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/hacked-message-str-169x300.jpg 169w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/hacked-message-str-281x500.jpg 281w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/hacked-message-str.jpg 750w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/the-hotlist-is-the-latest-instagram-phishing-scam-attack\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-95012\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/04\/hotlist-profile-str-576x1024.jpg\" alt=\"\" width=\"400\" height=\"711\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/hotlist-profile-str-576x1024.jpg 576w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/hotlist-profile-str-169x300.jpg 169w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/hotlist-profile-str-281x500.jpg 281w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/04\/hotlist-profile-str.jpg 750w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><em>Images courtesy of Bleeping Computer.\u00a0<\/em><\/p>\n<h2>How to Keep Your Instagram Secure<\/h2>\n<p>Luckily, there are steps users can take to help ensure that their Instagram account stays secure:<\/p>\n<ul>\n<li><strong>Be skeptical of messages from unknown users.\u00a0<\/strong>If you receive a message from someone you don\u2019t know, it\u2019s best to ignore the message altogether or block the user. And if you think a friend\u2019s social media account has been compromised, look out for spelling mistakes and grammatical errors in their message, which are common indicators of a potential scam at play.<\/li>\n<li><strong>Exercise caution when inspecting links sent to your messages.\u00a0<\/strong>Always inspect a URL before you click on it. In the case of this scam, the URL that appears with the fake login page is clearly incorrect, as it ends in .me.<\/li>\n<li><strong>Reset your password.\u00a0<\/strong>If your account was hacked by \u201cThe HotList\u201d but you still have access to your account, reset your password to regain control of your page.<\/li>\n<\/ul>\n<p>And, of course, to stay updated on all of the latest consumer and mobile security threats, follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home\u00a0<\/a>\u00a0on Twitter, listen to our podcast\u00a0<a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Hackable?<\/em><\/a>, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages&#8230;<\/p>\n","protected":false},"author":674,"featured_media":91547,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13,1838],"tags":[4452,4295,214,4185,4222,321],"coauthors":[3973],"class_list":["post-95008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","category-mobile-security","tag-cybersecurity","tag-mobile","tag-mobile-security1","tag-phishing","tag-social-media","tag-social-networking"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Something\u2019s Phishy With the Instagram \u201cHotList\u201d<\/title>\n<meta name=\"description\" content=\"Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages almost\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Something\u2019s Phishy With the Instagram \u201cHotList\u201d\" \/>\n<meta property=\"og:description\" content=\"Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages almost\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-25T16:46:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T06:46:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/09\/img_1611900461797327.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Something\u2019s Phishy With the Instagram \u201cHotList\u201d\",\"datePublished\":\"2019-04-25T16:46:24+00:00\",\"dateModified\":\"2025-08-13T06:46:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/\"},\"wordCount\":416,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/09\/img_1611900461797327.jpg\",\"keywords\":[\"cybersecurity\",\"mobile\",\"mobile security\",\"Phishing\",\"social media\",\"social networking\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/\",\"name\":\"Something\u2019s Phishy With the Instagram \u201cHotList\u201d\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/09\/img_1611900461797327.jpg\",\"datePublished\":\"2019-04-25T16:46:24+00:00\",\"dateModified\":\"2025-08-13T06:46:24+00:00\",\"description\":\"Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages almost\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/09\/img_1611900461797327.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/09\/img_1611900461797327.jpg\",\"width\":400,\"height\":300,\"caption\":\"Group of friends texting\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Privacy &amp; Identity Protection\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Something\u2019s Phishy With the Instagram \u201cHotList\u201d\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Something\u2019s Phishy With the Instagram \u201cHotList\u201d","description":"Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages almost","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Something\u2019s Phishy With the Instagram \u201cHotList\u201d","og_description":"Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages almost","og_url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-04-25T16:46:24+00:00","article_modified_time":"2025-08-13T06:46:24+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/09\/img_1611900461797327.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Something\u2019s Phishy With the Instagram \u201cHotList\u201d","datePublished":"2019-04-25T16:46:24+00:00","dateModified":"2025-08-13T06:46:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/"},"wordCount":416,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/09\/img_1611900461797327.jpg","keywords":["cybersecurity","mobile","mobile security","Phishing","social media","social networking"],"articleSection":["Internet Security","Privacy &amp; Identity Protection","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/","url":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/","name":"Something\u2019s Phishy With the Instagram \u201cHotList\u201d","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/09\/img_1611900461797327.jpg","datePublished":"2019-04-25T16:46:24+00:00","dateModified":"2025-08-13T06:46:24+00:00","description":"Phishing scams have become incredibly popular these days. Cybercriminals have upped the ante with their tactics, making their phishing messages almost","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/09\/img_1611900461797327.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2018\/09\/img_1611900461797327.jpg","width":400,"height":300,"caption":"Group of friends texting"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/instagram-hotlist-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Privacy &amp; Identity Protection","item":"https:\/\/www.mcafee.com\/blogs\/privacy-identity-protection\/"},{"@type":"ListItem","position":3,"name":"Something\u2019s Phishy With the Instagram \u201cHotList\u201d"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=95008"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95008\/revisions"}],"predecessor-version":[{"id":219153,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/95008\/revisions\/219153"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/91547"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=95008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=95008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=95008"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=95008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}