{"id":96610,"date":"2019-09-05T10:28:19","date_gmt":"2019-09-05T17:28:19","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=96610"},"modified":"2025-05-26T00:50:05","modified_gmt":"2025-05-26T07:50:05","slug":"iphone-ios-hacks","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/","title":{"rendered":"iPhone Users: Here&#8217;s What You Need to Know About the Latest iOS Hacks"},"content":{"rendered":"<p>iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been <a href=\"https:\/\/securingtomorrow.mcafee.com\/other-blogs\/mcafee-labs\/apple-ios-attack-underscores-importance-of-threat-research\/\" target=\"_blank\" rel=\"noopener noreferrer\">exploiting multiple iPhone vulnerabilities<\/a> for the last two years. How? Simply by getting users to visit a website.<\/p>\n<p>How exactly does this exploitation campaign work? According to <a href=\"https:\/\/www.wired.com\/story\/ios-attack-watering-hole-project-zero\/\" target=\"_blank\" rel=\"noopener noreferrer\">WIRED<\/a>, researchers revealed a handful of websites that had assembled five exploit chains. These exploit chains are tools that link security vulnerabilities together and allow a hacker to penetrate each layer of iOS digital protections. This campaign took advantage of 14 security flaws, resulting in the attacker gaining complete control over a user\u2019s phone. Researchers state that these malicious sites were programmed to assess the Apple devices that loaded them and compromise the devices with powerful monitoring malware if possible. Once the malware was installed, it could monitor live location data, grab photos, contacts, passwords, or other sensitive information from the iOS Keychain.<\/p>\n<p>So, what makes this attack unique? For starters, this exploitation campaign hides in plain sight, uploading information without any encryption. If a user monitored their network traffic, they would notice activity as their data was being uploaded to the hacker&#8217;s server. Additionally, a user would be able to see suspicious activity if they connected their device to their computer and reviewed console logs. Console logs show the codes for the programs being run on the device. However, since this method would require a user to take the extra step of plugging their iPhone into a computer, it\u2019s highly unlikely that they would notice the suspicious activity.<\/p>\n<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-95375\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/05\/iStock-972541436-min-1024x700.jpg\" alt=\"\" width=\"800\" height=\"547\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/iStock-972541436-min-1024x700.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/iStock-972541436-min-300x205.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/iStock-972541436-min-768x525.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/iStock-972541436-min-731x500.jpg 731w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/iStock-972541436-min.jpg 2048w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/strong><\/p>\n<h2>Tips to Help You Secure Your Devices<\/h2>\n<p>Although iOS exploits usually require a variety of complexities to be successful, this exploitation campaign proves that iOS hacking is very much alive and kicking. So, what can Apple users do to help ward off these kinds of attacks? Here\u2019s how you can help keep your device secure:<\/p>\n<ul>\n<li><strong>Install automatic updates.<\/strong> In your device settings, choose to have automatic updates installed on your device. This will ensure that you have the latest security patches for vulnerabilities like the ones leveraged in these exploit chains as soon as they\u2019re available.<\/li>\n<li><strong>Limit app permissions.<\/strong> Regularly review the permissions granted to your apps, especially for sensitive features like camera, microphone, and location. Only allow access when necessary to reduce the chances of malicious misuse.<\/li>\n<li><strong>Avoid clicking suspicious links.<\/strong> Phishing remains a common attack method. Be cautious when receiving unsolicited messages or emails with links\u2014even if they appear to come from known contacts. When in doubt, navigate to websites manually rather than clicking links.<\/li>\n<\/ul>\n<p>And, as always, to stay on top of the latest consumer and mobile security threats, be sure to follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a>\u00a0on Twitter, listen to our podcast\u00a0<a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Hackable?<\/em><\/a>\u00a0and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently&#8230;<\/p>\n","protected":false},"author":674,"featured_media":93647,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[40,4452,5084,180,214],"coauthors":[3973],"class_list":["post-96610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-apple","tag-cybersecurity","tag-iot","tag-malware","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>iPhone Users: Here&#039;s What You Need to Know About the Latest iOS Hacks<\/title>\n<meta name=\"description\" content=\"iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"iPhone Users: Here&#039;s What You Need to Know About the Latest iOS Hacks\" \/>\n<meta property=\"og:description\" content=\"iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-05T17:28:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-26T07:50:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter61.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"iPhone Users: Here&#8217;s What You Need to Know About the Latest iOS Hacks\",\"datePublished\":\"2019-09-05T17:28:19+00:00\",\"dateModified\":\"2025-05-26T07:50:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/\"},\"wordCount\":480,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter61.jpg\",\"keywords\":[\"Apple\",\"cybersecurity\",\"IoT\",\"malware\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/\",\"name\":\"iPhone Users: Here's What You Need to Know About the Latest iOS Hacks\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter61.jpg\",\"datePublished\":\"2019-09-05T17:28:19+00:00\",\"dateModified\":\"2025-05-26T07:50:05+00:00\",\"description\":\"iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter61.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter61.jpg\",\"width\":1024,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"iPhone Users: Here&#8217;s What You Need to Know About the Latest iOS Hacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"iPhone Users: Here's What You Need to Know About the Latest iOS Hacks","description":"iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"iPhone Users: Here's What You Need to Know About the Latest iOS Hacks","og_description":"iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-09-05T17:28:19+00:00","article_modified_time":"2025-05-26T07:50:05+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter61.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"iPhone Users: Here&#8217;s What You Need to Know About the Latest iOS Hacks","datePublished":"2019-09-05T17:28:19+00:00","dateModified":"2025-05-26T07:50:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/"},"wordCount":480,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter61.jpg","keywords":["Apple","cybersecurity","IoT","malware","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/","name":"iPhone Users: Here's What You Need to Know About the Latest iOS Hacks","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter61.jpg","datePublished":"2019-09-05T17:28:19+00:00","dateModified":"2025-05-26T07:50:05+00:00","description":"iPhone hacks have often been considered by some to be a rare occurrence. However, a group of Google researchers recently discovered that someone has been","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter61.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/01\/twitter61.jpg","width":1024,"height":576},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/iphone-ios-hacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"iPhone Users: Here&#8217;s What You Need to Know About the Latest iOS Hacks"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=96610"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96610\/revisions"}],"predecessor-version":[{"id":214279,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96610\/revisions\/214279"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/93647"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=96610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=96610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=96610"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=96610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}