{"id":96823,"date":"2022-10-10T06:16:05","date_gmt":"2022-10-10T13:16:05","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=96823"},"modified":"2025-04-24T23:55:45","modified_gmt":"2025-04-25T06:55:45","slug":"the-seven-main-phishing-lures-of-cybercriminals","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/","title":{"rendered":"The Seven Main Phishing Lures of Cybercriminals"},"content":{"rendered":"<p>One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to <a href=\"https:\/\/www.phishing.org\/history-of-phishing\" target=\"_blank\" rel=\"noopener noreferrer\">America Online (AOL)<\/a> every day. And if we know one thing about cybercriminals, it\u2019s that they tend to follow the masses. In earlier iterations, phishing attempts were easy to spot due to link misspellings, odd link redirects, and other giveaways. However, today\u2019s phishing tricks have become personalized, advanced, and shrouded in new disguises. So, let\u2019s take a look at some of the different types, real-world examples and how you can recognize a phishing lure.<\/p>\n<h2><strong>Be Wary of Suspicious Emails<\/strong><\/h2>\n<p>Every day, users get sent thousands of emails. Some are important, but most are just plain junk. These emails often get filtered to a spam folder, where <a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\" target=\"_blank\" rel=\"noopener noreferrer\">phishing emails<\/a> are often trapped. But sometimes they slip through the digital cracks, into a main inbox. These messages typically have urgent requests that require the user to input sensitive information or fill out a form through an external link. These phishing emails can take on <a href=\"https:\/\/now.uiowa.edu\/2019\/09\/avoid-these-10-common-phishing-emails\" target=\"_blank\" rel=\"noopener noreferrer\">many personas<\/a>, such as banking institutions, popular services, and universities. As such, always remember to stay vigilant and double-check the source before giving away any information.<\/p>\n<h2><strong>Link Look-A-Likes<\/strong><\/h2>\n<p>A sort of sibling to email phishing, link manipulation is when a cybercriminal sends users a link to malicious website under the ruse of an urgent request or deadline. After clicking on the deceptive link, the user is brought to the cybercriminal\u2019s fake website rather than a real or verified link and asked to input or verify personal details. This exact scenario happened last year when several universities and businesses fell for a campaign disguised as a package delivery issue from <a href=\"https:\/\/www.helpnetsecurity.com\/2018\/09\/20\/manipulation-tactics-phishing-attacks\/\" target=\"_blank\" rel=\"noopener noreferrer\">FedEx<\/a>. This scheme is a reminder that anyone can fall for a cybercriminals trap, which is why users always have to careful when clicking, as well as ensure the validity of the claim and source of the link. To check the validity, it\u2019s always a good idea to contact the source directly to see if the notice or request is legitimate.<\/p>\n<h2><strong>Gone Whaling<\/strong><\/h2>\n<p>Corporate executives have always been high-level targets for cybercriminals. That\u2019s why C-suite members have a special name for when cybercriminals try to phish them \u2013\u00a0whaling. What sounds like a silly name is anything but. In this sophisticated, as well as personalized attack, a cybercriminal attempts to manipulate the target to obtain money, trade secrets, or employee information. In recent years, organizations have become smarter and in turn, whaling has slowed down. Before the slowdown, however, many companies were hit with data breaches due to cybercriminals impersonating C-suite members and asking lower-level employees for company information. To avoid this pesky phishing attempt, train C-suite members to be able to identify phishing, as well as encourage unique, strong passwords on all devices and accounts.<\/p>\n<h2><strong>Spear Target Acquired <\/strong><\/h2>\n<p><strong>\u00a0<\/strong>Just as email spam and link manipulation are phishing siblings, so too are whaling and <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/spear-phishing\" target=\"_blank\" rel=\"noopener noreferrer\">spear-phishing<\/a>. While whaling attacks target the C-suite of a specific organization, spear-phishing rather targets lower-level employees of a specific organization. Just as selective and sophisticated as whaling, spear-phishing targets members of a specific organization to gain access to critical information, like staff credentials, intellectual property, customer data, and more. Spear-phishing attacks tend to be more <a href=\"https:\/\/www.digitaltrends.com\/computing\/what-is-phishing\/\" target=\"_blank\" rel=\"noopener noreferrer\">lucrative<\/a> than a run-of-the-mill phishing attack, which is why cybercriminals will often spend more time crafting and obtaining personal information from these specific targets. To avoid falling for this phishing scheme, employees must have proper security training so they know how to spot a phishing lure when they see one.<\/p>\n<h2><strong>Spoofed Content <\/strong><\/h2>\n<p>With so many things to click on a website, it\u2019s easy to see why cybercriminals would take advantage of that fact. <a href=\"https:\/\/searchsoftwarequality.techtarget.com\/definition\/content-spoofing\" target=\"_blank\" rel=\"noopener noreferrer\">Content spoofing<\/a> is based on exactly that notion \u2013 a cybercriminal alters a section of content on a page of a reliable website to redirect an unsuspecting user to an illegitimate website where they are then asked to enter personal details. The best way to steer clear of this phishing scheme is to check that the URL matches the primary domain name.<\/p>\n<h2><strong>Phishing in a Search Engine Pond<\/strong><\/h2>\n<p><strong>\u00a0<\/strong>When users search for something online, they expect reliable resources. But sometimes, phishing sites can sneak their way into legitimate results. This tactic is called search engine phishing and involves search engines being manipulated into showing malicious results. Users are attracted to these sites by discount offers for products or services. However, when the user goes to buy said product or service, their personal details are collected by the deceptive site. To stay secure, watch out for potentially sketchy ads in particular and when in doubt always navigate to the official site first.<\/p>\n<h2><strong>Who\u2019s That Caller?<\/strong><\/h2>\n<p>With new technologies come new avenues for cybercriminals to try and obtain personal data. Vishing, or <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/mobile-and-iot-security\/voice-phishing-tricks-unsuspecting-users\/\" target=\"_blank\" rel=\"noopener noreferrer\">voice phishing<\/a>, is one of those new avenues. In a vishing attempt, cybercriminals contact users by phone and ask the user to dial a number to receive identifiable bank account or personal information through the phone by using a fake caller ID. For example, just <a href=\"https:\/\/krebsonsecurity.com\/2018\/10\/voice-phishing-scams-are-getting-more-clever\/\" target=\"_blank\" rel=\"noopener noreferrer\">last year<\/a>, a security researcher received a call from their financial institution saying that their card had been compromised. Instead of offering a replacement card, the bank suggested simply blocking any future geographic-specific transactions. Sensing something was up, the researcher hung up and dialed his bank \u2013\u00a0they had no record of the call or the fraudulent card transactions. This scenario, as sophisticated as it sounds, reminds users to always double-check directly with businesses before sharing any personal information.<\/p>\n<p>As you can see, phishing comes in all shapes and sizes. This blog only scratches the surface of all the ways cybercriminals lure unsuspecting users into phishing traps. The best way to stay protected is to invest in comprehensive security and stay <a href=\"https:\/\/securingtomorrow.mcafee.com\/category\/consumer\/\" target=\"_blank\" rel=\"noopener noreferrer\">updated on new phishing scams<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at&#8230;<\/p>\n","protected":false},"author":674,"featured_media":160148,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[5918,4185,5637,5679,5919,5698,5699],"coauthors":[3973],"class_list":["post-96823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-email-phishing","tag-phishing","tag-phishing-attacks","tag-phishing-scams","tag-spoofed-content","tag-vishing","tag-voice-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Seven Main Phishing Lures of Cybercriminals | McAfee Blog<\/title>\n<meta name=\"description\" content=\"One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Seven Main Phishing Lures of Cybercriminals | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-10T13:16:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-25T06:55:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_101122.png\" \/>\n\t<meta property=\"og:image:width\" content=\"308\" \/>\n\t<meta property=\"og:image:height\" content=\"208\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"The Seven Main Phishing Lures of Cybercriminals\",\"datePublished\":\"2022-10-10T13:16:05+00:00\",\"dateModified\":\"2025-04-25T06:55:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/\"},\"wordCount\":981,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_101122.png\",\"keywords\":[\"email phishing\",\"Phishing\",\"phishing attacks\",\"phishing scams\",\"spoofed content\",\"vishing\",\"voice phishing\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/\",\"name\":\"The Seven Main Phishing Lures of Cybercriminals | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_101122.png\",\"datePublished\":\"2022-10-10T13:16:05+00:00\",\"dateModified\":\"2025-04-25T06:55:45+00:00\",\"description\":\"One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_101122.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_101122.png\",\"width\":308,\"height\":208},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Seven Main Phishing Lures of Cybercriminals\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Seven Main Phishing Lures of Cybercriminals | McAfee Blog","description":"One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Seven Main Phishing Lures of Cybercriminals | McAfee Blog","og_description":"One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2022-10-10T13:16:05+00:00","article_modified_time":"2025-04-25T06:55:45+00:00","og_image":[{"width":308,"height":208,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_101122.png","type":"image\/png"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"The Seven Main Phishing Lures of Cybercriminals","datePublished":"2022-10-10T13:16:05+00:00","dateModified":"2025-04-25T06:55:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/"},"wordCount":981,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_101122.png","keywords":["email phishing","Phishing","phishing attacks","phishing scams","spoofed content","vishing","voice phishing"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/","name":"The Seven Main Phishing Lures of Cybercriminals | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_101122.png","datePublished":"2022-10-10T13:16:05+00:00","dateModified":"2025-04-25T06:55:45+00:00","description":"One of the oldest tricks in the cybercrime playbook is phishing. It first hit the digital scene in 1995, at a time when millions flocked to America Online","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_101122.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/10\/300x200_Blog_101122.png","width":308,"height":208},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/the-seven-main-phishing-lures-of-cybercriminals\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"The Seven Main Phishing Lures of Cybercriminals"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96823","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=96823"}],"version-history":[{"count":6,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96823\/revisions"}],"predecessor-version":[{"id":212216,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96823\/revisions\/212216"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/160148"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=96823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=96823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=96823"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=96823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}