{"id":97057,"date":"2019-10-10T09:15:04","date_gmt":"2019-10-10T16:15:04","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=97057"},"modified":"2025-08-12T19:29:54","modified_gmt":"2025-08-13T02:29:54","slug":"toms-shoes-hack","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/","title":{"rendered":"Watch Your Step: Insights on the TOMS Shoes Mailing Hack"},"content":{"rendered":"<p>You\u2019re familiar with the cybercriminals that go after users\u2019 credit card information and look to spread malicious links, but recently, one hacker decided to send a different message. According to <a href=\"https:\/\/www.vice.com\/en_us\/article\/a35434\/toms-shoes-mailing-list-hacked-hacker-says-log-off?wpisrc=nl_cybersecurity202&amp;wpmm=1\">Vice&#8217;s Motherboard<\/a>, a hacker accessed TOMS Shoes\u2019 mailing list and sent an email encouraging users to log off and go enjoy the outdoors.<\/p>\n<p>The email specifically stated, \u201chey you, don\u2019t look at a digital screen all day, theres a world out there that you\u2019re missing out on.\u201d The hacker claimed to have compromised TOMS a while back but never had any malicious intent and felt it had been too long to disclose the breach to the authorities. Although the hacker didn&#8217;t tell Motherboard how he or she specifically gained access to the TOMS account, they did voice their frustrations with hackers who steal data from large companies and innocent civilians.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-96832\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/iStock-946710932-min-1024x684.jpg\" alt=\"\" width=\"800\" height=\"534\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-946710932-min-1024x684.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-946710932-min-300x200.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-946710932-min-768x513.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-946710932-min-749x500.jpg 749w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/iStock-946710932-min.jpg 1920w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>Representatives from TOMS stated that they are actively looking into the breach and warned users to not interact with the message. And while this particular hacker had no malicious intent, users could have a potential phishing scam on their hands if these email addresses had ended up in the wrong hands.<\/p>\n<h2>Tips to Avoid Avoid Phishing Emails<\/h2>\n<p>So, whether you&#8217;re a TOMS shoe wearer or not, it&#8217;s important to stay updated on potential cyberthreats so you can recognize immediately. Here are some tips to help you avoid accidentally treading on potential phishing emails:<\/p>\n<ul>\n<li><strong>Go directly to the source.<\/strong>\u00a0Be skeptical of emails claiming to be from companies with peculiar asks or messages. Instead of clicking on a link within the email, it\u2019s best to go straight to the company\u2019s website to check the status of your account or contact customer service.<\/li>\n<li><strong>Be cautious of emails asking you to take action.<\/strong>\u00a0If you receive an email asking you to take a certain action or download software, don\u2019t click on anything within the message. Instead, go straight to the organization\u2019s website. This will prevent you from downloading malicious content from phishing links.<\/li>\n<li><strong>Hover over links to see and verify the URL.<\/strong> If someone sends you an email with a link, hover over the link without actually clicking on it. This will allow you to see a link preview. If the URL looks suspicious, don\u2019t interact with it and delete the email altogether.<\/li>\n<\/ul>\n<p>And, as always, to stay on top of the latest consumer and mobile security threats, be sure to follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\">@McAfee_Home<\/a>\u00a0on Twitter, listen to our podcast\u00a0<a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\"><em>Hackable?<\/em><\/a>\u00a0and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You\u2019re familiar with the cybercriminals that go after users\u2019 credit card information and look to spread malicious links, but recently,&#8230;<\/p>\n","protected":false},"author":674,"featured_media":95235,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[4452,3923,4185],"coauthors":[3973],"class_list":["post-97057","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybersecurity","tag-email-and-web-security","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Watch Your Step: Insights on the TOMS Shoes Mailing Hack<\/title>\n<meta name=\"description\" content=\"You\u2019re familiar with the cybercriminals that go after users\u2019 credit card information and look to spread malicious links, but recently, one hacker decided to\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Watch Your Step: Insights on the TOMS Shoes Mailing Hack\" \/>\n<meta property=\"og:description\" content=\"You\u2019re familiar with the cybercriminals that go after users\u2019 credit card information and look to spread malicious links, but recently, one hacker decided to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-10T16:15:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T02:29:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1parent1daughter_tablet_cooking_72dpi.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1382\" \/>\n\t<meta property=\"og:image:height\" content=\"922\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Watch Your Step: Insights on the TOMS Shoes Mailing Hack\",\"datePublished\":\"2019-10-10T16:15:04+00:00\",\"dateModified\":\"2025-08-13T02:29:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/\"},\"wordCount\":435,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1parent1daughter_tablet_cooking_72dpi.jpg\",\"keywords\":[\"cybersecurity\",\"email and web security\",\"Phishing\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/\",\"name\":\"Watch Your Step: Insights on the TOMS Shoes Mailing Hack\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1parent1daughter_tablet_cooking_72dpi.jpg\",\"datePublished\":\"2019-10-10T16:15:04+00:00\",\"dateModified\":\"2025-08-13T02:29:54+00:00\",\"description\":\"You\u2019re familiar with the cybercriminals that go after users\u2019 credit card information and look to spread malicious links, but recently, one hacker decided to\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1parent1daughter_tablet_cooking_72dpi.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1parent1daughter_tablet_cooking_72dpi.jpg\",\"width\":1382,\"height\":922,\"caption\":\"woman; women; female; females; mother; parent; girl; daughter; two people; 35-40 years; 40-45 years; 45-50 year; 10-15 years; 15-20 years; caucasian ethnicity; mature adult; mature woman; high school; teenage girl; teenager; three quarter length; home; indoors; kitchen; kitchen island; domestic kitchen; counter; cutting board; application; app; cooking; homemade; preparation; preparing food; researching; recipe; culinary; dinner; lunch; food; food and drink; ingredient; healthy eating; lettuce; tomatoes; salad; vegetable; vegetarian; viewing; candid; casual; direction; instruction; learning; reading; guidance; watching; looking down; technology; wireless technology; surfing the net; digital tablet; tablet; internet; online;\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Watch Your Step: Insights on the TOMS Shoes Mailing Hack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Watch Your Step: Insights on the TOMS Shoes Mailing Hack","description":"You\u2019re familiar with the cybercriminals that go after users\u2019 credit card information and look to spread malicious links, but recently, one hacker decided to","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Watch Your Step: Insights on the TOMS Shoes Mailing Hack","og_description":"You\u2019re familiar with the cybercriminals that go after users\u2019 credit card information and look to spread malicious links, but recently, one hacker decided to","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-10-10T16:15:04+00:00","article_modified_time":"2025-08-13T02:29:54+00:00","og_image":[{"width":1382,"height":922,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1parent1daughter_tablet_cooking_72dpi.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Watch Your Step: Insights on the TOMS Shoes Mailing Hack","datePublished":"2019-10-10T16:15:04+00:00","dateModified":"2025-08-13T02:29:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/"},"wordCount":435,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1parent1daughter_tablet_cooking_72dpi.jpg","keywords":["cybersecurity","email and web security","Phishing"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/","name":"Watch Your Step: Insights on the TOMS Shoes Mailing Hack","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1parent1daughter_tablet_cooking_72dpi.jpg","datePublished":"2019-10-10T16:15:04+00:00","dateModified":"2025-08-13T02:29:54+00:00","description":"You\u2019re familiar with the cybercriminals that go after users\u2019 credit card information and look to spread malicious links, but recently, one hacker decided to","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1parent1daughter_tablet_cooking_72dpi.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/05\/McAfee_consumer_1parent1daughter_tablet_cooking_72dpi.jpg","width":1382,"height":922,"caption":"woman; women; female; females; mother; parent; girl; daughter; two people; 35-40 years; 40-45 years; 45-50 year; 10-15 years; 15-20 years; caucasian ethnicity; mature adult; mature woman; high school; teenage girl; teenager; three quarter length; home; indoors; kitchen; kitchen island; domestic kitchen; counter; cutting board; application; app; cooking; homemade; preparation; preparing food; researching; recipe; culinary; dinner; lunch; food; food and drink; ingredient; healthy eating; lettuce; tomatoes; salad; vegetable; vegetarian; viewing; candid; casual; direction; instruction; learning; reading; guidance; watching; looking down; technology; wireless technology; surfing the net; digital tablet; tablet; internet; online;"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/toms-shoes-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Watch Your Step: Insights on the TOMS Shoes Mailing Hack"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97057","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=97057"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97057\/revisions"}],"predecessor-version":[{"id":218842,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97057\/revisions\/218842"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/95235"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=97057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=97057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=97057"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=97057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}