{"id":97228,"date":"2019-10-28T11:10:37","date_gmt":"2019-10-28T18:10:37","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=97228"},"modified":"2025-08-12T02:52:47","modified_gmt":"2025-08-12T09:52:47","slug":"creepiest-threats","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/","title":{"rendered":"A Cybersecurity Horror Story: Stay Secure From October\u2019s Creepiest Threats"},"content":{"rendered":"<p>Halloween time is among us and ghosts and goblins aren\u2019t the only things lurking in the shadows. This past month has brought a variety of spooky cyberthreats that haunt our networks and devices. From malicious malware to restricting ransomware, October has had its fair share of cyber-scares. Let&#8217;s take a look at what ghoulish threats have been leading to some tricks (and no treats) around the cybersphere this month.<\/p>\n<h2><strong>Ghostcat Malware <\/strong><\/h2>\n<p>One ghost that recently caused some hocus pocus across the Web is <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/consumer-threat-notices\/ghostcat-malware\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ghostcat-3PC<\/a>. According to\u00a0<a href=\"https:\/\/www.scmagazine.com\/website-web-server-security\/browser-hijacking-ghostcat-malware-haunts-online-publishers\/\" target=\"_blank\" rel=\"noopener noreferrer\">SC Magazine<\/a>, the malware\u2019s goal is to hijack users\u2019 mobile browsing sessions.<\/p>\n<p>The infection begins when a user visits a particular website and is served a malicious advertisement. Ghostcat <a href=\"https:\/\/pixelprivacy.com\/resources\/browser-fingerprinting\/\" target=\"_blank\" rel=\"noopener noreferrer\">fingerprints the browser<\/a> to collect device information and determines if the ad is running on a genuine webpage. Ghostcat also checks if the ad is running on an online publishers\u2019 page that has been specifically targeted by this campaign. If these conditions are met, then the malware serves a malicious URL linked to the ad.<\/p>\n<p>From there, this URL delivers obfuscated JavaScript, which creates an obscure source or machine code. The attackers behind Ghostcat use this to trick the publishers\u2019 ad blockers, preventing them from detecting malicious content. The code also checks for additional conditions necessary for the attack, like ensuring that the malware is being run on a mobile device and a mobile-specific browser, for example. If the malware concludes that the browsing environment fits the descriptions of their target, it will serve a fraudulent pop-up, leading the user to malicious content.<\/p>\n<h2><strong>Bewitched WAV Files <\/strong><\/h2>\n<p>Ghostcat isn\u2019t the only way malware is being spread lately, as, according to <a href=\"https:\/\/www.zdnet.com\/article\/wav-audio-files-are-now-being-used-to-hide-malicious-code\/\" target=\"_blank\" rel=\"noopener noreferrer\">ZDNet<\/a>, attackers have manipulated WAV audio files to spread malware and cryptominers. By using a technique called <a href=\"https:\/\/securingtomorrow.mcafee.com\/business\/seeing-through-stegware\/\" target=\"_blank\" rel=\"noopener noreferrer\">stenography<\/a>, malware authors can hide malicious code inside of a file that appears normal, which allows hackers to bypass security software and firewalls.<\/p>\n<p>Previously, cybercriminals have used stenography revolving around image file formats like PNG or JPEG. However, these crooks have now upped the ante by using WAV audio files to hide different types of malware. Most recently, researchers found that this technique is used to hide DLLs, or dynamic link libraries that contain code and data that can be used by more than one program at the same time. If malware was already present on an infected host device, it would download and read the WAV file, extract the DLL, and install a cryptocurrency miner called XMRrig. <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/webadvisor-cryptojacking-blocker\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cryptocurrency miners<\/a> compile all transactions into blocks to solve complicated mathematical problems and compete with other miners for bitcoins. To do this, miners need a ton of computer resources. As a result, miners tend to drain the victim\u2019s device of its computer processor\u2019s resources, creating a real cybersecurity headache.<\/p>\n<h2><strong>MedusaLocker Ransomware <\/strong><\/h2>\n<p>Finally, we have the mysterious MedusaLocker ransomware. According to <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/medusalocker-ransomware-wants-its-share-of-your-money\/\" target=\"_blank\" rel=\"noopener noreferrer\">BleepingComputer<\/a>, this threat is slithering its way onto users\u2019 devices, encrypting files until the victim purchases a decryptor.<\/p>\n<p>This strain will perform various startup routines to prep the victim&#8217;s device for encryption. Additionally, it will ensure that Windows networking is running and mapped network drives (shortcuts to a shared folder on a remote computer or server) are accessible. Then, it will shut down security programs, clear data duplicates so they can\u2019t be used to restore files, remove backups made with Windows backup, and disable the Windows automatic startup repair.<\/p>\n<p>For each folder that contains an encrypted file, MedusaLocker creates a ransom note with two email addresses to contact for payment. However, it is currently unknown how much the attackers are demanding for the victim to have their files released or if they actually provide a decryptor once they receive a payment.<\/p>\n<p>With all of these threats attempting to haunt networks and devices, what can users do to help themselves have a safe and secure spooky season? Follow these tips to keep cybersecurity tricks at bay:<\/p>\n<ul>\n<li><strong><u>Watch what you click.<\/u><\/strong>\u00a0Avoid clicking on unknown links or suspicious pop-ups, especially those coming from someone you don\u2019t know.<\/li>\n<li><strong><u>Be selective about which sites you visit.<\/u><\/strong>\u00a0Only use well-known and trusted sites. One way to determine if a site is potentially malicious is by checking its URL. If the URL address contains multiple grammar or spelling errors and suspicious characters, avoid interacting with the site.<\/li>\n<li><strong><u>If your computer slows down, be cautious<\/u><\/strong>. One way you can identify a cryptojacking attack \u2013 poor performance. If your device is slow or acting strange, start investigating and see if your device may be infected with malware.<\/li>\n<li><strong><u>Surf the web safely.<\/u><\/strong>\u00a0You can use a tool like\u00a0<a href=\"https:\/\/www.mcafee.com\/consumer\/en-us\/store\/m0\/catalog\/mwad_528\/mcafee-web-advisor.html\">McAfee\u00a0WebAdvisor<\/a>, which will flag any sites that may be malicious without your knowing.<\/li>\n<li><strong><u>Use a comprehensive security solution<\/u><\/strong><strong>.<\/strong> To secure your device and help keep your system running smoothly and safely, use a program like\u00a0<a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Total Protection<\/a>.<\/li>\n<\/ul>\n<p>And, of course, to stay on top of the latest consumer and mobile security threats, be sure to follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a>\u00a0on Twitter, listen to our podcast\u00a0<a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Hackable?<\/em><\/a>\u00a0and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Halloween time is among us and ghosts and goblins aren\u2019t the only things lurking in the shadows. This past month&#8230;<\/p>\n","protected":false},"author":674,"featured_media":80826,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,10661,13],"tags":[1814,3949,4452,180,4549],"coauthors":[3973],"class_list":["post-97228","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-internet-security","category-privacy-identity-protection","tag-computer-security","tag-cybersafety","tag-cybersecurity","tag-malware","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Cybersecurity Horror Story: October\u2019s Creepiest Threats and How to Stay Secure<\/title>\n<meta name=\"description\" content=\"Halloween time is among us and ghosts and goblins aren\u2019t the only things lurking in the shadows. This past month has brought a variety of spooky\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Cybersecurity Horror Story: October\u2019s Creepiest Threats and How to Stay Secure\" \/>\n<meta property=\"og:description\" content=\"Halloween time is among us and ghosts and goblins aren\u2019t the only things lurking in the shadows. This past month has brought a variety of spooky\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-28T18:10:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-12T09:52:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/img_1581534021300415.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"A Cybersecurity Horror Story: Stay Secure From October\u2019s Creepiest Threats\",\"datePublished\":\"2019-10-28T18:10:37+00:00\",\"dateModified\":\"2025-08-12T09:52:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/\"},\"wordCount\":850,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/img_1581534021300415.jpg\",\"keywords\":[\"computer security\",\"cybersafety\",\"cybersecurity\",\"malware\",\"ransomware\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/\",\"name\":\"A Cybersecurity Horror Story: October\u2019s Creepiest Threats and How to Stay Secure\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/img_1581534021300415.jpg\",\"datePublished\":\"2019-10-28T18:10:37+00:00\",\"dateModified\":\"2025-08-12T09:52:47+00:00\",\"description\":\"Halloween time is among us and ghosts and goblins aren\u2019t the only things lurking in the shadows. This past month has brought a variety of spooky\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/img_1581534021300415.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/img_1581534021300415.jpg\",\"width\":400,\"height\":300,\"caption\":\"a screen with codes in red text\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"A Cybersecurity Horror Story: Stay Secure From October\u2019s Creepiest Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Cybersecurity Horror Story: October\u2019s Creepiest Threats and How to Stay Secure","description":"Halloween time is among us and ghosts and goblins aren\u2019t the only things lurking in the shadows. This past month has brought a variety of spooky","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"A Cybersecurity Horror Story: October\u2019s Creepiest Threats and How to Stay Secure","og_description":"Halloween time is among us and ghosts and goblins aren\u2019t the only things lurking in the shadows. This past month has brought a variety of spooky","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-10-28T18:10:37+00:00","article_modified_time":"2025-08-12T09:52:47+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/img_1581534021300415.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"A Cybersecurity Horror Story: Stay Secure From October\u2019s Creepiest Threats","datePublished":"2019-10-28T18:10:37+00:00","dateModified":"2025-08-12T09:52:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/"},"wordCount":850,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/img_1581534021300415.jpg","keywords":["computer security","cybersafety","cybersecurity","malware","ransomware"],"articleSection":["How To Guides and Tutorials","Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/","name":"A Cybersecurity Horror Story: October\u2019s Creepiest Threats and How to Stay Secure","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/img_1581534021300415.jpg","datePublished":"2019-10-28T18:10:37+00:00","dateModified":"2025-08-12T09:52:47+00:00","description":"Halloween time is among us and ghosts and goblins aren\u2019t the only things lurking in the shadows. This past month has brought a variety of spooky","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/img_1581534021300415.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/10\/img_1581534021300415.jpg","width":400,"height":300,"caption":"a screen with codes in red text"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/creepiest-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"A Cybersecurity Horror Story: Stay Secure From October\u2019s Creepiest Threats"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97228","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=97228"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97228\/revisions"}],"predecessor-version":[{"id":218808,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97228\/revisions\/218808"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/80826"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=97228"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=97228"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=97228"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=97228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}