{"id":97921,"date":"2020-01-06T21:01:58","date_gmt":"2020-01-07T05:01:58","guid":{"rendered":"\/blogs\/?p=97921"},"modified":"2025-08-29T01:44:05","modified_gmt":"2025-08-29T08:44:05","slug":"ces-2020-atr-iot-device-flaws","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/","title":{"rendered":"What You Need to Know About the Latest IoT Device Flaws"},"content":{"rendered":"<p>The <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/index-co.html?adobe_mc_sdid=SDID%3D51927A110D871E6E-1A7AC3ABBB0134FA%7CMCORGID%3DA729776A5245B1590A490D44%40AdobeOrg%7CTS%3D1578331934&amp;adobe_mc_ref=https%3A%2F%2Fwww.google.com%2F\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee<\/a> Advanced Threat Research (ATR) team recently uncovered a security flaw in a popular connected garage door opener and a security design issue in an NFC (meaning near field communication, which is a technology that allows devices to communicate with each other) smart ring used to unlock doors. As we head into <a href=\"https:\/\/www.ces.tech\/\" target=\"_blank\" rel=\"noopener noreferrer\">CES<\/a> 2020, the global stage where innovators showcase the next generation of consumer technologies, let\u2019s take a look at these new security flaws and discover how users can connect securely and with confidence.<\/p>\n<h2>Review Chamberlain IoT device<\/h2>\n<p>The McAfee ATR team recently investigated the <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/we-be-jammin-bypassing-chamberlain-myq-garage-doors\/\" target=\"_blank\" rel=\"noopener noreferrer\">Chamberlain MyQ\u202fHub<\/a>, a \u201cuniversal\u201d garage door automation\u202fplatform. The Hub\u00a0acts as a new\u00a0garage door opener,\u00a0similar to\u00a0the one that you would have in your car. However, the McAfee ATR team discovered an inherent flaw\u00a0in the way\u00a0the\u00a0MyQ\u00a0Hub communicates over\u00a0radio frequency signals. It turns out that hackers can \u201cjam\u201d the radio frequency signals while the garage is being remotely closed. How? By jamming or blocking the code signal from ever making it to the Hub receiver, the remote sensor will never respond with the closed signal. This delivers an error message to the user, prompting them to attempt to close the door again through the app, which actually causes the garage door to open.<\/p>\n<h2>How can the Chamberlain IoT device be hacked?<\/h2>\n<p>Let\u2019s break it down:<\/p>\n<ul>\n<li>Many users enjoy using the MyQ Hub for the convenience of package delivery, ensuring that their packages are safe from porch pirates and placed directly in the garage by the carrier=.<\/li>\n<li>However, an attacker could wait for a package delivery using the connected garage door opener. The hacker could then jam the MyQ signal once the carrier opens the door and prompt an error message for the user. If and when the user attempts to close the door, the door will open and grant the attacker access to the home.<\/li>\n<li>An attacker could also wait and see when a homeowner physically leaves the premises to jam the MyQ signal and prompt the error message. This would potentially allow further access into the home.<\/li>\n<\/ul>\n<h2>Review McLear NFC Ring IoT device<\/h2>\n<p>The McAfee ATR team also discovered an insecure design with the <a href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/the-cloning-of-the-ring-who-can-unlock-your-door\/\" target=\"_blank\" rel=\"noopener noreferrer\">McLear NFC Ring<\/a>, a household access control device that can be used to interact with NFC-enabled door locks. Once the NFC Ring has been paired with an NFC-enabled door lock, the user can access their house by simply placing the NFC Ring within the NFC range of the door lock instead of using a traditional house key. However, due to an insecure design, hackers could easily clone the ring and gain access to a user&#8217;s home.<\/p>\n<h2>How can the McLear NFC Ring be hacked?<\/h2>\n<ul>\n<li>First, the attacker can do some basic research on the victim, such as finding a social media post about how excited they are to use their new McLear NFC Ring.<\/li>\n<li>Now, say the attacker locates the victim in a public setting and asks them to take a picture of them on the attacker\u2019s phone. The attacker\u2019s phone, equipped with an app to read NFC tags, can record the relevant information without giving any signs of foul play.<\/li>\n<li>The McLear NFC Ring is now compromised, and the information can be programmed on a standard writable card, which can be used to unlock smart home locks that partner with the product.<\/li>\n<\/ul>\n<h2>How to keep your IoT devices safe from hacking<\/h2>\n<p>In the era of IoT devices, the balance between cybersecurity and convenience is an important factor to get right. According to Steve Povolny, head of McAfee Advanced Threat Research, \u201cthe numerous benefits technology enhancements bring us are exciting and often highly valuable; but many people are unaware of the lengths hackers will go and the many ways new features can impact the security of a system.\u201d To help safeguard your security while still enjoying the benefits of your connected devices, check out the following tips:<\/p>\n<ul>\n<li><strong>Practice proper online security habits. <\/strong>Fortunately, users have many tools at their disposal, even when cybersecurity concerns do manifest. Implement a strong password policy, put IoT devices on their own, separate network, utilize dual-factor authentication when possible, minimize redundant systems, and patch quickly when issues are found.<\/li>\n<li><strong>Do your research. <\/strong>Before purchasing a new IoT device, take the time to look into its security features. Users should ensure they are aware of the security risks associated with IoT products available on the market.<\/li>\n<\/ul>\n<h2>Stay up to date<\/h2>\n<p>To stay on top of <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/index-a.html?adobe_mc_sdid=SDID%3D7E3E3F87EC750EDC-29B500946DC275E3%7CMCORGID%3DA729776A5245B1590A490D44%40AdobeOrg%7CTS%3D1578339777\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee\u2019s<\/a>\u00a0CES\u00a0news and the latest consumer and mobile security threats, be sure to follow\u00a0<a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home<\/a>\u00a0on Twitter, listen to our podcast\u00a0<a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Hackable?<\/em><\/a>, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The McAfee Advanced Threat Research (ATR) team recently uncovered a security flaw in a popular connected garage door opener and&#8230;<\/p>\n","protected":false},"author":674,"featured_media":96525,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[1814,4452,4449,4131,5084,18],"coauthors":[3973],"class_list":["post-97921","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-computer-security","tag-cybersecurity","tag-hacking","tag-internet-of-things","tag-iot","tag-network-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What You Need to Know About the Latest IoT Device Flaws<\/title>\n<meta name=\"description\" content=\"Though IoT devices are convenient and, in many cases, designed to better secure a system, they can also be cause for possible cybersecurity concerns due to overlooked weaknesses. Read our review about MyQ\u202fHub and McLear Smart Ring.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What You Need to Know About the Latest IoT Device Flaws\" \/>\n<meta property=\"og:description\" content=\"Though IoT devices are convenient and, in many cases, designed to better secure a system, they can also be cause for possible cybersecurity concerns due to overlooked weaknesses. Read our review about MyQ\u202fHub and McLear Smart Ring.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-07T05:01:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-29T08:44:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/twitter48.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"What You Need to Know About the Latest IoT Device Flaws\",\"datePublished\":\"2020-01-07T05:01:58+00:00\",\"dateModified\":\"2025-08-29T08:44:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/\"},\"wordCount\":794,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/twitter48.jpg\",\"keywords\":[\"computer security\",\"cybersecurity\",\"hacking\",\"Internet of Things\",\"IoT\",\"network security\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/\",\"name\":\"What You Need to Know About the Latest IoT Device Flaws\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/twitter48.jpg\",\"datePublished\":\"2020-01-07T05:01:58+00:00\",\"dateModified\":\"2025-08-29T08:44:05+00:00\",\"description\":\"Though IoT devices are convenient and, in many cases, designed to better secure a system, they can also be cause for possible cybersecurity concerns due to overlooked weaknesses. Read our review about MyQ\u202fHub and McLear Smart Ring.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/twitter48.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/twitter48.jpg\",\"width\":1024,\"height\":576,\"caption\":\"man using his tablet at home\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What You Need to Know About the Latest IoT Device Flaws\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What You Need to Know About the Latest IoT Device Flaws","description":"Though IoT devices are convenient and, in many cases, designed to better secure a system, they can also be cause for possible cybersecurity concerns due to overlooked weaknesses. Read our review about MyQ\u202fHub and McLear Smart Ring.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What You Need to Know About the Latest IoT Device Flaws","og_description":"Though IoT devices are convenient and, in many cases, designed to better secure a system, they can also be cause for possible cybersecurity concerns due to overlooked weaknesses. Read our review about MyQ\u202fHub and McLear Smart Ring.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-01-07T05:01:58+00:00","article_modified_time":"2025-08-29T08:44:05+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/twitter48.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"What You Need to Know About the Latest IoT Device Flaws","datePublished":"2020-01-07T05:01:58+00:00","dateModified":"2025-08-29T08:44:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/"},"wordCount":794,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/twitter48.jpg","keywords":["computer security","cybersecurity","hacking","Internet of Things","IoT","network security"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/","name":"What You Need to Know About the Latest IoT Device Flaws","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/twitter48.jpg","datePublished":"2020-01-07T05:01:58+00:00","dateModified":"2025-08-29T08:44:05+00:00","description":"Though IoT devices are convenient and, in many cases, designed to better secure a system, they can also be cause for possible cybersecurity concerns due to overlooked weaknesses. Read our review about MyQ\u202fHub and McLear Smart Ring.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/twitter48.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/twitter48.jpg","width":1024,"height":576,"caption":"man using his tablet at home"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/ces-2020-atr-iot-device-flaws\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"What You Need to Know About the Latest IoT Device Flaws"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=97921"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97921\/revisions"}],"predecessor-version":[{"id":221546,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/97921\/revisions\/221546"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96525"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=97921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=97921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=97921"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=97921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}