{"id":98940,"date":"2020-03-03T21:01:33","date_gmt":"2020-03-04T05:01:33","guid":{"rendered":"\/blogs\/?p=98940"},"modified":"2024-02-01T06:14:19","modified_gmt":"2024-02-01T14:14:19","slug":"mobile-threat-report-q1-2020","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/","title":{"rendered":"Is Mobile Malware Playing Hide and Steal on Your Device?"},"content":{"rendered":"<p>Over the years, we\u2019ve all grown accustomed to using our smartphones and mobile apps to support our lifestyles. We as consumers have developed expectations of how devices can enhance our everyday lives- from online banking transactions to handling work correspondence on the go. But as we become more reliant on our smart devices and apps, hackers use this dependency as an opportunity to gain unwarranted access to our personal data. According to McAfee\u2019s latest <a href=\"https:\/\/www.mcafee.com\/content\/dam\/consumer\/en-us\/docs\/2020-Mobile-Threat-Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Threat Report<\/a>, hidden apps are the most active mobile threat facing consumers, generating nearly 50% of all malicious activities in 2019. Let\u2019s dive into these mobile threats and how they could potentially impact your life.<\/p>\n<h2>Don\u2019t Let These Mobile Threats Commandeer Your Device<\/h2>\n<h3>LeifAccess<\/h3>\n<p>LeifAccess (also known as Shopper) is an Android-based malware distributed through social media, gaming platforms, and fraudulent advertising. Once installed, this stealthy hides its icon and displays fake security notifications, hoping to trick the user into granting the malware accessibility access. LeifAccess\/Shopper has also been found to use third-party logins to cheat app ranking systems and wreak more havoc on victims\u2019 devices. The malware uses the accessibility features in Android to quietly create third-party accounts, automatically download apps from Google Play, and post reviews using names and emails configured from the victim\u2019s device.<\/p>\n<p>According to the <a href=\"https:\/\/www.mcafee.com\/content\/dam\/consumer\/en-us\/docs\/2020-Mobile-Threat-Report.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile Threat Report<\/a>, hackers are also tricking users into installing adware onto their devices, redirecting them to a variety of fraudulent ads. Because digital ad revenue is simply based on screens displayed and clicks, hackers are quick to exploit this threat so they can collect fraudulent ad revenue at the expense of unsuspecting users. Due to the volume and speed of the redirects, many consumers don\u2019t even realize that their device is infected or that their data is being collected.<\/p>\n<h3>HiddenAds<\/h3>\n<p>HiddenAds masquerades as genuine apps like Call of Duty, Spotify, and FaceApp to trick users into downloading them. But once the app is installed on the victim\u2019s device, the app icon changes to one that mimics the Settings icon. When the victim clicks on it, the app displays a fake error message that reads \u201cApplication is unavailable in your country. Click OK to uninstall.&#8221; However, clicking OK completes the malicious app installation process and then hides the fake Settings icon, making it nearly impossible to find and delete the malware.<\/p>\n<h3>MalBus<\/h3>\n<p>McAfee researchers also discovered a new targeted attack hidden in a legitimate South Korean transit app. Called MalBus, this new attack method exploits the app developer\u2019s hacked Google Play account. Once the hackers accessed the developer\u2019s account, they added an additional library to the apps and uploaded them to Google Play. Now, MalBus spyware can phish for <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft.html\">\u00a0<\/a> with a local webpage that mimics the real Google login screen. Additionally, MalBus can drop a malicious trojan on the victim\u2019s device, searching for specific military or political keywords. If these keywords are found, the victim\u2019s matching files are uploaded to a remote server without their knowledge.<\/p>\n<h2>How to Stay Protected<\/h2>\n<p>As hackers continue to target consumers through the channels they spend the most time on \u2013 their mobile devices \u2013 it\u2019s important for users to reflect on the current digital landscape to help protect their data, as well as their family and friends. Follow these security tips to defend against stealthy mobile threats:<\/p>\n<ul>\n<li><strong>Do your research.<\/strong> While some malicious apps do make it through the app store screening process, the majority of attack downloads appear to be coming from social media, fake ads, and other unofficial app sources. Before downloading an app to your device, do some quick research about the source and developer.<\/li>\n<li><strong>Read app reviews with a critical eye.<\/strong> Reviews and rankings are still a good method of determining whether an app is legitimate. However, watch out for reviews that reuse simple or repetitive phrases, as this could be a sign of a fraudulent review.<\/li>\n<li><strong>Update, update, update. <\/strong>Developers are actively working to identify and address security issues. Frequently update your operating systems and apps so that they have the latest fixes and security protections.<\/li>\n<li><strong>Use a VPN.<\/strong> A virtual private network, or , allows you to send and receive data across a public network, but it encrypts your information so others can\u2019t read it. This can prevent hackers from spying on your internet activity, therefore protecting your privacy.<\/li>\n<li><strong>Keep tabs on your accounts.<\/strong> Use <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html\" target=\"_blank\" rel=\"noopener noreferrer\">ID monitoring tools<\/a> to be aware of changes or actions that you did not make. These may have been caused by malware and could indicate that your phone or account has been compromised.<\/li>\n<li><strong>Defend your devices with security software.<\/strong> <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/mcafee-total-protection.html\" target=\"_blank\" rel=\"noopener noreferrer\">Comprehensive security software<\/a> across all devices continues to be a strong defensive measure to protect your data and privacy from online threats.<\/li>\n<\/ul>\n<p>To stay updated on all things\u00a0<a href=\"https:\/\/www.mcafee.com\/en-us\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee<\/a> and the latest consumer and mobile security threats, follow <a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Home\u00a0<\/a>on Twitter, listen to our podcast\u00a0<a href=\"https:\/\/geo.itunes.apple.com\/podcast\/us\/id1257232208?mt=2&amp;at=1010lbVy&amp;ct=mcafeehackable_GaryBlog_EndBlurb\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Hackable?<\/em><\/a>, and \u2018Like\u2019 us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the years, we\u2019ve all grown accustomed to using our smartphones and mobile apps to support our lifestyles. We as&#8230;<\/p>\n","protected":false},"author":674,"featured_media":99000,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1838],"tags":[3949,4452,180,214],"coauthors":[3973],"class_list":["post-98940","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","tag-cybersafety","tag-cybersecurity","tag-malware","tag-mobile-security1"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Is Mobile Malware Playing Hide and Steal on Your Device? | McAfee<\/title>\n<meta name=\"description\" content=\"As we become more reliant on our smart devices and apps, hackers use this dependency as an opportunity to gain access to our data. Hidden apps are the most active mobile threat, generating nearly 50% of all malicious activities. Let\u2019s dive into these mobile threats and how they could potentially impact your life.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Is Mobile Malware Playing Hide and Steal on Your Device? | McAfee\" \/>\n<meta property=\"og:description\" content=\"As we become more reliant on our smart devices and apps, hackers use this dependency as an opportunity to gain access to our data. Hidden apps are the most active mobile threat, generating nearly 50% of all malicious activities. Let\u2019s dive into these mobile threats and how they could potentially impact your life.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-04T05:01:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-01T14:14:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/twitter43.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Is Mobile Malware Playing Hide and Steal on Your Device?\",\"datePublished\":\"2020-03-04T05:01:33+00:00\",\"dateModified\":\"2024-02-01T14:14:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/\"},\"wordCount\":832,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/twitter43.jpg\",\"keywords\":[\"cybersafety\",\"cybersecurity\",\"malware\",\"mobile security\"],\"articleSection\":[\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/\",\"name\":\"Is Mobile Malware Playing Hide and Steal on Your Device? | McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/twitter43.jpg\",\"datePublished\":\"2020-03-04T05:01:33+00:00\",\"dateModified\":\"2024-02-01T14:14:19+00:00\",\"description\":\"As we become more reliant on our smart devices and apps, hackers use this dependency as an opportunity to gain access to our data. Hidden apps are the most active mobile threat, generating nearly 50% of all malicious activities. Let\u2019s dive into these mobile threats and how they could potentially impact your life.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/twitter43.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/twitter43.jpg\",\"width\":1024,\"height\":576},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Is Mobile Malware Playing Hide and Steal on Your Device?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Is Mobile Malware Playing Hide and Steal on Your Device? | McAfee","description":"As we become more reliant on our smart devices and apps, hackers use this dependency as an opportunity to gain access to our data. Hidden apps are the most active mobile threat, generating nearly 50% of all malicious activities. Let\u2019s dive into these mobile threats and how they could potentially impact your life.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Is Mobile Malware Playing Hide and Steal on Your Device? | McAfee","og_description":"As we become more reliant on our smart devices and apps, hackers use this dependency as an opportunity to gain access to our data. Hidden apps are the most active mobile threat, generating nearly 50% of all malicious activities. Let\u2019s dive into these mobile threats and how they could potentially impact your life.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2020-03-04T05:01:33+00:00","article_modified_time":"2024-02-01T14:14:19+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/twitter43.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Is Mobile Malware Playing Hide and Steal on Your Device?","datePublished":"2020-03-04T05:01:33+00:00","dateModified":"2024-02-01T14:14:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/"},"wordCount":832,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/twitter43.jpg","keywords":["cybersafety","cybersecurity","malware","mobile security"],"articleSection":["Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/","name":"Is Mobile Malware Playing Hide and Steal on Your Device? | McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/twitter43.jpg","datePublished":"2020-03-04T05:01:33+00:00","dateModified":"2024-02-01T14:14:19+00:00","description":"As we become more reliant on our smart devices and apps, hackers use this dependency as an opportunity to gain access to our data. Hidden apps are the most active mobile threat, generating nearly 50% of all malicious activities. Let\u2019s dive into these mobile threats and how they could potentially impact your life.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/twitter43.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/03\/twitter43.jpg","width":1024,"height":576},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/mobile-threat-report-q1-2020\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"Is Mobile Malware Playing Hide and Steal on Your Device?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/98940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=98940"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/98940\/revisions"}],"predecessor-version":[{"id":181729,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/98940\/revisions\/181729"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/99000"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=98940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=98940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=98940"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=98940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}