{"id":99166,"date":"2024-09-30T06:28:19","date_gmt":"2024-09-30T13:28:19","guid":{"rendered":"\/blogs\/?p=99166"},"modified":"2025-12-17T16:30:38","modified_gmt":"2025-12-18T00:30:38","slug":"how-to-stop-phone-spoofing","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/","title":{"rendered":"How to Stop Phone Spoofing"},"content":{"rendered":"<p>From <a href=\"https:\/\/6abc.com\/scam-artists-spoofing-phone-numbers-to-pose-as-police-officers-in-perkasie-bucks-county-warn\/14746600\/\" target=\"_blank\" rel=\"noopener\">impersonating police officers<\/a> in Pennsylvania to employees of the City of San Antonio, scammers have been impersonating officials nationwide in order to scam people. A nurse in New York even <a href=\"https:\/\/www.cbsnews.com\/newyork\/news\/cbs-new-york-investigates-spoofing-scams-after-nurse-loses-life-savings\/\" target=\"_blank\" rel=\"noopener\">lost her life savings<\/a> to a spoofing scam. Phone spoofing is a technique used by callers to disguise their true identity and phone number when making calls.<\/p>\n<p>By altering the caller ID information displayed on the recipient&#8217;s phone, spoofers can make it appear as though the call is coming from a different number, often one that looks more trustworthy or familiar to the recipient.<\/p>\n<p>This deceptive practice is commonly employed by telemarketers, scammers, and individuals seeking to engage in fraudulent activities, making it more difficult for recipients to identify and block unwanted or suspicious calls.<\/p>\n<h2>How Does Phone Spoofing Work?<\/h2>\n<p>Most spoofing is done using a VoIP (Voice over Internet Protocol) service or IP phone that uses VoIP to transmit calls over the internet. VoIP users can usually choose their preferred number or name to be displayed on the caller ID when they set up their account. Some providers even offer spoofing services that work like a prepaid calling card. Customers pay for a PIN code to use when calling their provider, allowing them to select both the destination&#8217;s number they want to call, as well as the number they want to appear on the recipient&#8217;s caller ID.<\/p>\n<h2>What Are The Dangers of Phone Spoofing?<\/h2>\n<p>Scammers often use spoofing to try to trick people into handing over money, personal information, or both. They may pretend to be calling from a bank, a charity, or even a contest, offering a phony prize. These &#8220;<a href=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/learn-phishing-phone\/\" target=\"_blank\" rel=\"noopener\">vishing<\/a>&#8221; attacks (or &#8220;voice phishing&#8221;), are quite common and often target older people who are not as aware of this threat.<\/p>\n<p>For instance, one common scam appears to come from the IRS. The caller tries to scare the receiver into thinking that they owe money for back taxes, or need to send over sensitive financial information right away. Another common scam is <a href=\"https:\/\/www.mcafee.com\/learn\/how-to-spot-tech-support-scams\/\" target=\"_blank\" rel=\"noopener\">fake tech support<\/a>, where the caller claims to be from a recognizable company, like Microsoft, claiming there is a problem with your computer and they need remote access to fix it.<\/p>\n<p>There are also &#8220;<a href=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/what-is-smishing-heres-how-to-spot-fake-texts-and-keep-your-info-safe\/\" target=\"_blank\" rel=\"noopener\">SMiShing&#8221; attacks<\/a>, or phishing via text message, in which you may receive a message that appears to come from a reputable person or company, encouraging you to click on a link. But once you do, it can download <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus\/malware.html\" target=\"_blank\" rel=\"noopener\">malware<\/a> onto your device, sign you up for a premium service, or even steal your credentials for your online accounts.<\/p>\n<h2>Why Is Spoofing So Prevalent?<\/h2>\n<p>The convenience of sending digital voice signals over the internet has led to an explosion of spam and robocalls over the past few years. Between January 2019 and September 2023, Americans lodged <a href=\"https:\/\/usafacts.org\/articles\/how-many-spam-phone-calls-do-americans-receive\/\" target=\"_blank\" rel=\"noopener\">2.04 million complaints<\/a> about unwanted phone calls where people or robots falsely posed as government representatives, legitimate business entities, or people affiliated with them.<\/p>\n<p>Since robocalls use a computerized autodialer to deliver pre-recorded messages, marketers and scammers can place many more calls than a live person ever could, often employing tricks such as making the call appear to come from the recipient&#8217;s own area code. This increases the chance that the recipient will answer the call, thinking it is from a local friend or business.<\/p>\n<p>And because many of these calls are from scammers or shady marketing groups, just registering your number on the FTC&#8217;s official &#8220;<a href=\"https:\/\/www.donotcall.gov\/\" target=\"_blank\" rel=\"noopener\">National Do Not Call Registry<\/a>&#8221; does little help. That&#8217;s because only real companies that follow the law respect the registry.<\/p>\n<h2>What Can I Do To Stop Spoofing Calls?<\/h2>\n<p>To really cut back on these calls, the first thing you should do is check to see if your phone carrier has a service or app that helps identify and filter out spam calls.<\/p>\n<p>For instance, both AT&amp;T and Verizon have apps that provide spam screening or fraud warnings, although they may cost you extra each month. T-Mobile warns customers if a call is likely a scam when it appears on your phone screen, and you can sign up for a scam-blocking service for free.<\/p>\n<p>There are also third-party apps <a href=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/so-long-robocalls\/\" target=\"_blank\" rel=\"noopener\">such as RoboKiller<\/a> that you can download to help you screen calls, but you should be aware that you will be sharing private data with them.<\/p>\n<h2>Other Ways to Protect Yourself from Spoofing<\/h2>\n<ol>\n<li>After registering for the Do Not Call Registry and checking out your carrier&#8217;s options, be very cautious when it comes to sharing your contact information. If an online form asks for your phone number but does not need it, leave that field blank. Also, avoid listing your personal phone number on your social media profiles.<\/li>\n<li>If you receive a call from an unrecognized number, do not answer it. You can always return the call later to see if it was a real person or company. If it was a scam call, you can choose to block the number in your phone, but that too can be frustrating since scammers change their numbers so often.<\/li>\n<li>You can <a href=\"https:\/\/www.donotcall.gov\/report.html#step1\" target=\"_blank\" rel=\"noopener\">report<\/a> unwanted calls to the FTC.<\/li>\n<li>Read the privacy policy on every new service you sign up for to make sure that they will not share or sell your contact information.<\/li>\n<li>Be wary of entering contests and sweepstakes online, since they often share data with other companies.<\/li>\n<li>Stay up-to-date on the latest scams, so you can recognize potential threats.<\/li>\n<\/ol>\n<p>Enhance your smartphone security effortlessly with <a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/protection.html?path=blogs\" target=\"_blank\" rel=\"noopener\">McAfee+<\/a> which has 24\/7 identity monitoring and alerts, advanced privacy features, and AI-powered security for real-time protection against viruses, hackers, and risky links.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn how to stop phone spoofing and protect yourself from scam calls disguised as trusted contacts. Learn how to block them and ways to protect yourself.<\/p>\n","protected":false},"author":1407,"featured_media":202103,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,13,1838],"tags":[],"coauthors":[15735],"class_list":["post-99166","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-privacy-identity-protection","category-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Stop Phone Spoofing | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Learn how to stop phone spoofing and protect yourself from scam calls disguised as trusted contacts. Learn how to block them and ways to protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Stop Phone Spoofing | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how to stop phone spoofing and protect yourself from scam calls disguised as trusted contacts. Learn how to block them and ways to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-30T13:28:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-18T00:30:38+00:00\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"How to Stop Phone Spoofing\",\"datePublished\":\"2024-09-30T13:28:19+00:00\",\"dateModified\":\"2025-12-18T00:30:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/\"},\"wordCount\":935,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/06\/300x200_Blog_093024.png\",\"articleSection\":[\"How To Guides and Tutorials\",\"Privacy &amp; Identity Protection\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/\",\"name\":\"How to Stop Phone Spoofing | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/06\/300x200_Blog_093024.png\",\"datePublished\":\"2024-09-30T13:28:19+00:00\",\"dateModified\":\"2025-12-18T00:30:38+00:00\",\"description\":\"Learn how to stop phone spoofing and protect yourself from scam calls disguised as trusted contacts. Learn how to block them and ways to protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/06\/300x200_Blog_093024.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/06\/300x200_Blog_093024.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How To Stop Phone Spoofing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Stop Phone Spoofing | McAfee Blog","description":"Learn how to stop phone spoofing and protect yourself from scam calls disguised as trusted contacts. Learn how to block them and ways to protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Stop Phone Spoofing | McAfee Blog","og_description":"Learn how to stop phone spoofing and protect yourself from scam calls disguised as trusted contacts. Learn how to block them and ways to protect yourself.","og_url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-09-30T13:28:19+00:00","article_modified_time":"2025-12-18T00:30:38+00:00","author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"How to Stop Phone Spoofing","datePublished":"2024-09-30T13:28:19+00:00","dateModified":"2025-12-18T00:30:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/"},"wordCount":935,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/06\/300x200_Blog_093024.png","articleSection":["How To Guides and Tutorials","Privacy &amp; Identity Protection","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/","url":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/","name":"How to Stop Phone Spoofing | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/06\/300x200_Blog_093024.png","datePublished":"2024-09-30T13:28:19+00:00","dateModified":"2025-12-18T00:30:38+00:00","description":"Learn how to stop phone spoofing and protect yourself from scam calls disguised as trusted contacts. Learn how to block them and ways to protect yourself.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/06\/300x200_Blog_093024.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2024\/06\/300x200_Blog_093024.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/how-to-stop-phone-spoofing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Mobile Security","item":"https:\/\/www.mcafee.com\/blogs\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"How To Stop Phone Spoofing"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/99166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=99166"}],"version-history":[{"count":10,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/99166\/revisions"}],"predecessor-version":[{"id":224914,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/99166\/revisions\/224914"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/202103"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=99166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=99166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=99166"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=99166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}