{"id":1973,"date":"2017-11-25T09:00:25","date_gmt":"2017-11-25T01:00:25","guid":{"rendered":"http:\/\/nxtmag.tech\/?p=1973"},"modified":"2019-03-19T08:40:00","modified_gmt":"2019-03-19T00:40:00","slug":"cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts","status":"publish","type":"post","link":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/","title":{"rendered":"A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">2017 has been a year of great change, and not always the good kind of change either. One thing that\u2019s stood out has been the frankly alarming number of security breaches reported. Emphasis: reported. Who knows what security breaches have gone under the radar? And with the gift-giving season coming upon us, it\u2019s even more important to step back and prioritize security with the tech-based gifts we give. With the McAfee Most Hackable Holiday Gifts list and tips, it\u2019s easier than ever to keep you and your loved ones safe.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The McAfee Most Hackable Holiday Gifts list aims to help consumers identify potential security risks in popular gifts. After all, there\u2019s nothing better than the gift of security, right? Along with the list, McAfee also conducted a survey to identify the habits and behaviours of consumers as they get ready for the holiday season.<\/span><\/p>\n<h2><b>How Secure Are Your Spending Habits?<\/b><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1965\" src=\"http:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-01.jpg\" alt=\"McAfee survey results\" width=\"505\" height=\"600\" srcset=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-01.jpg 505w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-01-253x300.jpg 253w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-01-354x420.jpg 354w\" sizes=\"auto, (max-width: 505px) 100vw, 505px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Most consumers surveyed agree that security is a necessity for laptops, tablets, and smartphones (69%). However, only 22% believe connected toys require security, 29% that drones should be protected, and 56% that digital assistants need to be secured. Given that anything connected needs to be protected against cyber criminals, these numbers are more than a little worrying.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Almost all consumers (91%) claim that they know it is important to keep their online identity and devices safe. However, only 53% take the necessary steps. 16% assume that the manufacturer has built security into the product. Another 22% know they need to put security precautions in place, but don\u2019t know how.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This only highlights how important it is for consumers to conduct research about a device\u2019s built-in security settings. After all, you can\u2019t just rely on the manufacturers to appropriately lock down the devices and data.<\/span><\/p>\n<h2><b>Most Hackable Holiday Gifts<\/b><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1966\" src=\"http:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-02.jpg\" alt=\"McAfee list of most hackable gifts\" width=\"600\" height=\"749\" srcset=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-02.jpg 600w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-02-240x300.jpg 240w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-02-336x420.jpg 336w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<h4><b>1. Laptops\/Smartphones\/Tablets<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Laptops, smartphones, and tablets are traditional targets for cyber criminals. If not properly secured, they can get infected with malicious applications.<\/span><\/p>\n<h4><b>2. Drones<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Sales of drones are expected to top $1 billion in 2017, but security hasn\u2019t quite caught up. Drone owners therefore need to stay mindful of risks associated with drone jacking, and fake Wi-Fi signals from rogue drones.<\/span><\/p>\n<h4><b>3. Digital Assistants<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Device-based assistants like the Amazon Echo can help order household items, play music, provide answers to questions, and much more. However, these assistants have microphones that are always listening for a wake-up command. If hacked, or otherwise compromised, this can mean your every word is being recorded. And that\u2019s not even starting with the devices that have cameras!<\/span><\/p>\n<h4><b>4. Connected Toys<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Toys keep getting smarter, but unfortunately, so do cyber criminals. For many manufacturers, security is an afterthought that can leave toys vulnerable to attack. For example, hackers can target built-in microphones and location-based services to get access to your information.<\/span><\/p>\n<h4><b>5. Connected Appliances<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">A smart home appliance can make daily life a thousand times easier. But these devices can also be used as pawns in an online attack. Or worse, they can leak information about you, your loved ones, and your home.<\/span><\/p>\n<h2><b>How Do You Stay Protected?<\/b><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1967\" src=\"http:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-03.jpg\" alt=\"McAfee suggestions on keeping safe\" width=\"600\" height=\"634\" srcset=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-03.jpg 600w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-03-284x300.jpg 284w, https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-03-397x420.jpg 397w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">To help keep your family safe during the holidays, here are some tips:<\/span><\/p>\n<h4><b>Think Before You Click<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">One of the easiest ways for cybercriminals to compromise your device is through a malicious link. Be skeptical if you receive a link or other solicitation that you aren\u2019t expecting.<\/span><\/p>\n<h4><b>Update Your Software<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Whether it\u2019s your PC, smartphone, digital assistant, or even your drone, keep your software up to date! Manufacturers plug security holes with device updates, so it\u2019s important to always install the latest versions as soon as possible. Where applicable, use security software that\u2019s up to date.<\/span><\/p>\n<h4><b>Beware Of Shady Public Wi-Fi Hotspots<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Cyber criminals often deploy fake Wi-Fi hotspots that appear to be legitimate, but give them visibility into your browsing habits. If you have to use public Wi-Fi, refrain from doing online shopping or banking.<\/span><\/p>\n<h4><b>Do Your Homework<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Not all manufacturers take security seriously, especially when it comes to connected toys. It\u2019s therefore important to do your research! Always make sure to check if there have been any reported security vulnerabilities before purchasing.<\/span><\/p>\n<h4><b>Protect Your Home Network<\/b><\/h4>\n<p><span style=\"font-weight: 400;\">Secure all of your connected devices and your home internet at its source with something like McAfee Secure Home Platform. This gives you insight into what devices are on your network, and protects all of your connected devices.<\/span><\/p>\n<h2><b>Methodology<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">McAfee commissioned MSI-ACI to conduct a survey of 1,206 adults between the ages of 18 and 55 in the United States between September and October 2017. Respondents were individuals who use a connected device daily.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">McAfee used the following criteria to compile the list of most hackable devices:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Accessibility<\/b><span style=\"font-weight: 400;\">: Does this device connect to the internet?<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Communication Security<\/b><span style=\"font-weight: 400;\">: Does this device use insecure methods of transmitting information?<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Target Value<\/b><span style=\"font-weight: 400;\">: Does this device have access to information that would be valuable to a cybercriminal?<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Activity<\/b><span style=\"font-weight: 400;\">: Is there active research in the hacking community into exploiting these devices?<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Wildlife<\/b><span style=\"font-weight: 400;\">: Are there active exploits roaming the internet looking for this device?<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>2017 has been a year of great change, and not always the good kind of change either. One thing that\u2019s stood out has been the frankly alarming number of security breaches reported. Emphasis: reported. Who knows what security breaches have gone under the radar? And with the gift-giving season coming upon us, it\u2019s even more [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1964,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[19,523],"tags":[190,191],"class_list":{"0":"post-1973","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"category-guru","9":"tag-mcafee","10":"tag-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts - NXT Malaysia<\/title>\n<meta name=\"description\" content=\"What better gift to give your loved ones this holiday than the gift of security? Check out the McAfee list of Most Hackable Holiday Gifts!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:locale:alternate\" content=\"en_SG\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts - NXT Malaysia\" \/>\n<meta property=\"og:description\" content=\"What better gift to give your loved ones this holiday than the gift of security? Check out the McAfee list of Most Hackable Holiday Gifts!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/\" \/>\n<meta property=\"og:site_name\" content=\"NXT Malaysia\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-25T01:00:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-19T00:40:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-00.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NXT\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NXT\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/\"},\"author\":{\"name\":\"NXT\",\"@id\":\"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852\"},\"headline\":\"A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts\",\"datePublished\":\"2017-11-25T01:00:25+00:00\",\"dateModified\":\"2019-03-19T00:40:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/\"},\"wordCount\":845,\"image\":{\"@id\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-00.jpg\",\"keywords\":[\"McAfee\",\"security\"],\"articleSection\":[\"News\",\"Guru\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/\",\"url\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/\",\"name\":\"A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts - NXT Malaysia\",\"isPartOf\":{\"@id\":\"https:\/\/nxtmag.tech\/my\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-00.jpg\",\"datePublished\":\"2017-11-25T01:00:25+00:00\",\"dateModified\":\"2019-03-19T00:40:00+00:00\",\"author\":{\"@id\":\"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852\"},\"description\":\"What better gift to give your loved ones this holiday than the gift of security? Check out the McAfee list of Most Hackable Holiday Gifts!\",\"breadcrumb\":{\"@id\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#primaryimage\",\"url\":\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-00.jpg\",\"contentUrl\":\"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-00.jpg\",\"width\":1000,\"height\":750,\"caption\":\"McAfee Most Hackable Holiday Gifts List\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nxtmag.tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nxtmag.tech\/my\/#website\",\"url\":\"https:\/\/nxtmag.tech\/my\/\",\"name\":\"NXT Malaysia\",\"description\":\"Gear, Gadget, Technology\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nxtmag.tech\/my\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852\",\"name\":\"NXT\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g\",\"caption\":\"NXT\"},\"url\":\"https:\/\/nxtmag.tech\/my\/author\/lawrence\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts - NXT Malaysia","description":"What better gift to give your loved ones this holiday than the gift of security? Check out the McAfee list of Most Hackable Holiday Gifts!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/","og_locale":"en_US","og_type":"article","og_title":"A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts - NXT Malaysia","og_description":"What better gift to give your loved ones this holiday than the gift of security? Check out the McAfee list of Most Hackable Holiday Gifts!","og_url":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/","og_site_name":"NXT Malaysia","article_published_time":"2017-11-25T01:00:25+00:00","article_modified_time":"2019-03-19T00:40:00+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-00.jpg","type":"image\/jpeg"}],"author":"NXT","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NXT","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#article","isPartOf":{"@id":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/"},"author":{"name":"NXT","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852"},"headline":"A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts","datePublished":"2017-11-25T01:00:25+00:00","dateModified":"2019-03-19T00:40:00+00:00","mainEntityOfPage":{"@id":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/"},"wordCount":845,"image":{"@id":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#primaryimage"},"thumbnailUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-00.jpg","keywords":["McAfee","security"],"articleSection":["News","Guru"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/","url":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/","name":"A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts - NXT Malaysia","isPartOf":{"@id":"https:\/\/nxtmag.tech\/my\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#primaryimage"},"image":{"@id":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#primaryimage"},"thumbnailUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-00.jpg","datePublished":"2017-11-25T01:00:25+00:00","dateModified":"2019-03-19T00:40:00+00:00","author":{"@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852"},"description":"What better gift to give your loved ones this holiday than the gift of security? Check out the McAfee list of Most Hackable Holiday Gifts!","breadcrumb":{"@id":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#primaryimage","url":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-00.jpg","contentUrl":"https:\/\/nxtmag.tech\/wp-content\/uploads\/2017\/11\/mcafee-most-hackable-holiday-gifts-00.jpg","width":1000,"height":750,"caption":"McAfee Most Hackable Holiday Gifts List"},{"@type":"BreadcrumbList","@id":"https:\/\/nxtmag.tech\/my\/2017\/11\/25\/cybersecurity-carol-key-takeaways-years-hackable-holiday-gifts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nxtmag.tech\/"},{"@type":"ListItem","position":2,"name":"A Cybersecurity Carol: Key Takeaways From This Year\u2019s Most Hackable Holiday Gifts"}]},{"@type":"WebSite","@id":"https:\/\/nxtmag.tech\/my\/#website","url":"https:\/\/nxtmag.tech\/my\/","name":"NXT Malaysia","description":"Gear, Gadget, Technology","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nxtmag.tech\/my\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/c426122b1dd58a57f52a773b80de3852","name":"NXT","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/nxtmag.tech\/my\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3df61dffd2251dce64d0dd37531fe754b46b0b2026acd61b51a5c9d429f8cc6f?s=96&d=mm&r=g","caption":"NXT"},"url":"https:\/\/nxtmag.tech\/my\/author\/lawrence\/"}]}},"_links":{"self":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/1973","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/comments?post=1973"}],"version-history":[{"count":1,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/1973\/revisions"}],"predecessor-version":[{"id":1974,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/posts\/1973\/revisions\/1974"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/media\/1964"}],"wp:attachment":[{"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/media?parent=1973"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/categories?post=1973"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nxtmag.tech\/my\/wp-json\/wp\/v2\/tags?post=1973"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}