{"id":12405,"date":"2024-07-03T14:45:29","date_gmt":"2024-07-03T21:45:29","guid":{"rendered":"https:\/\/www.netgear.com\/hub\/?page_id=12405"},"modified":"2025-08-19T09:52:45","modified_gmt":"2025-08-19T16:52:45","slug":"what-is-cryptojacking-protection","status":"publish","type":"page","link":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/","title":{"rendered":"Protect Devices from Cryptojacking with NETGEAR Armor"},"content":{"rendered":"    <div class=\"table-of-content bg-gray 12405\">\n        <p><strong>IN THIS ARTICLE<\/strong><\/p>\n        <ul>\n                        <li><a href=\"#topic1\">What is Cryptojacking?<\/a><\/li>\n                        <li><a href=\"#topic2\">Armor Cryptomining Protection Feature<\/a><\/li>\n                        <li><a href=\"#topic3\">Get Armor for Cryptomining Protection &amp; Management<\/a><\/li>\n                        <li><a href=\"#topic4\">Enabling Cryptomining Protection on Your Device:<\/a><\/li>\n                        <li><a href=\"#topic5\">Setup: Block All Detected Cryptomining Activity<\/a><\/li>\n                        <li><a href=\"#topic6\">Setup: Manage Cryptomining Activities Manually<\/a><\/li>\n                    <\/ul>\n    <\/div>\n        <div id=\"topic1\" class=\"skip-item\">\n                        <h2>What is Cryptojacking?<\/h2>\n                <p><img decoding=\"async\" class=\"alignright size-full wp-image-12413\" src=\"https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/armor-bitcoin-featured.jpg\" alt=\"\" width=\"250\" srcset=\"https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/armor-bitcoin-featured.jpg 480w, https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/armor-bitcoin-featured-262x300.jpg 262w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/>Cybercriminals have begun to seize the opportunity, secretly mining cryptocurrency on other people&#8217;s computers without their permission. The process is known as &#8220;cryptojacking,&#8221; and it occurs when hackers install malicious software on a device, typically via infected websites, email attachments, or apps. The software operates in the background, utilizing the device&#8217;s power and resources to generate digital currency for the hacker. This can significantly slow down the device, increase the electricity bill, and even cause irreversible damage.<\/p>\n    <\/div>\n        <div id=\"topic2\" class=\"skip-item\">\n                        <h2>Armor Cryptomining Protection Feature<\/h2>\n                <p>Introducing Cryptomining Protection, NETGEAR Armor&#8217;s new cryptomining management feature, which allows users to protect against malicious cryptojacking while also managing their own legitimate cryptomining initiatives on their Windows PCs.<\/p>\n<p>Cryptomining Protection ensures Armor users are aware of and protected from unauthorized system breaches by blocking cryptojacking malware that attempts to exploit system resources. At the same time, because some users want to engage in legitimate cryptomining activities, Cryptomining Protection serves as a unique management tool, allowing them to monitor and decide what should be kept running and what should be stopped.<\/p>\n    <\/div>\n        <div id=\"topic3\" class=\"skip-item\">\n                        <h2>Get Armor for Cryptomining Protection &amp; Management<\/h2>\n                <p>To get Cryptomining Protection, download NETGEAR Armor for your Windows device click below:<br \/>\n<div class=\"explore-btn-area black-bg-btn\"><a class=\"explore-btn\" href=\"https:\/\/download.bitdefender.com\/b2b2c\/bfda6634-1c52-4b5a-aa47-68adf291e2e6\/windows\/latest\/agent\/en-us\/netgear_armor.exe\">Install Armor for Windows<\/a><\/div><br \/>\n<a style=\"text-decoration: underline;\" href=\"https:\/\/www.netgear.com\/home\/services\/armor\/\">Learn more about NETGEAR Armor<\/a><\/p>\n<p>In our digital age, safeguarding our online identity is of the utmost importance. The ever-expanding digital domain has come to include our private data, sensitive documents, online behavior and, more recently, digital assets in the form of cryptocurrency.<\/p>\n<p>With the advent of cryptomoney, a relatively new cyber threat has emerged \u2013 cryptojacking, in the form of cryptomining malware. This malware strain piggybacks on your device\u2019s processing power to mine cryptocurrency without your knowledge, taking a significant toll on your device\u2019s performance and potentially paving the way for other, more severe security risks.<\/p>\n<p>Recognizing this threat, Bitdefender Total Security now encompasses a cutting-edge cryptomining protection feature. Designed with the everyday user in mind, this feature protects your device from cryptomining malware, ensuring an unfettered online experience.<\/p>\n    <\/div>\n        <div id=\"topic4\" class=\"skip-item\">\n                        <h2>Enabling Cryptomining Protection on Your Device:<\/h2>\n                <p>As mentioned, Bitdefender Total Security will notify you of the feature\u2019s availability, allowing you to activate it on the spot, and give you a brief presentation of its capabilities and benefits. This is the easiest way to turn on cryptomining protection for your device.<\/p>\n<p>However, if you missed the notification, you can find it under the \u201cProtection\u201d category in the main window. You can easily enable Cryptomining Protection by flipping the corresponding switch and configure it by clicking the \u201cSettings\u201d button.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-12426\" src=\"https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/prevent-cryptomining.jpg\" alt=\"Prevent Cryptomining and Cryptojacking\" width=\"533\" height=\"363\" srcset=\"https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/prevent-cryptomining.jpg 533w, https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/prevent-cryptomining-300x204.jpg 300w\" sizes=\"auto, (max-width: 533px) 100vw, 533px\" \/><\/p>\n    <\/div>\n        <div id=\"topic5\" class=\"skip-item\">\n                        <h2>Setup: Block All Detected Cryptomining Activity<\/h2>\n                <p>The first Cryptomining Protection setting in the menu, called \u201cBlock all Cryptomining activities,\u201d as its name suggests, blocks all detected cryptomining activities automatically and acts accordingly to prevent further attempts or propagation. Unless specified, this setting will be chosen by default upon activating the feature.<\/p>\n<p>The setting also lets you receive notifications each time an activity is blocked on the device; or you could opt for a quieter approach that tells the feature to operate stealthily, notifying you every 24 hours via a pop-up summary.<\/p>\n<p>It\u2019s worth mentioning that the first setting is recommended for users who don\u2019t plan to run cryptomining activities on their devices.<\/p>\n    <\/div>\n        <div id=\"topic6\" class=\"skip-item\">\n                        <h2>Setup: Manage Cryptomining Activities Manually<\/h2>\n                <p>The second setting, \u201cDetect Cryptomining activities,\u201d provides a more hands-on approach. Upon choosing this setting, the feature detects matching activities on the system and informs you about them, but without taking further action automatically.<\/p>\n<p>You can then review the event and decide how to proceed, whether by allowing the activity to unfold on your system or blocking it. Choosing the latter will kill the unwanted process and disinfect your machine to prevent it from restarting.<\/p>\n<p>Advanced users can benefit from a third option, allowing them to configure exceptions to exclude from the scan. This could be useful if you want to mine cryptocurrency on your device and block all other detected activities automatically.<\/p>\n    <\/div>\n    \n","protected":false},"excerpt":{"rendered":"","protected":false},"author":104,"featured_media":12413,"parent":15275,"menu_order":8,"comment_status":"closed","ping_status":"closed","template":"templates\/blog-wifi.php","meta":{"_acf_changed":false,"content-type":"","_price":"","_stock":"","_tribe_ticket_header":"","_tribe_default_ticket_provider":"","_tribe_ticket_capacity":"0","_ticket_start_date":"","_ticket_end_date":"","_tribe_ticket_show_description":"","_tribe_ticket_show_not_going":false,"_tribe_ticket_use_global_stock":"","_tribe_ticket_global_stock_level":"","_global_stock_mode":"","_global_stock_cap":"","_tribe_rsvp_for_event":"","_tribe_ticket_going_count":"","_tribe_ticket_not_going_count":"","_tribe_tickets_list":"[]","_tribe_ticket_has_attendee_info_fields":false,"footnotes":"","_tec_slr_enabled":"","_tec_slr_layout":""},"class_list":["post-12405","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Cryptojacking Protection? | NETGEAR<\/title>\n<meta name=\"description\" content=\"Learn about cryptojacking protection and how NETGEAR\u2019s solutions safeguard your network from malicious attacks. Stay secure online.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Cryptojacking Protection? | NETGEAR\" \/>\n<meta property=\"og:description\" content=\"Learn about cryptojacking protection and how NETGEAR\u2019s solutions safeguard your network from malicious attacks. Stay secure online.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"NETGEAR Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NetgearAU\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T16:52:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/armor-bitcoin-featured.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"480\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@NETGEAR\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/\"},\"author\":{\"name\":\"NETGEAR Security Team\",\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/#\\\/schema\\\/person\\\/4dae84ed0a7586b232ceb062ad8651c1\"},\"headline\":\"Protect Devices from Cryptojacking with NETGEAR Armor\",\"datePublished\":\"2024-07-03T21:45:29+00:00\",\"dateModified\":\"2025-08-19T16:52:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/\"},\"wordCount\":9,\"publisher\":{\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/armor-bitcoin-featured.jpg\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/\",\"url\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/\",\"name\":\"What is Cryptojacking Protection? | NETGEAR\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/armor-bitcoin-featured.jpg\",\"datePublished\":\"2024-07-03T21:45:29+00:00\",\"dateModified\":\"2025-08-19T16:52:45+00:00\",\"description\":\"Learn about cryptojacking protection and how NETGEAR\u2019s solutions safeguard your network from malicious attacks. Stay secure online.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/armor-bitcoin-featured.jpg\",\"contentUrl\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/armor-bitcoin-featured.jpg\",\"width\":480,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/what-is-cryptojacking-protection\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Home Networking\",\"item\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Home Network Security Blogs\",\"item\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/network\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Protect Devices from Cryptojacking with NETGEAR Armor\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/#website\",\"url\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/\",\"name\":\"NETGEAR\",\"description\":\"Learn about NETGEAR Products and services\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/#organization\",\"name\":\"NETGEAR\",\"url\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"NETGEAR\"},\"image\":{\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/NetgearAU\\\/\",\"https:\\\/\\\/x.com\\\/NETGEAR\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/netgear\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/#\\\/schema\\\/person\\\/4dae84ed0a7586b232ceb062ad8651c1\",\"name\":\"NETGEAR Security Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad3df4eaae2c32c2f43659017c16bc5d3aa587ece49995db0ade06301b902322?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad3df4eaae2c32c2f43659017c16bc5d3aa587ece49995db0ade06301b902322?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad3df4eaae2c32c2f43659017c16bc5d3aa587ece49995db0ade06301b902322?s=96&d=mm&r=g\",\"caption\":\"NETGEAR Security Team\"},\"url\":\"https:\\\/\\\/www.netgear.com\\\/hub\\\/author\\\/securityteam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Cryptojacking Protection? | NETGEAR","description":"Learn about cryptojacking protection and how NETGEAR\u2019s solutions safeguard your network from malicious attacks. Stay secure online.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/","og_locale":"en_US","og_type":"article","og_title":"What is Cryptojacking Protection? | NETGEAR","og_description":"Learn about cryptojacking protection and how NETGEAR\u2019s solutions safeguard your network from malicious attacks. Stay secure online.","og_url":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/","og_site_name":"NETGEAR Blog","article_publisher":"https:\/\/www.facebook.com\/NetgearAU\/","article_modified_time":"2025-08-19T16:52:45+00:00","og_image":[{"width":480,"height":550,"url":"https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/armor-bitcoin-featured.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@NETGEAR","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/#article","isPartOf":{"@id":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/"},"author":{"name":"NETGEAR Security Team","@id":"https:\/\/www.netgear.com\/hub\/#\/schema\/person\/4dae84ed0a7586b232ceb062ad8651c1"},"headline":"Protect Devices from Cryptojacking with NETGEAR Armor","datePublished":"2024-07-03T21:45:29+00:00","dateModified":"2025-08-19T16:52:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/"},"wordCount":9,"publisher":{"@id":"https:\/\/www.netgear.com\/hub\/#organization"},"image":{"@id":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/armor-bitcoin-featured.jpg","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/","url":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/","name":"What is Cryptojacking Protection? | NETGEAR","isPartOf":{"@id":"https:\/\/www.netgear.com\/hub\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/#primaryimage"},"image":{"@id":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/armor-bitcoin-featured.jpg","datePublished":"2024-07-03T21:45:29+00:00","dateModified":"2025-08-19T16:52:45+00:00","description":"Learn about cryptojacking protection and how NETGEAR\u2019s solutions safeguard your network from malicious attacks. Stay secure online.","breadcrumb":{"@id":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/#primaryimage","url":"https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/armor-bitcoin-featured.jpg","contentUrl":"https:\/\/www.netgear.com\/hub\/wp-content\/uploads\/2024\/07\/armor-bitcoin-featured.jpg","width":480,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.netgear.com\/hub\/network\/security\/what-is-cryptojacking-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.netgear.com\/hub\/"},{"@type":"ListItem","position":2,"name":"Home Networking","item":"https:\/\/www.netgear.com\/hub\/network\/"},{"@type":"ListItem","position":3,"name":"Home Network Security Blogs","item":"https:\/\/www.netgear.com\/hub\/network\/security\/"},{"@type":"ListItem","position":4,"name":"Protect Devices from Cryptojacking with NETGEAR Armor"}]},{"@type":"WebSite","@id":"https:\/\/www.netgear.com\/hub\/#website","url":"https:\/\/www.netgear.com\/hub\/","name":"NETGEAR","description":"Learn about NETGEAR Products and services","publisher":{"@id":"https:\/\/www.netgear.com\/hub\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.netgear.com\/hub\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.netgear.com\/hub\/#organization","name":"NETGEAR","url":"https:\/\/www.netgear.com\/hub\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.netgear.com\/hub\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"NETGEAR"},"image":{"@id":"https:\/\/www.netgear.com\/hub\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NetgearAU\/","https:\/\/x.com\/NETGEAR","https:\/\/www.linkedin.com\/company\/netgear"]},{"@type":"Person","@id":"https:\/\/www.netgear.com\/hub\/#\/schema\/person\/4dae84ed0a7586b232ceb062ad8651c1","name":"NETGEAR Security Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad3df4eaae2c32c2f43659017c16bc5d3aa587ece49995db0ade06301b902322?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad3df4eaae2c32c2f43659017c16bc5d3aa587ece49995db0ade06301b902322?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad3df4eaae2c32c2f43659017c16bc5d3aa587ece49995db0ade06301b902322?s=96&d=mm&r=g","caption":"NETGEAR Security Team"},"url":"https:\/\/www.netgear.com\/hub\/author\/securityteam\/"}]}},"ticketed":false,"_links":{"self":[{"href":"https:\/\/www.netgear.com\/hub\/wp-json\/wp\/v2\/pages\/12405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.netgear.com\/hub\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.netgear.com\/hub\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.netgear.com\/hub\/wp-json\/wp\/v2\/users\/104"}],"replies":[{"embeddable":true,"href":"https:\/\/www.netgear.com\/hub\/wp-json\/wp\/v2\/comments?post=12405"}],"version-history":[{"count":8,"href":"https:\/\/www.netgear.com\/hub\/wp-json\/wp\/v2\/pages\/12405\/revisions"}],"predecessor-version":[{"id":20216,"href":"https:\/\/www.netgear.com\/hub\/wp-json\/wp\/v2\/pages\/12405\/revisions\/20216"}],"up":[{"embeddable":true,"href":"https:\/\/www.netgear.com\/hub\/wp-json\/wp\/v2\/pages\/15275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.netgear.com\/hub\/wp-json\/wp\/v2\/media\/12413"}],"wp:attachment":[{"href":"https:\/\/www.netgear.com\/hub\/wp-json\/wp\/v2\/media?parent=12405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}