{"id":3751,"date":"2007-07-04T11:57:43","date_gmt":"2007-07-04T09:57:43","guid":{"rendered":"http:\/\/us1.intego.com\/mac-security-blog\/?page_id=3751"},"modified":"2016-04-22T12:22:55","modified_gmt":"2016-04-22T19:22:55","slug":"about","status":"publish","type":"page","link":"https:\/\/www.intego.com\/mac-security-blog\/about\/","title":{"rendered":"About the Mac Security Blog"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-3639\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/01\/Intego-logo.png\" alt=\"Intego logo\" width=\"300\" height=\"84\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/01\/Intego-logo.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/01\/Intego-logo-100x28.png 100w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>The Mac Security Blog is published by Intego, the Macintosh security specialist, to provide Apple Mac users with timely, useful information about Mac security issues, Apple news, and Intego software. The Mac Security Blog has no relations with Apple Inc. All trademarks belong to their respective owners.<\/p>\n<p>To find out more about Intego and its products, visit <a href=\"https:\/\/www.intego.com\">the Intego web site<\/a>.<\/p>\n<p>Feel free to <a href=\"https:\/\/www.intego.com\/company\/contact-us\">contact us<\/a> if you have any questions about the blog.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; The Mac Security Blog is published by Intego, the Macintosh security specialist, to provide Apple Mac users with timely, useful information about Mac security issues, Apple news, and Intego software. The Mac Security Blog has no relations with Apple Inc. All trademarks belong to their respective owners. To find out more about Intego and [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"spay_email":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"&nbsp; The Mac Security Blog is published by Intego, the Macintosh security specialist, to provide Apple Mac users with timely, useful information about\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/about\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"About the Mac Security Blog - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"&nbsp; The Mac Security Blog is published by Intego, the Macintosh security specialist, to provide Apple Mac users with timely, useful information about\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/about\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:modified_time\" content=\"2016-04-22T19:22:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/01\/Intego-logo.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/about\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/01\/Intego-logo.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/01\/Intego-logo.png\",\"width\":\"300\",\"height\":\"84\",\"caption\":\"Intego logo\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/about\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/about\/\",\"name\":\"About the Mac Security Blog - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/about\/#primaryimage\"},\"datePublished\":\"2007-07-04T09:57:43+00:00\",\"dateModified\":\"2016-04-22T19:22:55+00:00\",\"description\":\"&nbsp; The Mac Security Blog is published by Intego, the Macintosh security specialist, to provide Apple Mac users with timely, useful information about\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/about\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/about\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/about\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"About the Mac Security Blog\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"&nbsp; The Mac Security Blog is published by Intego, the Macintosh security specialist, to provide Apple Mac users with timely, useful information about","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/about\/","og_locale":"en_US","og_type":"article","og_title":"About the Mac Security Blog - The Mac Security Blog","og_description":"&nbsp; The Mac Security Blog is published by Intego, the Macintosh security specialist, to provide Apple Mac users with timely, useful information about","og_url":"https:\/\/www.intego.com\/mac-security-blog\/about\/","og_site_name":"The Mac Security Blog","article_modified_time":"2016-04-22T19:22:55+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/01\/Intego-logo.png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/about\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/01\/Intego-logo.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/01\/Intego-logo.png","width":"300","height":"84","caption":"Intego logo"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/about\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/about\/","name":"About the Mac Security Blog - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/about\/#primaryimage"},"datePublished":"2007-07-04T09:57:43+00:00","dateModified":"2016-04-22T19:22:55+00:00","description":"&nbsp; The Mac Security Blog is published by Intego, the Macintosh security specialist, to provide Apple Mac users with timely, useful information about","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/about\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/about\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/about\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"About the Mac Security Blog"}]}]}},"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/P4VAYd-Yv","_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/pages\/3751"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=3751"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/pages\/3751\/revisions"}],"predecessor-version":[{"id":96537,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/pages\/3751\/revisions\/96537"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=3751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}