	{"id":100233,"date":"2024-04-19T05:28:51","date_gmt":"2024-04-19T12:28:51","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=100233"},"modified":"2024-10-18T09:54:30","modified_gmt":"2024-10-18T16:54:30","slug":"apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/","title":{"rendered":"How to spot fake Apple security alerts via text, phone, email, or web"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-100308\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/cybercriminal-wearing-an-Apple-logo-mask-and-hoodie-600x350-1.jpg\" alt=\"\" width=\"600\" height=\"350\" \/><\/p>\n<p>Apple recently contacted users in 92 countries around the world, warning them that they had been targeted by a &#8220;mercenary spyware attack.&#8221; This term replaces what Apple used to call &#8220;state-sponsored attacks,&#8221; and covers attacks using spyware such as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/pegasus\/\">Pegasus, created by the NSO Group<\/a>. Apple contacted these individuals by both email and iMessage. Also, when logging into their Apple ID account in a browser, users would see a &#8220;Threat Notification&#8221; bar with the date on which Apple sent those communications.<\/p>\n<p>But if you get a message that claims to be from Apple\u2014whether by SMS text message, iMessage, email, or a phone call\u2014how can you know whether it&#8217;s really Apple or not?<\/p>\n<p>Let&#8217;s examine the reasons why Apple might legitimately contact you (and how they&#8217;ll do so), and how to recognize scams.<\/p>\n<h3>Apple notified users who were victims of mercenary spyware attacks<\/h3>\n<p>The aforementioned Apple emails <a href=\"https:\/\/www.documentcloud.org\/documents\/24539926-threat-notifications-email-april-10\" target=\"_blank\" rel=\"noopener\">reportedly<\/a> included the following details:<\/p>\n<blockquote><p>\u201cApple detected that you are being targeted by a mercenary spyware attack that is trying to remotely compromise the iPhone associated with your Apple ID -xxx-<\/p>\n<p>\u201cThis attack is likely targeting you specifically because of who you are or what you do. Although it\u2019s never possible to achieve absolute certainty when detecting such attacks, Apple has high confidence in this warning \u2014 please take it seriously.<\/p>\n<p>\u201cWe are unable to provide more information about what caused us to send you this notification, as that may help mercenary spyware attackers adapt their behavior to evade detection in the future.<\/p>\n<p>\u201cMercenary spyware attacks, such as those using Pegasus from the NSO Group, are exceptionally rare and vastly more sophisticated than regular cybercriminal activity or consumer malware.\u201d<\/p><\/blockquote>\n<p>Notably, <strong>these real Apple emails do not contain any links<\/strong>. So if you get a similar-looking email, but it <strong>prompts you to click on something<\/strong>, don&#8217;t trust it\u2014it&#8217;s a scam.<\/p>\n<h3 id=\"ifyougetcontactedbyapplehowdoyouknowitsreallythem\">How can I confirm that an Apple threat notification is legitimate?<\/h3>\n<p>As Apple points out in a support document entitled <a href=\"https:\/\/support.apple.com\/en-us\/102174\">About Apple threat notifications and protecting against mercenary spyware<\/a>, the company &#8220;sends an email and iMessage notification to the email addresses and phone numbers associated with the user\u2019s Apple ID.&#8221; Moreover, &#8220;A Threat Notification is displayed at the top of the page after the user signs into appleid.apple.com.&#8221;<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-100234\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake3.png\" alt=\"\" width=\"1560\" height=\"1108\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake3.png 1560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake3-300x213.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake3-1024x727.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake3-150x107.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake3-768x545.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake3-1536x1091.png 1536w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake3-657x467.png 657w\" sizes=\"(max-width: 1560px) 100vw, 1560px\" \/><\/p>\n<p>The emails and notifications do not contain links to click, but direct users to the Apple ID website instead. After signing into the website, clicking the View Details link in the Threat Notification bar takes the user to a page giving more information about the attack.<\/p>\n<h3>Will Apple send me emails containing links?<\/h3>\n<p>If you receive an email purporting to be from Apple, but it entices you to click on a link, it is likely a phishing email.<\/p>\n<p>One exception to this rule is if you have recently opened a support case with AppleCare; the emails they send will include your case number for verification purposes, and they may contain links to Apple&#8217;s support website. Receipts from Apple&#8217;s App Store, iTunes Store, or other Apple services will also contain links. But <strong>no legitimate emails from Apple will recommend that you click on a link to log into your Apple ID account<\/strong>.<\/p>\n<p>If you receive an email claiming to be from Apple, and claiming you&#8217;ve made a purchase that you don&#8217;t recognize, don&#8217;t click any links; it&#8217;s almost certainly a scam. If you&#8217;re really concerned, check your actual purchase history (or billing method) to make sure that you did not accidentally buy something. If you did make an accidental purchase, you can use Apple&#8217;s <a href=\"https:\/\/reportaproblem.apple.com\/\">Report a Problem<\/a> site to resolve the issue. Just make sure you go to that site from a trusted link or bookmark\u2014not a link from a possible phishing email.<\/p>\n<h4><strong>iCloud storage warning email phishing scams<\/strong><\/h4>\n<p>Late last year, a wave of iCloud storage-related phishing emails circulated. They claimed, for example: &#8220;Your [iCloud] storage might be full,&#8221; and they pretended to offer a free iCloud storage upgrade to recipients who clicked on a &#8220;Get this deal&#8221; link. We wrote about this scam in December: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/dont-fall-for-icloud-free-storage-notice-email-scams\/\">Don&#8217;t fall for &#8220;iCloud FREE Storage Notice&#8221; e-mail scams<\/a>.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"YG1kYKoMQX\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/dont-fall-for-icloud-free-storage-notice-email-scams\/\">Don&#8217;t fall for &#8220;iCloud FREE Storage Notice&#8221; email scams<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Don&#8217;t fall for &#8220;iCloud FREE Storage Notice&#8221; email scams&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/dont-fall-for-icloud-free-storage-notice-email-scams\/embed\/#?secret=YG1kYKoMQX\" data-secret=\"YG1kYKoMQX\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h4><strong>How to report scam emails that impersonate Apple<\/strong><\/h4>\n<p>If you receive an email that claims to be from Apple but you believe it&#8217;s fraudulent, check out our video tutorial on how to report it to Apple and the authorities: <a href=\"https:\/\/www.youtube.com\/watch?v=fGCiDTlyHME\">How to report scam e-mails &#8211; Phishing, fraud, blackmail, or extortion<\/a>.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/fGCiDTlyHME?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<h3 id=\"willapplesendtextmessages\">Will Apple ever send me text messages?<\/h3>\n<p>There are very rare and limited circumstances under which Apple may send you messages through the Messages app. These may either be SMS text messages, or feature-rich chats similar to iMessage\u2014but with distinct features that allow users to easily verify that they&#8217;re really from Apple.<\/p>\n<h4><strong>SMS two-factor authentication codes<\/strong><\/h4>\n<p>Apple may send text messages to users as two-factor authentication codes if the user cannot get notified in any other way. Other than that, Apple never sends ordinary plain-text messages.<\/p>\n<p>Following is an example of a <strong>real text message<\/strong> from Apple. Note the lack of a link, other than the percent symbol followed by apple.com. Although the formatting looks odd, it&#8217;s designed to comply with <a href=\"https:\/\/developer.apple.com\/documentation\/security\/one-time_codes\/enabling_autofill_for_domain-bound_sms_codes\" target=\"_blank\" rel=\"noopener\">Apple&#8217;s own AutoFill standards for SMS text messages<\/a>.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-100235 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake1.png\" alt=\"Your Apple ID Code is: 123456. Don\u2019t share it with anyone. @apple.com #123456 %apple.com\" width=\"510\" height=\"205\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake1.png 510w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake1-300x121.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/apple-fake1-150x60.png 150w\" sizes=\"(max-width: 510px) 100vw, 510px\" \/><\/p>\n<h4><strong>Verified support via Apple Messages for Business<\/strong><\/h4>\n<p>Here&#8217;s another example of legitimate messages you may receive from Apple via the Messages app. If you contact Apple via its Support app for iPhone, you may have the option to chat live. This chat takes place in the Messages app\u2014the same app you use for iMessage and SMS\/MMS (and RCS, as of iOS 18) text message conversations. But you&#8217;ll notice some key differences in appearance. These conversations include a <strong>Verified badge next to Apple&#8217;s company name at the top<\/strong>. If you&#8217;re able to reply, your messages will have a <strong>gray bubble<\/strong> (rather than blue for iMessage or green for other chats).<\/p>\n<p>Similarly, Apple may also send shipping notifications via the Messages app. You won&#8217;t have the option to reply. But you will see a Verified badge next to the name &#8220;Apple Notifications&#8221; at the top of the chat. If you tap on the Verified badge, you&#8217;ll see more details about the company.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-100314\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/Apple-Messages-for-Business-examples.jpg\" alt=\"\" width=\"1192\" height=\"900\" \/><\/p>\n<p>Other companies besides Apple can also get Verified badges and interact with customers via the Messages app. To do so, the company must register for the <a href=\"https:\/\/register.apple.com\/resources\/messages\/messaging-documentation\/\" target=\"_blank\" rel=\"noopener\">Apple Messages for Business<\/a> service.<\/p>\n<h4><strong>What if I get a message that doesn&#8217;t look like the examples above?<\/strong><\/h4>\n<p>What about if you get any other kind of text message or iMessage that claims to be from Apple? If it doesn&#8217;t look like the examples above, don&#8217;t trust it; it&#8217;s a scam. Don&#8217;t click on any links within those messages, as they may lead to a phishing or malware site.<\/p>\n<h3 id=\"willappleevercallyou\">Will Apple ever call me by phone?<\/h3>\n<h4><strong>Real scenarios when Apple may call you<\/strong><\/h4>\n<p>Apple will not call you unless it&#8217;s about a tech support case <strong>you previously initiated<\/strong>. When you start a support case with AppleCare, you can choose to receive a phone call. That call will happen within one minute of when you request it. You will be instructed to press a number if you&#8217;re ready to take the call.<\/p>\n<p>If your support case is escalated, you may get a call back from a senior support agent. It&#8217;s a good idea to ask them for the case number, to confirm that they are from Apple. AppleCare sends an email when you initiate a case which contains a case number and other information.<\/p>\n<div id=\"attachment_100236\" style=\"width: 1210px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-100236\" loading=\"lazy\" class=\"wp-image-100236 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/fake-apple2.png\" alt=\"\" width=\"1200\" height=\"790\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/fake-apple2.png 1200w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/fake-apple2-300x198.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/fake-apple2-1024x674.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/fake-apple2-150x99.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/fake-apple2-768x506.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/fake-apple2-305x200.png 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/fake-apple2-657x433.png 657w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><p id=\"caption-attachment-100236\" class=\"wp-caption-text\">A real email you&#8217;ll get from Apple when you open a support case. (Note that phishing scam emails may try to impersonate these.)<\/p><\/div>\n<h4><strong>Scams that may appear to be Apple calling you<\/strong><\/h4>\n<p>One possible fake phone call that Apple users may receive comes after an &#8220;<strong>MFA bombing<\/strong>&#8221; attack. (MFA stands for multifactor authentication.) This occurs when <a href=\"https:\/\/krebsonsecurity.com\/2024\/03\/recent-mfa-bombing-attacks-targeting-apple-users\/\">a user receives repeated notifications asking to approve a password reset<\/a>, initiated by a malicious user trying to get into their account. The goal of this attack is to get the user to slip up when tapping the notifications; they hope you&#8217;ll accidentally hit Allow rather than Don&#8217;t Allow. All it takes is one mistake to enable a malicious to user to reset your Apple ID password reset.<\/p>\n<p>With this attack, users may receive a phone call purporting to be from Apple support. Their phone may even display the correct phone number for Apple Support; this is because the attacker is &#8220;spoofing&#8221; the Apple support phone number stored in your contacts. Apple won&#8217;t call a user like this, except for an AppleCare case the user has already initiated recently. <strong>Any phone call claiming to be from Apple after repeated password-reset push notifications is bogus, and should be ignored.<\/strong><\/p>\n<h3>Will Apple ever display in-browser alerts about malware infections or security issues?<\/h3>\n<p>For many years, scammer-operated sites have tried to trick victims with flashy alerts claiming your system is infected. These may either come in the form of a &#8220;virus scan&#8221; window, or a <a href=\"https:\/\/support.intego.com\/hc\/en-us\/articles\/207113578-About-the-Web-Browser-Pop-up-Alert-Scam\">pop-up alert<\/a> like the ones below. You may encounter similar alerts after clicking on a search engine result. <strong>Don&#8217;t believe in-browser alerts like these; they&#8217;re scams.<\/strong> Apple will never contact you this way.<\/p>\n<div id=\"attachment_97016\" style=\"width: 1210px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-97016\" loading=\"lazy\" class=\"wp-image-97016 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2023\/01\/Safari-fake-alert-support-scam-pop-ups.jpg\" alt=\"\" width=\"1200\" height=\"1439\" \/><p id=\"caption-attachment-97016\" class=\"wp-caption-text\">Fake in-browser alerts claiming to be from Apple or the FBI.<\/p><\/div>\n<p>If you&#8217;re concerned that you Mac might actually be infected, scan your Mac with a trustworthy antivirus.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-54214\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png\" alt=\"Intego X9 software boxes\" width=\"200\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-300x150.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/X9-Mac-Antivirus-Launch.png 600w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>Intego VirusBarrier X9, included with <strong><a href=\"https:\/\/offer.intego.com\/BlogMACAV_lbmxlkchf\">Intego&#8217;s Mac Premium Bundle X9<\/a><\/strong>, is a powerful solution designed to protect against, detect, and eliminate Mac malware.<\/p>\n<p>Whether you believe your Mac may be infected, or to prevent future infections, it&#8217;s best to use antivirus software from a trusted Mac developer. VirusBarrier is award-winning antivirus software, designed by Mac security experts, that includes <a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-antivirus-needs-real-time-scanning\/\">real-time protection<\/a>. It runs natively on both Intel- and Apple silicon-based Macs, and it&#8217;s compatible with Apple&#8217;s current Mac operating system, macOS Sonoma.<a name=\"learnmore\"><\/a><\/p>\n<h3>Key takeaways<\/h3>\n<p>Apple has a support document explaining how to &#8220;<a href=\"https:\/\/support.apple.com\/en-us\/102568\">Recognize and avoid phishing messages, phony support calls, and other scams<\/a>.&#8221; This document includes many links and email addresses to deal with fraudulent contacts purporting to be from Apple.<\/p>\n<p>The bottom line: Apple will only contact users for very specific reasons. These include: if Apple thinks you have been targeted by mercenary software; when they send receipts for purchases from one of Apple&#8217;s services (which won&#8217;t contain login\/action links); and for AppleCare support cases. The company sends text messages with two-factor authentication codes if users can&#8217;t authenticate in another way. And they only call users about AppleCare support cases you&#8217;ve just created. Any other supposed contact from Apple is likely malicious. Don&#8217;t click on any links that claim to be from Apple; it&#8217;s safest to use an existing bookmark to sign into your Apple ID account.<a name=\"learnmore\"><\/a><\/p>\n<h3 id=\"exploremore\">How can I learn more?<\/h3>\n<p>Other resources on this topic include:<\/p>\n<ul>\n<li><a href=\"https:\/\/support.apple.com\/en-us\/102568\" target=\"_blank\" rel=\"noopener\">Apple Support &#8211; Recognize and avoid phishing messages, phony support calls, and other scams<\/a><\/li>\n<li><a href=\"https:\/\/support.intego.com\/hc\/en-us\/articles\/207113578-About-the-Web-Browser-Pop-up-Alert-Scam\">Intego Support &#8211; About the Web Browser Pop-up Alert Scam<\/a><\/li>\n<li><a href=\"https:\/\/eclecticlight.co\/2024\/04\/12\/what-to-do-if-apple-contacts-you-about-malware-or-security\/\" target=\"_blank\" rel=\"noopener nofollow\">Eclectic Light Company &#8211; What to do if Apple contacts you about malware or security<\/a><\/li>\n<\/ul>\n<p>We discussed Apple notifications about mercenary spyware on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-can-take-over-your-phone-by-sim-swapping-intego-mac-podcast-episode-340\/\">episode 340<\/a> of the Intego Mac Podcast.<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+6Pb8JAxA?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on \ud835\udd4f\/Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/X-Twitter-logo-icon-225.gif\" alt=\"Follow Intego on X\/Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Facebook-logo-icon-225.gif\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/YouTube-logo-icon-225.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Pinterest-logo-icon-225.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/LinkedIn-logo-icon-225.gif\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/03\/Instagram-logo-icon-225.gif\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What should you do if you receive an email, text message, or phone call purporting to be from Apple? Is it legitimate? How can you find know for sure? We\u2019ve got the answers.<\/p>\n","protected":false},"author":46,"featured_media":100310,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[3151,215,4039,3070,102,116,2380],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"What should you do if you receive an email, text message, or phone call purporting to be from Apple? Is it legitimate? How can you find know for sure? We\u2019ve got the answers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to spot fake Apple security alerts via text, phone, email, or web - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"What should you do if you receive an email, text message, or phone call purporting to be from Apple? Is it legitimate? How can you find know for sure? We\u2019ve got the answers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-19T12:28:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-18T16:54:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/cybercriminal-wearing-an-Apple-logo-mask-and-hoodie-400x260-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/cybercriminal-wearing-an-Apple-logo-mask-and-hoodie-400x260-1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/cybercriminal-wearing-an-Apple-logo-mask-and-hoodie-400x260-1.jpg\",\"width\":400,\"height\":260,\"caption\":\"cybercriminal wearing an Apple logo mask and hoodie\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/\",\"name\":\"How to spot fake Apple security alerts via text, phone, email, or web - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#primaryimage\"},\"datePublished\":\"2024-04-19T12:28:51+00:00\",\"dateModified\":\"2024-10-18T16:54:30+00:00\",\"description\":\"What should you do if you receive an email, text message, or phone call purporting to be from Apple? Is it legitimate? How can you find know for sure? We\\u2019ve got the answers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to spot fake Apple security alerts via text, phone, email, or web\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"How to spot fake Apple security alerts via text, phone, email, or web\",\"datePublished\":\"2024-04-19T12:28:51+00:00\",\"dateModified\":\"2024-10-18T16:54:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#webpage\"},\"wordCount\":1973,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/cybercriminal-wearing-an-Apple-logo-mask-and-hoodie-400x260-1.jpg\",\"keywords\":[\"Apple\",\"Identity Theft\",\"Online Scams\",\"Pegasus\",\"Phishing\",\"Scam\",\"Support Scam\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"What should you do if you receive an email, text message, or phone call purporting to be from Apple? Is it legitimate? How can you find know for sure? We\u2019ve got the answers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/","og_locale":"en_US","og_type":"article","og_title":"How to spot fake Apple security alerts via text, phone, email, or web - The Mac Security Blog","og_description":"What should you do if you receive an email, text message, or phone call purporting to be from Apple? Is it legitimate? How can you find know for sure? We\u2019ve got the answers.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/","og_site_name":"The Mac Security Blog","article_published_time":"2024-04-19T12:28:51+00:00","article_modified_time":"2024-10-18T16:54:30+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/cybercriminal-wearing-an-Apple-logo-mask-and-hoodie-400x260-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/cybercriminal-wearing-an-Apple-logo-mask-and-hoodie-400x260-1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/cybercriminal-wearing-an-Apple-logo-mask-and-hoodie-400x260-1.jpg","width":400,"height":260,"caption":"cybercriminal wearing an Apple logo mask and hoodie"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/","name":"How to spot fake Apple security alerts via text, phone, email, or web - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#primaryimage"},"datePublished":"2024-04-19T12:28:51+00:00","dateModified":"2024-10-18T16:54:30+00:00","description":"What should you do if you receive an email, text message, or phone call purporting to be from Apple? Is it legitimate? How can you find know for sure? We\u2019ve got the answers.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How to spot fake Apple security alerts via text, phone, email, or web"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"How to spot fake Apple security alerts via text, phone, email, or web","datePublished":"2024-04-19T12:28:51+00:00","dateModified":"2024-10-18T16:54:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#webpage"},"wordCount":1973,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/cybercriminal-wearing-an-Apple-logo-mask-and-hoodie-400x260-1.jpg","keywords":["Apple","Identity Theft","Online Scams","Pegasus","Phishing","Scam","Support Scam"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-is-that-really-you-how-to-spot-fake-security-alerts-via-text-phone-email-or-web\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2024\/04\/cybercriminal-wearing-an-Apple-logo-mask-and-hoodie-400x260-1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-q4F","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100233"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=100233"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100233\/revisions"}],"predecessor-version":[{"id":100408,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/100233\/revisions\/100408"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/100310"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=100233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=100233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=100233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}