{"id":10129,"date":"2013-01-30T12:40:55","date_gmt":"2013-01-30T20:40:55","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=10129"},"modified":"2017-01-06T15:44:33","modified_gmt":"2017-01-06T23:44:33","slug":"what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/","title":{"rendered":"What to Do if Your Email Account Gets Hijacked and Sends Out Spam"},"content":{"rendered":"<p>It\u2019s an event that we\u2019ve probably all dealt with at one point or another, either on the sender&#8217;s or the receiver&#8217;s end: an email that clearly didn\u2019t come from the person who supposedly sent it, hawking weight-loss supplements or \u201cmale enhancement\u201d pills or some such nonsense. What causes these, and what can you do about it? The short answer is, it\u2019s one of two things:<\/p>\n<ol>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-types-of-passwords-you-shouldnt-create-unless-you-want-your-account-hacked\/\">Poor password hygiene<\/a><\/li>\n<li>Spoofing.<\/li>\n<\/ol>\n<h4>(<strong><a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Is a virus\u00a0sending emails from your account? Click here for\u00a0a free trial of\u00a0Mac Internet Security X8 for\u00a0protection from malware and viruses.<\/a><\/strong>)<\/h4>\n<p>If the problem is poor password hygiene, that means your account was hacked. Or your account has been spoofed, in which case someone has made it appear as if it&#8217;s been hacked.<\/p>\n<div id=\"attachment_10135\" style=\"width: 610px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-10135\" loading=\"lazy\" class=\"size-full wp-image-10135\" title=\"spam-email\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email.png\" alt=\"\" width=\"600\" height=\"325\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-150x81.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-300x162.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><p id=\"caption-attachment-10135\" class=\"wp-caption-text\">A spam email one of Intego&#8217;s employees received from her friend just this morning.<\/p><\/div>\n<p>There are a number of reasons that can explain how your account got hacked:<\/p>\n<ul>\n<li>Your password was easily guessable<\/li>\n<li>You entered your credentials into a phishing site<\/li>\n<li>The website where you had your account had a security breach<\/li>\n<li>Your hacked account used the same password as a different, breached site<\/li>\n<li>There is spyware on your computer<\/li>\n<\/ul>\n<p>You can tell if your account has been hacked if:<\/p>\n<ul>\n<li>The recipients of the spam-email includes a bunch of people you know<\/li>\n<li>You try to access your account and the password no longer works<\/li>\n<li>You try to access the \u201cForgot Password\u201d link and it does not go to the expected email<\/li>\n<li>Your Sent Items folder contains a bunch of spammy emails you\u2019re not aware of sending<\/li>\n<\/ul>\n<p>(I\u2019m assuming, of course, that you didn\u2019t have a brain-spasm and temporarily misremember your account, or you didn\u2019t have way too many drinks on Friday night before drunk-emailing your friends.)<\/p>\n<p>If your account was in fact hacked, there are a few things you\u2019ll need to do:<\/p>\n<ul>\n<li>You need to change your password on the hacked site<\/li>\n<li>You need to change your password on any other sites where you used the same username and password<\/li>\n<li>You need to change your password on any sites whose information you stored in the hacked account<\/li>\n<li>If you determine that you have been affected by spyware, once it\u2019s removed, you will need to change all your passwords for all your online accounts and follow procedures for <a href=\"http:\/\/www.ftc.gov\/bcp\/edu\/microsites\/idtheft\/consumers\/defend.html\">recovering from identity theft<\/a><\/li>\n<li>If you cannot follow any of these steps because your account details have been changed, you will need to contact support for the website that provides your account so that you can regain control<\/li>\n<\/ul>\n<p>There are two main ways to see if your account was spoofed:<\/p>\n<ol>\n<li>Get a copy of the email, including headers, and check the <a href=\"https:\/\/my.bluehost.com\/cgi\/help\/539\">originating IP address<\/a> to see if it was not one you could have been using<\/li>\n<li>If you\u2019re receiving bounce messages from a bunch of email addresses for people you\u2019ve never heard of<\/li>\n<\/ol>\n<p>If your account was spoofed, they simply created an email that had fake details (usually the \u201cFrom\u201d or \u201cReply-to\u201d address), and there is very little you can do to stop this. And what you can do is likely to be ineffective. In short, you\u2019ll need to do the following:<\/p>\n<ol>\n<li>Take the IP address from the email header<\/li>\n<li>Contact the ISP for that address<\/li>\n<li>Ask them to block it<\/li>\n<\/ol>\n<p>However, the spammer could be using a different IP address the next day, and the ISP could either ignore or deny your request (especially if the ISP is a shady one).<\/p>\n<p>This is one of those cases that reminds us computer security is not just about protecting your machine from malware. There is a lot of data on your machine that is valuable to hackers, and attackers don\u2019t necessarily have to go to the trouble of creating malware to get it from you. But the good news is, it can also be fairly easy to protect yourself by making a few simple improvements. Stay tuned \u2013 in a future article, we\u2019ll talk about more ways you can protect yourself against common computer security hassles.<\/p>\n<div>\n<hr>\n<div>\n<p>Protect your Mac against malware, strangers, and suspicious applications with Intego\u2019s award-winning\u00a0<strong><a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Mac Internet Security X8<\/a><\/strong>.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s an event that we\u2019ve probably all dealt with at one point or another, either on the sender&#8217;s or the receiver&#8217;s end: an email that clearly didn\u2019t come from the person who supposedly sent it, hawking weight-loss supplements or \u201cmale enhancement\u201d pills or some such nonsense. What causes these, and what can you do about [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":10149,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,151],"tags":[275,124],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It\u2019s an event that we\u2019ve probably all dealt with at one point or another, either on the sender&#039;s or the receiver&#039;s end: an email that clearly didn\u2019t come\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to Do if Your Email Account Gets Hijacked and Sends Out Spam - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It\u2019s an event that we\u2019ve probably all dealt with at one point or another, either on the sender&#039;s or the receiver&#039;s end: an email that clearly didn\u2019t come\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-01-30T20:40:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:44:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/\",\"name\":\"What to Do if Your Email Account Gets Hijacked and Sends Out Spam - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#primaryimage\"},\"datePublished\":\"2013-01-30T20:40:55+00:00\",\"dateModified\":\"2017-01-06T23:44:33+00:00\",\"description\":\"It\\u2019s an event that we\\u2019ve probably all dealt with at one point or another, either on the sender's or the receiver's end: an email that clearly didn\\u2019t come\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to Do if Your Email Account Gets Hijacked and Sends Out Spam\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"What to Do if Your Email Account Gets Hijacked and Sends Out Spam\",\"datePublished\":\"2013-01-30T20:40:55+00:00\",\"dateModified\":\"2017-01-06T23:44:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#webpage\"},\"wordCount\":719,\"commentCount\":8,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-thumb.jpg\",\"keywords\":[\"Email\",\"Spam\"],\"articleSection\":[\"How To\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It\u2019s an event that we\u2019ve probably all dealt with at one point or another, either on the sender's or the receiver's end: an email that clearly didn\u2019t come","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/","og_locale":"en_US","og_type":"article","og_title":"What to Do if Your Email Account Gets Hijacked and Sends Out Spam - The Mac Security Blog","og_description":"It\u2019s an event that we\u2019ve probably all dealt with at one point or another, either on the sender's or the receiver's end: an email that clearly didn\u2019t come","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-01-30T20:40:55+00:00","article_modified_time":"2017-01-06T23:44:33+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/","name":"What to Do if Your Email Account Gets Hijacked and Sends Out Spam - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#primaryimage"},"datePublished":"2013-01-30T20:40:55+00:00","dateModified":"2017-01-06T23:44:33+00:00","description":"It\u2019s an event that we\u2019ve probably all dealt with at one point or another, either on the sender's or the receiver's end: an email that clearly didn\u2019t come","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What to Do if Your Email Account Gets Hijacked and Sends Out Spam"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"What to Do if Your Email Account Gets Hijacked and Sends Out Spam","datePublished":"2013-01-30T20:40:55+00:00","dateModified":"2017-01-06T23:44:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#webpage"},"wordCount":719,"commentCount":8,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-thumb.jpg","keywords":["Email","Spam"],"articleSection":["How To","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-email-account-gets-hijacked-and-sends-out-spam\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/spam-email-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2Dn","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10129"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=10129"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10129\/revisions"}],"predecessor-version":[{"id":60997,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/10129\/revisions\/60997"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/10149"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=10129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=10129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=10129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}