{"id":11085,"date":"2013-03-04T13:13:21","date_gmt":"2013-03-04T21:13:21","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=11085"},"modified":"2013-03-04T13:14:56","modified_gmt":"2013-03-04T21:14:56","slug":"jeff-erwin-and-lysa-myers-on-tech-night-owl","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/","title":{"rendered":"Intego CEO Jeff Erwin and Senior Security Analyst Lysa Myers on The Tech Night Owl"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-11107\" title=\"tech-night-owl-blog-header\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-blog-header.jpg\" alt=\"\" width=\"600\" height=\"250\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-blog-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-blog-header-150x62.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-blog-header-300x125.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Intego&#8217;s CEO Jeff Erwin and I had the pleasure of being interviewed by Gene Steinberg for the <a href=\"http:\/\/www.technightowl.com\/radio\/\">Tech Night Owl<\/a> the other day to discuss Mac malware and our new <a href=\"https:\/\/www.intego.com\/products\">2013 product line<\/a>. If you missed the live version, you can still <a href=\"http:\/\/www.technightowl.com\/radio\/show-archives\/\">download the file from the archive<\/a>. For those of you who are unfamiliar with Gene&#8217;s show, you should definitely check it out, as he&#8217;s a tech savvy guy who does a lot of interviews with interesting people within the computing industry.<\/p>\n<p>In the course of our 20 minutes of radio-fame, we covered a variety of subjects you might expect us to opine about. Our first point of discussion was the myth that Macs don&#8217;t get malware &#8211; <a href=\"https:\/\/www.intego.com\/mac-security-blog\/oracle-apple-patched-vulnerable-java-after-apple-hacked-by-cybercriminals\/\">Java has been a particular problem lately<\/a> as it makes cross-platform development easier not just for legitimate developers but malicious ones as well. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-we-know-about-apples-malware-breach\/\">Apple&#8217;s developers recently got an object lesson in this problem<\/a>.<\/p>\n<p>After we discussed the malware landscape, it was time for some product discussion. We do have an iOS product called <a href=\"https:\/\/www.intego.com\/mac-virus-barrier-ios\">VirusBarrier iOS<\/a>, and it scans not just iOS files but any files that you access via iOS (through Dropbox, email, etc.) so you won&#8217;t be a Typhoid Mary sending viruses to your friends. <a href=\"https:\/\/www.intego.com\/mac-internet-security-premium#\/identity-scrubber\">Identity Scrubber<\/a> (available for English-speaking users via <a href=\"https:\/\/www.intego.com\/mac-internet-security-premium\">Mac Internet Security Premium<\/a> or our <a href=\"https:\/\/www.intego.com\/Intego-mac-premium-bundle\">Mac Premium Bundle<\/a>) is one of our newest additions. It&#8217;s a very cool product that finds sensitive data on your machine so you can lock it or remove it. <a href=\"https:\/\/www.intego.com\/mac-family-protector\">Family Protector<\/a> is a good way to protect your kids on the Internet &#8211; you wouldn&#8217;t push your kid on a tricycle onto the freeway, nor should you leave them on the information superhighway unprotected. Our products have been Mac-focused for many years, which means they&#8217;re optimized specifically for Macs. The newest version of <a href=\"https:\/\/www.intego.com\/virusbarrier\">VirusBarrier<\/a> in particular has been streamlined so that it scan much more quickly, and <a href=\"https:\/\/www.intego.com\/virusbarrier#\/net-barrier-2013\">NetBarrier<\/a> is more user-friendly and intuitive.<\/p>\n<p>Many thanks to Gene for inviting us to appear on his show. To listen to the archive,\u00a0<a href=\"http:\/\/www.technightowl.com\/radio\/show-archives\/\">download it here.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego&#8217;s CEO Jeff Erwin and I had the pleasure of being interviewed by Gene Steinberg for the Tech Night Owl the other day to discuss Mac malware and our new 2013 product line. If you missed the live version, you can still download the file from the archive. For those of you who are unfamiliar [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":11099,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[3],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego&#039;s CEO Jeff Erwin and I had the pleasure of being interviewed by Gene Steinberg for the Tech Night Owl the other day to discuss Mac malware and our\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intego CEO Jeff Erwin and Senior Security Analyst Lysa Myers on The Tech Night Owl - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego&#039;s CEO Jeff Erwin and I had the pleasure of being interviewed by Gene Steinberg for the Tech Night Owl the other day to discuss Mac malware and our\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-04T21:13:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-03-04T21:14:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/\",\"name\":\"Intego CEO Jeff Erwin and Senior Security Analyst Lysa Myers on The Tech Night Owl - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#primaryimage\"},\"datePublished\":\"2013-03-04T21:13:21+00:00\",\"dateModified\":\"2013-03-04T21:14:56+00:00\",\"description\":\"Intego's CEO Jeff Erwin and I had the pleasure of being interviewed by Gene Steinberg for the Tech Night Owl the other day to discuss Mac malware and our\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intego CEO Jeff Erwin and Senior Security Analyst Lysa Myers on The Tech Night Owl\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Intego CEO Jeff Erwin and Senior Security Analyst Lysa Myers on The Tech Night Owl\",\"datePublished\":\"2013-03-04T21:13:21+00:00\",\"dateModified\":\"2013-03-04T21:14:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#webpage\"},\"wordCount\":354,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-thumb.jpg\",\"articleSection\":[\"Intego\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego's CEO Jeff Erwin and I had the pleasure of being interviewed by Gene Steinberg for the Tech Night Owl the other day to discuss Mac malware and our","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/","og_locale":"en_US","og_type":"article","og_title":"Intego CEO Jeff Erwin and Senior Security Analyst Lysa Myers on The Tech Night Owl - The Mac Security Blog","og_description":"Intego's CEO Jeff Erwin and I had the pleasure of being interviewed by Gene Steinberg for the Tech Night Owl the other day to discuss Mac malware and our","og_url":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-04T21:13:21+00:00","article_modified_time":"2013-03-04T21:14:56+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/","name":"Intego CEO Jeff Erwin and Senior Security Analyst Lysa Myers on The Tech Night Owl - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#primaryimage"},"datePublished":"2013-03-04T21:13:21+00:00","dateModified":"2013-03-04T21:14:56+00:00","description":"Intego's CEO Jeff Erwin and I had the pleasure of being interviewed by Gene Steinberg for the Tech Night Owl the other day to discuss Mac malware and our","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Intego CEO Jeff Erwin and Senior Security Analyst Lysa Myers on The Tech Night Owl"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Intego CEO Jeff Erwin and Senior Security Analyst Lysa Myers on The Tech Night Owl","datePublished":"2013-03-04T21:13:21+00:00","dateModified":"2013-03-04T21:14:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#webpage"},"wordCount":354,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-thumb.jpg","articleSection":["Intego"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/jeff-erwin-and-lysa-myers-on-tech-night-owl\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/tech-night-owl-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-2SN","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11085"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=11085"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11085\/revisions"}],"predecessor-version":[{"id":11105,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/11085\/revisions\/11105"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/11099"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=11085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=11085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=11085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}