	{"id":12141,"date":"2013-03-19T10:21:37","date_gmt":"2013-03-19T18:21:37","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=12141"},"modified":"2016-10-06T12:29:55","modified_gmt":"2016-10-06T19:29:55","slug":"apple-ios-6-1-3-update-fixes-passcode-bug","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/","title":{"rendered":"Apple iOS 6.1.3 Update Fixes Passcode Bug"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/ios-6-1-3-bug-fixes-3\/\" rel=\"attachment wp-att-12185\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12185\" title=\"iOS 6.1.3 bug fixes\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/iOS-6.1.3-bug-fixes2.png\" alt=\"Apple's iOS 6.1.3 update fixes passcode bug\" width=\"482\" height=\"289\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/iOS-6.1.3-bug-fixes2.png 482w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/iOS-6.1.3-bug-fixes2-150x89.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/iOS-6.1.3-bug-fixes2-300x179.png 300w\" sizes=\"(max-width: 482px) 100vw, 482px\" \/><\/a>Apple has released <a href=\"http:\/\/support.apple.com\/kb\/HT5704\" target=\"_blank\">security updates<\/a>\u00a0for iOS with an update to version 6.1.3, designed\u00a0to resolve a bug that allows anyone to bypass the lockscreen on a passcode-protected iPhone. Before the fix, hackers could have potentially accessed your phone application, looked through photos on the device, listened to your voice mails, and placed calls. This software update fixes six flaws altogether, affecting iPhone 3GS and later,\u00a0iPod touch (4th generation) and later, and iPad 2 and later.<\/p>\n<p>Apple described the passcode bug and their resolution as follows:<\/p>\n<blockquote><p>A person with physical access to the device may be able to bypass the screen lock.\u00a0A logic issue existed in the handling of emergency calls from the lock screen. This issue was addressed through improved lock state management.<\/p><\/blockquote>\n<p>In addition to resolving the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/lockscreen-flaw-may-be-fixed-in-ios-6-1-3-but-breaks-jailbreak\/\" target=\"_blank\">iOS lockscreen flaw<\/a>\u00a0(CVE-2013-0980),\u00a0this update also fixes vulnerabilities that will prevent the use of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/evasi0n-jailbreak-tool-released\/\" target=\"_blank\">popular jailbreak software evasi0n<\/a>, which Charlie Miller has predicted will be \u201cthe last public jailbreak ever released.\u201d<\/p>\n<blockquote class=\"twitter-tweet\"><p>Congrats to the <a href=\"https:\/\/twitter.com\/search\/%23evasi0n\">#evasi0n<\/a> team!My new prediction is this is the last public jailbreak ever released. \u2014 Charlie Miller (@0xcharlie) <a href=\"https:\/\/twitter.com\/0xcharlie\/status\/298506156580675584\">February 4, 2013<\/a><\/p><\/blockquote>\n<p>As news broke of the iOS 6.1.3 update, other Twitter users chimed in, too:<\/p>\n<blockquote class=\"twitter-tweet\"><p>IOS 6.1.3 is out.Jailbreakers stay away!There&#8217;s no coming back to 6.1.2 JB even if you saved blobs (except iPhone4 and ipt4g)<\/p>\n<p>\u2014 MuscleNerd (@MuscleNerd) <a href=\"https:\/\/twitter.com\/MuscleNerd\/status\/314060082293911552\">March 19, 2013<\/a><\/p><\/blockquote>\n<p>The Evasi0n jailbreak tool became the most popular jailbreak ever with nearly seven million iOS devices hacked just four days removed from of its official release date, <a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2013\/02\/08\/evasi0n-is-the-most-popular-jailbreak-ever-nearly-seven-million-ios-devices-hacked-in-four-days\/\" target=\"_blank\">according to Forbes<\/a>. Perhaps with Charlie Miller\u2019s gloomy prediction coupled with huge numbers of iOS users jailbreaking their iPhones, many people may wish to keep their jailbreak and live with the lockscreen flaws.<\/p>\n<p><strong>Updated March 20, 2013 for security contents of iOS 6.1.3<\/strong><\/p>\n<p>_____<\/p>\n<p>Following are descriptions of the six iOS vulnerabilities resolved in this update:<\/p>\n<ul>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0977\" target=\"_blank\">CVE-2013-0977<\/a>\u00a0:\u00a0A state management issue existed in the handling of Mach-O executable files with overlapping segments. This issue was addressed by refusing to load an executable with overlapping segments.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0978\" target=\"_blank\">CVE-2013-0978<\/a> :\u00a0An information disclosure issue existed in the ARM prefetch abort handler. This issue was addressed by panicking if the prefetch abort handler is not being called from an abort context.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0979\" target=\"_blank\">CVE-2013-0979<\/a> :\u00a0When restoring from backup, lockdownd changed permissions on certain files even if the path to the file included a symbolic link. This issue was addressed by not changing permissions on any file with a symlink in its path.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0980\" target=\"_blank\">CVE-2013-0980<\/a> :\u00a0A logic issue existed in the handling of emergency calls from the lock screen. This issue was addressed through improved lock state management.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0981\" target=\"_blank\">CVE-2013-0981<\/a> :\u00a0The IOUSBDeviceFamily driver used pipe object pointers that came from userspace. This issue was addressed by performing additional validation of pipe object pointers.<\/li>\n<li><a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2013-0912\" target=\"_blank\">CVE-2013-0912<\/a> :\u00a0An invalid cast issue existed in the handling of SVG files. This issue was addressed through improved type checking.<\/li>\n<\/ul>\n<p>Apple iOS users can download and install the 28.5 MB update in iTunes or through your device Settings (select General &gt; <strong>Software Update<\/strong>).<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has released security updates\u00a0for iOS with an update to version 6.1.3, designed\u00a0to resolve a bug that allows anyone to bypass the lockscreen on a passcode-protected iPhone. Before the fix, hackers could have potentially accessed your phone application, looked through photos on the device, listened to your voice mails, and placed calls. This software update [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":9867,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,261,267,69,255,259,201],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has released security updates\u00a0for iOS with an update to version 6.1.3, designed\u00a0to resolve a bug that allows anyone to bypass the lockscreen on a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple iOS 6.1.3 Update Fixes Passcode Bug - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has released security updates\u00a0for iOS with an update to version 6.1.3, designed\u00a0to resolve a bug that allows anyone to bypass the lockscreen on a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-19T18:21:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T19:29:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/\",\"name\":\"Apple iOS 6.1.3 Update Fixes Passcode Bug - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#primaryimage\"},\"datePublished\":\"2013-03-19T18:21:37+00:00\",\"dateModified\":\"2016-10-06T19:29:55+00:00\",\"description\":\"Apple has released security updates\\u00a0for iOS with an update to version 6.1.3, designed\\u00a0to resolve a bug that allows anyone to bypass the lockscreen on a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple iOS 6.1.3 Update Fixes Passcode Bug\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Apple iOS 6.1.3 Update Fixes Passcode Bug\",\"datePublished\":\"2013-03-19T18:21:37+00:00\",\"dateModified\":\"2016-10-06T19:29:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#webpage\"},\"wordCount\":506,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg\",\"keywords\":[\"Apple\",\"Bug Fixes\",\"CVE-2013-0980\",\"iOS\",\"iOS 6.1.3\",\"Passcode\",\"Security Updates\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has released security updates\u00a0for iOS with an update to version 6.1.3, designed\u00a0to resolve a bug that allows anyone to bypass the lockscreen on a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/","og_locale":"en_US","og_type":"article","og_title":"Apple iOS 6.1.3 Update Fixes Passcode Bug - The Mac Security Blog","og_description":"Apple has released security updates\u00a0for iOS with an update to version 6.1.3, designed\u00a0to resolve a bug that allows anyone to bypass the lockscreen on a","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-19T18:21:37+00:00","article_modified_time":"2016-10-06T19:29:55+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/","name":"Apple iOS 6.1.3 Update Fixes Passcode Bug - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#primaryimage"},"datePublished":"2013-03-19T18:21:37+00:00","dateModified":"2016-10-06T19:29:55+00:00","description":"Apple has released security updates\u00a0for iOS with an update to version 6.1.3, designed\u00a0to resolve a bug that allows anyone to bypass the lockscreen on a","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple iOS 6.1.3 Update Fixes Passcode Bug"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Apple iOS 6.1.3 Update Fixes Passcode Bug","datePublished":"2013-03-19T18:21:37+00:00","dateModified":"2016-10-06T19:29:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#webpage"},"wordCount":506,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","keywords":["Apple","Bug Fixes","CVE-2013-0980","iOS","iOS 6.1.3","Passcode","Security Updates"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-ios-6-1-3-update-fixes-passcode-bug\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/01\/ios-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-39P","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12141"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=12141"}],"version-history":[{"count":36,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12141\/revisions"}],"predecessor-version":[{"id":57952,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12141\/revisions\/57952"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/9867"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=12141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=12141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=12141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}