{"id":12489,"date":"2013-03-29T13:40:03","date_gmt":"2013-03-29T20:40:03","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=12489"},"modified":"2016-10-06T12:03:47","modified_gmt":"2016-10-06T19:03:47","slug":"weekly-mac-security-and-tech-news-roundup-32913","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/","title":{"rendered":"Weekly Mac Security and Tech News Roundup: 3\/29\/13"},"content":{"rendered":"<p>Happy Friday, everyone! It&#8217;s time for another roundup from your friendly folks at Intego. Last week&#8217;s snow seems like it was months ago, as it&#8217;s now sunny and warm leading into a weekend full of college basketball, chocolate bunnies, and April Fool&#8217;s Day pranks. We hope you enjoy this week&#8217;s batch of interesting links.<\/p>\n<h3>Security News<\/h3>\n<ul>\n<li>A hospital in Mississippi is in hot water after <a href=\"http:\/\/www.scmagazine.com\/laptop-containing-patient-data-goes-missing-from-mississippi-hospital\/article\/285959\/\">losing a laptop containing patient data<\/a> such as &#8220;[names],\u00a0addresses, dates of birth, Social Security numbers, diagnoses, medications, treatments and other clinical information.&#8221; The laptop was password protected but someone could still easily be able to access all that personal information. Even worse, the hospital can&#8217;t notify the specific patients whose information has been breached because they don&#8217;t know exactly who has been affected. This is both a security and PR nightmare, and definitely a lesson to businesses to tighten up your security measures on company devices.<\/li>\n<li>Palo Alto Networks has conducted a study called &#8220;The Modern Malware Review&#8221; and found that <a href=\"http:\/\/www.infosecurity-magazine.com\/view\/31458\/90-of-unknown-malware-is-delivered-via-the-web\/\">90% of unknown malware is delivered via web browsing<\/a>.<\/li>\n<li>You may have heard rumors of the &#8220;<a href=\"http:\/\/www.telegraph.co.uk\/technology\/internet-security\/9957063\/Web-slows-under-biggest-attack-ever.html\">biggest online attack in history<\/a>&#8221; happening soon. Or now. Or something. Anyway, Gizmodo reports that the &#8220;Internet war apocalypse&#8221; everyone&#8217;s been talking about lately is <a href=\"http:\/\/gizmodo.com\/5992652\/that-internet-war-apocalypse-is-a-lie\">actually a lie<\/a>.<\/li>\n<li>Some hackers broke into nearly half a million devices all over the world <a href=\"http:\/\/www.fastcodesign.com\/1672187\/infographic-hackers-create-an-amazing-illegal-portrait-of-the-internet\">just so they could map a portrait of the Internet<\/a>. Very illegal, but also very cool.<\/li>\n<li>Ars Technica has an insightful article from Nate Anderson about <a href=\"http:\/\/arstechnica.com\/security\/2013\/03\/how-i-became-a-password-cracker\/\">how he became a password cracker<\/a>.<\/li>\n<li>An interesting debate about online privacy has emerged. First Bruce Schneier laments &#8220;<a href=\"http:\/\/www.schneier.com\/blog\/archives\/2013\/03\/our_internet_su.html\">our Internet surveillance state<\/a>&#8221; and the death of online privacy, but then Tom Brewster from Tech Week Europe counters that <a href=\"http:\/\/www.techweekeurope.co.uk\/comment\/bruce-schneier-is-wrong-there-is-hope-for-internet-privacy-111235\">there is hope for Internet privacy<\/a> and that it&#8217;s not dead yet.<\/li>\n<\/ul>\n<h3>From the Intego Blog<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-iforgot-page-updated-to-fix-vulnerability\/\">Apple updated their iForgot page<\/a> to fix a security hole.<\/li>\n<li>Lysa provides a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/\">walkthrough of OS X&#8217;s built-in security features<\/a> and assesses their protection levels.<\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/google-releases-chrome-26-and-fixes-multiple-flaws\/\">Google released Chrome 26<\/a> and fixed some flaws and security issues.<\/li>\n<li>Worried you won&#8217;t know <a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-iphone-gets-stolen\/\">what to do if your iPhone gets lost or stolen<\/a>? Here&#8217;s a handy guide offering actions to take before you lose it as well as what to do if some jerk steals your device.<\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-anti-virus-is-a-terribly-outdated-idea\/\">Computer security isn&#8217;t about &#8220;anti-virus&#8221; any more<\/a>. Threats have become more sophisticated beyond old-school viruses, as Lysa explains in the post published earlier today.<\/li>\n<\/ul>\n<h3>Apple News<\/h3>\n<ul>\n<li>Apple recently added to their arsenal, <a href=\"http:\/\/www.idownloadblog.com\/2013\/03\/23\/apple-buys-wifislam\/\">acquiring indoor GPS company WiFiSLAM for $20 million<\/a>.<\/li>\n<li><a href=\"http:\/\/arstechnica.com\/apple\/2013\/03\/frustrated-with-icloud-apples-developer-community-speaks-up-en-masse\/\">Apple&#8217;s developer community is frustrated with iCloud<\/a> and have spoken up about it.<\/li>\n<li>Apple has patented a <a href=\"http:\/\/www.telegraph.co.uk\/technology\/apple\/9959968\/Apple-designs-iPhone-with-wraparound-3D-display.html\">new iPhone design with a wraparound 3D display<\/a>. Are we looking at an early-stage iPhone 6?<\/li>\n<li>Want your new iPhone as soon as possible? Apple has announced <a href=\"http:\/\/news.cnet.com\/8301-13579_3-57576304-37\/apple-kicks-off-free-next-day-shipping-for-all-iphones\/\">free next-day shipping for all current iPhones<\/a> (limit two per customer).<\/li>\n<li>Apple&#8217;s &#8220;outdated&#8221; security has gotten a lot of flak from security experts, and now <a href=\"http:\/\/www.theverge.com\/2013\/3\/29\/4158594\/password-denied-when-will-apple-get-serious-about-security\">The Verge calls upon Appl<\/a>e to finally get serious about it.<\/li>\n<\/ul>\n<h3>Notable Tech News<\/h3>\n<ul>\n<li>Three Egyptian divers have been arrested for <a href=\"http:\/\/mashable.com\/2013\/03\/28\/ddos-attacks-not-the-only-way-to-disrupt-internet\/\">trying to sever an undersea cable that provides Internet to Europe and Asia<\/a>.<\/li>\n<li>According to an AT&amp;T survey, <a href=\"http:\/\/www.cnn.com\/2013\/03\/28\/tech\/mobile\/survey-texting-while-driving\/index.html\">adults are more guilty of texting while driving than teenagers are<\/a>.<\/li>\n<li><a href=\"http:\/\/www.theverge.com\/2013\/3\/28\/4156614\/google-opa-open-source-patent-pledge-wont-sue-unless-attacked\">Google has announced an\u00a0Open Patent Non-Assertion (OPN) Pledge<\/a>, where they promise not to sue developers, distributors, and users of open source software utilizing their patents &#8220;unless first attacked.&#8221;<\/li>\n<li>Speaking of Google, they will reportedly <a href=\"http:\/\/www.theverge.com\/2013\/3\/27\/4153866\/google-glass-will-reportedly-be-manufactured-in-the-us\">manufacture their highly-anticipated Google Glass in the United States<\/a>.<\/li>\n<li>Will the U.S. government soon have to <a href=\"http:\/\/www.forbes.com\/sites\/edblack\/2013\/03\/28\/lawmakers-propose-changes-to-make-government-get-warrant-before-reading-your-email\/\">get a warrant before being able to read your emai<\/a>l? Lawmakers are trying to better protect your email from a nosy government.<\/li>\n<li><a href=\"http:\/\/arstechnica.com\/business\/2013\/03\/after-months-of-speculation-t-mobile-finally-ditches-cellphone-contracts\/\">T Mobile has gotten rid of cell phone contracts<\/a>. Will other carriers soon follow suit?<\/li>\n<li><a href=\"http:\/\/arstechnica.com\/tech-policy\/2013\/03\/twitter-sued-50-million-for-refusing-to-reveal-anti-semites\/\">Twitter has been sued for $50 million<\/a> after they refused a French court&#8217;s ruling to hand over the details of some users who had been tweeting racist and anti-semitic comments.<\/li>\n<li>Yahoo raised eyebrows when they acquired a 17-year old&#8217;s news app called Summly for an outstanding $30 million. NY Mag has an interesting editorial about how <a href=\"http:\/\/nymag.com\/daily\/intelligencer\/2013\/03\/yahoos-summly-acquisition-is-about-image.html\">this surprising move was all about PR and hiring<\/a>. A $30 million PR move is pretty&#8230;interesting, to say the least.<\/li>\n<\/ul>\n<h3>Random Awesomeness<\/h3>\n<ul>\n<li>Check out this cool <a href=\"http:\/\/traintimes.org.uk\/map\/tube\/\">live map of the London Underground<\/a> transit system.<\/li>\n<li>Researchers have created a <a href=\"http:\/\/www.extremetech.com\/computing\/151498-researchers-create-fiber-network-that-operates-at-99-7-speed-of-light-smashes-speed-and-latency-records\">fiber network that operates at 99.7% the speed of light<\/a>. This network has &#8220;[smashed] speed and latency records&#8221; (though I bet YouTube still buffers).<\/li>\n<li>According to an astute reddit user who was reading Walter Isaacson&#8217;s Steve Jobs biography, the iconic Apple founder seemed to &#8220;<a href=\"http:\/\/i.imgur.com\/tEPiaNA.png\">get furious<\/a>&#8221; a lot.<\/li>\n<li>We shared this on our <a href=\"http:\/\/www.facebook.com\/Intego\">Facebook<\/a>\u00a0page and <a href=\"https:\/\/twitter.com\/IntegoSecurity\">Twitter<\/a>\u00a0account, but in case you missed it, here&#8217;s an interesting chart depicting <a href=\"http:\/\/i.imgur.com\/fpGeLbd.png\">Apple&#8217;s money flow<\/a> coming in and going out.<\/li>\n<\/ul>\n<p>Have a great weekend, and don&#8217;t forget to keep your Macs safe and secure!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Happy Friday, everyone! It&#8217;s time for another roundup from your friendly folks at Intego. Last week&#8217;s snow seems like it was months ago, as it&#8217;s now sunny and warm leading into a weekend full of college basketball, chocolate bunnies, and April Fool&#8217;s Day pranks. We hope you enjoy this week&#8217;s batch of interesting links. Security [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":11645,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,199,313,311],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Happy Friday, everyone! It&#039;s time for another roundup from your friendly folks at Intego. Last week&#039;s snow seems like it was months ago, as it&#039;s now sunny\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Mac Security and Tech News Roundup: 3\/29\/13 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Happy Friday, everyone! It&#039;s time for another roundup from your friendly folks at Intego. Last week&#039;s snow seems like it was months ago, as it&#039;s now sunny\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-29T20:40:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T19:03:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rebecca Kelley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/\",\"name\":\"Weekly Mac Security and Tech News Roundup: 3\/29\/13 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#primaryimage\"},\"datePublished\":\"2013-03-29T20:40:03+00:00\",\"dateModified\":\"2016-10-06T19:03:47+00:00\",\"description\":\"Happy Friday, everyone! It's time for another roundup from your friendly folks at Intego. Last week's snow seems like it was months ago, as it's now sunny\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Weekly Mac Security and Tech News Roundup: 3\/29\/13\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/95563235f381b0cacc52161b4e37ebc0\"},\"headline\":\"Weekly Mac Security and Tech News Roundup: 3\/29\/13\",\"datePublished\":\"2013-03-29T20:40:03+00:00\",\"dateModified\":\"2016-10-06T19:03:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#webpage\"},\"wordCount\":813,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg\",\"keywords\":[\"Apple\",\"Mac Security\",\"News\",\"Tech\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/95563235f381b0cacc52161b4e37ebc0\",\"name\":\"Rebecca Kelley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6a2f1925e3fa6d79601ffe57643b4a6a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6a2f1925e3fa6d79601ffe57643b4a6a?s=96&d=mm&r=g\",\"caption\":\"Rebecca Kelley\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/rebeccakelley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Happy Friday, everyone! It's time for another roundup from your friendly folks at Intego. Last week's snow seems like it was months ago, as it's now sunny","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Mac Security and Tech News Roundup: 3\/29\/13 - The Mac Security Blog","og_description":"Happy Friday, everyone! It's time for another roundup from your friendly folks at Intego. Last week's snow seems like it was months ago, as it's now sunny","og_url":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-03-29T20:40:03+00:00","article_modified_time":"2016-10-06T19:03:47+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rebecca Kelley","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/","name":"Weekly Mac Security and Tech News Roundup: 3\/29\/13 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#primaryimage"},"datePublished":"2013-03-29T20:40:03+00:00","dateModified":"2016-10-06T19:03:47+00:00","description":"Happy Friday, everyone! It's time for another roundup from your friendly folks at Intego. Last week's snow seems like it was months ago, as it's now sunny","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Weekly Mac Security and Tech News Roundup: 3\/29\/13"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/95563235f381b0cacc52161b4e37ebc0"},"headline":"Weekly Mac Security and Tech News Roundup: 3\/29\/13","datePublished":"2013-03-29T20:40:03+00:00","dateModified":"2016-10-06T19:03:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#webpage"},"wordCount":813,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg","keywords":["Apple","Mac Security","News","Tech"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-32913\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/95563235f381b0cacc52161b4e37ebc0","name":"Rebecca Kelley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/6a2f1925e3fa6d79601ffe57643b4a6a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6a2f1925e3fa6d79601ffe57643b4a6a?s=96&d=mm&r=g","caption":"Rebecca Kelley"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/rebeccakelley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3fr","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12489"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=12489"}],"version-history":[{"count":17,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12489\/revisions"}],"predecessor-version":[{"id":13223,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12489\/revisions\/13223"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/11645"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=12489"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=12489"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=12489"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}