{"id":12541,"date":"2013-05-09T09:58:47","date_gmt":"2013-05-09T16:58:47","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=12541"},"modified":"2015-03-26T16:23:30","modified_gmt":"2015-03-26T23:23:30","slug":"6-ineffective-ways-to-protect-yourself-against-online-attacks","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/","title":{"rendered":"6 Ineffective Ways to Protect Yourself Against Online Attacks"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/medium_2418973883.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-14287\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/medium_2418973883.jpg\" alt=\"medium_2418973883\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/medium_2418973883.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/medium_2418973883-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/medium_2418973883-300x199.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>You&#8217;re a clever person. You&#8217;ve learned a lot about computer security and think you understand how things have gone so wrong. So you&#8217;ve modified your behavior in corresponding ways to try to make yourself safe. But attackers are clever too, and there are many of them working cooperatively to thwart defenses. Thus, some of your behavior modifications may not be as effective as you think. Here are six ways you think you&#8217;re protecting yourself:<\/p>\n<h3>1. Use Less Popular Software (aka Security Through Obscurity)<\/h3>\n<p>You may think that using an obscure browser that no one else has heard of might decrease the number of active attacks you run into. The reality is that even unpopular software can be vulnerable to attacks. For example, if your browser allows plugins, you\u2019re still vulnerable to the majority of the attacks out there. Unless you consider any sort of active scripting (such as Java, Javascript, and Flash) to be totally outr\u00e9 and live in a land of only text-based web content, then yes, you\u2019re probably okay on the web-based threats. But for most of us, that sort of web browsing isn&#8217;t ideal or feasible.<\/p>\n<h3>2. Use Really Old Software<\/h3>\n<p>Retro-computing is not feasible or particularly effective as a defense against malware. That ancient installation of MS Word is more full of holes than your favorite artisanal Gruyere. There\u2019s a reason there are still ancient macro viruses floating around \u2013 just because it\u2019s old doesn\u2019t mean it\u2019s forgotten. People who don\u2019t update are putting themselves at risk for both direct attacks and malware.<\/p>\n<h3>3. Assume an OS&#8217;s Built-In Security Features Protect Against Everything<\/h3>\n<p>Several major software vendors got bit by this assumption, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/pint-sized-backdoor-for-os-x-discovered\/\" target=\"_blank\">Pintsized was the gift that awaited them<\/a>. Security settings are an awesome thing and we believe everyone should use them to full advantage, but your protection should not stop there.\u00a0The other thing about <a href=\"https:\/\/www.intego.com\/mac-security-blog\/do-os-xs-built-in-security-features-offer-good-enough-protection\/\">built-in software security settings<\/a> is that they\u2019re often not on by default. You need to enable things like passcodes, OS firewalls, and various other types of security and privacy protections. You&#8217;ll need to get friendly with the settings menu of any software you install to see if there are things you can do to make your data more secure.<\/p>\n<h3>4. Update Software Only When Popups Remind You<\/h3>\n<p>Is that popup really from the vendor itself, or is it malware that\u2019s trying to scare you into installing? <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\">It\u2019s better to check the vendor\u2019s site<\/a> to verify the latest version against what\u2019s on your computer to make sure everything is on the up and up.<\/p>\n<h3>5. Devise the Strongest Password Ever&#8230;and Then Use It Everywhere<\/h3>\n<p>There are myriad <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-types-of-passwords-you-shouldnt-create-unless-you-want-your-account-hacked\/\">ways to get password security wrong<\/a>, unfortunately. And the cost is potentially high. Devising <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\">strong, unique passwords<\/a> can be a real pain in the butt, but <a href=\"https:\/\/www.intego.com\/mac-security-blog\/8-password-manager-options-for-mac-and-ios\/\">password managers<\/a> can help you achieve login peace of mind.<\/p>\n<h3>6. Rely on the Well-Lit Corners of the Internet for Safety<\/h3>\n<p>Much like in real life, avoiding dark and foreboding corners of the Internets will only go so far to protect you. Many of the threats of the past few years, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-flashback-variant-changes-tack-to-infect-macs\/\">including Flashback<\/a>, have used compromised, legitimate sites to silently push their code on unsuspecting visitors.<\/p>\n<p>The motive of many attacks these days is financial, and it\u2019s safe to say that if there\u2019s an idea for ways to protect your machine without using extra security tools that has been espoused by more than a couple people, malware authors have thought of it, too. And they probably gotten around that protection by the time the fourth or fifth person caught on to the idea. Luckily, there are also lots of defenders out there working cooperatively, both within and across companies, to develop tools that can help augment safe security behavior.<\/p>\n<p><strong>Further Reading:<\/strong><\/p>\n<ul>\n<li><a title=\"Are You Sabotaging Your Own Security Efforts?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/\" target=\"_blank\">Are You Sabotaging Your Own Security Efforts?<\/a><\/li>\n<li><a title=\"8 Ways to Accidentally Infect Your Friends with Malware\" href=\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/\" target=\"_blank\">8 Ways to Accidentally Infect Your Friends with Malware<\/a><\/li>\n<li><a title=\"Top 5 Ineffective Ways to Protect Yourself From Government Surveillance\" href=\"https:\/\/www.intego.com\/mac-security-blog\/top-5-ineffective-ways-to-protect-yourself-from-government-surveillance\/\" target=\"_blank\">Top 5 Ineffective Ways to Protect Yourself From Government Surveillance<\/a><\/li>\n<\/ul>\n<p><em><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/todojuanjo\/2418973883\/\">Todo-Juanjo<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/2.0\/\">cc<\/a><\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;re a clever person. You&#8217;ve learned a lot about computer security and think you understand how things have gone so wrong. So you&#8217;ve modified your behavior in corresponding ways to try to make yourself safe. But attackers are clever too, and there are many of them working cooperatively to thwart defenses. Thus, some of your [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":14291,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[331,365],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"You&#039;re a clever person. You&#039;ve learned a lot about computer security and think you understand how things have gone so wrong. So you&#039;ve modified your\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Ineffective Ways to Protect Yourself Against Online Attacks - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"You&#039;re a clever person. You&#039;ve learned a lot about computer security and think you understand how things have gone so wrong. So you&#039;ve modified your\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-09T16:58:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-26T23:23:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/SadMacbookFT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"390\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/SadMacbookFT.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/SadMacbookFT.jpg\",\"width\":390,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/\",\"name\":\"6 Ineffective Ways to Protect Yourself Against Online Attacks - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#primaryimage\"},\"datePublished\":\"2013-05-09T16:58:47+00:00\",\"dateModified\":\"2015-03-26T23:23:30+00:00\",\"description\":\"You're a clever person. You've learned a lot about computer security and think you understand how things have gone so wrong. So you've modified your\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"6 Ineffective Ways to Protect Yourself Against Online Attacks\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"6 Ineffective Ways to Protect Yourself Against Online Attacks\",\"datePublished\":\"2013-05-09T16:58:47+00:00\",\"dateModified\":\"2015-03-26T23:23:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#webpage\"},\"wordCount\":670,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/SadMacbookFT.jpg\",\"keywords\":[\"Computer Security\",\"Security Tips\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"You're a clever person. You've learned a lot about computer security and think you understand how things have gone so wrong. So you've modified your","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/","og_locale":"en_US","og_type":"article","og_title":"6 Ineffective Ways to Protect Yourself Against Online Attacks - The Mac Security Blog","og_description":"You're a clever person. You've learned a lot about computer security and think you understand how things have gone so wrong. So you've modified your","og_url":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-05-09T16:58:47+00:00","article_modified_time":"2015-03-26T23:23:30+00:00","og_image":[{"width":390,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/SadMacbookFT.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/SadMacbookFT.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/SadMacbookFT.jpg","width":390,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/","name":"6 Ineffective Ways to Protect Yourself Against Online Attacks - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#primaryimage"},"datePublished":"2013-05-09T16:58:47+00:00","dateModified":"2015-03-26T23:23:30+00:00","description":"You're a clever person. You've learned a lot about computer security and think you understand how things have gone so wrong. So you've modified your","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"6 Ineffective Ways to Protect Yourself Against Online Attacks"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"6 Ineffective Ways to Protect Yourself Against Online Attacks","datePublished":"2013-05-09T16:58:47+00:00","dateModified":"2015-03-26T23:23:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#webpage"},"wordCount":670,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/SadMacbookFT.jpg","keywords":["Computer Security","Security Tips"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/05\/SadMacbookFT.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3gh","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12541"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=12541"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12541\/revisions"}],"predecessor-version":[{"id":39265,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12541\/revisions\/39265"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/14291"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=12541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=12541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=12541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}