{"id":12545,"date":"2013-05-01T08:38:03","date_gmt":"2013-05-01T15:38:03","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=12545"},"modified":"2015-03-26T16:13:51","modified_gmt":"2015-03-26T23:13:51","slug":"8-ways-to-accidentally-infect-your-friends-with-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/","title":{"rendered":"8 Ways to Accidentally Infect Your Friends with Malware"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-13985\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-laptop-blog-header.jpg\" alt=\"infected-laptop-blog-header\" width=\"600\" height=\"350\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-laptop-blog-header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-laptop-blog-header-150x87.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-laptop-blog-header-300x175.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>A lot has been said over the years about the best ways to protect your machine from attacks and malicious code. But where do those recommendations intersect with ways to protect your friends from attacks? By failing to protect your own data, you\u2019re sometimes putting them at risk as well. Here are a few ways people end up mindlessly spreading the malware love.<\/p>\n<h3>1. Neglect to Scan That File Before You Share It<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-12831\" title=\"email-attachment\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/email-attachment.png\" alt=\"\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/email-attachment.png 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/email-attachment-150x90.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/email-attachment-300x180.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>That spreadsheet you shared with your friends to organize a summer beach trip could end up bringing with it some unexpected cooties. But a quick once-over with an up-to-date antivirus scanner will help keep your trip relaxing.<\/p>\n<h3>2. Pick Up Abandoned USB Keys and Use\/Share Them<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-13967\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/usb-stick.jpg\" alt=\"usb-stick\" width=\"500\" height=\"202\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/usb-stick.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/usb-stick-150x60.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/usb-stick-300x121.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Would you pick up and use a comb someone dropped in the parking lot? Probably not \u2013 who knows what sorts of grossness could be lurking on it! But not everyone is so fastidious about their digital hygiene. <a href=\"http:\/\/thenextweb.com\/insider\/2011\/06\/28\/us-govt-plant-usb-sticks-in-security-study-60-of-subjects-take-the-bait\/\">A shocking number of people<\/a> in one study picked up a \u201clost\u201d USB drive in a parking lot. Ewh. <a href=\"http:\/\/www.scmagazine.com\/report-78-of-it-security-pros-admit-plugging-in-found-usb-drives\/article\/285619\/\">Even experts are not immune<\/a>. And then to share it with your friends? Totally uncouth. USB sticks are considered an infection vector unto themselves, as many Windows-based threats will attempt to run automatically upon inserting the drive. While it may not affect you, it may get your friends.<\/p>\n<h3>3. Click on Every Stupid Link on Facebook<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-13961\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/facebook-scam.jpg\" alt=\"facebook-scam\" width=\"500\" height=\"182\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/facebook-scam.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/facebook-scam-150x54.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/facebook-scam-300x109.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>OMG, your best friend from the 3rd grade just posted something that offers a free ticket to a tropical, sunny location just for clicking on a link! Who could it possibly harm to try it? Sometimes those scams come with more than you bargain for, and you could in fact be putting your friends\u2019 data up for grabs by clicking that link. Be skeptical of links that seem shocking or potentially scammy. Ask them if they intended to post the link if you really feel inclined to click.<\/p>\n<h3>4. Fall for Phishing Scams<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-13969\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/no-phishing.jpg\" alt=\"no-phishing\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/no-phishing.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/no-phishing-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/no-phishing-300x199.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>It\u2019s tough when phishing emails are getting increasingly sophisticated and adept at making scary claims about what will happen if you don\u2019t click that link. But it\u2019s always a good idea to verify before you trust. Since the aim of phishing is in part to steal your contact data so they can hit your friends too, there\u2019s more on the line than just your own data. If you receive an email from any of your accounts (social, financial, or otherwise) saying that you need to click a link and access your account, you can indeed check your account to be safe, but <strong>never<\/strong> do it via a link in email. Go directly to your browser and type in the address for the site.<\/p>\n<h3>5. Use a Weak Password on Your Email\/Social Networking Accounts<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-13971\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/weak-password.jpg\" alt=\"weak-password\" width=\"500\" height=\"348\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/weak-password.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/weak-password-150x104.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/weak-password-300x208.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>This is much the same idea \u2013 your password doesn\u2019t just protect access to your account, but access to your friends\u2019 data as well. Choose unique, strong passwords and change them often, or just use a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/8-password-manager-options-for-mac-and-ios\/\">password manager<\/a> that will do the heavy lifting for you. (After all, the most secure password is the one you don\u2019t know.)<\/p>\n<h3>6. Break into Your Neighbors\u2019 WiFi<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-13981\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/steal-connection.jpg\" alt=\"steal-connection\" width=\"500\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/steal-connection.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/steal-connection-150x90.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/steal-connection-300x180.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>It\u2019s tempting, as more and more people get WiFi routers at home, to simply poach your neighbor\u2019s bandwidth and save yourself that few bucks a month. But you really don\u2019t have any idea what their level of protection is. I attempted this once on a sacrificial research machine, for the sake of curiosity and science, and the machine was infected almost immediately. That blew even <em>my<\/em> jaded, professionally paranoid mind. If you then have friends over that connect into your network, you could be putting them at risk, too.<\/p>\n<h3>7. Install Pirated Software on Your Friends&#8217; Computer<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-13979\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/danger-skull.jpg\" alt=\"danger-skull\" width=\"500\" height=\"283\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/danger-skull.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/danger-skull-150x84.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/danger-skull-300x169.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Oh, the digital hygiene horror! This is the InfoSec equivalent of having a dinner party to share your \u201c<a href=\"http:\/\/money.howstuffworks.com\/freegan.htm\" target=\"_blank\">freegan<\/a>,&#8221;\u00a0dumpster-diving haul. It\u2019s one thing to take your chances with your own intestinal tract or computing device, but it\u2019s another thing entirely to share that with your friends. Warez is a popular way for malware authors to spread <em>their<\/em> wares, as many people still believe you can get something for nothing without realizing the potential consequences.<\/p>\n<h3>8. Be Lazy About Updating Your WordPress Installation<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-13975\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/wordpress-orange-logo.jpg\" alt=\"wordpress-orange-logo\" width=\"500\" height=\"313\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/wordpress-orange-logo.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/wordpress-orange-logo-150x93.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/wordpress-orange-logo-300x187.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Your friends love your blog about designer dog sweaters, but it\u2019s not yet caught on with the general public. So who needs to get around to updating it with the latest and greatest WordPress version? It\u2019s precisely that problem (okay, maybe not the dog sweater part) that <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-flashback-variant-changes-tack-to-infect-macs\/\">led to the explosion of Flashback<\/a>. Lots of people with old blogs got compromised, and their friends and fans paid the price.<\/p>\n<p>It only takes a little thought and effort to avoid common ways for spreading malware. The investment is far less than it would take to write sincere, contrite apology emails to your friends and family members who had to deal with the virtual crud they got from you.<\/p>\n<p><strong>Further Reading:\u00a0<\/strong><\/p>\n<ul>\n<li><a title=\"Are You Sabotaging Your Own Security Efforts?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/sabotaging-your-security-efforts\/\" target=\"_blank\">Are You Sabotaging Your Own Security Efforts?<\/a><\/li>\n<li><a title=\"6 Ineffective Ways to Protect Yourself Against Online Attacks\" href=\"https:\/\/www.intego.com\/mac-security-blog\/6-ineffective-ways-to-protect-yourself-against-online-attacks\/\" target=\"_blank\">6\u00a0Ineffective Ways to Protect Yourself Against Online Attacks<\/a><\/li>\n<li><a title=\"Top 5 Ineffective Ways to Protect Yourself From Government Surveillance\" href=\"https:\/\/www.intego.com\/mac-security-blog\/top-5-ineffective-ways-to-protect-yourself-from-government-surveillance\/\" target=\"_blank\">Top 5 Ineffective Ways to Protect Yourself From Government Surveillance<\/a><\/li>\n<\/ul>\n<p><em><span style=\"font-size: x-small;\">USB stick photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/wnicolai\/2604810309\/\">Count_Count<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/\">cc<\/a><br \/>\nFacebook scam screenshot via <a href=\"http:\/\/reviews.cnet.com\/8301-19512_7-20015102-233.html\">CNET<\/a><br \/>\nphishing image photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/28288673@N07\/6457165789\/\">ivanpw<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\">cc<\/a><br \/>\nskull and crossbones photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/leehaywood\/4765430360\/\">\u263a Lee J Haywood<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-sa\/2.0\/\">cc<\/a><br \/>\nsteal wifi photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/47941176@N00\/132942659\/\">dana~2<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\">cc<\/a><\/span><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A lot has been said over the years about the best ways to protect your machine from attacks and malicious code. But where do those recommendations intersect with ways to protect your friends from attacks? By failing to protect your own data, you\u2019re sometimes putting them at risk as well. Here are a few ways [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":13987,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[86,365],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A lot has been said over the years about the best ways to protect your machine from attacks and malicious code. But where do those recommendations\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Ways to Accidentally Infect Your Friends with Malware - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A lot has been said over the years about the best ways to protect your machine from attacks and malicious code. But where do those recommendations\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-01T15:38:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-26T23:13:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/\",\"name\":\"8 Ways to Accidentally Infect Your Friends with Malware - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#primaryimage\"},\"datePublished\":\"2013-05-01T15:38:03+00:00\",\"dateModified\":\"2015-03-26T23:13:51+00:00\",\"description\":\"A lot has been said over the years about the best ways to protect your machine from attacks and malicious code. But where do those recommendations\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Ways to Accidentally Infect Your Friends with Malware\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"8 Ways to Accidentally Infect Your Friends with Malware\",\"datePublished\":\"2013-05-01T15:38:03+00:00\",\"dateModified\":\"2015-03-26T23:13:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#webpage\"},\"wordCount\":900,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg\",\"keywords\":[\"Malware\",\"Security Tips\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A lot has been said over the years about the best ways to protect your machine from attacks and malicious code. But where do those recommendations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/","og_locale":"en_US","og_type":"article","og_title":"8 Ways to Accidentally Infect Your Friends with Malware - The Mac Security Blog","og_description":"A lot has been said over the years about the best ways to protect your machine from attacks and malicious code. But where do those recommendations","og_url":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-05-01T15:38:03+00:00","article_modified_time":"2015-03-26T23:13:51+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/","name":"8 Ways to Accidentally Infect Your Friends with Malware - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#primaryimage"},"datePublished":"2013-05-01T15:38:03+00:00","dateModified":"2015-03-26T23:13:51+00:00","description":"A lot has been said over the years about the best ways to protect your machine from attacks and malicious code. But where do those recommendations","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"8 Ways to Accidentally Infect Your Friends with Malware"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"8 Ways to Accidentally Infect Your Friends with Malware","datePublished":"2013-05-01T15:38:03+00:00","dateModified":"2015-03-26T23:13:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#webpage"},"wordCount":900,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg","keywords":["Malware","Security Tips"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/8-ways-to-accidentally-infect-your-friends-with-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/infected-computer-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3gl","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12545"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=12545"}],"version-history":[{"count":18,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12545\/revisions"}],"predecessor-version":[{"id":39250,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/12545\/revisions\/39250"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/13987"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=12545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=12545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=12545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}