{"id":1290,"date":"2010-01-01T09:00:12","date_gmt":"2010-01-01T16:00:12","guid":{"rendered":"http:\/\/blog.intego.com\/?p=1290"},"modified":"2012-11-14T17:19:40","modified_gmt":"2012-11-15T00:19:40","slug":"happy-new-year-2010","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/","title":{"rendered":"Happy New Year 2010"},"content":{"rendered":"<p><img src=\"https:\/\/www.intego.com\/mac-security-blog\/images\/laurent.jpg\"><\/p>\n<p>Another year has come and gone, and with it a number of security threats that have targeted Macs. Intego has been busy dealing with the new types of security issues that affect Macs, and ensuring that Mac users are safe from the dangers of malware, network threats, offensive content, spam and much more. But with the new decade come new security issues that need addressing.<\/p>\n<p>While viruses, Trojan horses, worms and other forms of malware are a constant threat to computers of all kinds, cyber-criminals are turning to new techniques to infect and control Macs. These new threats come silently, with little warning, over the Internet: in many cases, simply visiting a booby-trapped web page can compromise a Mac. Focusing on malware alone is no longer sufficient to protect Macs from the dangers of the Internet. <\/p>\n<p>Intego is putting the final touches on the next generation of its malware protection software: X6. <\/p>\n<p>Thanks to all those who have helped Intego become the leader in Mac security: our employees, customers, partners, resellers; thanks to Apple, all the journalists and Mac fans who use our software, and all our friends.<\/p>\n<p>And, above all, have a very Happy and Healthy New Year!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another year has come and gone, and with it a number of security threats that have targeted Macs. Intego has been busy dealing with the new types of security issues that affect Macs, and ensuring that Mac users are safe from the dangers of malware, network threats, offensive content, spam and much more. But with [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[3],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Another year has come and gone, and with it a number of security threats that have targeted Macs. Intego has been busy dealing with the new types of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Happy New Year 2010 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Another year has come and gone, and with it a number of security threats that have targeted Macs. Intego has been busy dealing with the new types of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2010-01-01T16:00:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-11-15T00:19:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/images\/laurent.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/laurent.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/laurent.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/\",\"name\":\"Happy New Year 2010 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#primaryimage\"},\"datePublished\":\"2010-01-01T16:00:12+00:00\",\"dateModified\":\"2012-11-15T00:19:40+00:00\",\"description\":\"Another year has come and gone, and with it a number of security threats that have targeted Macs. Intego has been busy dealing with the new types of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Happy New Year 2010\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"Happy New Year 2010\",\"datePublished\":\"2010-01-01T16:00:12+00:00\",\"dateModified\":\"2012-11-15T00:19:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#webpage\"},\"wordCount\":202,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/images\/laurent.jpg\",\"articleSection\":[\"Intego\"],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Another year has come and gone, and with it a number of security threats that have targeted Macs. Intego has been busy dealing with the new types of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/","og_locale":"en_US","og_type":"article","og_title":"Happy New Year 2010 - The Mac Security Blog","og_description":"Another year has come and gone, and with it a number of security threats that have targeted Macs. Intego has been busy dealing with the new types of","og_url":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/","og_site_name":"The Mac Security Blog","article_published_time":"2010-01-01T16:00:12+00:00","article_modified_time":"2012-11-15T00:19:40+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/images\/laurent.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/images\/laurent.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/laurent.jpg"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/","name":"Happy New Year 2010 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#primaryimage"},"datePublished":"2010-01-01T16:00:12+00:00","dateModified":"2012-11-15T00:19:40+00:00","description":"Another year has come and gone, and with it a number of security threats that have targeted Macs. Intego has been busy dealing with the new types of","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Happy New Year 2010"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"Happy New Year 2010","datePublished":"2010-01-01T16:00:12+00:00","dateModified":"2012-11-15T00:19:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#webpage"},"wordCount":202,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/happy-new-year-2010\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/images\/laurent.jpg","articleSection":["Intego"],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-kO","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1290"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=1290"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1290\/revisions"}],"predecessor-version":[{"id":7218,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/1290\/revisions\/7218"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=1290"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=1290"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=1290"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}