{"id":13933,"date":"2013-04-26T10:37:30","date_gmt":"2013-04-26T17:37:30","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=13933"},"modified":"2016-10-06T12:05:50","modified_gmt":"2016-10-06T19:05:50","slug":"weekly-mac-security-and-tech-news-roundup-42613","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/","title":{"rendered":"Weekly Mac Security and Tech News Roundup: 4\/26\/13"},"content":{"rendered":"<p>We&#8217;re on the cusp of May! Hard to believe that spring is on our doorsteps and summer will be fast approaching. Hopefully you&#8217;ll be enjoying some sunshine and warmer weather this weekend, but if not, cuddle up to a warm fire with a hot drink of your choice and enjoy this week&#8217;s batch of links.<\/p>\n<h3>Security News<\/h3>\n<ul>\n<li><span style=\"line-height: 13px;\">As we mentioned in last week&#8217;s roundup, more and more spammers are using recent tragedies and newsworthy events such as the Boston bombing and the West, Texas fires to <a href=\"http:\/\/www.digitaltrends.com\/social-media\/spammers-use-boston-tragedy-to-spread-malware\/\">spread malware<\/a>. Infected videos and articles and fake charity sites have been popping up left and right to capitalize on these popular news trends. Remember to be smart, keep your virus definitions updated, and don&#8217;t click on any suspicious links.<\/span><\/li>\n<\/ul>\n<h3>From the Intego Blog<\/h3>\n<ul>\n<li>Whether you&#8217;re aware of it or not, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/your-information-likes-to-hide-on-your-computer\/\">your information likes to hide in various spots on your computer<\/a>. It&#8217;s important to locate your scattered data so you can adequately protect it.<\/li>\n<li>Unfortunately, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/common-sense-ad-blockers-arent-enough-to-prevent-malware-infections\/\">common sense and utilizing ad blockers aren&#8217;t enough to keep you safe against malware infections<\/a>. Lysa explains why and reminds us that a layered approach to security is the safest strategy.<\/li>\n<li>A <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-targeted-attack-against-uyghur-mac-users-hitting-the-news\/\">new targeted attack against Uyghur Mac users<\/a> has been floating around. Make sure your <a href=\"https:\/\/www.intego.com\/virusbarrier\">Intego antivirus software<\/a> definitions are updated and you should be protected against this attack.<\/li>\n<\/ul>\n<h3>Apple News<\/h3>\n<ul>\n<li><span style=\"line-height: 13px;\">The Guardian has a list of <a href=\"http:\/\/www.guardian.co.uk\/technology\/2013\/apr\/23\/five-ways-apple-lost-bite\">5 ways Apple has lost its bite<\/a> since Tim Cook took over as CEO.<\/span><\/li>\n<li>Apple has a <a href=\"http:\/\/allthingsd.com\/20130425\/apples-new-iphone-ad-says-nothing-and-its-great\/\">new, almost wordless iPhone ad<\/a>. All Things D loves it. What do you think?<\/li>\n<li>The MacBook Pro with Boot Camp was found to <a href=\"http:\/\/bgr.com\/2013\/04\/24\/windows-pc-study-macbook-pro-463158\/\">run Windows more reliably than Windows PCs<\/a>.<\/li>\n<li>The <a href=\"https:\/\/developer.apple.com\/wwdc\/\">Apple Worldwide Developers Conference<\/a> will take place June 10-14 in San Francisco, CA. Tickets went on sale April 25, so if you&#8217;re interested in attending, pick up your tickets now.<\/li>\n<li>A redditor went to the Apple &#8220;Pop-Up&#8221; Museum display in Atlanta last weekend and uploaded some <a href=\"http:\/\/imgur.com\/a\/TPNFz#0\">images from the event<\/a>.<\/li>\n<li>Is Tim Cook <a href=\"http:\/\/appleinsider.com\/articles\/13\/04\/22\/the-bizarre-campaign-against-apples-tim-cook\">facing a mutiny<\/a>? A &#8220;whisper campaign&#8221; appears to be targeting the Apple CEO as being a &#8220;poor choice to run the company.&#8221; He may be an unpopular CEO, but a <a href=\"http:\/\/www.macrumors.com\/2013\/04\/26\/charity-auction-bids-for-coffee-with-tim-cook-pass-500000\/\">charity auction offering coffee with him<\/a> has exceeded $500,000.<\/li>\n<li>Apple allegedly <a href=\"http:\/\/www.patentlyapple.com\/patently-apple\/2013\/04\/apple-reportedly-returned-8-million-iphones-to-foxconn-for-shoddy-workmanship.html\">returned 8 million iPhones<\/a> to Foxconn because of &#8220;shoddy workmanship.&#8221;<\/li>\n<li><a href=\"http:\/\/www.macrumors.com\/2013\/04\/26\/apples-share-of-smartphone-market-slips-as-smartphones-outsell-feature-phones-for-first-time\/\">Apple&#8217;s share of smartphones has slipped<\/a> &#8212; it posted 6.6% year-over-year growth vs. the entire market growing 41.6%. Smartphones, meanwhile, have outsold feature phones for the first time.<\/li>\n<\/ul>\n<h3>Notable Tech News<\/h3>\n<ul>\n<li>Apparently the <a href=\"http:\/\/mashable.com\/2013\/04\/22\/grooveshark-radio\/\">CEO of Grooveshark is broke<\/a>. The music startup has faced hard times these past couple years and is losing marketshare to Spotify while battling lawsuits from major record labels.<\/li>\n<li>Last week CISPA, a major cyber security bill, got passed in the House but this week it <a href=\"http:\/\/news.cnet.com\/8301-13578_3-57581463-38\/cispa-suffers-setback-in-senate-citing-privacy-concerns\/\">has been halted by the Senate<\/a> and is expected to get &#8220;shelved.&#8221;<\/li>\n<li><a href=\"http:\/\/www.latimes.com\/news\/science\/sciencenow\/la-sci-sn-nasa-smartphone-satellites-20130422,0,439021.story\">NASA recently launched three smartphones into orbit<\/a> to use them as low-budget, experimental satellites.<\/li>\n<li>A <a href=\"http:\/\/www.usatoday.com\/story\/news\/nation\/2013\/04\/23\/hack-attack-on-associated-press-shows-vulnerable-media\/2106985\/\">fake tweet<\/a> claiming the White House had been attacked sent Wall Street in a panic and resulted in stocks plummeting. Once the news had been identified as a hoax, the stock market rebounded but questions arose as to how vulnerable the stock market is if it responds in such a knee-jerk reaction to breaking news that hasn&#8217;t yet been verified.<\/li>\n<li>Wired has an interesting article about <a href=\"http:\/\/www.wired.com\/opinion\/2013\/04\/facebook-home-ads-make-selfishness-contagious\/\">how Facebook \u00a0Home is encouraging selfishness<\/a>.<\/li>\n<li><a href=\"http:\/\/www.theverge.com\/2013\/4\/22\/4251610\/windows-8-1-start-button\">Windows 8.1 will reportedly bring back the Start button<\/a> disgruntled Windows users miss so dearly.<\/li>\n<li>Check out a fascinating Ars Technica article about <a href=\"http:\/\/arstechnica.com\/business\/2013\/04\/the-rise-and-fall-of-amd-how-an-underdog-stuck-it-to-intel\/\">the rise and fall of AMD<\/a>.<\/li>\n<\/ul>\n<h3>Random Awesomeness<\/h3>\n<ul>\n<li>QZ.com has an intriguing article about how someone concocted a fake persona and became <a href=\"http:\/\/qz.com\/74937\/how-to-become-internet-famous-without-ever-existing\/\">&#8220;Internet famous&#8221; for only $68<\/a>.<\/li>\n<li>Wired has a list of <a href=\"http:\/\/www.wired.com\/underwire\/2013\/04\/websites-stuck-in-time\/\">old websites that have been amusingly frozen in time<\/a>. Dubbed &#8220;Internet archaeology,&#8221; the list visits awesome forgotten gems like the website for the 1996 movie <em>Space Jam<\/em> and the site for <em>Crash Bandicoot: Warped<\/em>, a Playstation videogame released in 1998.<\/li>\n<li>Sometimes Ghana can&#8217;t import the official movie posters for big Hollywood films. When that happens, <a href=\"http:\/\/twistedsifter.com\/2011\/09\/30-hilarious-bootleg-movie-posters-from-ghana\/\">they improvise<\/a>.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;re on the cusp of May! Hard to believe that spring is on our doorsteps and summer will be fast approaching. Hopefully you&#8217;ll be enjoying some sunshine and warmer weather this weekend, but if not, cuddle up to a warm fire with a hot drink of your choice and enjoy this week&#8217;s batch of links. [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":11645,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[199,313,311],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We&#039;re on the cusp of May! Hard to believe that spring is on our doorsteps and summer will be fast approaching. Hopefully you&#039;ll be enjoying some sunshine\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Mac Security and Tech News Roundup: 4\/26\/13 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We&#039;re on the cusp of May! Hard to believe that spring is on our doorsteps and summer will be fast approaching. Hopefully you&#039;ll be enjoying some sunshine\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-26T17:37:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-06T19:05:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rebecca Kelley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/\",\"name\":\"Weekly Mac Security and Tech News Roundup: 4\/26\/13 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#primaryimage\"},\"datePublished\":\"2013-04-26T17:37:30+00:00\",\"dateModified\":\"2016-10-06T19:05:50+00:00\",\"description\":\"We're on the cusp of May! Hard to believe that spring is on our doorsteps and summer will be fast approaching. Hopefully you'll be enjoying some sunshine\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Weekly Mac Security and Tech News Roundup: 4\/26\/13\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/95563235f381b0cacc52161b4e37ebc0\"},\"headline\":\"Weekly Mac Security and Tech News Roundup: 4\/26\/13\",\"datePublished\":\"2013-04-26T17:37:30+00:00\",\"dateModified\":\"2016-10-06T19:05:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#webpage\"},\"wordCount\":670,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg\",\"keywords\":[\"Mac Security\",\"News\",\"Tech\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/95563235f381b0cacc52161b4e37ebc0\",\"name\":\"Rebecca Kelley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6a2f1925e3fa6d79601ffe57643b4a6a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6a2f1925e3fa6d79601ffe57643b4a6a?s=96&d=mm&r=g\",\"caption\":\"Rebecca Kelley\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/rebeccakelley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We're on the cusp of May! Hard to believe that spring is on our doorsteps and summer will be fast approaching. Hopefully you'll be enjoying some sunshine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/","og_locale":"en_US","og_type":"article","og_title":"Weekly Mac Security and Tech News Roundup: 4\/26\/13 - The Mac Security Blog","og_description":"We're on the cusp of May! Hard to believe that spring is on our doorsteps and summer will be fast approaching. Hopefully you'll be enjoying some sunshine","og_url":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-04-26T17:37:30+00:00","article_modified_time":"2016-10-06T19:05:50+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Rebecca Kelley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/","name":"Weekly Mac Security and Tech News Roundup: 4\/26\/13 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#primaryimage"},"datePublished":"2013-04-26T17:37:30+00:00","dateModified":"2016-10-06T19:05:50+00:00","description":"We're on the cusp of May! Hard to believe that spring is on our doorsteps and summer will be fast approaching. Hopefully you'll be enjoying some sunshine","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Weekly Mac Security and Tech News Roundup: 4\/26\/13"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/95563235f381b0cacc52161b4e37ebc0"},"headline":"Weekly Mac Security and Tech News Roundup: 4\/26\/13","datePublished":"2013-04-26T17:37:30+00:00","dateModified":"2016-10-06T19:05:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#webpage"},"wordCount":670,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg","keywords":["Mac Security","News","Tech"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/weekly-mac-security-and-tech-news-roundup-42613\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/95563235f381b0cacc52161b4e37ebc0","name":"Rebecca Kelley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/6a2f1925e3fa6d79601ffe57643b4a6a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6a2f1925e3fa6d79601ffe57643b4a6a?s=96&d=mm&r=g","caption":"Rebecca Kelley"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/rebeccakelley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/http-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-3CJ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/13933"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=13933"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/13933\/revisions"}],"predecessor-version":[{"id":14077,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/13933\/revisions\/14077"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/11645"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=13933"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=13933"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=13933"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}