{"id":15409,"date":"2013-06-26T13:51:50","date_gmt":"2013-06-26T20:51:50","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=15409"},"modified":"2015-03-26T16:03:01","modified_gmt":"2015-03-26T23:03:01","slug":"how-hackers-are-monetizing-your-online-accounts","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/","title":{"rendered":"How Hackers Make Money Online"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoney.jpeg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-15419\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoney.jpeg\" alt=\"EmailMoney\" width=\"500\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoney.jpeg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoney-150x112.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoney-300x225.jpeg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>It&#8217;s not really news that the motivation behind most cybercrime is financial, but many people are surprised how exactly our data is valued. No one account is worth all that much to a cyber criminal, so they&#8217;re typically sold in bulk. This excellent <a href=\"http:\/\/ddanchev.blogspot.com\/2011\/10\/exposing-market-for-stolen-credit-cards.html\" target=\"_blank\">article by Dancho Danchev<\/a> from a couple years ago gives a thorough account of what price credit card information goes for on the various &#8220;carding&#8221; sites. Most cards go for less than $15, some go for less than $2. And yet, undeniably, there is no small amount of interest in stolen credit card data. In short: If you add up enough accounts, it quickly adds up to a big payday.<\/p>\n<p>In light of this, how much interest do you think there would be in a Gmail account that&#8217;s worth almost $30? <a href=\"http:\/\/krebsonsecurity.com\/2013\/06\/how-much-is-your-gmail-worth\/\" target=\"_blank\">Brian Krebs&#8217; latest article<\/a> talks about a tool called Cloudsweeper that will tell users how much their Gmail accounts are worth to criminals. He examined one of his less commonly used email addresses and found that, with the various other online accounts that are linked to it, the account was cumulatively worth $28.90 to a hacker. How do they figure it&#8217;s worth so much more than a credit card that could have a limit of many thousands of dollars?<\/p>\n<p>In a <a href=\"http:\/\/krebsonsecurity.com\/2013\/06\/the-value-of-a-hacked-email-account\/\" target=\"_blank\">previous article<\/a>, Krebs discusses the value of email accounts more generally, according to what other online accounts it allows access to. Each attached account&#8217;s credentials was worth at least as much as most credit cards, and it adds up remarkably quickly!<\/p>\n<blockquote><p>One prominent credential seller in the underground peddles <strong>iTunes<\/strong> accounts for $8, and <strong>Fedex.com<\/strong>, <strong>Continental.com<\/strong> and <strong>United.com<\/strong> accounts for USD $6. <strong>Groupon.com<\/strong> accounts fetch $5, while $4 buys hacked credentials at registrar and hosting provider <strong>Godaddy.com<\/strong>, as well as wireless providers <strong>Att.com<\/strong>, <strong>Sprint.com<\/strong>, <strong>Verizonwireless.com<\/strong>, and <strong>Tmobile.com<\/strong>. Active accounts at <strong>Facebook<\/strong> and <strong>Twitter<\/strong> retail for just $2.50 apiece.<\/p>\n<p>As I\u2019ve noted in <a title=\"http:\/\/krebsonsecurity.com\/2012\/12\/exploring-the-market-for-stolen-passwords\/\" href=\"http:\/\/krebsonsecurity.com\/2012\/12\/exploring-the-market-for-stolen-passwords\/\" target=\"_blank\">previous stories<\/a>, some crime shops go even lower with their prices for hacked accounts, charging between $1 to $3 for active accounts at <strong>dell.com<\/strong>, <strong>overstock.com<\/strong>, <strong>walmart.com<\/strong>,<strong> tesco.com<\/strong>, <strong>bestbuy.com<\/strong> and <strong>target.com,<\/strong> to name just a few.<\/p><\/blockquote>\n<p>Knowing this, consider how zealously you guard your online department store password versus your credit card data? And conversely, what protections are in place against fraud on that online store versus on your credit card?<\/p>\n<p>Credit card companies have vast anti-fraud departments, and are actively on the lookout for strange purchases made on your account. That same protection doesn&#8217;t exist for most stores&#8217; sites. If your credit card information is saved on your Walmart account, you&#8217;re likely going to have to go to your credit card company to dispute any fraudulent charges.<\/p>\n<p>Social networking accounts are valuable simply because it gives cyber criminals access to so many other people, which helps spread their reach. How many people are on your friend list and on your email contact list? Each additional person they can hit is another chance for a few more bucks and a few more contacts, which could lead to a few more bucks and a few more contacts. Lather, rinse, repeat!<\/p>\n<p>This is why it&#8217;s important to have strong, unique passwords on all your various accounts, and to guard them all zealously. And why changes like <a href=\"https:\/\/www.intego.com\/mac-security-blog\/orphaned-yahoo-accounts-foretell-security-hassles\/\">Yahoo&#8217;s redistributing of &#8220;unused&#8221; accounts<\/a> are so anxiety-inducing. Email accounts are the hub that connects much of your online life, and criminals know this.<\/p>\n<p><strong>Further Reading:<\/strong><\/p>\n<ul>\n<li><a title=\"Who Are the Real Hackers?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/who-are-the-real-hackers\/\" target=\"_blank\">Who Are the Real Hackers?<\/a><\/li>\n<li><a title=\"Beyond Malware \u2013 Detecting Hack Tools\" href=\"https:\/\/www.intego.com\/mac-security-blog\/beyond-malware-detecting-hack-tools\/\" target=\"_blank\">Beyond Malware: Detecting Hack Tools<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>It&#8217;s not really news that the motivation behind most cybercrime is financial, but many people are surprised how exactly our data is valued. No one account is worth all that much to a cyber criminal, so they&#8217;re typically sold in bulk. This excellent article by Dancho Danchev from a couple years ago gives a thorough [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":15417,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[11],"tags":[477,481,483],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It&#039;s not really news that the motivation behind most cybercrime is financial, but many people are surprised how exactly our data is valued. No one account\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Hackers Make Money Online - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It&#039;s not really news that the motivation behind most cybercrime is financial, but many people are surprised how exactly our data is valued. No one account\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-26T20:51:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-26T23:03:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoneyFT.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoneyFT.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoneyFT.jpeg\",\"width\":400,\"height\":300},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/\",\"name\":\"How Hackers Make Money Online - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#primaryimage\"},\"datePublished\":\"2013-06-26T20:51:50+00:00\",\"dateModified\":\"2015-03-26T23:03:01+00:00\",\"description\":\"It's not really news that the motivation behind most cybercrime is financial, but many people are surprised how exactly our data is valued. No one account\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Hackers Make Money Online\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"How Hackers Make Money Online\",\"datePublished\":\"2013-06-26T20:51:50+00:00\",\"dateModified\":\"2015-03-26T23:03:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#webpage\"},\"wordCount\":586,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoneyFT.jpeg\",\"keywords\":[\"Hackers\",\"money\",\"online\"],\"articleSection\":[\"Software &amp; Apps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It's not really news that the motivation behind most cybercrime is financial, but many people are surprised how exactly our data is valued. No one account","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/","og_locale":"en_US","og_type":"article","og_title":"How Hackers Make Money Online - The Mac Security Blog","og_description":"It's not really news that the motivation behind most cybercrime is financial, but many people are surprised how exactly our data is valued. No one account","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-06-26T20:51:50+00:00","article_modified_time":"2015-03-26T23:03:01+00:00","og_image":[{"width":400,"height":300,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoneyFT.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoneyFT.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoneyFT.jpeg","width":400,"height":300},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/","name":"How Hackers Make Money Online - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#primaryimage"},"datePublished":"2013-06-26T20:51:50+00:00","dateModified":"2015-03-26T23:03:01+00:00","description":"It's not really news that the motivation behind most cybercrime is financial, but many people are surprised how exactly our data is valued. No one account","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How Hackers Make Money Online"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"How Hackers Make Money Online","datePublished":"2013-06-26T20:51:50+00:00","dateModified":"2015-03-26T23:03:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#webpage"},"wordCount":586,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoneyFT.jpeg","keywords":["Hackers","money","online"],"articleSection":["Software &amp; Apps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-hackers-are-monetizing-your-online-accounts\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/06\/EmailMoneyFT.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-40x","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15409"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=15409"}],"version-history":[{"count":20,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15409\/revisions"}],"predecessor-version":[{"id":39235,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/15409\/revisions\/39235"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/15417"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=15409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=15409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=15409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}