{"id":16575,"date":"2013-08-01T10:54:10","date_gmt":"2013-08-01T17:54:10","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=16575"},"modified":"2016-02-12T10:41:05","modified_gmt":"2016-02-12T18:41:05","slug":"details-of-malicious-ios-charger-presented-at-black-hat-conference","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/","title":{"rendered":"Details of Malicious iOS Charger Presented at Black Hat Conference"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousCharger.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-16577\" alt=\"MaliciousCharger\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousCharger.jpg\" width=\"500\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousCharger.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousCharger-150x112.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousCharger-300x225.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Every year the Black Hat security conference promises spectacular headlines of the ways hackers can use to make our lives difficult. From a practical perspective, the information is interesting, as it can help defenders look to better protect users of those devices and it can help device-makers beef up the security of their products. But as a home user, it can be a little terrifying to hear this information out of context.\u00a0How can you really gauge the seriousness of the threat? When researchers make things sound so simple and devastating, it can be very hard to come up with that information if you&#8217;re not particularly technically inclined.<\/p>\n<p>Since the Black Hat conference dealt with a device that&#8217;s in many people&#8217;s homes or offices, let&#8217;s take a little look at the information as it was presented yesterday. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/blackhat-brings-news-of-malicious-ios-charger\/\" target=\"_blank\">Researchers from Georgia Institute of Technology<\/a> announced earlier this summer that they had found a way to create a malicious iOS charger, which allowed them to get around the usual safeguards in order to install a malicious app. Sounds pretty scary, right? Yeah, in theory.<\/p>\n<p>For starters, this would require you to use a knockoff iOS charger. Using an <a href=\"http:\/\/www.macrumors.com\/2013\/07\/18\/chinese-woman-electrocuted-by-iphone-4-likely-used-unauthorized-charger\/\" target=\"_blank\">unauthorized charger is a bad idea<\/a>, for any reason. Plugging any computing device into a strange accessory (or vice versa) inherently carries some risk. Do you trust the maker of that device? Or did you just find that USB in a car park and plug who-knows-what into your computer? (Yuck!) Fortunately, <a href=\"http:\/\/www.iphonehacks.com\/2013\/06\/ios-7-unauthorized-lightning-accessory-warning.html\" target=\"_blank\">iOS 7 has added a warning about using unauthorized accessories<\/a>, which is a nice reminder.<\/p>\n<p>And while we&#8217;re on the subject of iOS 7 improvements, because this research was disclosed to Apple, they&#8217;ve been able to <a href=\"http:\/\/www.iphonehacks.com\/2013\/08\/ios-7-fixes-malicious-charger-hack.html\" target=\"_blank\">address the vulnerabilities that were found<\/a> in the upcoming version of the OS. Because the malicious charger is more of a <a href=\"http:\/\/www.zdnet.com\/researchers-reveal-how-to-hack-an-iphone-in-60-seconds-7000018822\/\" target=\"_blank\">small computer with its own separate OS<\/a> than a simple charger, one of the improvements is that you get a more specific warning in iOS 7 asking you if you trust the computer you&#8217;re about to connect with. Allowing this trusted connection will allow the computer &#8220;full access to your device and all of its data.&#8221; I&#8217;d say that description pretty well covers the situation! And it&#8217;s another compelling reason to make sure you update to the new OS when it&#8217;s officially released.<\/p>\n<p>Lastly, going into manufacturing malicious devices is a pretty low return on potential investment for attackers. Of all the ways to make a few bucks from infecting your computing devices, this ranks pretty low. When phishing, malware and direct attack are such simple, cost-effective ways to access devices, who needs to go to the trouble of creating fake chargers? It&#8217;s unlikely we&#8217;ll see this tactic used any time soon, unless something in the world of online crime changes drastically such that this becomes a potentially lucrative business opportunity.<br \/>\n<span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/divine_harvester\/2264679703\/\">Divine Harvester<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every year the Black Hat security conference promises spectacular headlines of the ways hackers can use to make our lives difficult. From a practical perspective, the information is interesting, as it can help defenders look to better protect users of those devices and it can help device-makers beef up the security of their products. But [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":16579,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[565,431,433,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Every year the Black Hat security conference promises spectacular headlines of the ways hackers can use to make our lives difficult. From a practical\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Details of Malicious iOS Charger Presented at Black Hat Conference - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Every year the Black Hat security conference promises spectacular headlines of the ways hackers can use to make our lives difficult. From a practical\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-01T17:54:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:41:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousChargerFT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousChargerFT.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousChargerFT.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/\",\"name\":\"Details of Malicious iOS Charger Presented at Black Hat Conference - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#primaryimage\"},\"datePublished\":\"2013-08-01T17:54:10+00:00\",\"dateModified\":\"2016-02-12T18:41:05+00:00\",\"description\":\"Every year the Black Hat security conference promises spectacular headlines of the ways hackers can use to make our lives difficult. From a practical\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Details of Malicious iOS Charger Presented at Black Hat Conference\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Details of Malicious iOS Charger Presented at Black Hat Conference\",\"datePublished\":\"2013-08-01T17:54:10+00:00\",\"dateModified\":\"2016-02-12T18:41:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#webpage\"},\"wordCount\":489,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousChargerFT.jpg\",\"keywords\":[\"Black Hat\",\"iOS charger\",\"Malicious\",\"Malware\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Every year the Black Hat security conference promises spectacular headlines of the ways hackers can use to make our lives difficult. From a practical","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/","og_locale":"en_US","og_type":"article","og_title":"Details of Malicious iOS Charger Presented at Black Hat Conference - The Mac Security Blog","og_description":"Every year the Black Hat security conference promises spectacular headlines of the ways hackers can use to make our lives difficult. From a practical","og_url":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-08-01T17:54:10+00:00","article_modified_time":"2016-02-12T18:41:05+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousChargerFT.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousChargerFT.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousChargerFT.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/","name":"Details of Malicious iOS Charger Presented at Black Hat Conference - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#primaryimage"},"datePublished":"2013-08-01T17:54:10+00:00","dateModified":"2016-02-12T18:41:05+00:00","description":"Every year the Black Hat security conference promises spectacular headlines of the ways hackers can use to make our lives difficult. From a practical","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Details of Malicious iOS Charger Presented at Black Hat Conference"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Details of Malicious iOS Charger Presented at Black Hat Conference","datePublished":"2013-08-01T17:54:10+00:00","dateModified":"2016-02-12T18:41:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#webpage"},"wordCount":489,"commentCount":5,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousChargerFT.jpg","keywords":["Black Hat","iOS charger","Malicious","Malware"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/details-of-malicious-ios-charger-presented-at-black-hat-conference\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/08\/MaliciousChargerFT.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4jl","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16575"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=16575"}],"version-history":[{"count":17,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16575\/revisions"}],"predecessor-version":[{"id":50242,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/16575\/revisions\/50242"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/16579"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=16575"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=16575"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=16575"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}