{"id":17953,"date":"2013-11-20T09:36:24","date_gmt":"2013-11-20T17:36:24","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=17953"},"modified":"2018-03-22T13:30:40","modified_gmt":"2018-03-22T20:30:40","slug":"just-say-no-to-password-books","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/","title":{"rendered":"Just Say &#8216;No&#8217; to Password Books"},"content":{"rendered":"<p>As a security wonk, it&#8217;s not all that uncommon to have head-desk moments with ideas about security that permeate popular culture. Take for example the <a href=\"http:\/\/www.imdb.com\/title\/tt1074638\/?ref_=fn_al_tt_1\" target=\"_blank\">most recent installment<\/a>\u00a0of the James Bond movies, which had a computer-hacker-ish moment in one of the chase scenes. Although I&#8217;m sort of a huge fan of James Bond, I found myself needing a distraction until the scenes were over, so that I could continue to enjoy the movie without upsetting fellow movie-goers with a lot of derisive snorting and grunting. And don&#8217;t even get me started on movies like &#8220;<a href=\"http:\/\/www.imdb.com\/title\/tt0408345\/\" target=\"_blank\">Firewall<\/a>&#8221; and &#8220;<a href=\"http:\/\/www.imdb.com\/title\/tt0244244\/\" target=\"_blank\">Swordfish<\/a>!&#8221; I think the only movie about people using computers that didn&#8217;t leave me with a headache was &#8220;<a href=\"http:\/\/www.imdb.com\/title\/tt0880578\/?ref_=fn_al_tt_1\" target=\"_blank\">Untraceable<\/a>,&#8221; but I digress.<\/p>\n<p>The most recent pop-culture thing to give me a giant, bruising headache is &#8220;<a href=\"http:\/\/www.amazon.com\/s\/ref=nb_sb_noss_1?url=search-alias%3Daps&amp;field-keywords=password+book+organizer\" target=\"_blank\">Password Books<\/a>.&#8221;<\/p>\n<p>&nbsp;<\/p>\n<blockquote class=\"twitter-tweet\"><p>This can&#8217;t be serious. <a href=\"http:\/\/t.co\/B83hq4JfxS\">pic.twitter.com\/B83hq4JfxS<\/a><\/p>\n<p>\u2014 Megan Horner (@meganHorner00) <a href=\"https:\/\/twitter.com\/meganHorner00\/statuses\/380003382490320896\">September 17, 2013<\/a><\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>This trend even captured the attention of Ellen DeGeneres, who amusingly raised awareness of password security issues with her TV audience. Ellen humorously showcased a spoof product that claimed to solve password security problems created by\u00a0<em>unsecured<\/em> password books, with what she called the &#8220;Internet Password Minder.&#8221;<\/p>\n<p>Check out her video below:<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/Srh_TV_J144?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>To make a point about just how silly password books are,\u00a0<a href=\"http:\/\/scrapbook.ellentv.com\/post\/47657511827\/ellen-didnt-think-the-internet-password-minder\" target=\"_blank\">Ellen DeGeneres<\/a>\u00a0took things even further down a comical path as she discovered that the Internet Password Minder also requires additional security:<\/p>\n<blockquote><p>Ellen didn\u2019t think the Internet Password Minder was protected enough, so she came up with the Internet Password Minder Protector, but since that needs a password she came up with the Internet Password Minder Protector Minder.<\/p><\/blockquote>\n<p>I understand, remembering dozens of passwords is hard. Really hard. People have all sorts of tactics for getting around this. For instance, using one password for everything, letting the browser remember everything, coming up with <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\" target=\"_blank\">elaborate methods for making unique passwords<\/a> per site, running a password manager app, or as Ellen DeGeneres comically suggests, using the Internet Password Minder Protector with the Internet Password Minder Protector Minder to secure the Internet Password Minder. All jokes aside, the one tactic that we would highly advise against to remember your passwords would be writing them down in a book clearly labeled &#8220;HEY GUYS, PLEASE STEAL MY PASSWORDS.&#8221;<\/p>\n<p>Writing your passwords down is a really bad idea, especially putting all of them in one location, and I strongly advise against this.\u00a0But then, so is using <a href=\"http:\/\/bestpasswordmanagers.com\/how-to\/worst-passwords-of-2013-and-how-to-fix-them\/\" target=\"_blank\">weak or redundant passwords<\/a>. And I know if you&#8217;re reading this, you almost assuredly understand how and why that&#8217;s bad. But if we&#8217;re talking lesser evils, and you&#8217;re trying to talk some aging relative or security-averse friend out of absolutely shooting themselves in the foot, here&#8217;s what I would say: pick a random page in the middle of a very nondescript notebook (don&#8217;t dog-ear it or bookmark it, please) and write down a password\u00a0<em>hint.\u00a0<\/em>Not your actual password. Just something that would remind <em>only you<\/em> what your password is.<\/p>\n<p>Say your password is &#8220;Garf!3ldRulz,0d!3Dr00lz.&#8221; You could write something like, &#8220;Yay lasagna, dog slobber.&#8221; At worst, if the password notebook lands in the wrong hands, the person staring at the pages of password-hints could make a few guesses, which might be enough to cause them to lock the account rather than just letting them waltz right in. But if writing your passwords down in a notebook gives you the heebie jeebies, a good solution is to\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/8-password-manager-options-for-mac-and-ios\/\" target=\"_blank\">use a password manager to protect your passwords<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As a security wonk, it&#8217;s not all that uncommon to have head-desk moments with ideas about security that permeate popular culture. Take for example the most recent installment\u00a0of the James Bond movies, which had a computer-hacker-ish moment in one of the chase scenes. Although I&#8217;m sort of a huge fan of James Bond, I found [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":21149,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[727,725,95,723,353,96],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"As a security wonk, it&#039;s not all that uncommon to have head-desk moments with ideas about security that permeate popular culture. Take for example the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Just Say &#039;No&#039; to Password Books - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"As a security wonk, it&#039;s not all that uncommon to have head-desk moments with ideas about security that permeate popular culture. Take for example the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-11-20T17:36:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-22T20:30:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/11\/no-password-books.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/11\/no-password-books.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/11\/no-password-books.jpeg\",\"width\":400,\"height\":260,\"caption\":\"sanity insanity sign\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/\",\"name\":\"Just Say 'No' to Password Books - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#primaryimage\"},\"datePublished\":\"2013-11-20T17:36:24+00:00\",\"dateModified\":\"2018-03-22T20:30:40+00:00\",\"description\":\"As a security wonk, it's not all that uncommon to have head-desk moments with ideas about security that permeate popular culture. Take for example the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Just Say &#8216;No&#8217; to Password Books\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Just Say &#8216;No&#8217; to Password Books\",\"datePublished\":\"2013-11-20T17:36:24+00:00\",\"dateModified\":\"2018-03-22T20:30:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#webpage\"},\"wordCount\":598,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/11\/no-password-books.jpeg\",\"keywords\":[\"Ellen DeGeneres\",\"Internet Password Minder\",\"Password\",\"password books\",\"Password Security\",\"Passwords\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"As a security wonk, it's not all that uncommon to have head-desk moments with ideas about security that permeate popular culture. Take for example the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/","og_locale":"en_US","og_type":"article","og_title":"Just Say 'No' to Password Books - The Mac Security Blog","og_description":"As a security wonk, it's not all that uncommon to have head-desk moments with ideas about security that permeate popular culture. Take for example the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/","og_site_name":"The Mac Security Blog","article_published_time":"2013-11-20T17:36:24+00:00","article_modified_time":"2018-03-22T20:30:40+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/11\/no-password-books.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/11\/no-password-books.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/11\/no-password-books.jpeg","width":400,"height":260,"caption":"sanity insanity sign"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/","name":"Just Say 'No' to Password Books - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#primaryimage"},"datePublished":"2013-11-20T17:36:24+00:00","dateModified":"2018-03-22T20:30:40+00:00","description":"As a security wonk, it's not all that uncommon to have head-desk moments with ideas about security that permeate popular culture. Take for example the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Just Say &#8216;No&#8217; to Password Books"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Just Say &#8216;No&#8217; to Password Books","datePublished":"2013-11-20T17:36:24+00:00","dateModified":"2018-03-22T20:30:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#webpage"},"wordCount":598,"commentCount":5,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/11\/no-password-books.jpeg","keywords":["Ellen DeGeneres","Internet Password Minder","Password","password books","Password Security","Passwords"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/just-say-no-to-password-books\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/11\/no-password-books.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-4Fz","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17953"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=17953"}],"version-history":[{"count":81,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17953\/revisions"}],"predecessor-version":[{"id":76945,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/17953\/revisions\/76945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/21149"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=17953"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=17953"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=17953"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}