{"id":25486,"date":"2014-05-22T09:39:39","date_gmt":"2014-05-22T16:39:39","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=25486"},"modified":"2025-10-27T00:26:17","modified_gmt":"2025-10-27T07:26:17","slug":"parental-concerns-in-the-digital-era-child-identity-theft","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/","title":{"rendered":"Child Identity Theft: How To Protect Your Child&#8217;s Future"},"content":{"rendered":"<address><em>This is the final installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In <a title=\"Parental Concerns in the Digital Era: An Introduction\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era\/\" target=\"_blank\" rel=\"noopener\">Part 1<\/a>, we outlined why parents should be concerned with their children\u2019s online activities and some initial advice about online predators. In <a title=\"Parental Concerns in the Digital Era: Inappropriate Communications\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-inappropriate-communications-and-digital-harassment\/\" target=\"_blank\" rel=\"noopener\">Part 2<\/a>, we examined the risks of inappropriate communications and how to cope with digital harassment. In <a title=\"Parental Concerns in the Digital Era: Exposing Personal Information\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-exposing-personal-information\/\" target=\"_blank\" rel=\"noopener\">Part 3<\/a>, we addressed the dangers of illegal file sharing and password sharing.\u00a0<\/em><\/address>\n<p>Today, we conclude our Five Minute Family Protector Tips series with advice on how to protect a child from identity theft in the digital era.<\/p>\n<h3>Child Identity Theft: Stealing a Child&#8217;s Future<\/h3>\n<p>According to <a title=\"Child Identity Theft - What Every Parents Needs to Know by Robert P. Chappell, Jr. \" href=\"http:\/\/www.childidtheft.org\/\" target=\"_blank\" rel=\"noopener\">childtheft.org<\/a>, between 500,000 and 750,000 children every year are affected\u00a0by identity theft, half of which are under six.<\/p>\n<p>Another recent <a title=\"New Evidence Indicates Identity Thieves are Targeting Children for Unused Social Security Numbers\" href=\"https:\/\/www.cylab.cmu.edu\/files\/pdfs\/reports\/2011\/child-identity-theft.pdf\" target=\"_blank\" rel=\"noopener\">study by CyLab<\/a> revealed that 1-in-10 children have had their social security number used by someone else before they reached adulthood. \u201cThe rate of identity theft among children was 51 times higher than that among adults in the study,\u201d noted Rachel Cernansky at <a title=\"What to Do If Your Child is a Victim of Identity Theft\" href=\"http:\/\/www.realsimple.com\/work-life\/family\/kids-parenting\/child-identity-theft-00100000095315\/index.html\" target=\"_blank\" rel=\"noopener\">Real Simple<\/a>.<\/p>\n<p>This crime can cause many problems for the child\u2019s future opportunities, and undoing the damage is far from easy. Identity predators will seek to exploit naive teenagers by getting them to give up personal information, or worse, the information may be readily available on a careless teen\u2019s social media account.<\/p>\n<p>The reality is there are\u00a0<a title=\"How a Cyber Criminal Can Steal Information Off Your Computer (and How to Protect Yourself Against Theft)\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-a-cyber-criminal-steals-information-off-your-computer\/\" target=\"_blank\" rel=\"noopener\">a number of ways<\/a>\u00a0child identity theft can occur.<\/p>\n<p>There are two main methods cybercriminals will attack: the first is by luring a person into installing malware that reveals the contents of their computer to them, and the second is by hacking into accounts or computers directly. Thankfully, there are ways to protect against these attacks and keep a family&#8217;s digital world safe, secure, and appropriate.<\/p>\n<h3>The Big Question: What Can Parents Do?<\/h3>\n<p>Parents cannot always be around to watch their children\u2019s online activities, but by staying active and engaged in a child&#8217;s online life, and by using the tools available to them, parents can meet their web safety goals.<\/p>\n<p>The earlier parents can teach their children about security and web safety, the less likely children and teens will run into problems as they get older.<\/p>\n<p>The challenge for parents is to help their children understand there are both good and bad people and places online, as well as how to identify and steer clear of dangers.\u00a0While the web puts a world of information at children&#8217;s fingertips, it also places them just a single click away from a world of issues.<\/p>\n<p>By implementing a layered approach to security and web safety\u2014running both a\u00a0<a title=\"Why You Need an Outbound Firewall\" href=\"https:\/\/www.intego.com\/mac-security-blog\/why-you-need-an-outbound-firewall\/\" target=\"_blank\" rel=\"noopener\">sophisticated firewall<\/a>\u00a0to block rogue applications and protect against network attacks and anti-virus to protect against malware, spyware and rootkits\u2014parents are more likely to protect their family members from identity theft.<\/p>\n<p>That way, even if a child clicks a link they shouldn&#8217;t have or if they land on a phishing site, any\u00a0<a title=\"Why Your Computer is a Target for Identity Theft\" href=\"https:\/\/www.intego.com\/mac-security-blog\/why-your-computer-is-a-target-for-identity-theft\/\" target=\"_blank\" rel=\"noopener\">identity information on the computer<\/a>\u00a0is likely to be kept safe.<\/p>\n<p>Using parental controls in addition to Internet security tools, such as those provided in <a href=\"https:\/\/www.intego.com\/contentbarrier-secure\">Intego ContentBarrier Secure<\/a>, can help parents know when their kids are online, who they&#8217;re talking to, and what websites they&#8217;re visiting. It&#8217;s a winning combination that keeps a family&#8217;s digital world safe, secure, and appropriate.<\/p>\n<p>To conclude, here&#8217;s a helpful summary of all our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/five-minute-family-protection-tips\/\" target=\"_blank\" rel=\"noopener\">Five Minute Family Protection Tips<\/a>:<\/p>\n<ul>\n<li>Teach a child to be\u00a0cautious and aware of predators and other dangerous people online<\/li>\n<li>Set clear boundaries about what is and is not appropriate online behavior<\/li>\n<li>Explain the consequences of digital harassment and always be there to help them<\/li>\n<li>Keep passwords private and change them often<\/li>\n<li>Guard personal information using a layered approach to security<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This is the final installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In Part 1, we outlined why parents should be concerned with their children\u2019s online activities and some initial advice about online predators. In Part 2, we examined the risks of inappropriate communications [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":23056,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,13],"tags":[994,215],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This is the final installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In Part 1, we\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Child Identity Theft: How To Protect Your Child&#039;s Future - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This is the final installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In Part 1, we\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-22T16:39:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-27T07:26:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/child-identity-theft.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"375\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/child-identity-theft.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/child-identity-theft.jpeg\",\"width\":600,\"height\":375,\"caption\":\"social security number protection\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/\",\"name\":\"Child Identity Theft: How To Protect Your Child's Future - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#primaryimage\"},\"datePublished\":\"2014-05-22T16:39:39+00:00\",\"dateModified\":\"2025-10-27T07:26:17+00:00\",\"description\":\"This is the final installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In Part 1, we\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Child Identity Theft: How To Protect Your Child&#8217;s Future\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Child Identity Theft: How To Protect Your Child&#8217;s Future\",\"datePublished\":\"2014-05-22T16:39:39+00:00\",\"dateModified\":\"2025-10-27T07:26:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#webpage\"},\"wordCount\":627,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/child-identity-theft.jpeg\",\"keywords\":[\"Five Minute Family Protection Tips\",\"Identity Theft\"],\"articleSection\":[\"How To\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This is the final installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In Part 1, we","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/","og_locale":"en_US","og_type":"article","og_title":"Child Identity Theft: How To Protect Your Child's Future - The Mac Security Blog","og_description":"This is the final installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In Part 1, we","og_url":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-05-22T16:39:39+00:00","article_modified_time":"2025-10-27T07:26:17+00:00","og_image":[{"width":600,"height":375,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/child-identity-theft.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/child-identity-theft.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/child-identity-theft.jpeg","width":600,"height":375,"caption":"social security number protection"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/","name":"Child Identity Theft: How To Protect Your Child's Future - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#primaryimage"},"datePublished":"2014-05-22T16:39:39+00:00","dateModified":"2025-10-27T07:26:17+00:00","description":"This is the final installment in our Five Minute Family Protection Tips series on Internet safety for concerned parents in the digital era. In Part 1, we","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Child Identity Theft: How To Protect Your Child&#8217;s Future"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Child Identity Theft: How To Protect Your Child&#8217;s Future","datePublished":"2014-05-22T16:39:39+00:00","dateModified":"2025-10-27T07:26:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#webpage"},"wordCount":627,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/child-identity-theft.jpeg","keywords":["Five Minute Family Protection Tips","Identity Theft"],"articleSection":["How To","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/parental-concerns-in-the-digital-era-child-identity-theft\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/03\/child-identity-theft.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-6D4","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25486"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=25486"}],"version-history":[{"count":42,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25486\/revisions"}],"predecessor-version":[{"id":103999,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25486\/revisions\/103999"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/23056"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=25486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=25486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=25486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}