{"id":25816,"date":"2014-05-12T08:38:32","date_gmt":"2014-05-12T15:38:32","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=25816"},"modified":"2019-09-27T10:44:46","modified_gmt":"2019-09-27T17:44:46","slug":"iphone-lock-screen-bypass","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/","title":{"rendered":"The latest iPhone lock screen bypass, and how to stop it"},"content":{"rendered":"<p>iOS 7 has brought some cool new features to Apple&#8217;s mobile operating system, but it has also introduced its fair share of embarrassing and unwelcome security holes.<\/p>\n<p>Some of the more high profile flaws have involved methods to bypass the iPhone&#8217;s lock screen. Astonishingly, the first of these <a title=\"Link to ZDNet report from September 2013\" href=\"http:\/\/www.zdnet.com\/how-to-fix-the-ios-7-lock-screen-bypass-flaw-7000020913\/\" target=\"_blank\" rel=\"nofollow noopener\">appeared<\/a> just <em>one day<\/em> after the initial release of iOS 7, and there have <a title=\"New Siri-Enabled Lockscreen Bypass is Extra Juicy\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-siri-enabled-lockscreen-bypass-is-extra-juicy\/\" target=\"_blank\" rel=\"noopener\">too<\/a> <a title=\"iOS 7.0.3 Released, Fixes Passcode Lock Flaws\" href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-7-0-3-released-fixes-passcode-lock-flaws\/\" target=\"_blank\" rel=\"noopener\">many<\/a> others since.<\/p>\n<p>Now, it appears that an iPhone lock screen flaw has been found in iOS 7.1.1, the latest version of the operating system, which can allow someone to reach the Contacts of an iPhone without unlocking the device.<\/p>\n<p>Sherif Hashim, who describes himself as an Egyptian neurosurgeon and part-time security researcher, discovered the security loophole and created a <a title=\"Link to video on YouTube\" href=\"https:\/\/www.youtube.com\/watch?v=6cHZBk-eKps\" target=\"_blank\" rel=\"nofollow noopener\">video<\/a> demonstrating how it could be exploited.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/6cHZBk-eKps?version=3&#038;rel=0&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>In his video, Hashim initially tries (and fails) to access the targeted iPhone&#8217;s contact list by giving Siri a command while the device is locked.<\/p>\n<p>However, when he simply gives Siri a &#8220;Call&#8221; command instead, and Siri asks who he would like to call, it is just a couple of simple steps to gain access to the phone&#8217;s Contact list, where phone numbers can be stolen and even unauthorised calls made.<\/p>\n<p>Of course, being an iPhone lock screen bypass it does require an unauthorised party to have physical access to your iPhone. This isn&#8217;t a security hole that can be exploited remotely.<\/p>\n<p>But many people are in the habit of leaving their phones lying around, perhaps in the office, college or at home, without proper consideration that someone might attempt, while backs are turned, to meddle with it with either mischief or malice in mind.<\/p>\n<p>It turns out that anyone concerned about this latest lock screen bypass can prevent it from happening on their iPhone easily enough.<\/p>\n<p>Simply do the following to protect your iPhone from this type of attack:<\/p>\n<ul>\n<li>Navigate to <strong>Settings &gt; Passcode<\/strong>. (You should have to re-enter your passcode at this point. You *do* have a passcode, don\u2019t you?)<\/li>\n<li>Under the <strong>Allow Access When Locked<\/strong> section, tap the Siri On\/Off slider to turn it off.<\/li>\n<li>Now no-one, including you, can access Siri while your phone is locked.<\/li>\n<\/ul>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-25825\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-setting.jpeg\" alt=\"iPhone setting\" width=\"350\" height=\"423\" border=\"1\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-setting.jpeg 350w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-setting-124x150.jpeg 124w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-setting-248x300.jpeg 248w\" sizes=\"(max-width: 350px) 100vw, 350px\" \/><\/p>\n<p>Of course, this solution isn&#8217;t going to be satisfactory for everyone. There are plenty of people who probably *want* to be able to give commands to Siri while their device is locked.<\/p>\n<p>For instance, perhaps they are making calls while driving, or have a sleeping baby in their arms, which makes it tricky for them to enter a passcode.<\/p>\n<p>I accept, that could be a nuisance, but isn&#8217;t it time that Apple understood that when a phone is &#8220;locked,&#8221; users expect it to be really, properly *locked*?<\/p>\n<p>We&#8217;ll have to wait and see if Apple will include a fix for this latest lock screen bypass in a future version of iOS. In the meantime, if you&#8217;re worried, disable Siri on the lock screen as described above. And let&#8217;s hope that Apple also puts a little more effort into testing this particular part of its software, so it doesn&#8217;t suffer from any more similar security flaws in future.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>iOS 7 has brought some cool new features to Apple&#8217;s mobile operating system, but it has also introduced its fair share of embarrassing and unwelcome security holes. Some of the more high profile flaws have involved methods to bypass the iPhone&#8217;s lock screen. Astonishingly, the first of these appeared just one day after the initial [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":25879,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10],"tags":[69,964,263,1066,106,645],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"iOS 7 has brought some cool new features to Apple&#039;s mobile operating system, but it has also introduced its fair share of embarrassing and unwelcome\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The latest iPhone lock screen bypass, and how to stop it - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"iOS 7 has brought some cool new features to Apple&#039;s mobile operating system, but it has also introduced its fair share of embarrassing and unwelcome\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-05-12T15:38:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-27T17:44:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-lock-siri-bypass-thumb.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"269\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-lock-siri-bypass-thumb.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-lock-siri-bypass-thumb.jpeg\",\"width\":400,\"height\":269},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/\",\"name\":\"The latest iPhone lock screen bypass, and how to stop it - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#primaryimage\"},\"datePublished\":\"2014-05-12T15:38:32+00:00\",\"dateModified\":\"2019-09-27T17:44:46+00:00\",\"description\":\"iOS 7 has brought some cool new features to Apple's mobile operating system, but it has also introduced its fair share of embarrassing and unwelcome\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The latest iPhone lock screen bypass, and how to stop it\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"The latest iPhone lock screen bypass, and how to stop it\",\"datePublished\":\"2014-05-12T15:38:32+00:00\",\"dateModified\":\"2019-09-27T17:44:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#webpage\"},\"wordCount\":536,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-lock-siri-bypass-thumb.jpeg\",\"keywords\":[\"iOS\",\"iOS 7.1.1\",\"Lock Screen\",\"Lock Screen\",\"Privacy\",\"Siri\"],\"articleSection\":[\"How To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"iOS 7 has brought some cool new features to Apple's mobile operating system, but it has also introduced its fair share of embarrassing and unwelcome","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/","og_locale":"en_US","og_type":"article","og_title":"The latest iPhone lock screen bypass, and how to stop it - The Mac Security Blog","og_description":"iOS 7 has brought some cool new features to Apple's mobile operating system, but it has also introduced its fair share of embarrassing and unwelcome","og_url":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-05-12T15:38:32+00:00","article_modified_time":"2019-09-27T17:44:46+00:00","og_image":[{"width":400,"height":269,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-lock-siri-bypass-thumb.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-lock-siri-bypass-thumb.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-lock-siri-bypass-thumb.jpeg","width":400,"height":269},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/","name":"The latest iPhone lock screen bypass, and how to stop it - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#primaryimage"},"datePublished":"2014-05-12T15:38:32+00:00","dateModified":"2019-09-27T17:44:46+00:00","description":"iOS 7 has brought some cool new features to Apple's mobile operating system, but it has also introduced its fair share of embarrassing and unwelcome","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The latest iPhone lock screen bypass, and how to stop it"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"The latest iPhone lock screen bypass, and how to stop it","datePublished":"2014-05-12T15:38:32+00:00","dateModified":"2019-09-27T17:44:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#webpage"},"wordCount":536,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-lock-siri-bypass-thumb.jpeg","keywords":["iOS","iOS 7.1.1","Lock Screen","Lock Screen","Privacy","Siri"],"articleSection":["How To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/iphone-lock-screen-bypass\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/05\/iphone-lock-siri-bypass-thumb.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-6Io","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25816"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=25816"}],"version-history":[{"count":24,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25816\/revisions"}],"predecessor-version":[{"id":90016,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/25816\/revisions\/90016"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/25879"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=25816"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=25816"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=25816"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}