{"id":31720,"date":"2014-09-15T09:53:05","date_gmt":"2014-09-15T16:53:05","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=31720"},"modified":"2015-01-28T10:15:39","modified_gmt":"2015-01-28T18:15:39","slug":"iphone-case-atm-pins","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/","title":{"rendered":"This Simple iPhone Case can be Used to Steal ATM PINs"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-31732\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-600x300.jpeg\" alt=\"ATM\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><br \/>\nIt\u2019s a common wisecrack around the criminal community. This whole stealing ATM PINs thing would be a lot simple if a gadget would just do all the work.<\/p>\n<p>Sounds like a crazy dream, right?<\/p>\n<p>After all, what thief wouldn&#8217;t love to steal ATM PINs via a handheld device?<\/p>\n<p>This dream, frighteningly for us, may just come true with what appears to be an ordinary iPhone case.<\/p>\n<p>It\u2019s called the <strong>\u2018FLIR One \u2013 Infrared Accessory\u2019<\/strong> and it fits the Apple iPhone 5 and 5s. The concept behind it is that the infrared camera on the case can pick up thermal heat signatures and translate them into dynamic color images.<\/p>\n<p>While it\u2019s initially created for security, home repairs and outdoor activities, thieves can use it to pick up the thermal heat signatures left behind after an individual punches in a PIN at the ATM or a bank code at the supermarket.<\/p>\n<p>So an amateur ATM-code thief can now buy an iPhone case with infrared-scanning capabilities. Thermal imaging technology\u2014normally reserved for military operations and for\u00a0hunting\u2014can be bought from online stores and retailers for just a few hundred dollars.<\/p>\n<p>With infrared technology, thieves can scan a keypad that you have punched your PIN into. They don\u2019t have to use their hands \u2013 just the infrared accessory on their phones.<\/p>\n<p>The thermal imaging camera does all the work \u2013 capturing an image of the heat that is left by your fingertips when they touch the buttons to enter the PIN. Using the dynamic color image of the thermal signature, crooks can easily tell the order of the PIN numbers.<\/p>\n<p>And if you\u2019re wondering if criminals could cause any damage with access to just the PIN and not the physical card, they can! They only require a <a title=\"Link to Forbes article\" href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2012\/01\/30\/hackers-demo-shows-how-easily-credit-cards-can-be-read-through-clothes-and-wallets\/\" target=\"_blank\" rel=\"nofollow\">radio frequency identification scanner<\/a> that can capture your details from your card, even from three feet away.<\/p>\n<h3>Thermal imaging and ATM PIN theft<\/h3>\n<p>This isn\u2019t the first time thermal imaging has grabbed headlines when it comes to stealing ATM PINs. Research presented at the USENIX Security Symposium in 2011 showcased how thermal imaging has the ability to <a title=\"Link to research paper\" href=\"http:\/\/www.usenix.org\/events\/woot11\/tech\/final_files\/Mowery.pdf\" target=\"_blank\" rel=\"nofollow\">detect residual heat from keypresses<\/a> unlike traditional video cameras.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-31738\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/thermal-atm-research.jpeg\" alt=\"Thermal image from research paper\" width=\"600\" height=\"369\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/thermal-atm-research.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/thermal-atm-research-150x92.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/thermal-atm-research-300x184.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Researchers who gave the presentation gathered volunteers to select random PIN numbers on a brushed metal PIN pad and a plastic PIN pad. The researchers found that the plastic PIN pad made it possible to determine the heat signatures of the numbers pressed as well as the number order.<\/p>\n<p>The research also suggested that the thieves could adopt the use of thermal camera techniques in the future. It is easy for account robbers to hide such gadgets about their person, and they are inexpensive. The FLIR One case for example <a title=\"Link to FLIR One\" href=\"http:\/\/shop.flir.com\/dp\/B00K0PXFB6\" target=\"_blank\" rel=\"nofollow\">costs $350<\/a>, which is a small investment for someone keen to access your account, steal your credit card data and find out your security codes.<\/p>\n<h3>How to protect yourself<\/h3>\n<p>Fortunately, there are some things you can do.<\/p>\n<p>The design and science guru Mark Rober had made a video, showing how you can easily prevent thieves from using this new strategy to steal your PIN and information.<\/p>\n<p>After you swipe an ATM card, rest a couple of fingers on other buttons while typing in your code.<\/p>\n<p>This would leave a signature that even the savviest criminal with the best infrared camera\/accessory won\u2019t be able to detect. It\u2019s all about the buttons you press on the machine.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/8Vc-69M-UWk?version=3&#038;rel=0&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>Rober also points out that metal keypads won\u2019t work well for this theft method as they tend to dissipate heat too quickly and are more conductive.<\/p>\n<p><strong>How do you protect yourself when you use an ATM? Leave a comment below.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thieves can use an iPhone case accessory to pick up the thermal heat signature you leave when you enter your PIN at an ATM or supermarket.  Find out how to protect yourself.<\/p>\n","protected":false},"author":34,"featured_media":31747,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13],"tags":[1411,1417,1420,9,1408,1423,1414,357],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Thieves can use an iPhone case accessory to pick up the thermal heat signature you leave when you enter your PIN at an ATM or supermarket. Find out how to protect yourself.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"This Simple iPhone Case can be Used to Steal ATM PINs - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Thieves can use an iPhone case accessory to pick up the thermal heat signature you leave when you enter your PIN at an ATM or supermarket. Find out how to protect yourself.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-15T16:53:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-28T18:15:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-440x270.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"270\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-440x270.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-440x270.jpeg\",\"width\":400,\"height\":270},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/\",\"name\":\"This Simple iPhone Case can be Used to Steal ATM PINs - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#primaryimage\"},\"datePublished\":\"2014-09-15T16:53:05+00:00\",\"dateModified\":\"2015-01-28T18:15:39+00:00\",\"description\":\"Thieves can use an iPhone case accessory to pick up the thermal heat signature you leave when you enter your PIN at an ATM or supermarket. Find out how to protect yourself.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"This Simple iPhone Case can be Used to Steal ATM PINs\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"This Simple iPhone Case can be Used to Steal ATM PINs\",\"datePublished\":\"2014-09-15T16:53:05+00:00\",\"dateModified\":\"2015-01-28T18:15:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#webpage\"},\"wordCount\":630,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-440x270.jpeg\",\"keywords\":[\"ATM\",\"FLIR One\",\"infrared technology\",\"iPhone\",\"iPhone Case\",\"Mark Rober\",\"PIN\",\"Technology\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Thieves can use an iPhone case accessory to pick up the thermal heat signature you leave when you enter your PIN at an ATM or supermarket. Find out how to protect yourself.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/","og_locale":"en_US","og_type":"article","og_title":"This Simple iPhone Case can be Used to Steal ATM PINs - The Mac Security Blog","og_description":"Thieves can use an iPhone case accessory to pick up the thermal heat signature you leave when you enter your PIN at an ATM or supermarket. Find out how to protect yourself.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-09-15T16:53:05+00:00","article_modified_time":"2015-01-28T18:15:39+00:00","og_image":[{"width":400,"height":270,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-440x270.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-440x270.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-440x270.jpeg","width":400,"height":270},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/","name":"This Simple iPhone Case can be Used to Steal ATM PINs - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#primaryimage"},"datePublished":"2014-09-15T16:53:05+00:00","dateModified":"2015-01-28T18:15:39+00:00","description":"Thieves can use an iPhone case accessory to pick up the thermal heat signature you leave when you enter your PIN at an ATM or supermarket. Find out how to protect yourself.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"This Simple iPhone Case can be Used to Steal ATM PINs"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"This Simple iPhone Case can be Used to Steal ATM PINs","datePublished":"2014-09-15T16:53:05+00:00","dateModified":"2015-01-28T18:15:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#webpage"},"wordCount":630,"commentCount":4,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-440x270.jpeg","keywords":["ATM","FLIR One","infrared technology","iPhone","iPhone Case","Mark Rober","PIN","Technology"],"articleSection":["Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/iphone-case-atm-pins\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/atm-flir-440x270.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-8fC","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31720"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=31720"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31720\/revisions"}],"predecessor-version":[{"id":31753,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/31720\/revisions\/31753"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/31747"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=31720"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=31720"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=31720"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}