	{"id":33463,"date":"2014-11-05T08:48:27","date_gmt":"2014-11-05T16:48:27","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=33463"},"modified":"2015-04-24T12:16:38","modified_gmt":"2015-04-24T19:16:38","slug":"rootpipe-hacker-mac","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/","title":{"rendered":"Rootpipe Flaw in OS X Could Allow Hackers to Completely Take Over Your Mac"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-33469\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-600x300.jpeg\" alt=\"Rootpipe flaw in OS X could allow hackers to completely take over your Mac\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>For day-to-day activities on your Mac\u2014such as browsing the web, writing documents or checking your emails\u2014are you using an account with Admin privileges?<\/p>\n<p>I hope not. Because if you are, you&#8217;re putting yourself and the data stored on your computer at greater risk.<\/p>\n<p>The risk is borne out by a newly discovered vulnerability in some versions of OS X (including the newly-released 10.10 Yosemite) that could allow a hacker to take complete control of your iMac or MacBook.<\/p>\n<p>Swedish security researcher, Emil Kvarnhammar, calls the as-yet-unpatched privilege escalation bug &#8220;Rootpipe,&#8221; and says that a malicious hacker could gain root access\u2014the highest level of access\u2014without having to know a password. And once an attacker has root access, all bets are off.<\/p>\n<p>&#8220;Normally there are &#8216;sudo&#8217; password requirements, which work as a barrier, so the admin can&#8217;t gain root access without entering the correct password. However, rootpipe circumvents this,&#8221; Kvarnhammar was <a title=\"Link to media report\" href=\"http:\/\/www.macworld.co.uk\/news\/mac-software\/swedish-hacker-finds-serious-vulnerability-in-os-x-yosemite-3583723\/\" target=\"_blank\" rel=\"nofollow\">reported<\/a> as saying.<\/p>\n<p>A YouTube video\u2014with a decidedly funky beat\u2014shows the vulnerability in action:<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/fCQg2I_pFDk?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>Obviously this is a serious security hole, and eyes will be turning towards Cupertino in the hope that it will be fixed quickly.<\/p>\n<p>The good news is that Kvarnhammar believes in responsible disclosure, and has not released details of how to exploit the vulnerability. If such details were made public there is a very real risk that malicious hackers could take advantage of the flaw, and use it to compromise Macs around the world\u2014stealing information, planting malware, and generally getting up to no good.<\/p>\n<p>Instead the researcher tweeted that the right thing to do was to give Apple time to issue and distribute a patch to vulnerable computers:<\/p>\n<blockquote class=\"twitter-tweet\" width=\"500\">\n<p>Details on the <a href=\"https:\/\/twitter.com\/hashtag\/rootpipe?src=hash\">#rootpipe<\/a> exploit will be presented, but not now. Let&#39;s just give Apple some time to roll out a patch to affected users.<\/p>\n<p>&mdash; Emil Kvarnhammar (@emilkvarnhammar) <a href=\"https:\/\/twitter.com\/emilkvarnhammar\/status\/522646505128480768\">October 16, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Kvarnhammar reported the vulnerability to Apple, sharing details with the firm&#8217;s developers the day after he discovered the problem. Although Apple has not officially confirmed the flaw, it did agree that he could go public with full details about the vulnerability in January, suggesting that the company is planning to patch it.<\/p>\n<p>It will be interesting to see just how long it takes Apple to push out a patch for what appears to be a serious vulnerability. It will certainly be a shame if it takes until early January for a fix to be rolled out.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-33481\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/sys-pref.jpeg\" alt=\"System preferences\" width=\"170\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/sys-pref.jpeg 170w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/sys-pref-150x132.jpeg 150w\" sizes=\"(max-width: 170px) 100vw, 170px\" \/>In the meantime, while you&#8217;re waiting, it&#8217;s a good idea to not use a user account with Administrator rights on your Mac unless absolutely necessary.<\/p>\n<p>Instead, make sure that your regular user account has &#8220;Standard&#8221; rights, and <a title=\"Link to Apple support kbase article\" href=\"http:\/\/support.apple.com\/kb\/PH18891\" target=\"_blank\" rel=\"nofollow\">create a new account with Admin privileges<\/a> for when that is required.<\/p>\n<p>To create a new user account, and to adjust your existing accounts&#8217; privileges, open <strong>System Preferences<\/strong> and click on <strong>Users &amp; Groups<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For day-to-day activities on your Mac &#8211; such as browsing the web, writing documents or checking your emails &#8211; are you using an account with Admin privileges?<\/p>\n<p>Maybe that&#8217;s not so wise&#8230;<\/p>\n","protected":false},"author":34,"featured_media":33487,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13,5],"tags":[477,174,168,1624,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"For day-to-day activities on your Mac - such as browsing the web, writing documents or checking your emails - are you using an account with Admin privileges?  Maybe that&#039;s not so wise...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rootpipe Flaw in OS X Could Allow Hackers to Completely Take Over Your Mac - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"For day-to-day activities on your Mac - such as browsing the web, writing documents or checking your emails - are you using an account with Admin privileges?  Maybe that&#039;s not so wise...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-11-05T16:48:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-04-24T19:16:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-400x260.jpeg\",\"width\":400,\"height\":200},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/\",\"name\":\"Rootpipe Flaw in OS X Could Allow Hackers to Completely Take Over Your Mac - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#primaryimage\"},\"datePublished\":\"2014-11-05T16:48:27+00:00\",\"dateModified\":\"2015-04-24T19:16:38+00:00\",\"description\":\"For day-to-day activities on your Mac - such as browsing the web, writing documents or checking your emails - are you using an account with Admin privileges? Maybe that's not so wise...\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rootpipe Flaw in OS X Could Allow Hackers to Completely Take Over Your Mac\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Rootpipe Flaw in OS X Could Allow Hackers to Completely Take Over Your Mac\",\"datePublished\":\"2014-11-05T16:48:27+00:00\",\"dateModified\":\"2015-04-24T19:16:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#webpage\"},\"wordCount\":474,\"commentCount\":5,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-400x260.jpeg\",\"keywords\":[\"Hackers\",\"Mac\",\"OS X\",\"Rootpipe\",\"Vulnerability\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"For day-to-day activities on your Mac - such as browsing the web, writing documents or checking your emails - are you using an account with Admin privileges?  Maybe that's not so wise...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/","og_locale":"en_US","og_type":"article","og_title":"Rootpipe Flaw in OS X Could Allow Hackers to Completely Take Over Your Mac - The Mac Security Blog","og_description":"For day-to-day activities on your Mac - such as browsing the web, writing documents or checking your emails - are you using an account with Admin privileges?  Maybe that's not so wise...","og_url":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/","og_site_name":"The Mac Security Blog","article_published_time":"2014-11-05T16:48:27+00:00","article_modified_time":"2015-04-24T19:16:38+00:00","og_image":[{"width":400,"height":200,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-400x260.jpeg","width":400,"height":200},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/","name":"Rootpipe Flaw in OS X Could Allow Hackers to Completely Take Over Your Mac - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#primaryimage"},"datePublished":"2014-11-05T16:48:27+00:00","dateModified":"2015-04-24T19:16:38+00:00","description":"For day-to-day activities on your Mac - such as browsing the web, writing documents or checking your emails - are you using an account with Admin privileges? Maybe that's not so wise...","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Rootpipe Flaw in OS X Could Allow Hackers to Completely Take Over Your Mac"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Rootpipe Flaw in OS X Could Allow Hackers to Completely Take Over Your Mac","datePublished":"2014-11-05T16:48:27+00:00","dateModified":"2015-04-24T19:16:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#webpage"},"wordCount":474,"commentCount":5,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-400x260.jpeg","keywords":["Hackers","Mac","OS X","Rootpipe","Vulnerability"],"articleSection":["Recommended","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/11\/rootpipe-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-8HJ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/33463"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=33463"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/33463\/revisions"}],"predecessor-version":[{"id":33496,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/33463\/revisions\/33496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/33487"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=33463"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=33463"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=33463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}