{"id":35110,"date":"2015-01-13T09:37:03","date_gmt":"2015-01-13T17:37:03","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=35110"},"modified":"2015-01-22T10:46:35","modified_gmt":"2015-01-22T18:46:35","slug":"apple-security-2014-year-in-review","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/","title":{"rendered":"Apple Security: 2014 Year In Review"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/apple-security-2014-year-review\/\" rel=\"attachment wp-att-35194\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-35194\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/apple-security-2014-year-review.jpg\" alt=\"Apple security 2014 year in review\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/apple-security-2014-year-review.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/apple-security-2014-year-review-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/apple-security-2014-year-review-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>The computer security stories seemed to be virtually nonstop over the past year, so there&#8217;s a good chance you may have missed some stories. Make sure you haven&#8217;t missed anything important\u2014read on for a quick review of some significant Apple-related security stories of 2014.<\/p>\n<p>Perhaps the most widely publicized Apple security problem of 2014 was the <a title=\"Mystery Surrounds \u201ciCloud Hack\u201d as Naked Celebrity Photos Leak\" href=\"https:\/\/www.intego.com\/mac-security-blog\/mystery-surrounds-icloud-hack-as-naked-celebrity-photos-leak\/\" target=\"_blank\">celebrity photo leak<\/a> a few months ago, when a number of celebrities&#8217; private photographs were posted online, apparently facilitated by a flaw in iCloud security. (It&#8217;s worth mentioning that although Apple&#8217;s iCloud got the brunt of the blame, some of the leaked photos were evidently taken on Android devices and webcams.) Apple admitted that it had identified a way that attackers could brute-force iCloud passwords and stated that the issue had been rectified. Just last week, however, a hacker tool was released that again allowed attackers to brute-force iCloud passwords, but <a title=\"Apple Patches Brute Force Password-Cracking Security Hole in iCloud\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-patches-brute-force-password-cracking-security-hole-in-icloud\/\" target=\"_blank\">Apple fixed the problem<\/a>\u00a0early this week. In case similar flaws are found in the future, be sure to use a very strong password for your iCloud account and <a title=\"How to Activate Apple\u2019s Two-Step Verification for iCloud\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-activate-apple-two-step-verification-for-icloud\/\" target=\"_blank\">enable two-step\u00a0verification<\/a>.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/leaky-apple\/\" rel=\"attachment wp-att-35212\"><img loading=\"lazy\" class=\"alignright size-full wp-image-35212\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/leaky-apple.png\" alt=\"bug in Apple developer site\" width=\"126\" height=\"150\" \/><\/a>Apple also had a bit of public embarrassment when a developer revealed that he had discovered a way to obtain, by means of a <a title=\"Month in Review, Part 1: Database Breaches, Compromised Passwords\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/\" target=\"_blank\">bug in Apple&#8217;s developer site<\/a>, the personal contact information of all Apple employees (all the way up to executives such as Tim Cook and Phil Schiller) and all registered developers (including, potentially, Flappy Bird developer Dong Nguyen, who was distressed by all the personal attention he received due to his iOS game&#8217;s unanticipated popularity). Apple quickly patched the bug.<\/p>\n<p>There were quite a few new samples of OS X malware that were discovered in 2014. Apple&#8217;s built-in Safe Downloads List (aka XProtect, the rudimentary unsafe-download blocker built into Snow Leopard and later) was updated 12 times throughout the year. Somewhat surprisingly, Apple has (for now) continued to release XProtect updates for Snow Leopard and Lion even though both OS X versions are no longer receiving security patches to the operating system itself. (Perhaps Apple is trying to prevent headlines about armies of <a title=\"Mac botnets\" href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/botnet\/\" target=\"_blank\">Mac botnets<\/a>; after all, Lion and earlier versions of OS X\u00a0comprise roughly one-fifth of the Mac installed base, as I reported <a title=\"What to Do if Your Mac Can\u2019t Run OS X Yosemite\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-mac-cant-run-os-x-yosemite\/\" target=\"_blank\">here<\/a>.)<\/p>\n<div id=\"attachment_35218\" style=\"width: 310px\" class=\"wp-caption alignright\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/mac-malware-2014-graph\/\" rel=\"attachment wp-att-35218\"><img aria-describedby=\"caption-attachment-35218\" loading=\"lazy\" class=\"size-full wp-image-35218\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/mac-malware-2014-graph.png\" alt=\"New Mac malware appearance by year\" width=\"300\" height=\"186\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/mac-malware-2014-graph.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/mac-malware-2014-graph-150x93.png 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><p id=\"caption-attachment-35218\" class=\"wp-caption-text\">Image credit: The Safe Mac<\/p><\/div>\n<p>Independent security researcher Thomas Reed recently wrote up a list of the <a title=\"A look back at the malware of 2014\" href=\"http:\/\/www.thesafemac.com\/a-look-back-at-the-malware-of-2014\/\" target=\"_blank\">biggest malware threats<\/a> he observed in 2014, if you&#8217;re interested in reading some technical details. While XProtect and standalone malware removal tools can certainly be\u00a0helpful, they don&#8217;t provide the active security protection\u00a0offered by\u00a0full-fledged <a title=\"Mac Antivirus and Security - Mac Internet Security X8\" href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Mac antivirus<\/a> products; might we recommend some\u00a0<a title=\"Mac Virus Protection &amp; Security Products for Home\" href=\"https:\/\/www.intego.com\/products\" target=\"_blank\">options for your Mac<\/a>?<\/p>\n<p>The past year also seemed to follow\u00a0a trend of nicknaming major security exploits, for example <a title=\"Heartbleed\" href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/heartbleed\/\" target=\"_blank\">Heartbleed<\/a>, <a title=\"Shellshock Vulnerability: What Mac OS X Users Need to Know\" href=\"https:\/\/www.intego.com\/mac-security-blog\/shellshock-vulnerability-what-mac-os-x-users-need-to-know\/\" target=\"_blank\">Shellshock<\/a>, and <a title=\"POODLE\" href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/poodle\/\" target=\"_blank\">POODLE<\/a>. The main thing you need to do in order to stay safe is to make sure you&#8217;re running a supported version of OS X and a fully updated Web browser. You may also need to change your passwords\u2014if you haven&#8217;t already done so\u2014on sites that may have been vulnerable to Heartbleed; you can find a partial list of sites <a title=\"Heartbleed Affected More Sites Than You Realized\" href=\"http:\/\/security.thejoshmeister.com\/2014\/05\/heartbleed-affected-more-sites-than-you.html\" target=\"_blank\">here<\/a>. As a follow-up note on Shellshock:\u00a0Snow Leopard and older versions of OS X did not get an official patch from Apple, but you can <a title=\"Bashing bash one more time: updated universal 4.3.30 covering all known bash flaws\" href=\"http:\/\/tenfourfox.blogspot.com\/2014\/09\/bashing-bash-one-more-time-updated.html\" target=\"_blank\">patch it yourself<\/a>.<\/p>\n<p>Just before Christmas, <a title=\"Apple Rolls Out OS X Patch to Protect Against Critical NTP Security Flaw\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-rolls-out-os-x-patch-to-protect-against-critical-ntp-security-flaw\/\" target=\"_blank\">Apple patched a widely publicized critical NTP vulnerability<\/a>. This led to what some saw as a milestone in Apple OS security: it was the first time Apple has automatically patched a vulnerability on all supported versions of an OS without first prompting the user (unless you count XProtect, which updates in the background and, in addition to the aforementioned download blocking, also prevents highly exploited versions of Flash Player and Java from running in your Web browsers).<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-34924\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/automatic-update.jpeg\" alt=\"Apple automatic security update\" width=\"600\" height=\"160\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/automatic-update.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/automatic-update-150x40.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/12\/automatic-update-300x80.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Last year also marked the <a title=\"TrueCrypt is Dead; What Does This Mean for Mac Users?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/truecrypt-is-dead-what-does-this-mean-for-mac-users\/\" target=\"_blank\">mysterious death of TrueCrypt<\/a>, which had been a cross-platform whole-drive encryption product that was available as\u00a0freeware. Mac users of TrueCrypt can switch to FileVault 2, which is\u00a0built into Lion and later versions of OS X.<\/p>\n<p>With the recent release of OS X Yosemite (<a title=\"OS X Yosemite 10.10 Patches POODLE, Shellshock Vulnerabilities\" href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-10-10-patches-poodle-shellshock-vulnerabilities\/\" target=\"_blank\">version 10.10<\/a>), Apple stopped releasing security updates for Lion (10.7)\u2014including the Lion version of OS X Server. Most Macs running Lion can be upgraded to Yosemite, which is a free* upgrade available from the Mac App Store; see my <a title=\"What to Do if Your Mac Can\u2019t Run OS X Yosemite\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-mac-cant-run-os-x-yosemite\/\" target=\"_blank\">guide to which Macs can (and can&#8217;t) run Yosemite<\/a>.<\/p>\n<p>*Note that if you&#8217;re upgrading a Mac server, OS X Server is a paid upgrade ($19.99 in the<a title=\"OS X Server - Mac App Store\" href=\"https:\/\/itunes.apple.com\/us\/app\/os-x-server\/id883878097\" target=\"_blank\"> Mac App Store<\/a>) after upgrading the base operating system to Yosemite.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-5872\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/09\/FadedSnowLeopard.png\" alt=\"FadedSnowLeopard\" width=\"290\" height=\"290\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/09\/FadedSnowLeopard.png 290w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/09\/FadedSnowLeopard-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/09\/FadedSnowLeopard-100x100.png 100w\" sizes=\"(max-width: 290px) 100vw, 290px\" \/>Apple also stopped releasing iTunes updates for Mac OS X Snow Leopard (version 10.6), which had already stopped receiving base OS security updates when Mavericks (10.9) was released in 2013. Although the cessation of iTunes updates for Snow Leopard doesn&#8217;t have any immediate security implications, if future versions of iTunes include security fixes, they most likely\u00a0won&#8217;t be made available to Snow Leopard users. However, if you&#8217;re still using Snow Leopard as a client OS at this point, it&#8217;s really time to move on, if at all possible; XProtect updates and antivirus software can&#8217;t always protect you from unpatched vulnerabilities in your core operating system. Again, see our <a title=\"What to Do if Your Mac Can\u2019t Run OS X Yosemite\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-your-mac-cant-run-os-x-yosemite\/\" target=\"_blank\">upgrade guide<\/a>\u00a0if you&#8217;re not sure whether your Mac can be upgraded, and for tips on what to do if you can&#8217;t upgrade to a supported version of OS X.<\/p>\n<p>There was also a plethora of password database breaches in 2014, which in some cases prompted companies to ask its users to change their passwords. I mentioned <a title=\"Month in Review, Part 1: Database Breaches, Compromised Passwords\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-part-1-database-breaches-compromised-passwords\/\" target=\"_blank\">a few such occurrences<\/a> back in May. As a standard best practice, it&#8217;s wise to use a unique password for each site. If you have accounts at a lot of sites and can&#8217;t memorize every password, consider using a reputable password management program; we shared some <a title=\"8 Password Manager Options for Mac and iOS\" href=\"https:\/\/www.intego.com\/mac-security-blog\/8-password-manager-options-for-mac-and-ios\/\" target=\"_blank\">Mac and iOS options<\/a>\u00a0a couple years ago. (For thoughts about why storing your passwords in a single secure program might not be a bad idea, see <a title=\"Why Trust a Password Manager? Because It\u2019s Better Than Having Poor Password Hygiene\" href=\"https:\/\/www.intego.com\/mac-security-blog\/why-trust-a-password-manager\/\" target=\"_blank\">this article<\/a>, or you can take a look at\u00a0our past articles on <a title=\"Password Security\" href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/password-security\/\" target=\"_blank\">password security<\/a>.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The computer security stories seemed to be virtually nonstop over the past year, so there&#8217;s a good chance you may have missed some stories. Make sure you haven&#8217;t missed anything important\u2014read on for a quick review of some significant Apple-related security stories of 2014. Perhaps the most widely publicized Apple security problem of 2014 was [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":35200,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,13,5],"tags":[775,1807,66,174,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The computer security stories seemed to be virtually nonstop over the past year, so there&#039;s a good chance you may have missed some stories. Make sure you\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Security: 2014 Year In Review - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The computer security stories seemed to be virtually nonstop over the past year, so there&#039;s a good chance you may have missed some stories. Make sure you\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-13T17:37:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-22T18:46:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Apple-Security-2014.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Apple-Security-2014.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Apple-Security-2014.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple Security 2014 Year in review\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/\",\"name\":\"Apple Security: 2014 Year In Review - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#primaryimage\"},\"datePublished\":\"2015-01-13T17:37:03+00:00\",\"dateModified\":\"2015-01-22T18:46:35+00:00\",\"description\":\"The computer security stories seemed to be virtually nonstop over the past year, so there's a good chance you may have missed some stories. Make sure you\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Security: 2014 Year In Review\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Apple Security: 2014 Year In Review\",\"datePublished\":\"2015-01-13T17:37:03+00:00\",\"dateModified\":\"2015-01-22T18:46:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#webpage\"},\"wordCount\":1003,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Apple-Security-2014.jpg\",\"keywords\":[\"2014\",\"Apple Security\",\"Intego\",\"Mac\",\"Malware\"],\"articleSection\":[\"Malware\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The computer security stories seemed to be virtually nonstop over the past year, so there's a good chance you may have missed some stories. Make sure you","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/","og_locale":"en_US","og_type":"article","og_title":"Apple Security: 2014 Year In Review - The Mac Security Blog","og_description":"The computer security stories seemed to be virtually nonstop over the past year, so there's a good chance you may have missed some stories. Make sure you","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2015-01-13T17:37:03+00:00","article_modified_time":"2015-01-22T18:46:35+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Apple-Security-2014.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Apple-Security-2014.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Apple-Security-2014.jpg","width":400,"height":260,"caption":"Apple Security 2014 Year in review"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/","name":"Apple Security: 2014 Year In Review - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#primaryimage"},"datePublished":"2015-01-13T17:37:03+00:00","dateModified":"2015-01-22T18:46:35+00:00","description":"The computer security stories seemed to be virtually nonstop over the past year, so there's a good chance you may have missed some stories. Make sure you","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Security: 2014 Year In Review"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Apple Security: 2014 Year In Review","datePublished":"2015-01-13T17:37:03+00:00","dateModified":"2015-01-22T18:46:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#webpage"},"wordCount":1003,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Apple-Security-2014.jpg","keywords":["2014","Apple Security","Intego","Mac","Malware"],"articleSection":["Malware","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-security-2014-year-in-review\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Apple-Security-2014.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-98i","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35110"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=35110"}],"version-history":[{"count":32,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35110\/revisions"}],"predecessor-version":[{"id":35929,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35110\/revisions\/35929"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/35200"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=35110"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=35110"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=35110"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}