{"id":36085,"date":"2015-01-26T15:54:13","date_gmt":"2015-01-26T23:54:13","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=36085"},"modified":"2015-01-27T12:29:06","modified_gmt":"2015-01-27T20:29:06","slug":"google-discloses-security-vulnerabilities-in-osx-android-users-exposed","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/","title":{"rendered":"Google Discloses Security Vulnerabilities in OS X\u2014While Leaving a Billion Android Users Exposed"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-36100\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-600x300.jpeg\" alt=\"OS X flaws\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><br \/>\nIf you&#8217;ve been following the security beat closely in the last month or so, you&#8217;ll be aware that Google has managed to get itself into some hot water on the vulnerability side of things.<\/p>\n<p>What&#8217;s happened is this. A team of Google security engineers, calling themselves Project Zero, have taken it upon themselves to find flaws in other vendor&#8217;s software. And, if they feel the other vendor isn&#8217;t quick enough in fixing the software vulnerabilities, the Googlenauts release details of not just how to exploit the software vulnerability, but actual proof-of-concept code to do the deed too.<\/p>\n<p>The release of actual exploit code, that any internet ne&#8217;er-do-well can pick up and alter for their own malicious ends, is bad enough\u2014but the Google Project Zero team has done itself no favours by dishing the dirt on exploitable vulnerabilities when they knew that a patch to protect all vulnerable users <a title=\"Google discloses *another* Microsoft Windows vulnerability before a patch is ready\" href=\"http:\/\/grahamcluley.com\/2015\/01\/google-discloses-microsoft-windows-vulnerability\/\" target=\"_blank\">was only a day or two away<\/a>.<\/p>\n<p>Three times in the last month, Google has gone public about flaws in arch-rival Microsoft&#8217;s code, and effectively handed online criminals the blueprints to exploit the vulnerabilities themselves.<\/p>\n<p>Now, I accept that the issue of how to best disclose vulnerabilities is a contentious one\u2014with many holding strong and opposing opinions. But I really cannot understand how Google engineers think they are doing the internet community a favour, if they know a patch for a bug is only a matter of a day or so away and yet release their exploit code anyway.<\/p>\n<p>Why am I talking about this on the Intego Mac Security blog? Because it&#8217;s not just Microsoft that is in Google&#8217;s firing line.<\/p>\n<p>Last week, Google disclosed three vulnerabilities in OS X (<a href=\"https:\/\/code.google.com\/p\/google-security-research\/issues\/detail?id=130&amp;q=label%3AVendor-Apple\" target=\"_blank\">here<\/a>, <a href=\"https:\/\/code.google.com\/p\/google-security-research\/issues\/detail?id=135&amp;q=label%3AVendor-Apple\" target=\"_blank\">here<\/a>, and <a href=\"https:\/\/code.google.com\/p\/google-security-research\/issues\/detail?id=136&amp;q=label%3AVendor-Apple\" target=\"_blank\">here<\/a>), having first privately informed Apple in October last year.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/google-disclose\/\" rel=\"attachment wp-att-36109\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-36109\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/google-disclose.jpeg\" alt=\"Google discloses security vulnerabilities in OS X\" width=\"600\" height=\"403\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/google-disclose.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/google-disclose-150x100.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/google-disclose-300x201.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>As the 90-day grace period has expired, Google feels it&#8217;s right to make details of the vulnerabilities public, and tell people how to exploit them.<\/p>\n<p>Thankfully, none of the OS X vulnerabilities discovered by Google appear to be highly critical and seem to require an attacker to have physical access to a vulnerable Mac\u2014but that&#8217;s not really the point.<\/p>\n<p>Is it really helping <em>anyone<\/em> by making details of these bugs public? If Google&#8217;s engineers felt that Apple needed a kick up the bum to fix the flaws more quickly, wouldn&#8217;t it have been sufficient to demonstrate the vulnerabilities to members of the computer security press rather than making the code public?<\/p>\n<p>After all, the media would think it was a pretty hot story if Apple was being lackadaisical about security\u2014and pressure could be brought to bear.<\/p>\n<p>Fortunately, according to <a title=\"Link to iMore article\" href=\"http:\/\/www.imore.com\/latest-os-x-10102-beta-kills-google-disclosed-vulnerabilities-dead\" target=\"_blank\" rel=\"nofollow\">iMore<\/a>, the security flaws are all fixed in OS X Yosemite 10.10.2, which is now undergoing beta test.<\/p>\n<p>Meanwhile, perhaps someone should remind Google of the saying, &#8220;People in glass houses shouldn&#8217;t throw stones.&#8221;<\/p>\n<p>As is being widely reported, more than a billion Android smartphones, running Android 4.3 or earlier, are being left exposed to attacks by Google, which has declared it <a title=\"Link to ZDNet article\" href=\"http:\/\/www.zdnet.com\/article\/google-why-we-wont-patch-pre-kitkat-android-webview\/\" target=\"_blank\" rel=\"nofollow\">will not fix vulnerabilities<\/a> in its WebView code.<\/p>\n<p>Just imagine if Apple researchers gave Google 90 days to fix a WebView vulnerability in Android 4.3, and then released proof-of-concept exploit code.<\/p>\n<p>I wonder how Google would feel then?<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most of us have heard the saying &#8220;People in glass houses shouldn&#8217;t throw stones&#8221;, but not Google it seems.<\/p>\n","protected":false},"author":34,"featured_media":36094,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13,5],"tags":[3151,60,168],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Most of us have heard the saying &quot;People in glass houses shouldn&#039;t throw stones&quot;, but not Google it seems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google Discloses Security Vulnerabilities in OS X\u2014While Leaving a Billion Android Users Exposed - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Most of us have heard the saying &quot;People in glass houses shouldn&#039;t throw stones&quot;, but not Google it seems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-26T23:54:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-27T20:29:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/\",\"name\":\"Google Discloses Security Vulnerabilities in OS X\\u2014While Leaving a Billion Android Users Exposed - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#primaryimage\"},\"datePublished\":\"2015-01-26T23:54:13+00:00\",\"dateModified\":\"2015-01-27T20:29:06+00:00\",\"description\":\"Most of us have heard the saying \\\"People in glass houses shouldn't throw stones\\\", but not Google it seems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google Discloses Security Vulnerabilities in OS X\\u2014While Leaving a Billion Android Users Exposed\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Google Discloses Security Vulnerabilities in OS X\\u2014While Leaving a Billion Android Users Exposed\",\"datePublished\":\"2015-01-26T23:54:13+00:00\",\"dateModified\":\"2015-01-27T20:29:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#webpage\"},\"wordCount\":545,\"commentCount\":13,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-400x260.jpeg\",\"keywords\":[\"Apple\",\"Google\",\"OS X\"],\"articleSection\":[\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Most of us have heard the saying \"People in glass houses shouldn't throw stones\", but not Google it seems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/","og_locale":"en_US","og_type":"article","og_title":"Google Discloses Security Vulnerabilities in OS X\u2014While Leaving a Billion Android Users Exposed - The Mac Security Blog","og_description":"Most of us have heard the saying \"People in glass houses shouldn't throw stones\", but not Google it seems.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-01-26T23:54:13+00:00","article_modified_time":"2015-01-27T20:29:06+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/","name":"Google Discloses Security Vulnerabilities in OS X\u2014While Leaving a Billion Android Users Exposed - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#primaryimage"},"datePublished":"2015-01-26T23:54:13+00:00","dateModified":"2015-01-27T20:29:06+00:00","description":"Most of us have heard the saying \"People in glass houses shouldn't throw stones\", but not Google it seems.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Google Discloses Security Vulnerabilities in OS X\u2014While Leaving a Billion Android Users Exposed"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Google Discloses Security Vulnerabilities in OS X\u2014While Leaving a Billion Android Users Exposed","datePublished":"2015-01-26T23:54:13+00:00","dateModified":"2015-01-27T20:29:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#webpage"},"wordCount":545,"commentCount":13,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-400x260.jpeg","keywords":["Apple","Google","OS X"],"articleSection":["Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/google-discloses-security-vulnerabilities-in-osx-android-users-exposed\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/yos-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9o1","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/36085"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=36085"}],"version-history":[{"count":23,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/36085\/revisions"}],"predecessor-version":[{"id":36271,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/36085\/revisions\/36271"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/36094"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=36085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=36085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=36085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}