{"id":40600,"date":"2015-04-21T13:04:00","date_gmt":"2015-04-21T20:04:00","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=40600"},"modified":"2016-10-07T12:21:42","modified_gmt":"2016-10-07T19:21:42","slug":"os-x-yosemite-still-vulnerable-to-rootpipe-attacks","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/","title":{"rendered":"OS X Yosemite Still Vulnerable to Rootpipe Attacks"},"content":{"rendered":"<p>Have you ever seen the movie, The Replacements? There\u2019s this memorable quote by Shane Falco, played by Keanu Reeves, and I can\u2019t help but imagine Apple must feel like they\u2019re in a similar predicament. Like, as if stuck in quicksand and the harder they fight to get out, nothing they do is working.<\/p>\n<blockquote><p>\u201c[Y]ou think everything is going fine. Then one thing goes wrong. And then another. And another. You try to fight back, but the harder you fight, the deeper you sink. Until you can&#8217;t move&#8230; you can&#8217;t breathe&#8230; because you&#8217;re in over your head. Like quicksand.\u201d<\/p><\/blockquote>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-40612\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/rootpipe-flaw-conspiracy-keanu-300x300.jpg\" alt=\"Photo of conspiracy keanu meme on Apple rootpipe flaw\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/rootpipe-flaw-conspiracy-keanu-300x300.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/rootpipe-flaw-conspiracy-keanu-150x150.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/04\/rootpipe-flaw-conspiracy-keanu.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Earlier this month, Apple claimed to have fixed the <a title=\"Rootpipe Flaw in OS X Could Allow Hackers to Completely Take Over Your Mac\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-hacker-mac\/\" target=\"_blank\">Rootpipe flaw<\/a>\u2014albeit only for OS X 10.10.3; Apple has <a href=\"https:\/\/www.intego.com\/mac-security-blog\/rootpipe-backdoor-flaw-no-patch\/\" target=\"_blank\">no plans to patch older Macs<\/a> (pre-Yosemite).<\/p>\n<p>Yet for the Mac users Apple hadn\u2019t snubbed, well, as <a href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2015\/04\/19\/apple-fails-to-patch-rootpipe\/\" target=\"_blank\">Forbes\u2019 Thomas Fox-Brewster reported<\/a>, \u201cApple botched the patch anyway, so all Mac machines remain vulnerable to Rootpipe attacks.\u201d<\/p>\n<p>Say what?<\/p>\n<p>Patrick Wardle, the director of research at Synack, was\u00a0on a flight home\u00a0when, much to his surprise, he found it was still possible\u00a0to exploit the Rootpipe flaw\u00a0on a \u201cfully patched\u201d OS X 10.10.3 platform.<\/p>\n<p>This means Apple&#8217;s recently-released patch for the Rootpipe vulnerability\u00a0(<a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-1130\" target=\"_blank\">CVE-2015-1130<\/a>) in OS X Yosemite 10.10.3\u00a0fails to resolve the underlining issue\u2014all Mac\u00a0OS X systems remain\u00a0vulnerable to attack.<\/p>\n<p>On his blog, <a href=\"https:\/\/objective-see.com\/blog.html\" target=\"_blank\">Wardle said<\/a>, \u201c[O]n my flight back from presenting at Infiltrate (amazing conference btw), I found a novel, yet trivial way for any local user to re-abuse rootpipe &#8211; even on a fully patched OS X 10.10.3 system.\u201d He also created a video as evidence that Rootpipe is still exploitable on a fully-patched OS X 10.10.3 installation:<\/p>\n<div class=\"embed-vimeo\" style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/125345793\" width=\"600\" height=\"338\" frameborder=\"0\" webkitallowfullscreen mozallowfullscreen allowfullscreen><\/iframe><\/div>\n<p>The good news is that Patrick believes in responsible disclosure, and, at this time, won\u2019t be providing technical details of how to exploit the vulnerability.<\/p>\n<p>The ball is back in Apple\u2019s court.<\/p>\n<p>While the security world awaits Apple\u2019s response, it\u2019s worth noting there is malware from 2014 that was already exploiting this vulnerability. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/spyware-xslcmd-malware-os-x\/\" target=\"_blank\">XSLCmd malware<\/a> contains the exploit\u00a0code for both Mavericks and older OS X versions, and uses the exploit to activate the Accessibility API (hat tip to <a href=\"https:\/\/reverse.put.as\/2015\/04\/13\/how-to-fix-rootpipe-in-mavericks-and-call-apples-bullshit-bluff-about-rootpipe-fixes\/\" target=\"_blank\">@osxreverser<\/a>). Intego VirusBarrier detects this threat as OSX\/XSLCmd.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Rootpipe vulnerability (CVE-2015-1130), previously thought patched by Apple in OS X Yosemite 10.10.3, remains on all Macs.<\/p>\n","protected":false},"author":4,"featured_media":10913,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[3151,174,1561,2161,1624,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Rootpipe vulnerability (CVE-2015-1130), previously thought patched by Apple in OS X Yosemite 10.10.3, remains on all Macs.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OS X Yosemite Still Vulnerable to Rootpipe Attacks - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Rootpipe vulnerability (CVE-2015-1130), previously thought patched by Apple in OS X Yosemite 10.10.3, remains on all Macs.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-21T20:04:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-07T19:21:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/\",\"name\":\"OS X Yosemite Still Vulnerable to Rootpipe Attacks - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#primaryimage\"},\"datePublished\":\"2015-04-21T20:04:00+00:00\",\"dateModified\":\"2016-10-07T19:21:42+00:00\",\"description\":\"The Rootpipe vulnerability (CVE-2015-1130), previously thought patched by Apple in OS X Yosemite 10.10.3, remains on all Macs.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OS X Yosemite Still Vulnerable to Rootpipe Attacks\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"OS X Yosemite Still Vulnerable to Rootpipe Attacks\",\"datePublished\":\"2015-04-21T20:04:00+00:00\",\"dateModified\":\"2016-10-07T19:21:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#webpage\"},\"wordCount\":386,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg\",\"keywords\":[\"Apple\",\"Mac\",\"OS X Yosemite\",\"Patrick Wardle\",\"Rootpipe\",\"Vulnerability\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Rootpipe vulnerability (CVE-2015-1130), previously thought patched by Apple in OS X Yosemite 10.10.3, remains on all Macs.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/","og_locale":"en_US","og_type":"article","og_title":"OS X Yosemite Still Vulnerable to Rootpipe Attacks - The Mac Security Blog","og_description":"The Rootpipe vulnerability (CVE-2015-1130), previously thought patched by Apple in OS X Yosemite 10.10.3, remains on all Macs.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-04-21T20:04:00+00:00","article_modified_time":"2016-10-07T19:21:42+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/","name":"OS X Yosemite Still Vulnerable to Rootpipe Attacks - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#primaryimage"},"datePublished":"2015-04-21T20:04:00+00:00","dateModified":"2016-10-07T19:21:42+00:00","description":"The Rootpipe vulnerability (CVE-2015-1130), previously thought patched by Apple in OS X Yosemite 10.10.3, remains on all Macs.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OS X Yosemite Still Vulnerable to Rootpipe Attacks"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"OS X Yosemite Still Vulnerable to Rootpipe Attacks","datePublished":"2015-04-21T20:04:00+00:00","dateModified":"2016-10-07T19:21:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#webpage"},"wordCount":386,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","keywords":["Apple","Mac","OS X Yosemite","Patrick Wardle","Rootpipe","Vulnerability"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-still-vulnerable-to-rootpipe-attacks\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/02\/rotten-apple-thumb.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ayQ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40600"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=40600"}],"version-history":[{"count":15,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40600\/revisions"}],"predecessor-version":[{"id":40762,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/40600\/revisions\/40762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/10913"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=40600"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=40600"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=40600"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}