{"id":46168,"date":"2015-09-16T09:03:42","date_gmt":"2015-09-16T16:03:42","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=46168"},"modified":"2015-09-16T09:03:42","modified_gmt":"2015-09-16T16:03:42","slug":"airdrop-bug","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/","title":{"rendered":"AirDrop Bug Could Let Hackers Silently Plant Malware on Your iPhone or Mac"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-46219\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-600x3001.jpeg\" alt=\"AirDrop\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-600x3001.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-600x3001-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-600x3001-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Do you have AirDrop enabled on your iPhone or Mac?<\/p>\n<p>Maybe you&#8217;ll think again after watching a video made by Australian security researcher Mark Dowd.<\/p>\n<p>Dowd has uncovered a major vulnerability in the current versions of iOS and OS X, that could allow a hacker to install a malicious app on your phone wirelessly, from close proximity, with no obvious warning to you that anything suspicious has occurred.<\/p>\n<p>The vulnerability depends upon AirDrop, the over-the-air file-sharing technology used by OS X and iOS, being enabled \u2014 but does not require the intended victim to accept a file being sent to them.<\/p>\n<p>To demonstrate the attack in action, Dowd published a <a title=\"Link to YouTube video\" href=\"https:\/\/www.youtube.com\/watch?v=j3JODDmk2Hs&amp;rel=0\" target=\"_blank\" rel=\"nofollow\">YouTube video<\/a> with an amusingly stealthy soundtrack, showing just how easy it was to infect an iPhone with AirDrop enabled.<\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe loading=\"lazy\" class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/j3JODDmk2Hs?version=3&#038;rel=0&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span><\/p>\n<p>After your device has received a boobytrapped AirDrop request (which you don&#8217;t have to accept), nothing happens&#8230;. until you reboot your iPhone.<\/p>\n<p>The rebooting process wakes up the dormant infection, installing an app using the <a title=\"Link to Apple enterprise provisioning\" href=\"https:\/\/developer.apple.com\/programs\/enterprise\/how-it-works\/\" target=\"_blank\" rel=\"nofollow\">enterprise provisioning feature<\/a> that Apple provides for companies who wish to roll out their own apps to staff.<\/p>\n<p>In short \u2014 the app hasn&#8217;t had to sneak into the official Apple App Store, and it hasn&#8217;t been subject to the normal security checks.<\/p>\n<p>In the video, Dowd gives a taste for just how dangerous such an attack could be by replacing the standard iPhone app with a program that says, &#8220;Hello world.&#8221; Just imagine if the app spied on your conversations, stole data, or provided remote access to malicious hackers.<\/p>\n<p>The vulnerability is said to affect all versions of iOS that support AirDrop from iOS 7 onwards, and OS X Yosemite and later.<\/p>\n<p>iOS 9, scheduled to be released today, mitigates against the flaw \u2014 although, it does not contain a full patch. OS X users will presumably have to wait until the release of OS X 10.11 El Capitan, due for official release at the end of this month.<\/p>\n<p>For now there is no news from Apple as to when a proper full patch will be released.<\/p>\n<p>In the meantime, maybe it would be sensible to disable AirDrop, or at least limit it to only allowing file sharing requests from your contacts.<\/p>\n<p>Note, by the way, that by default it&#8217;s possible to enable AirDrop from the lock screen \u2014 so even locked phones could be at risk if an attacker has physical access to them. So maybe you should also consider blocking Control Center access from the lock screen, if you really want to secure your iPhone or iPad.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you have AirDrop enabled on your iPhone or Mac?<\/p>\n<p>Maybe you&#8217;ll think again after watching a video made by Australian security researcher Mark Dowd.<\/p>\n","protected":false},"author":34,"featured_media":46222,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,13,5],"tags":[2476,69,9,174,168,144],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Do you have AirDrop enabled on your iPhone or Mac?  Maybe you&#039;ll think again after watching a video made by Australian security researcher Mark Dowd.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AirDrop Bug Could Let Hackers Silently Plant Malware on Your iPhone or Mac - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Do you have AirDrop enabled on your iPhone or Mac?  Maybe you&#039;ll think again after watching a video made by Australian security researcher Mark Dowd.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-09-16T16:03:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/\",\"name\":\"AirDrop Bug Could Let Hackers Silently Plant Malware on Your iPhone or Mac - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#primaryimage\"},\"datePublished\":\"2015-09-16T16:03:42+00:00\",\"dateModified\":\"2015-09-16T16:03:42+00:00\",\"description\":\"Do you have AirDrop enabled on your iPhone or Mac? Maybe you'll think again after watching a video made by Australian security researcher Mark Dowd.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AirDrop Bug Could Let Hackers Silently Plant Malware on Your iPhone or Mac\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"AirDrop Bug Could Let Hackers Silently Plant Malware on Your iPhone or Mac\",\"datePublished\":\"2015-09-16T16:03:42+00:00\",\"dateModified\":\"2015-09-16T16:03:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#webpage\"},\"wordCount\":441,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-400x260.jpeg\",\"keywords\":[\"AirDrop\",\"iOS\",\"iPhone\",\"Mac\",\"OS X\",\"Vulnerability\"],\"articleSection\":[\"Malware\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Do you have AirDrop enabled on your iPhone or Mac?  Maybe you'll think again after watching a video made by Australian security researcher Mark Dowd.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/","og_locale":"en_US","og_type":"article","og_title":"AirDrop Bug Could Let Hackers Silently Plant Malware on Your iPhone or Mac - The Mac Security Blog","og_description":"Do you have AirDrop enabled on your iPhone or Mac?  Maybe you'll think again after watching a video made by Australian security researcher Mark Dowd.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-09-16T16:03:42+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/","name":"AirDrop Bug Could Let Hackers Silently Plant Malware on Your iPhone or Mac - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#primaryimage"},"datePublished":"2015-09-16T16:03:42+00:00","dateModified":"2015-09-16T16:03:42+00:00","description":"Do you have AirDrop enabled on your iPhone or Mac? Maybe you'll think again after watching a video made by Australian security researcher Mark Dowd.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"AirDrop Bug Could Let Hackers Silently Plant Malware on Your iPhone or Mac"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"AirDrop Bug Could Let Hackers Silently Plant Malware on Your iPhone or Mac","datePublished":"2015-09-16T16:03:42+00:00","dateModified":"2015-09-16T16:03:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#webpage"},"wordCount":441,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-400x260.jpeg","keywords":["AirDrop","iOS","iPhone","Mac","OS X","Vulnerability"],"articleSection":["Malware","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/airdrop-bug\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/09\/airdrop-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-c0E","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46168"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=46168"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46168\/revisions"}],"predecessor-version":[{"id":46237,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46168\/revisions\/46237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/46222"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=46168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=46168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=46168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}