{"id":4650,"date":"2012-05-17T15:50:38","date_gmt":"2012-05-17T22:50:38","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=4650"},"modified":"2016-02-12T10:19:38","modified_gmt":"2016-02-12T18:19:38","slug":"security-jargon-decoded","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/","title":{"rendered":"Security Jargon Decoded"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/INTG_Jargon_02.jpg\"><img loading=\"lazy\" class=\"aligncenter wp-image-4761 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/INTG_Jargon_02.jpg\" alt=\"\" width=\"560\" height=\"400\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/INTG_Jargon_02.jpg 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/INTG_Jargon_02-300x214.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/INTG_Jargon_02-100x71.jpg 100w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p>In any industry, you get industry-specific jargon. It\u2019s a sort of verbal shorthand that&#8217;s used to cover terms that are used a lot. In the security industry, we\u2019re certainly not immune to this. Some of the terms are particularly colorful, given the subject matter we\u2019re dealing with, and the geek-love of pop culture media. I\u2019ll introduce a few of the terms that we\u2019ve been dealing with lately, especially in light of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/\" target=\"_blank\">Flashback malware<\/a>.<\/p>\n<ul>\n<li><strong>Malware:<\/strong><br \/>\nThis is a big catchall phrase that covers all sorts of software with nasty intent. Not buggy software, not programs you don\u2019t like, but software which is written with the intent to harm.<\/li>\n<li><strong>Virus: <\/strong><br \/>\nThis is a specific type of malware that spreads itself once it\u2019s initially run. This is different from other types of malware because it can either be like a parasite that attaches to good files on your machine, or it can be self-contained and search out other machines to infect.<\/li>\n<li><strong>Worm: <\/strong><br \/>\nWorms are a kind of virus. Specifically that second kind I just mentioned that searches out other machines to infect.<\/li>\n<li><strong>Trojan: <\/strong><br \/>\nDo you remember that story you had to read in high school about the big wooden horse that turned out to be full of guys with spears? This is the computer equivalent. You run a file that is supposed to be something fun or important, but it turns out that it\u2019s neither fun nor important, and it\u2019s now doing nasty things to your machine.<\/li>\n<li><strong>Exploit: <\/strong><br \/>\nFunny thing about software; it\u2019s written by humans. Humans are fallible and sometimes forget to cross Ts and dot Is. When this happens, it creates strange behavior in programs. Sometimes that strange behavior can be used to create a hole which malware could use to get into your machine more easily. The code they use to create that hole is Exploit code, or an Exploit for short.<\/li>\n<li><strong>Backdoor: <\/strong><br \/>\nPicture your computer as a house with one door; that\u2019s the door you use to go in and surf the web, check your email, write documents, or play games. If someone sneaks in and creates a second door, we call that a \u201cbackdoor\u201d. This backdoor allows them to come in and access your metaphorical house whenever they want, to do whatever they want. They can add security cameras to watch you, they can steal things, and they can even block numbers on your phone so you can\u2019t call the police to report them. Similarly, with a backdoor Trojan they can capture your keystrokes, or they can steal data on your computer, or they could even redirect your web surfing away from places like security sites.<\/li>\n<li><strong>Bot\/Zombie:<\/strong><br \/>\nThese two terms are interchangeable. The main mental image here is a thing with no mind of its own, driven by external motives. The hunger for brains, the code of some programmer\u2026 Either way, they\u2019ve been stripped of their free will and are doing nasty things. In the malware sense, it\u2019s an infected computer that has been filled with miscreants\u2019 code that&#8217;s instructing it to do their bidding.<\/li>\n<li><strong>Botmaster: <\/strong><br \/>\nSo, what do you call the person who programs and controls bots? A botmaster, of course. This is the person who instructs the bots to go out on their nefarious missions.<\/li>\n<li><strong>Botnet:<\/strong><br \/>\nWhen you have a bunch of bots, what do you do with them? Giving each one instructions individually is a royal pain. Instead, it\u2019s much more efficient for a botmaster to instruct bots to go to a central meeting place, where they only have to give instructions once.<\/li>\n<li><strong>Command &amp; Control Channel:<br \/>\n<\/strong>What do you call this central bot-meeting place? A Command &amp; Control Channel, or a C&amp;C. Infected machines check in to a sort of chat room, and then sit there awaiting instructions.<\/li>\n<li><strong>Goat Machine\/Honeypot:<\/strong><br \/>\nIn order to see what sort of effects malware has on an average user\u2019s machine, malware researchers will set up a lure or bait machine. It\u2019s meant to look (to a casual glance) like an unprotected user\u2019s machine, ripe for the picking. Think back to the scene in Jurassic Park where they\u2019re trying to lure the T Rex with a goat. Or if you\u2019d like a warmer and fuzzier mental image, think about Winnie the Pooh getting his head stuck in the honey jar. That\u2019s what we\u2019re going for here, trapping malware by luring them in with a tasty treat.<\/li>\n<li><strong>Sinkhole:<\/strong><br \/>\nA sinkhole, in normal parlance, is a giant hole in the earth. In the malware research sense, it\u2019s meant to conjure a similar mental image, with data being what falls into the hole. It\u2019s a computer that is meant to redirect traffic between infected users\u2019 machines and their intended target. This usually means one of three things. One meaning is that it\u2019s trapping network traffic intended to attack something like a website in order to overwhelm that site so nobody else can access it. Another use is for trapping viruses, when an infected user\u2019s machine is trying to search for other machines to infect. And lastly (and most relevant to Flashback), it can also mean intercepting communications between infected users\u2019 machines and a C&amp;C. Any of these three techniques can be used either to stop the harmful activities, or to analyze their behavior.<\/li>\n<\/ul>\n<p><strong>Further Reading:<\/strong><\/p>\n<ul>\n<li><a title=\"Rootkits Defined: What They Are and How They Can Be Used Maliciously\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rootkits-defined-what-they-are-and-how-they-can-be-used-maliciously\/\" target=\"_blank\">Rootkits Defined: What They Are and How They Can Be Used Maliciously<\/a><\/li>\n<li><a title=\"What\u2019s the Difference Between Malware, Trojan, Virus, and Worm?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-malware-trojan-virus-and-worm\/\" target=\"_blank\">What&#8217;s the Difference Between Malware, Trojan, Virus, and Worm?<\/a><\/li>\n<li><a title=\"How Does Malware Naming Work?\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-does-malware-naming-work\/\" target=\"_blank\">How Does Malware Naming Work?<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>In any industry, you get industry-specific jargon. This article introduces a few of the terms that we\u2019ve been dealing with lately, especially in light of the Flashback malware.<\/p>\n","protected":false},"author":6,"featured_media":35284,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151,13],"tags":[30,513,507,505,511,52,491,515,86,319,509,132,160,150],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In any industry, you get industry-specific jargon. This article introduces a few of the terms that we\u2019ve been dealing with lately, especially in light of the Flashback malware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Jargon Decoded - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In any industry, you get industry-specific jargon. This article introduces a few of the terms that we\u2019ve been dealing with lately, especially in light of the Flashback malware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-17T22:50:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:19:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Security-Jargon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Security-Jargon.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Security-Jargon.jpg\",\"width\":400,\"height\":260,\"caption\":\"security jargon\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/\",\"name\":\"Security Jargon Decoded - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#primaryimage\"},\"datePublished\":\"2012-05-17T22:50:38+00:00\",\"dateModified\":\"2016-02-12T18:19:38+00:00\",\"description\":\"In any industry, you get industry-specific jargon. This article introduces a few of the terms that we\\u2019ve been dealing with lately, especially in light of the Flashback malware.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Jargon Decoded\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Security Jargon Decoded\",\"datePublished\":\"2012-05-17T22:50:38+00:00\",\"dateModified\":\"2016-02-12T18:19:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#webpage\"},\"wordCount\":934,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Security-Jargon.jpg\",\"keywords\":[\"Backdoor\",\"Bot\/Zombie\",\"botmaster\",\"Botnet\",\"command &amp; control channel\",\"Exploit\",\"Honeypot\",\"jargon\",\"Malware\",\"Security\",\"Sinkhole\",\"Trojan Horse\",\"Virus\",\"Worm\"],\"articleSection\":[\"Malware\",\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In any industry, you get industry-specific jargon. This article introduces a few of the terms that we\u2019ve been dealing with lately, especially in light of the Flashback malware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/","og_locale":"en_US","og_type":"article","og_title":"Security Jargon Decoded - The Mac Security Blog","og_description":"In any industry, you get industry-specific jargon. This article introduces a few of the terms that we\u2019ve been dealing with lately, especially in light of the Flashback malware.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-05-17T22:50:38+00:00","article_modified_time":"2016-02-12T18:19:38+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Security-Jargon.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Security-Jargon.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Security-Jargon.jpg","width":400,"height":260,"caption":"security jargon"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/","name":"Security Jargon Decoded - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#primaryimage"},"datePublished":"2012-05-17T22:50:38+00:00","dateModified":"2016-02-12T18:19:38+00:00","description":"In any industry, you get industry-specific jargon. This article introduces a few of the terms that we\u2019ve been dealing with lately, especially in light of the Flashback malware.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Security Jargon Decoded"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Security Jargon Decoded","datePublished":"2012-05-17T22:50:38+00:00","dateModified":"2016-02-12T18:19:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#webpage"},"wordCount":934,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Security-Jargon.jpg","keywords":["Backdoor","Bot\/Zombie","botmaster","Botnet","command &amp; control channel","Exploit","Honeypot","jargon","Malware","Security","Sinkhole","Trojan Horse","Virus","Worm"],"articleSection":["Malware","Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/security-jargon-decoded\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/05\/Security-Jargon.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1d0","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4650"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=4650"}],"version-history":[{"count":15,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4650\/revisions"}],"predecessor-version":[{"id":39190,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4650\/revisions\/39190"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/35284"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=4650"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=4650"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=4650"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}