{"id":46789,"date":"2015-10-05T14:03:31","date_gmt":"2015-10-05T21:03:31","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=46789"},"modified":"2016-10-07T11:31:22","modified_gmt":"2016-10-07T18:31:22","slug":"yispecter-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/","title":{"rendered":"YiSpecter Malware Attacks iPhones and iPads to Serve up Ads"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-46792\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-600x300.jpeg\" alt=\"YiSpector\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Just weeks after Apple was forced to rid its iOS App Store from <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-cleans-house-pulls-xcodeghost-malware-riddled-apps-from-app-store\/\" target=\"_blank\">apps poisoned by the XcodeGhost malware<\/a>, and mere months after the tech company pulled all iOS anti-virus apps, a new attack has come to light impacting owners of iPads and iPhones, bringing into question the sanctity of Apple&#8217;s walled garden.<\/p>\n<p>The new malware threat \u2014 which is capable of infecting iDevices whether they are jailbroken or not \u2014 has been named <a title=\"Link to Palo Alto Networks blog\" href=\"http:\/\/researchcenter.paloaltonetworks.com\/2015\/10\/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis\/\" target=\"_blank\" rel=\"nofollow\">YiSpecter<\/a> by security researchers at Palo Alto Networks, and a <a title=\"Link to Wall Street Journal\" href=\"http:\/\/blogs.wsj.com\/digits\/2015\/10\/04\/ad-focused-malware-targets-apple-users-in-china-and-taiwan\/\" target=\"_blank\" rel=\"nofollow\">report<\/a> in the <em>Wall Street Journal<\/em> says that it has been spread with the help of a Chinese advertising network.<\/p>\n<p>YiSpecter is thought to have been spreading in-the-wild since at least November 2014, initially distributed as trojanised version of QVOD, a media player popular in China for watching porn videos. QVOD has since been discontinued after the Chinese authorities shut it down earlier this year, so it&#8217;s safe to assume that any QVOD video player should now be treated with suspicion.<\/p>\n<p>However, the YiSpecter malware has also infected iPhones and iPads through other unusual means, including the hijacking of traffic from Chinese ISPs, a Windows-based social networking worm, third-party app stores and direct promotion of trojanised apps on social networks and forums.<\/p>\n<p>Once in place the YiSpecter malware can install unwanted apps, replace legitimate apps with ones it had downloaded, display full-screen advertisements, meddle with Safari&#8217;s bookmarks and default search engine, and steal information about users. In a further flourish, YiSpecter can survive manual deletion from iOS devices by automatically reappearing.<\/p>\n<p>Researchers have described how YiSpecter has pretended to be legitimate apps, including Phone, Weather, Game Center and Passbook on infected devices.<\/p>\n<p>YiSpecter goes further than past attacks against non-jailbroken iPhones such as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/\" target=\"_blank\">WireLurker<\/a>, by not just taking advantage of certificates issued under Apple&#8217;s iOS Developer Enterprise Program to roll-out bespoke apps within companies, but also exploiting private APIs.<\/p>\n<p>To date, it appears that YiSpecter has mostly affected users based in China and Taiwan, but clearly there is the potential for attacks like this to strike further afield.<\/p>\n<p>Palo Alto Networks offers the following removal advice for any users who believe that their iDevices might be affected by YiSpecter:<\/p>\n<blockquote>\n<ul>\n<li>In iOS, go to Settings -&gt; General -&gt; Profiles to remove all unknown or untrusted profiles;<\/li>\n<li>If there\u2019s any installed apps named \u201c\u60c5\u6da9\u64ad\u653e\u5668\u201d, \u201c\u5feb\u64ad\u79c1\u5bc6\u7248\u201d or \u201c\u5feb\u64ad0\u201d, delete them;<\/li>\n<li>Use any third-party iOS management tool (e.g., iFunBox, though note that Apple\u2019s iTunes doesn\u2019t work in this step) on Windows or Mac OS X, to connect with your iPhone or iPad;<\/li>\n<li>In the management tool, check all installed iOS apps; if there are some apps have name like Phone, Weather, Game Center, Passbook, Notes, or Cydia, delete them. (Note that this step won\u2019t affect original system apps but just delete faked malware.)<\/li>\n<\/ul>\n<\/blockquote>\n<p>Intego&#8217;s\u00a0<a href=\"https:\/\/www.intego.com\/products\" target=\"_blank\">Mac security products<\/a> detect the malware as <strong>iOS\/YiSpecter<\/strong>.<\/p>\n<p>Although recent developments in the world of iOS malware may rattle some users&#8217; confidence in the safety of the platform, it&#8217;s well worth remembering that the problem of malicious software is much more significant on the Android operating system. Thousands of new Android malware samples are being discovered all the time.<\/p>\n<p>The good news for iOS users is that, for now at least, malware is a relative novelty.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just weeks after Apple was forced to rid its iOS App Store from apps poisoned by the XcodeGhost malware, a new attack has come to light impacting owners of iPads and iPhones, and bringing into question the sanctity of Apple&#8217;s walled garden.<\/p>\n","protected":false},"author":34,"featured_media":46798,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,5],"tags":[2506,86,2503],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Just weeks after Apple was forced to rid its iOS App Store from apps poisoned by the XcodeGhost malware, a new attack has come to light impacting owners of iPads and iPhones, and bringing into question the sanctity of Apple&#039;s walled garden.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"YiSpecter Malware Attacks iPhones and iPads to Serve up Ads - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Just weeks after Apple was forced to rid its iOS App Store from apps poisoned by the XcodeGhost malware, a new attack has come to light impacting owners of iPads and iPhones, and bringing into question the sanctity of Apple&#039;s walled garden.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-05T21:03:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-07T18:31:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/\",\"name\":\"YiSpecter Malware Attacks iPhones and iPads to Serve up Ads - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#primaryimage\"},\"datePublished\":\"2015-10-05T21:03:31+00:00\",\"dateModified\":\"2016-10-07T18:31:22+00:00\",\"description\":\"Just weeks after Apple was forced to rid its iOS App Store from apps poisoned by the XcodeGhost malware, a new attack has come to light impacting owners of iPads and iPhones, and bringing into question the sanctity of Apple's walled garden.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"YiSpecter Malware Attacks iPhones and iPads to Serve up Ads\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"YiSpecter Malware Attacks iPhones and iPads to Serve up Ads\",\"datePublished\":\"2015-10-05T21:03:31+00:00\",\"dateModified\":\"2016-10-07T18:31:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#webpage\"},\"wordCount\":552,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-400x260.jpeg\",\"keywords\":[\"iOS\/YiSpecter\",\"Malware\",\"YiSpector\"],\"articleSection\":[\"Malware\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Just weeks after Apple was forced to rid its iOS App Store from apps poisoned by the XcodeGhost malware, a new attack has come to light impacting owners of iPads and iPhones, and bringing into question the sanctity of Apple's walled garden.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/","og_locale":"en_US","og_type":"article","og_title":"YiSpecter Malware Attacks iPhones and iPads to Serve up Ads - The Mac Security Blog","og_description":"Just weeks after Apple was forced to rid its iOS App Store from apps poisoned by the XcodeGhost malware, a new attack has come to light impacting owners of iPads and iPhones, and bringing into question the sanctity of Apple's walled garden.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-10-05T21:03:31+00:00","article_modified_time":"2016-10-07T18:31:22+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/","name":"YiSpecter Malware Attacks iPhones and iPads to Serve up Ads - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#primaryimage"},"datePublished":"2015-10-05T21:03:31+00:00","dateModified":"2016-10-07T18:31:22+00:00","description":"Just weeks after Apple was forced to rid its iOS App Store from apps poisoned by the XcodeGhost malware, a new attack has come to light impacting owners of iPads and iPhones, and bringing into question the sanctity of Apple's walled garden.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"YiSpecter Malware Attacks iPhones and iPads to Serve up Ads"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"YiSpecter Malware Attacks iPhones and iPads to Serve up Ads","datePublished":"2015-10-05T21:03:31+00:00","dateModified":"2016-10-07T18:31:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#webpage"},"wordCount":552,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-400x260.jpeg","keywords":["iOS\/YiSpecter","Malware","YiSpector"],"articleSection":["Malware","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/yispecter-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/yispector-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-caF","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46789"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=46789"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46789\/revisions"}],"predecessor-version":[{"id":46837,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46789\/revisions\/46837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/46798"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=46789"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=46789"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=46789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}