{"id":4822,"date":"2012-06-01T22:01:18","date_gmt":"2012-06-02T05:01:18","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=4822"},"modified":"2016-02-12T10:20:01","modified_gmt":"2016-02-12T18:20:01","slug":"flame-education-part-1","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/","title":{"rendered":"Flame Education, Part 1"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg\"><img loading=\"lazy\" class=\"size-full wp-image-4827 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg\" alt=\"\" width=\"560\" height=\"170\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4-300x91.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4-100x30.jpg 100w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/a><\/p>\n<p>While we have all this attention on Flame, we\u2019ll take this opportunity to define a few concepts to help you understand the coverage. This will be an article in two parts: The first will be about the importance of using layered defense, and describing a specific kind of anti-malware detection called \u201cgeneric detection\u201d. The second part is about the importance of you \u2013 the customer \u2013 in the fight against malware.<\/p>\n<p><strong>Layered Defense<\/strong><\/p>\n<p>If you\u2019ve read a few computer security articles, you\u2019ve undoubtedly heard how important it is to use a layered defense. If you\u2019ve not, here is the general idea: Don\u2019t rely on just one technology to protect your computer; use anti-malware software with firewall, for instance. But why is that? Why can\u2019t one technology protect us against everything?<\/p>\n<p>Each technology has its strengths and weaknesses because of the way it\u2019s designed to protect your system. By combining layers, you can give your machines a good amount of overlap that will help prevent against even the newest threats.<\/p>\n<p>Think of your home network like a town. There are many ways to keep your town safe, and each has its benefits and its drawbacks. You could have a police force that investigates crimes and locks up known criminals. You could put up a gate around the town, with guards at the entrances. You could put up a wall with armed watchtowers all along its length. You could even carve your town into the top of a remote mountain, or build a station at the bottom of the sea.<\/p>\n<p>Most towns won\u2019t need the level of protection in the last two examples. Those more-accessible places prefer for their citizens to come and go as they please, and they simply don\u2019t have anything that they feel the need to guard that heavily. Most towns won\u2019t even go so far as to put up a gate. These places that are not totally locked down deal with a certain amount of crime. This is the cost of freedom of movement, and in real life most people employ additional protection to improve their own personal safety.<\/p>\n<p>Most people live in a home; this affords them a certain amount of additional safety. Those homes sometimes have locks on doors or windows, and sometimes they even have automated security systems. The people who live in those homes sometimes own weapons to give them further protection. These are all layers of protection, which people can add or subtract depending on a combination of how much they have to spend on security, how comfortable they are with the specific methods, or how far they\u2019re willing to go to protect what is inside their home.<\/p>\n<p>Similarly, there are lots of ways to protect your network and the machines that connect to it. You could use an anti-malware product, or you could use a firewall, or you could use any of the many other types of security tools. These things can all add up to a more robust defense. There are pros and cons to each type of defense, and you must ultimately judge for yourself what resources you have to spend on security, how comfortable you are with the technology, and how much restriction you are willing to accept to protect what\u2019s on your network.<\/p>\n<p><strong>Generic Detection<\/strong><\/p>\n<p>Let\u2019s delve a little more deeply into one part of the anti-malware part of your potential security arsenal, to shed some light on one of the more advanced detection techniques. At a basic level, anti-malware looks for known threats. First someone discovers a threat, and then researchers analyze it. At that point, the researchers can add detection and removal for the threat.<\/p>\n<p>We\u2019ve collectively been analyzing threats for a really long time now, and in that time we\u2019ve learned to identify some patterns. These patterns are what we use to create \u201cgeneric detection\u201d.<\/p>\n<p>Malware frequently exhibits certain specific traits that are not frequently exhibited by innocent software. Notice my use of the word \u201cfrequently\u201d, not \u201calways\u201d. How do you tell the difference between remote desktop applications and backdoor trojans, generically? Both allow a remote user total control of the target machine. It can be very tricky, but not impossible, to tell these two types of things apart. Researchers tread an exceedingly fine line between crafting detection for suspicious behavior and tagging innocent software unfairly.<\/p>\n<p><strong>How does this pertain to Flame?<\/strong><\/p>\n<p>It appears that some components of the Flame malware have been around for two years. Other components appear to have been released at various points in the last year. Whether this means some version of Flame has been affecting machines for two years may forever remain a mystery. What we do know is that for those two years, there was detection in some anti-malware products, mostly using generic detection.<\/p>\n<p>But even if the systems that were infected by Flame didn\u2019t have a product that detected parts of this threat generically, they could have been protected by other technology. If they had a firewall in place, it could have detected connections going out to the spy controlling it. Or the firewall might have detected the connection from the spy back into the infected computer. Either way, they could have been alerted to the intrusion. And there are many other types of security tools that could have detected strange behavior before any damage was done.<\/p>\n<p>The same goes for all those run-of-the-mill threats that continue to infect users of both Windows and OS X systems. It doesn\u2019t take much to set up a layered defense, but the additional protection it provides can make a world of difference.<\/p>\n<p>Our complete security suite, with both Anti-malware and Firewall among many other tools, is Internet Security Barrier. To download a <a href=\"https:\/\/www.intego.com\/demo\">30-day free trial of Internet Security Barrier X6, click this link.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While we have all this attention on Flame, we\u2019ll take this opportunity to define a few concepts to help you understand the coverage. This will be an article in two parts: The first will be about the importance of using layered defense, and describing a specific kind of anti-malware detection called \u201cgeneric detection\u201d. <\/p>\n","protected":false},"author":6,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,13],"tags":[163,66,86,3154],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"While we have all this attention on Flame, we\u2019ll take this opportunity to define a few concepts to help you understand the coverage. This will be an article in two parts: The first will be about the importance of using layered defense, and describing a specific kind of anti-malware detection called \u201cgeneric detection\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Flame Education, Part 1 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"While we have all this attention on Flame, we\u2019ll take this opportunity to define a few concepts to help you understand the coverage. This will be an article in two parts: The first will be about the importance of using layered defense, and describing a specific kind of anti-malware detection called \u201cgeneric detection\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-06-02T05:01:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:20:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg\",\"width\":\"560\",\"height\":\"170\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/\",\"name\":\"Flame Education, Part 1 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#primaryimage\"},\"datePublished\":\"2012-06-02T05:01:18+00:00\",\"dateModified\":\"2016-02-12T18:20:01+00:00\",\"description\":\"While we have all this attention on Flame, we\\u2019ll take this opportunity to define a few concepts to help you understand the coverage. This will be an article in two parts: The first will be about the importance of using layered defense, and describing a specific kind of anti-malware detection called \\u201cgeneric detection\\u201d.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Flame Education, Part 1\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Flame Education, Part 1\",\"datePublished\":\"2012-06-02T05:01:18+00:00\",\"dateModified\":\"2016-02-12T18:20:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#webpage\"},\"wordCount\":981,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg\",\"keywords\":[\"Flame\",\"Intego\",\"Malware\",\"Security &amp; Privacy\"],\"articleSection\":[\"Malware\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"While we have all this attention on Flame, we\u2019ll take this opportunity to define a few concepts to help you understand the coverage. This will be an article in two parts: The first will be about the importance of using layered defense, and describing a specific kind of anti-malware detection called \u201cgeneric detection\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/","og_locale":"en_US","og_type":"article","og_title":"Flame Education, Part 1 - The Mac Security Blog","og_description":"While we have all this attention on Flame, we\u2019ll take this opportunity to define a few concepts to help you understand the coverage. This will be an article in two parts: The first will be about the importance of using layered defense, and describing a specific kind of anti-malware detection called \u201cgeneric detection\u201d.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-06-02T05:01:18+00:00","article_modified_time":"2016-02-12T18:20:01+00:00","og_image":[{"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg","width":"560","height":"170"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/","name":"Flame Education, Part 1 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#primaryimage"},"datePublished":"2012-06-02T05:01:18+00:00","dateModified":"2016-02-12T18:20:01+00:00","description":"While we have all this attention on Flame, we\u2019ll take this opportunity to define a few concepts to help you understand the coverage. This will be an article in two parts: The first will be about the importance of using layered defense, and describing a specific kind of anti-malware detection called \u201cgeneric detection\u201d.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Flame Education, Part 1"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Flame Education, Part 1","datePublished":"2012-06-02T05:01:18+00:00","dateModified":"2016-02-12T18:20:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#webpage"},"wordCount":981,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/06\/INTG_Flame_03a_CO4.jpg","keywords":["Flame","Intego","Malware","Security &amp; Privacy"],"articleSection":["Malware","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/flame-education-part-1\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1fM","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4822"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=4822"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4822\/revisions"}],"predecessor-version":[{"id":7176,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/4822\/revisions\/7176"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=4822"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=4822"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=4822"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}