{"id":48505,"date":"2015-12-08T10:18:52","date_gmt":"2015-12-08T18:18:52","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=48505"},"modified":"2016-10-07T11:34:47","modified_gmt":"2016-10-07T18:34:47","slug":"find-my-iphone-search-ends-in-violence","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/","title":{"rendered":"Find My iPhone Search Ends in Violence"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-48517\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-600x300.jpeg\" alt=\"Find my iPhone assault\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-600x300.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-600x300-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-600x300-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>As we have detailed in the past, there are many examples of cases where &#8220;Find my iPhone&#8221; has <a href=\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-now-catching-criminals-and-saving-lives\/\" target=\"_blank\">helped save lives or helped law enforcement agencies locate criminals<\/a>\u00a0too dumb to disable it.<\/p>\n<p>I think most of us are unlikely to have a problem with the technology being used in this fashion, as well as its more regular use of helping find a mislaid iPhone or iPad.<\/p>\n<p>But now a report from New York shows that hunting for a lost iPhone may not be as harmless an activity as you might imagine.<\/p>\n<p>As <em>The Gothamist<\/em> <a title=\"Link to Gothamist report\" href=\"http:\/\/gothamist.com\/2015\/12\/04\/weird_iphone_assault.php\" target=\"_blank\" rel=\"nofollow\">reports<\/a>, a 43-year-old woman and her son were assaulted at their Bronx home in the early morning of Thanksgiving, after three people arrived on their doorstep claiming that a lost iPhone was on the premises.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-48514\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/suspect-images.jpeg\" alt=\"Suspect images, released by the police\" width=\"600\" height=\"338\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/suspect-images.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/suspect-images-150x85.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/suspect-images-300x169.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Strangers arriving on your doorstep at 3am can be disturbing enough at the best of times, but when those knocking at your door demand that you hand over an iPhone that they insist is inside your house, you can understand why the family became increasingly concerned as tempers flared.<\/p>\n<p>You see, the problem was that the allegedly lost iPhone <strong>wasn&#8217;t<\/strong> there. So there was nothing for them to hand over to their unexpected visitors.<\/p>\n<p>The trio who knocked on the door of the house on Randall Avenue insisted that they had tracked their lost iPhone to the house, and they clearly weren&#8217;t happy when the occupants couldn&#8217;t magic an iPhone out of thin air and suggested that the iPhone hunters call the police instead.<\/p>\n<p>Eventually, the mother and son were able to get the two women and one man out of the house, but &#8220;when they tried to get their license plate, were assaulted by the suspects.&#8221;<\/p>\n<p>Both mother and son were taken to the hospital for treatment after the attack.<\/p>\n<p>So, what has gone badly wrong here?<\/p>\n<p>Well, let&#8217;s make the assumption that the alleged attackers were indeed hunting for a lost iDevice, rather than pulling a fast one in an attempt to gain access to someone&#8217;s home for another purpose.<\/p>\n<p><strong>What they were thinking going around to the property at 3 o&#8217;clock in the morning?<\/strong><\/p>\n<p>If you lose your iPhone, and you believe that it is on a stranger&#8217;s private property, then\u2014if you haven&#8217;t yourself ever visited the property with your iPhone\u2014you should probably assume that it has been stolen. Especially if you have already gone through the process of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-enable-the-kill-switch-on-your-iphone-or-ipad\/\" target=\"_blank\">enabling Lost Mode<\/a>, which can display a handy note on the phone telling any Good Samaritan who picked it up how to get in touch with you.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-48508\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/find-my-iphone-600.jpeg\" alt=\"Find my iPhone\" width=\"600\" height=\"402\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/find-my-iphone-600.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/find-my-iphone-600-150x101.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/find-my-iphone-600-300x201.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Visiting the perceived thief&#8217;s lair\u2014<em>at three in the morning!<\/em>\u2014just doesn&#8217;t make sense.<\/p>\n<p>Picking up a lost iPhone at a restaurant, a hotel lobby, a lost and found office&#8230; yes, I get that. But not from a stranger&#8217;s residential address. And not in the dead of the night.<\/p>\n<p>The correct course of action in this scenario, if you genuinely believe you know where your iPhone is (and remember that the location shown by Find My iPhone is not always entirely accurate), would seem to me to speak to the police.<\/p>\n<p>I feel sorry for the mother and son who apparently suffered the traumatic experience. No doubt next time they get an unexpected knock on their door at three in the morning they will be very nervous to answer, and certainly won&#8217;t be keen to invite strangers inside again.<\/p>\n<p>NYPD has released images of two women, who they wish to question about the incident.<\/p>\n<p>Anyone with information in regards to the incident should call the NYPD Crime Stoppers Hotline on 800-577-TIPS. You can also submit tips by logging onto the <a href=\"http:\/\/www.nypdcrimestoppers.com\" target=\"_blank\">Crime Stoppers website<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Police are hunting people suspected of assaulting a mother and son, after knocking on their door hunting for a lost iPhone.<\/p>\n","protected":false},"author":34,"featured_media":48523,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[2593,1117,69],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Police are hunting people suspected of assaulting a mother and son, after knocking on their door hunting for a lost iPhone.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Find My iPhone Search Ends in Violence - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Police are hunting people suspected of assaulting a mother and son, after knocking on their door hunting for a lost iPhone.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-12-08T18:18:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-07T18:34:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-400x260.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-400x260.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-400x260.jpeg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/\",\"name\":\"Find My iPhone Search Ends in Violence - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#primaryimage\"},\"datePublished\":\"2015-12-08T18:18:52+00:00\",\"dateModified\":\"2016-10-07T18:34:47+00:00\",\"description\":\"Police are hunting people suspected of assaulting a mother and son, after knocking on their door hunting for a lost iPhone.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Find My iPhone Search Ends in Violence\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Find My iPhone Search Ends in Violence\",\"datePublished\":\"2015-12-08T18:18:52+00:00\",\"dateModified\":\"2016-10-07T18:34:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#webpage\"},\"wordCount\":621,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-400x260.jpeg\",\"keywords\":[\"assault\",\"Find My\",\"iOS\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Police are hunting people suspected of assaulting a mother and son, after knocking on their door hunting for a lost iPhone.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/","og_locale":"en_US","og_type":"article","og_title":"Find My iPhone Search Ends in Violence - The Mac Security Blog","og_description":"Police are hunting people suspected of assaulting a mother and son, after knocking on their door hunting for a lost iPhone.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-12-08T18:18:52+00:00","article_modified_time":"2016-10-07T18:34:47+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-400x260.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-400x260.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-400x260.jpeg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/","name":"Find My iPhone Search Ends in Violence - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#primaryimage"},"datePublished":"2015-12-08T18:18:52+00:00","dateModified":"2016-10-07T18:34:47+00:00","description":"Police are hunting people suspected of assaulting a mother and son, after knocking on their door hunting for a lost iPhone.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Find My iPhone Search Ends in Violence"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Find My iPhone Search Ends in Violence","datePublished":"2015-12-08T18:18:52+00:00","dateModified":"2016-10-07T18:34:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#webpage"},"wordCount":621,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-400x260.jpeg","keywords":["assault","Find My","iOS"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/find-my-iphone-search-ends-in-violence\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/12\/iphone-assault-400x260.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cCl","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48505"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=48505"}],"version-history":[{"count":13,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48505\/revisions"}],"predecessor-version":[{"id":48580,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/48505\/revisions\/48580"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/48523"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=48505"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=48505"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=48505"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}