{"id":49381,"date":"2016-01-20T13:08:54","date_gmt":"2016-01-20T21:08:54","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=49381"},"modified":"2016-01-20T13:08:54","modified_gmt":"2016-01-20T21:08:54","slug":"patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/","title":{"rendered":"Patch Now to Stay Secure: OS X El Capitan 10.11.3 and Security Update 2016-001 Released"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-42682\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/El-Capitan-Header.jpg\" alt=\"OS X El Capitan logo on desktop background image\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/El-Capitan-Header.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/El-Capitan-Header-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/06\/El-Capitan-Header-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Apple has released OS X El Capitan 10.11.3, its\u00a0first public update in 2016 and the third major update for El Capitan since the operating system was released, and\u00a0Security Update 2016-001 to patch a number of vulnerabilities in the software.<\/p>\n<p>Security Update 2016-001 is\u00a0available for\u00a0OS X Mavericks 10.9.5, OS X Yosemite 10.10.5, and OS X El Capitan 10.11 to 10.11.2.<\/p>\n<p>According to Apple, generally speaking, here&#8217;s what&#8217;s new in OS X El Capitan 10.11.3:<\/p>\n<blockquote><p>The OS X El Captian 10.11.3 update improves the stability, compatibility, and security of your Mac. This update contains bug fixes and security updates.<\/p><\/blockquote>\n<p>The update patches lingering bugs and performance issues hanging out in the Mac operating system, but, unfortunately,\u00a0Apple still hasn&#8217;t provided a full fix for the Gatekeeper flaws\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-fails-to-properly-fix-gatekeeper-security-hole-claims-researcher\/\" target=\"_blank\">detailed by security researcher Patrick Wardle<\/a>\u00a0last week.<\/p>\n<p>OS X El Capitan 10.11.3 and Security Update 2016-001 addresses the following vulnerabilities:<\/p>\n<ul>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1716\" target=\"_blank\">CVE-2016-1716<\/a> : A local user may be able to execute arbitrary code with kernel privileges. A memory corruption issue was addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1717\" target=\"_blank\">CVE-2016-1717<\/a> : A local user may be able to execute arbitrary code with kernel privileges. A memory corruption issue existed in the parsing of disk images. This issue was addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1718\" target=\"_blank\">CVE-2016-1718<\/a> : A local user may be able to execute arbitrary code with kernel privileges. A memory corruption issue was addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1719\" target=\"_blank\">CVE-2016-1719<\/a> : A local user may be able to execute arbitrary code with kernel privileges. A memory corruption issue existed in an IOHIDFamily\u00a0API. This issue was addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1720\" target=\"_blank\">CVE-2016-1720<\/a> : A local user may be able to execute arbitrary code with kernel privileges. A memory corruption issue was addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1721\" target=\"_blank\">CVE-2016-1721<\/a> : A local user may be able to execute arbitrary code with kernel privileges. A memory corruption issue was addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-7995\" target=\"_blank\">CVE-2015-7995<\/a> : Visiting a maliciously crafted website may lead to arbitrary code execution. A type confusion issue existed in libxslt. This issue was addressed through improved memory handling.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1729\" target=\"_blank\">CVE-2016-1729<\/a> : A quarantined application may be able to override OSA script libraries installed by the user. An issue existed when searching for scripting libraries. This issue was addressed through improved search order and quarantine checks.<\/li>\n<li><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-1722\" target=\"_blank\">CVE-2016-1722<\/a> : A local user may be able to execute arbitrary code with root Privileges. A memory corruption issue was addressed through improved memory handling.<\/li>\n<\/ul>\n<p>Before updating, it&#8217;s a good idea to <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-personal-backup-compared-with-apples-time-machine\/\" target=\"_blank\">back up your Mac<\/a> in case disaster strikes. Then you\u00a0can head over to the Mac App Store and search for El Capitan, or <a href=\"http:\/\/appstore.com\/mac\/osxelcapitan\" target=\"_blank\">go directly to the El Capitan page<\/a>\u00a0to install the latest updates.<\/p>\n<p><em><strong>Have you discovered something new you like in the software or experienced any issues after updating? Drop us a comment below!<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has released OS X El Capitan 10.11.3, its\u00a0first public update in 2016 and the third major update for El Capitan since the operating system was released, and\u00a0Security Update 2016-001 to patch a number of vulnerabilities in the software. Security Update 2016-001 is\u00a0available for\u00a0OS X Mavericks 10.9.5, OS X Yosemite 10.10.5, and OS X El [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":8813,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,2644,2647,143],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has released OS X El Capitan 10.11.3, its\u00a0first public update in 2016 and the third major update for El Capitan since the operating system was\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Patch Now to Stay Secure: OS X El Capitan 10.11.3 and Security Update 2016-001 Released - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has released OS X El Capitan 10.11.3, its\u00a0first public update in 2016 and the third major update for El Capitan since the operating system was\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-01-20T21:08:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"width\":\"400\",\"height\":\"260\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/\",\"name\":\"Patch Now to Stay Secure: OS X El Capitan 10.11.3 and Security Update 2016-001 Released - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#primaryimage\"},\"datePublished\":\"2016-01-20T21:08:54+00:00\",\"dateModified\":\"2016-01-20T21:08:54+00:00\",\"description\":\"Apple has released OS X El Capitan 10.11.3, its\\u00a0first public update in 2016 and the third major update for El Capitan since the operating system was\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Patch Now to Stay Secure: OS X El Capitan 10.11.3 and Security Update 2016-001 Released\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Patch Now to Stay Secure: OS X El Capitan 10.11.3 and Security Update 2016-001 Released\",\"datePublished\":\"2016-01-20T21:08:54+00:00\",\"dateModified\":\"2016-01-20T21:08:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#webpage\"},\"wordCount\":474,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg\",\"keywords\":[\"Apple\",\"OS X El Capitan 10.11.3\",\"Security Update 2016-001\",\"Vulnerabilities\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has released OS X El Capitan 10.11.3, its\u00a0first public update in 2016 and the third major update for El Capitan since the operating system was","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/","og_locale":"en_US","og_type":"article","og_title":"Patch Now to Stay Secure: OS X El Capitan 10.11.3 and Security Update 2016-001 Released - The Mac Security Blog","og_description":"Apple has released OS X El Capitan 10.11.3, its\u00a0first public update in 2016 and the third major update for El Capitan since the operating system was","og_url":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-01-20T21:08:54+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","width":"400","height":"260"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/","name":"Patch Now to Stay Secure: OS X El Capitan 10.11.3 and Security Update 2016-001 Released - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#primaryimage"},"datePublished":"2016-01-20T21:08:54+00:00","dateModified":"2016-01-20T21:08:54+00:00","description":"Apple has released OS X El Capitan 10.11.3, its\u00a0first public update in 2016 and the third major update for El Capitan since the operating system was","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Patch Now to Stay Secure: OS X El Capitan 10.11.3 and Security Update 2016-001 Released"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Patch Now to Stay Secure: OS X El Capitan 10.11.3 and Security Update 2016-001 Released","datePublished":"2016-01-20T21:08:54+00:00","dateModified":"2016-01-20T21:08:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#webpage"},"wordCount":474,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","keywords":["Apple","OS X El Capitan 10.11.3","Security Update 2016-001","Vulnerabilities"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/patch-now-to-stay-secure-osx-el-capitan-10-11-3-and-security-update-2016-001-released\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/11\/apple-icon.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cQt","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49381"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=49381"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49381\/revisions"}],"predecessor-version":[{"id":49405,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49381\/revisions\/49405"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8813"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=49381"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=49381"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=49381"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}