{"id":49864,"date":"2016-02-16T07:20:00","date_gmt":"2016-02-16T15:20:00","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=49864"},"modified":"2016-03-01T08:28:31","modified_gmt":"2016-03-01T16:28:31","slug":"the-state-of-mac-security-in-2016","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/","title":{"rendered":"The State of Mac Security in 2016"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-50023\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-osx-security-address.jpg\" alt=\"State of Mac Security 2016\" width=\"600\" height=\"355\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-osx-security-address.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-osx-security-address-150x89.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-osx-security-address-300x178.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>In the beginning, Macs were perceived as impenetrable and inherently secure machines that held a reputation besting its rival Windows operating system. For years, Apple was revered for creating one of the safest platforms in existence as OS X maintained a fa\u00e7ade of invincibility. But on this day 10 years ago, Intego announced the discovery of what is considered the first major Trojan horse in history to target Mac OS X. And so, you may be wondering a few things, for instance, how is the vulnerability of Macs perceived today? Is the overall threat landscape different now compared to the early days of Mac OS X? And what the heck can savvy Mac users do to protect themselves?<\/p>\n<p>These are all good questions that we&#8217;ll clear up, explaining how we got to the current state of Mac security in 2016, and also offering some tips how you can protect your Mac against highly-motivated hackers and malware writers targeting OS X.<\/p>\n<h3>Old Myths Die Hard<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-41209\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/spyhole-170.jpeg\" alt=\"Spying\" width=\"170\" height=\"200\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/spyhole-170.jpeg 170w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/05\/spyhole-170-127x150.jpeg 127w\" sizes=\"(max-width: 170px) 100vw, 170px\" \/>Among a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/5-more-mac-malware-myths-and-misconceptions\/\" target=\"_blank\">variety of misconceptions about malware<\/a>, the most common myth is that \u201cMacs can\u2019t get viruses.\u201d However,\u00a0there really is no period of time in which this statement has ever been true.<\/p>\n<p>Since the dawn of Apple, every Mac OS has had some manner of virus or worm.\u00a0Elk Cloner, the very first Mac virus to be discovered in the wild, was written specifically for Apple DOS 3.3. In the 1990&#8217;s, Word macro viruses were the most prevalent and dangerous of all Mac viruses. (There have been macro viruses capable of spreading on Macs as long as people have used MS Office on Macs.) The first OS X specific worm was discovered by Intego in 2006, so Mac malware does\u00a0indeed exist. But it took many years for people to\u00a0fully\u00a0grasp this reality\u2014a realization that didn&#8217;t come to fruition\u00a0overnight.<\/p>\n<p>Of course, Apple added fuel to the frenzy with a clever marketing ploy that ultimately put its user-base in a lull. It\u2019s hard to forget those \u201c<a href=\"https:\/\/www.youtube.com\/watch?v=VuqZ8AqmLPY\" target=\"_blank\">I\u2019m a PC, I\u2019m a Mac<\/a>\u201d commercials in which Apple claimed that only PCs have a malware problem, and that Macs don\u2019t.<\/p>\n<p>And the seeds of security complacency were sowed; disaster lurked on the horizon.<\/p>\n<div id=\"attachment_49981\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-49981\" loading=\"lazy\" class=\"wp-image-49981 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-osx-security-commercial.jpg\" alt=\"I'm a PC I'm a Mac Security Check\" width=\"500\" height=\"325\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-osx-security-commercial.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-osx-security-commercial-150x98.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-osx-security-commercial-300x195.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-osx-security-commercial-400x260.jpg 400w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><p id=\"caption-attachment-49981\" class=\"wp-caption-text\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/jlloya\/513134349\/\">joseloya<\/a> via <a href=\"http:\/\/photopin.com\">photopin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by\/2.0\/\">cc<\/a><\/p><\/div>\n<p>Although Apple has since changed its tune\u2014no longer touting Macs as &#8220;virus free&#8221;\u2014the campaign was nonetheless very successful, and even today the false perception of security lingers.<\/p>\n<p>Until recently, however, there was some truth to this perception: OS X faced significantly less risk of cyber attack than Windows. After all, with the release of Mac OS X 10.0 in March 2001, Apple\u2019s new operating system meant that much of the old Mac malware from the 80\u2019s and 90\u2019s would no longer be capable of running.<\/p>\n<p>With Mac OS X 10.0, five years would pass before the first major malware hit Macs. Due mostly in part to the lack of attention from hackers, Mac systems benefited for the better part of a decade, but as we entered the 21st century that all changed.<\/p>\n<h3>Intego Jumps to Action, Fills a Void in Mac Security<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-50032\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-founded-1997.png\" alt=\"Intego Founded in 1997\" width=\"420\" height=\"250\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-founded-1997.png 420w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-founded-1997-150x89.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-founded-1997-300x179.png 300w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/><\/p>\n<p>Intego made headway into the Mac market in 1997, becoming the first and <a href=\"https:\/\/www.intego.com\/intego-built-for-mac\" target=\"_blank\">only anti-virus firm to build security software exclusively for Mac<\/a>, focusing solely on protecting Macintosh computers.<\/p>\n<p>The writing was on the wall, but only Intego seemed to be\u00a0reading it: All Macs connecting to the Internet are susceptible to security problems with no exceptions.<\/p>\n<p>In a world where using the Internet exposes your computer to hackers, vandals and viruses, Intego realized the need for efficient security solutions that not only protect your Mac, but also give you peace of mind. And so a collection of highly-motivated engineers and other Mac experts founded Intego to fill a void in the security industry.<\/p>\n<p><img loading=\"lazy\" class=\"alignright wp-image-49951 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-netbarrier-1.0.jpg\" alt=\"Intego NetBarrier 1.0\" width=\"81\" height=\"100\" \/>Intego went on to become the first anti-virus company in the world to offer a personal firewall for Macintosh, releasing <a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8#netbarrier-x8\" target=\"_blank\">Intego NetBarrier<\/a> to provide <a href=\"https:\/\/www.intego.com\/mac-security-blog\/whats-the-difference-between-incoming-and-outgoing-firewall-protection\/\" target=\"_blank\">incoming and outgoing firewall protection<\/a> when using a wireless network, which stops hackers in their tracks. The company was also the first to offer native Mac OS X (Cocoa) security solutions:<\/p>\n<ul>\n<li>October 1997, Intego is founded and releases Rival anti-virus for Mac<\/li>\n<li>July 1999, Intego releases NetBarrier\u00a0at the Macworld Expo in New York<\/li>\n<li>June 2000, Intego releases VirusBarrier<\/li>\n<li>By 2004, Intego is the world leader in Mac security with over 1 million users in 65 countries<\/li>\n<\/ul>\n<h3>The Lull Before the Storm<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-50044\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/malware-storm.jpg\" alt=\"Malware Storm\" width=\"500\" height=\"291\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/malware-storm.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/malware-storm-150x87.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/malware-storm-300x175.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Between the time Intego was founded and 2006, most discovered threats were related to vulnerabilities in Mac OS. For instance, in January 2000, a flaw was discovered in port 49152 of Mac OS 9\u2019s security. If a hacker sent a package with a zero length data field on a Mac running Mac OS 9, the Mac would freeze instantly.<\/p>\n<p>Another example was found in 2001: engineers at <a href=\"http:\/\/www.isaac.cs.berkeley.edu\/isaac\/wep-faq.html\" target=\"_blank\">Berkeley University discovered<\/a> that the Wired Equivalent Privacy (WEP) algorithm, which is part of the 802.11 standard (used by Apple AirPort networks) contained a flaw, and was vulnerable to hacker attacks. Apple\u2019s AirPort wireless networking is an extremely useful technology, but like many network protocols, there are ways for hackers to get in. For this reason, the researchers recommended &#8220;anyone using an 802.11 wireless network not rely on WEP for security, and employ other security measures to protect their wireless network.&#8221;<\/p>\n<h3>First Major Malware Hits Macs<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-49963\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-discovers-first-osx-trojan-horse.png\" alt=\"Intego Discovers the First Mac OS X Trojan Horse\" width=\"475\" height=\"315\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-discovers-first-osx-trojan-horse.png 475w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-discovers-first-osx-trojan-horse-150x99.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/intego-discovers-first-osx-trojan-horse-300x199.png 300w\" sizes=\"(max-width: 475px) 100vw, 475px\" \/><br \/>\nIronically, the very ads that helped boost Apple\u2019s sales of Macintosh computers may have also put the operating system in the crosshairs of cyber-criminals\u2014resulting in a new rise of Mac OS X malware. Sophisticated <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/mac-malware\/\" target=\"_blank\">Mac malware<\/a> began to surface following years of rapid OS X market share gains, with Apple owning\u00a012 percent of the laptop market share in 2006, <a href=\"http:\/\/arstechnica.com\/apple\/2006\/07\/4753\/\" target=\"_blank\">according to Ars Technica<\/a>.<\/p>\n<p>On February 16, 2006\u2014ten years ago today\u2014Intego\u2019s Malware Research Team discovered the first Trojan horse targeting OS X.\u00a0We called it Oompa-Loompa, and <a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego VirusBarrier<\/a>\u00a0detects the malware as\u00a0OSX\/Oomp.A.<\/p>\n<p><strong>INFOGRAPHIC: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/10-years-of-mac-malware-how-os-x-threats-have-evolved\/\" target=\"_blank\">10 Years of Mac Malware\u2014How OS X Threats Have Evolved<\/a><\/strong><\/p>\n<p>Over the next ten years, malware writers began targeting Mac\u00a0OS X\u00a0more and more, shattering the Mac&#8217;s fa\u00e7ade of invincibility.\u00a0As a result, attitudes have changed; even the most optimistic Mac user realizes that OS X security must now be a paramount concern.<\/p>\n<p>Malware is one problem, but there are many reasons why you need to protect your Mac, including:<\/p>\n<ul>\n<li>Many types of malware threaten Macs and are becoming more common: Trojan horses, macro viruses, worms, spyware, and more<\/li>\n<li>Security flaws are regularly found in Mac OS X, providing malware writers with opportunities to attack Macs<\/li>\n<li>Users who exchange files often with friends and colleagues face increased risks<\/li>\n<li>Booby-trapped web pages can infect your Mac when you simply visit infected web sites<\/li>\n<li>Children need protection from adult content on the web<\/li>\n<li>Your personal files need to be protected in case of loss due to software or hardware problems<\/li>\n<li>You have confidential files that need to be protected from hackers and prying eyes<\/li>\n<\/ul>\n<h3>The State of Mac Security<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-49948\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-osx-security-trends-2016.jpg\" alt=\"Mac OS X Security Trends 2016\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-osx-security-trends-2016.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-osx-security-trends-2016-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-osx-security-trends-2016-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The sky is blue, the sun rises in the east, and a trusted Mac security solution is a must have in 2016. So, are you doing <a href=\"https:\/\/www.intego.com\/mac-security-blog\/15-mac-hardening-security-tips-to-protect-your-privacy\/\" target=\"_blank\">everything you can to protect your Mac<\/a>?<\/p>\n<p>To prevent malware attacks, you will need to start making the same amount of effort to protect your Mac that users of other operating systems must do to keep themselves safe. This may not be a fun activity, but these threats are realities Mac users face today and you&#8217;ll thank yourself later for taking action before disaster strikes.\u00a0At Intego, we routinely recommend that a <a href=\"https:\/\/www.intego.com\/company\/infographic\/layers-of-protection\" target=\"_blank\">multi-layered approach to security<\/a>\u00a0is the best form of defense against all types of threats.<\/p>\n<p>In the end, there is no short supply of bad guys\u2014motivated hackers who will take the challenge if it means the reward is the ability to steal money from people\u2014and there\u2019s no question that they will make every effort possible to penetrate your Mac&#8217;s fortifications (especially since this user base tends to be more complacent about security in general).<\/p>\n<p>And Intego is proud to lead the way and help you stay one step ahead of the bad guys.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the beginning, Macs were perceived as impenetrable and inherently secure machines that held a reputation besting its rival Windows operating system. For years, Apple was revered for creating one of the safest platforms in existence as OS X maintained a fa\u00e7ade of invincibility. But on this day 10 years ago, Intego announced the discovery [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":50269,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,3,151,13],"tags":[2680,80,199],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"In the beginning, Macs were perceived as impenetrable and inherently secure machines that held a reputation besting its rival Windows operating system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The State of Mac Security in 2016 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"In the beginning, Macs were perceived as impenetrable and inherently secure machines that held a reputation besting its rival Windows operating system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-16T15:20:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-03-01T16:28:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-security-2016.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-security-2016.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-security-2016.jpg\",\"width\":400,\"height\":260,\"caption\":\"State of Mac Security 2016\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/\",\"name\":\"The State of Mac Security in 2016 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#primaryimage\"},\"datePublished\":\"2016-02-16T15:20:00+00:00\",\"dateModified\":\"2016-03-01T16:28:31+00:00\",\"description\":\"In the beginning, Macs were perceived as impenetrable and inherently secure machines that held a reputation besting its rival Windows operating system.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The State of Mac Security in 2016\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"The State of Mac Security in 2016\",\"datePublished\":\"2016-02-16T15:20:00+00:00\",\"dateModified\":\"2016-03-01T16:28:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#webpage\"},\"wordCount\":1361,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-security-2016.jpg\",\"keywords\":[\"2016\",\"Mac OS X\",\"Mac Security\"],\"articleSection\":[\"Apple\",\"Intego\",\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"In the beginning, Macs were perceived as impenetrable and inherently secure machines that held a reputation besting its rival Windows operating system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/","og_locale":"en_US","og_type":"article","og_title":"The State of Mac Security in 2016 - The Mac Security Blog","og_description":"In the beginning, Macs were perceived as impenetrable and inherently secure machines that held a reputation besting its rival Windows operating system.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-02-16T15:20:00+00:00","article_modified_time":"2016-03-01T16:28:31+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-security-2016.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-security-2016.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-security-2016.jpg","width":400,"height":260,"caption":"State of Mac Security 2016"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/","name":"The State of Mac Security in 2016 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#primaryimage"},"datePublished":"2016-02-16T15:20:00+00:00","dateModified":"2016-03-01T16:28:31+00:00","description":"In the beginning, Macs were perceived as impenetrable and inherently secure machines that held a reputation besting its rival Windows operating system.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The State of Mac Security in 2016"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"The State of Mac Security in 2016","datePublished":"2016-02-16T15:20:00+00:00","dateModified":"2016-03-01T16:28:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#webpage"},"wordCount":1361,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-security-2016.jpg","keywords":["2016","Mac OS X","Mac Security"],"articleSection":["Apple","Intego","Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/02\/mac-security-2016.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cYg","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49864"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=49864"}],"version-history":[{"count":64,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49864\/revisions"}],"predecessor-version":[{"id":51247,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/49864\/revisions\/51247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/50269"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=49864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=49864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=49864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}