{"id":51664,"date":"2016-03-16T09:20:24","date_gmt":"2016-03-16T16:20:24","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=51664"},"modified":"2016-05-24T11:34:40","modified_gmt":"2016-05-24T18:34:40","slug":"type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/","title":{"rendered":"Type a URL Wrong, and You Might End up with Malware on Your Mac"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-51739\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/om-url-typosquatting-malware.jpeg\" alt=\".OM URL Typosquatting Malware\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/om-url-typosquatting-malware.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/om-url-typosquatting-malware-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/om-url-typosquatting-malware-300x150.jpeg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>You may never get to visit the Middle Eastern country of Oman, but all it takes is a slip of the fingers to find your browser is visiting a &#8220;.om&#8221; website rather than a &#8220;.com.&#8221;<\/p>\n<p>Do keyboard fumbles like this matter? Well, yes they do if it results in you visiting a webpage that has been set up by typosquatting opportunists \u2014 particularly if their plan is to trick you into installing adware or malware onto your computer.<\/p>\n<p>Security researchers at Endgame have <a title=\"Link to Endgame blog post\" href=\"https:\/\/www.endgame.com\/blog\/what-does-oman-house-cards-and-typosquatting-have-common-om-domain-and-dangers-typosquatting\" target=\"_blank\" rel=\"nofollow\">uncovered 319 .om websites<\/a> that appear to have been set up with the deliberate intention of displaying ads, promoting scams and spreading the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/genieo\/\" target=\"_blank\">Genieo family of malware<\/a>.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-51667\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/fake-flash-player-download.jpeg\" alt=\"Fake Flash Player Update\" width=\"500\" height=\"328\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/fake-flash-player-download.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/fake-flash-player-download-150x99.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/fake-flash-player-download-300x197.jpeg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/fake-flash-player-download-305x200.jpeg 305w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Included in the long list of dodgy .om websites are the likes of netflix.om, reddit.om, nike.om, paypal.om, tumblr.om and youtube.om.<\/p>\n<p>Through a series of redirects, users who visit one of these .om websites can find themselves ultimately taken to a fake Flash Updater webpage, that attempts to trick the unwary into downloading malicious code onto their computers.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-51670\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/fake-flash-instructions.jpeg\" alt=\"Fake Flash Player Instructions\" width=\"500\" height=\"152\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/fake-flash-instructions.jpeg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/fake-flash-instructions-150x46.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/fake-flash-instructions-300x91.jpeg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Once in place, Genieo&#8217;s adware gets its teeth into your web browser, installing itself as an extension, meddling with your browser settings, changing your browser&#8217;s home page, and injecting unwanted advertising and online surveys, all in an attempt to generate revenue.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/antivirus-internet-security-x8\" target=\"_blank\">Intego VirusBarrier<\/a> already protects users against the Genieo malware family under a number of variants (<strong>OSX\/Genieo<\/strong>, <strong>OSX\/Genieo.B<\/strong>, and so forth).<\/p>\n<p>And, as Intego\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/another-problematic-softonic-installer-brings-adware\/\" target=\"_blank\">reported before<\/a>, this is not the first time that Genieo has been distributed via fake Flash updates, or <a href=\"https:\/\/www.intego.com\/mac-security-blog\/another-sketchy-genieo-installer-discovered\/\" target=\"_blank\">used a variety of tricks<\/a> to lull\u00a0users into installing it onto their Mac computers.<\/p>\n<p>As always, keep your wits about you; always download software from legitimate sites, and ensure your Mac anti-virus is updated. Taking precautionary steps and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/15-mac-hardening-security-tips-to-protect-your-privacy\/\" target=\"_blank\">adding extra layers of security<\/a>\u00a0goes a long way to protecting your Mac from being infected by nuisances like this.<\/p>\n<p>Furthermore, if you run a website and are concerned that someone might grab your .om domain in order to take advantage of your brand and exploit your customers, you should consider snapping it up first as a preventative measure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>All it takes is a slip of the fingers to find your browser is visiting a &#8220;.om&#8221; website rather than a &#8220;.com,&#8221; and you might end up with malware on your Mac.<\/p>\n","protected":false},"author":34,"featured_media":51703,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190,151],"tags":[323,475,2839],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"All it takes is a slip of the fingers to find your browser is visiting a &quot;.om&quot; website rather than a &quot;.com,&quot; and you might end up with malware on your Mac.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Type a URL Wrong, and You Might End up with Malware on Your Mac - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"All it takes is a slip of the fingers to find your browser is visiting a &quot;.om&quot; website rather than a &quot;.com,&quot; and you might end up with malware on your Mac.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-16T16:20:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-05-24T18:34:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Genieo-adware-typo-squatting.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Graham Cluley\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Genieo-adware-typo-squatting.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Genieo-adware-typo-squatting.jpg\",\"width\":400,\"height\":260,\"caption\":\"Genieo Adware Typosquatting\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/\",\"name\":\"Type a URL Wrong, and You Might End up with Malware on Your Mac - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#primaryimage\"},\"datePublished\":\"2016-03-16T16:20:24+00:00\",\"dateModified\":\"2016-05-24T18:34:40+00:00\",\"description\":\"All it takes is a slip of the fingers to find your browser is visiting a \\\".om\\\" website rather than a \\\".com,\\\" and you might end up with malware on your Mac.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Type a URL Wrong, and You Might End up with Malware on Your Mac\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\"},\"headline\":\"Type a URL Wrong, and You Might End up with Malware on Your Mac\",\"datePublished\":\"2016-03-16T16:20:24+00:00\",\"dateModified\":\"2016-05-24T18:34:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#webpage\"},\"wordCount\":368,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Genieo-adware-typo-squatting.jpg\",\"keywords\":[\"Adware\",\"Genieo\",\"Typosquatting\"],\"articleSection\":[\"Malware\",\"Recommended\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2\",\"name\":\"Graham Cluley\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g\",\"caption\":\"Graham Cluley\"},\"description\":\"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \\\"10 Greatest Britons in IT History\\\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.\",\"sameAs\":[\"https:\/\/grahamcluley.com\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"All it takes is a slip of the fingers to find your browser is visiting a \".om\" website rather than a \".com,\" and you might end up with malware on your Mac.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/","og_locale":"en_US","og_type":"article","og_title":"Type a URL Wrong, and You Might End up with Malware on Your Mac - The Mac Security Blog","og_description":"All it takes is a slip of the fingers to find your browser is visiting a \".om\" website rather than a \".com,\" and you might end up with malware on your Mac.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-03-16T16:20:24+00:00","article_modified_time":"2016-05-24T18:34:40+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Genieo-adware-typo-squatting.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Graham Cluley","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Genieo-adware-typo-squatting.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Genieo-adware-typo-squatting.jpg","width":400,"height":260,"caption":"Genieo Adware Typosquatting"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/","name":"Type a URL Wrong, and You Might End up with Malware on Your Mac - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#primaryimage"},"datePublished":"2016-03-16T16:20:24+00:00","dateModified":"2016-05-24T18:34:40+00:00","description":"All it takes is a slip of the fingers to find your browser is visiting a \".om\" website rather than a \".com,\" and you might end up with malware on your Mac.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Type a URL Wrong, and You Might End up with Malware on Your Mac"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2"},"headline":"Type a URL Wrong, and You Might End up with Malware on Your Mac","datePublished":"2016-03-16T16:20:24+00:00","dateModified":"2016-05-24T18:34:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#webpage"},"wordCount":368,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Genieo-adware-typo-squatting.jpg","keywords":["Adware","Genieo","Typosquatting"],"articleSection":["Malware","Recommended"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/type-a-url-wrong-and-you-might-end-up-with-malware-on-your-mac\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/4bb722788ecdbd86fde47a5cf256bde2","name":"Graham Cluley","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa9ea0686c5d1aa9086d4b12c3aa05f2?s=96&d=mm&r=g","caption":"Graham Cluley"},"description":"Graham Cluley is an award-winning security blogger, researcher and public speaker. He has been working in the computer security industry since the early 1990s, having been employed by companies such as Sophos, McAfee and Dr Solomon's. He has given talks about computer security for some of the world's largest companies, worked with law enforcement agencies on investigations into hacking groups, and regularly appears on TV and radio explaining computer security threats. Graham Cluley was inducted into the InfoSecurity Europe Hall of Fame in 2011, and was given an honorary mention in the \"10 Greatest Britons in IT History\" for his contribution as a leading authority in internet security. Follow him on Twitter at @gcluley.","sameAs":["https:\/\/grahamcluley.com\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/graham-cluley\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/03\/Genieo-adware-typo-squatting.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-dri","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51664"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=51664"}],"version-history":[{"count":20,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51664\/revisions"}],"predecessor-version":[{"id":51841,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/51664\/revisions\/51841"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/51703"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=51664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=51664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=51664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}