	{"id":54169,"date":"2016-06-17T15:01:07","date_gmt":"2016-06-17T22:01:07","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=54169"},"modified":"2016-06-17T15:08:00","modified_gmt":"2016-06-17T22:08:00","slug":"before-the-weekend-update-flash-player-office-for-mac","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/","title":{"rendered":"Before the Weekend: Update Flash Player, Office for Mac"},"content":{"rendered":"<p>Online threats capitalize on software vulnerabilities, so it\u2019s best to patch known holes as quickly as possible. This means installing Apple\u2019s and other third-party software security updates promptly.<\/p>\n<p>Before heading\u00a0into the weekend, there are two very important security updates you should be aware of and install immediately. First is for Adobe Flash Player, and the other for Microsoft\u2019s Office for Mac.<\/p>\n<h3>Adobe Update: Flash Player 22.0.0.192<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-54181\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/Adobe-Flash-Player-22.0.0.192.png\" alt=\"Adobe Flash Player 22.0.0.192\" width=\"763\" height=\"446\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/Adobe-Flash-Player-22.0.0.192.png 763w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/Adobe-Flash-Player-22.0.0.192-150x88.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/Adobe-Flash-Player-22.0.0.192-300x175.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/Adobe-Flash-Player-22.0.0.192-657x384.png 657w\" sizes=\"(max-width: 763px) 100vw, 763px\" \/><\/p>\n<p>Adobe Systems has released Flash Player 22.0.0.192 with security updates to patch multiple vulnerabilities, most of which could lead to arbitrary code execution, as well as a fix for the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/adobe-flash-alert-0-day-exploit-for-vulnerability-in-the-wild\/\" target=\"_blank\">zero-day exploit<\/a> reported on Tuesday.<\/p>\n<p>Adobe software affected by this updates includes the following:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-54187\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/adobe-affected-software-apsb16-18.png\" alt=\"adobe affected software apsb16-18\" width=\"680\" height=\"200\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/adobe-affected-software-apsb16-18.png 680w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/adobe-affected-software-apsb16-18-150x44.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/adobe-affected-software-apsb16-18-300x88.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/adobe-affected-software-apsb16-18-657x193.png 657w\" sizes=\"(max-width: 680px) 100vw, 680px\" \/><\/p>\n<p>For those interested in the full list of vulnerabilities patched with these updates, see Adobe\u2019s security bulletin (<a href=\"https:\/\/helpx.adobe.com\/security\/products\/flash-player\/apsb16-18.html\" target=\"_blank\">APSB16-18<\/a>).<\/p>\n<p>Macintosh and Windows users running Adobe Flash Player Desktop Runtime should update your software to <strong><a href=\"https:\/\/get.adobe.com\/flashplayer\/\" target=\"_blank\">Flash Player 22.0.0.192<\/a><\/strong> (17.7 MB) as soon as possible, and Linux users should update to Flash Player 11.2.202.626. Adobe Flash Player installed with Google Chrome will be automatically updated to the latest version, which will include Adobe Flash Player 22.0.0.192 for Windows, Mac, Linux and Chrome OS.<\/p>\n<h3>Microsoft Update: Office for Mac 2011 14.6.5<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-54193\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/Office-2011-14.6.5-Update.png\" alt=\"Office 2011 14.6.5 Update\" width=\"650\" height=\"495\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/Office-2011-14.6.5-Update.png 650w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/Office-2011-14.6.5-Update-150x114.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/06\/Office-2011-14.6.5-Update-300x228.png 300w\" sizes=\"(max-width: 650px) 100vw, 650px\" \/><\/p>\n<p>Microsoft has released security patches\u00a0with the updated Office for Mac 2011 14.6.5, resolving vulnerabilities in Microsoft Office that could allow remote code execution if a user opens a specially crafted Office file.<\/p>\n<p>Microsoft also released updates for Office 2016 for Mac, which includes fixes for issues in the Office 2016 for Mac Suite that affect versions of Word, Excel, and PowerPoint.<\/p>\n<p>According to Microsoft\u2019s security team, these updates correct a critical vulnerability and users should install the security patches as soon as possible. Microsoft <a href=\"https:\/\/technet.microsoft.com\/library\/security\/MS16-070?f=255&amp;MSPPError=-2147217396\" target=\"_blank\">said<\/a>:<\/p>\n<blockquote><p>\u201cThe most severe of the vulnerabilities could allow remote code execution if a user opens a specially crafted Microsoft Office file. An attacker who successfully exploited the vulnerabilities could run arbitrary code in the context of the current user. Customers whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.\u201d<\/p><\/blockquote>\n<p>Common Vulnerabilities and Exposures identifies the vulnerability as follows:<\/p>\n<blockquote><p><a href=\"http:\/\/www.cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-0025\" target=\"_blank\">CVE-2016-0025<\/a>: Microsoft Word 2007 SP3, Office 2010 SP2, Word 2010 SP2, Word 2013 SP1, Word 2013 RT SP1, Office 2016, Word 2016, Word for Mac 2011, Word 2016 for Mac, Office Compatibility Pack SP3, Word Automation Services on SharePoint Server 2010 SP2, Word Automation Services on SharePoint Server 2013 SP1, Office Web Apps 2010 SP2, Office Web Apps Server 2013 SP1, and Office Online Server allow remote attackers to execute arbitrary code via a crafted Office document, aka &#8220;Microsoft Office Memory Corruption Vulnerability.&#8221;<\/p><\/blockquote>\n<p>Microsoft addressed the vulnerability by correcting how Office handles objects in memory. Office for Mac users should install the update at your earliest convenience.<\/p>\n<p><strong>Office for Mac 2011<\/strong> users can update your software by using Microsoft\u2019s AutoUpdate application, or by visiting the Microsoft Download Center to <a href=\"https:\/\/www.microsoft.com\/en-us\/download\/details.aspx?id=52948\" target=\"_blank\">download and install Office for Mac 2011 14.6.5<\/a> (113.4 MB).<\/p>\n<p><strong>Office 2016 for Mac<\/strong> users can get the updates by using Microsoft AutoUpdate. To do this, open a Microsoft Office program, and then click \u201cCheck for Updates\u201d on the Help menu.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online threats capitalize on software vulnerabilities, so it\u2019s best to patch known holes as quickly as possible. This means installing Apple\u2019s and other third-party software security updates promptly. Before heading\u00a0into the weekend, there are two very important security updates you should be aware of and install immediately. First is for Adobe Flash Player, and the [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":11701,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[15,2965,87,2968,2857,958],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Online threats capitalize on software vulnerabilities, so it\u2019s best to patch known holes as quickly as possible. This means installing Apple\u2019s and other\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Before the Weekend: Update Flash Player, Office for Mac - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Online threats capitalize on software vulnerabilities, so it\u2019s best to patch known holes as quickly as possible. This means installing Apple\u2019s and other\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-17T22:01:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-06-17T22:08:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Software Update\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/\",\"name\":\"Before the Weekend: Update Flash Player, Office for Mac - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#primaryimage\"},\"datePublished\":\"2016-06-17T22:01:07+00:00\",\"dateModified\":\"2016-06-17T22:08:00+00:00\",\"description\":\"Online threats capitalize on software vulnerabilities, so it\\u2019s best to patch known holes as quickly as possible. This means installing Apple\\u2019s and other\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Before the Weekend: Update Flash Player, Office for Mac\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Before the Weekend: Update Flash Player, Office for Mac\",\"datePublished\":\"2016-06-17T22:01:07+00:00\",\"dateModified\":\"2016-06-17T22:08:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#webpage\"},\"wordCount\":514,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg\",\"keywords\":[\"Adobe\",\"Flash Player 22.0.0.192\",\"Microsoft\",\"Office 2011 14.6.5\",\"Office 2016 for Mac\",\"Office for Mac\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Online threats capitalize on software vulnerabilities, so it\u2019s best to patch known holes as quickly as possible. This means installing Apple\u2019s and other","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/","og_locale":"en_US","og_type":"article","og_title":"Before the Weekend: Update Flash Player, Office for Mac - The Mac Security Blog","og_description":"Online threats capitalize on software vulnerabilities, so it\u2019s best to patch known holes as quickly as possible. This means installing Apple\u2019s and other","og_url":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-06-17T22:01:07+00:00","article_modified_time":"2016-06-17T22:08:00+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg","width":"400","height":"260","caption":"Software Update"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/","name":"Before the Weekend: Update Flash Player, Office for Mac - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#primaryimage"},"datePublished":"2016-06-17T22:01:07+00:00","dateModified":"2016-06-17T22:08:00+00:00","description":"Online threats capitalize on software vulnerabilities, so it\u2019s best to patch known holes as quickly as possible. This means installing Apple\u2019s and other","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Before the Weekend: Update Flash Player, Office for Mac"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Before the Weekend: Update Flash Player, Office for Mac","datePublished":"2016-06-17T22:01:07+00:00","dateModified":"2016-06-17T22:08:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#webpage"},"wordCount":514,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg","keywords":["Adobe","Flash Player 22.0.0.192","Microsoft","Office 2011 14.6.5","Office 2016 for Mac","Office for Mac"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/before-the-weekend-update-flash-player-office-for-mac\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/03\/update-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-e5H","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/54169"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=54169"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/54169\/revisions"}],"predecessor-version":[{"id":54211,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/54169\/revisions\/54211"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/11701"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=54169"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=54169"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=54169"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}