{"id":5460,"date":"2012-08-06T13:47:11","date_gmt":"2012-08-06T20:47:11","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=5460"},"modified":"2015-02-04T11:12:58","modified_gmt":"2015-02-04T19:12:58","slug":"4-security-lessons-learned-from-mat-honans-icloud-account-hack","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/","title":{"rendered":"4 Security Lessons Learned from Mat Honan&#8217;s iCloud Account Hack"},"content":{"rendered":"<p style=\"text-align: center;\"><a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/icloud-logo\/\" rel=\"attachment wp-att-5502\"><img loading=\"lazy\" class=\"aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/icloud-logo.jpg\" alt=\"\" width=\"280\" height=\"280\" \/><br \/>\n<\/a><\/p>\n<p>This past week, writer <a href=\"http:\/\/www.emptyage.com\/post\/28679875595\/yes-i-was-hacked-hard\">Mat Honan had the unthinkable happen<\/a>. Someone got into his iCloud account, and they were able to remotely wipe his iPhone, iPad and Macbook Air and delete his Google account that was attached to his iCloud account. The initial assumption was that this happened because the hacker brute-forced his way into Honan\u2019s account. After some further digging, it came to light that the hacker was simply able to use social engineering to trick Apple Support into resetting his password.<\/p>\n<p>As much as we like to trumpet the use of good passwords, this is one instance in which this would not have made a difference. You can use the best password in the world, but if someone can socially engineer you or someone from the site or service itself to reveal your password, it will make no difference. That isn\u2019t to say that strong passwords are not important; <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/secure-passwords\/\">having a strong password<\/a> will protect you against the majority of common attacks. But you should definitely not bet the farm on a password.<\/p>\n<p>There are a number of questions that this brings up, of course:<\/p>\n<ul>\n<li>What can you do to recover from a catastrophic data loss incident?<\/li>\n<li>What can you do to protect yourself against this sort of attack?<\/li>\n<li>What is the likelihood of this happening to me?<\/li>\n<\/ul>\n<p>Honan learned the answer to this first question the hard way: Make regular backups in multiple locations. Do not just rely on the Cloud to store your backups&#8211;websites are not bulletproof, companies go out of business, disasters happen. Honan may recover the accounts that were compromised during this hack, but that is in no way certain in every case. He may not be able to recover the year\u2019s worth of data he hadn\u2019t backed up in another location. (Though he was fortunate that the remote wipe did not complete, so it may not all be lost.)<\/p>\n<p>For the second question, we\u2019ll define the attack as a compromise on any online account that contains a whole lot of your important data; whether that be your contacts, your calendar, entire backups, or selected files, or just links to a lot of your other accounts (social networking, banking, online shopping, etc). This could be iCloud, this could be Google, it could be any number of different services.<\/p>\n<p>We have to assume that you can\u2019t trust the protection of your password alone, as that could be stolen by social engineering or hacking of some other sort. But this is another place where a layered defense strategy comes in handy. We already covered the need to back up your data in multiple places. But what else can you do?<\/p>\n<ol>\n<li><strong>Encrypt as much of the online data as you can.<\/strong>\u00a0This will keep someone breaking into your account from being able to use the data they find.<\/li>\n<li><strong>Seriously consider whether you really need to link accounts.<\/strong>\u00a0Is the convenience of linking your accounts worth the possibility that someone phishing\/hacking into that account would now have access to the linked account? Or would it be preferable to give the hacker one more hurdle to jump over in order to compromise your accounts?<\/li>\n<li><strong>Use two-factor authentication as often as possible.\u00a0<\/strong>This makes it more difficult to gain access to your accounts as it relies not just on what you or the hacker knows (your password), but on something that you have (your phone or a dongle, for instance). This would not have stopped the remote wipe that happened to Honan, but it would have kept his Google account from being deleted.<\/li>\n<li><strong>Use an email address that is not known to others.<\/strong>\u00a0If hackers don&#8217;t know what email address you&#8217;ve used for your account, it makes it harder to socially engineer their way into them.<\/li>\n<\/ol>\n<p>And lastly, how likely is this to happen to you? The exact situation that Honan describes is fairly unlikely. Most of us are in more danger of our devices being stolen than of having someone go to the trouble of gaining access to our important passwords and then destroying the data. This was a very clear case of a targeted attack. And hopefully this is something that Apple will address by strengthening the requirements for remote wipes. You should not be able to destroy your data by an accidental mis-click or two.<\/p>\n<p>As this story is still unfolding, it will be interesting to hear what changes this may bring and how Apple responds to this incident, and whether any more information comes to light about how exactly the hacker conned the support rep into resetting Honan\u2019s password.<\/p>\n<p>What questions do you hope are answered after this incident? Have you gone to Apple\u2019s support for a password reset request? If so, what was your experience?<\/p>\n<p>&nbsp;<\/p>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This past week, writer Mat Honan had the unthinkable happen. Someone got into his iCloud account, and they were able to remotely wipe his iPhone, iPad and Macbook Air and delete his Google account that was attached to his iCloud account. The initial assumption was that this happened because the hacker brute-forced his way into [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":28462,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13],"tags":[1351,1924,353],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This past week, writer Mat Honan had the unthinkable happen. Someone got into his iCloud account, and they were able to remotely wipe his iPhone, iPad and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Security Lessons Learned from Mat Honan&#039;s iCloud Account Hack - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This past week, writer Mat Honan had the unthinkable happen. Someone got into his iCloud account, and they were able to remotely wipe his iPhone, iPad and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-06T20:47:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-02-04T19:12:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/icloud-header.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"325\" \/>\n\t<meta property=\"og:image:height\" content=\"220\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/icloud-header.jpeg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/icloud-header.jpeg\",\"width\":325,\"height\":220},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/\",\"name\":\"4 Security Lessons Learned from Mat Honan's iCloud Account Hack - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#primaryimage\"},\"datePublished\":\"2012-08-06T20:47:11+00:00\",\"dateModified\":\"2015-02-04T19:12:58+00:00\",\"description\":\"This past week, writer Mat Honan had the unthinkable happen. Someone got into his iCloud account, and they were able to remotely wipe his iPhone, iPad and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"4 Security Lessons Learned from Mat Honan&#8217;s iCloud Account Hack\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"4 Security Lessons Learned from Mat Honan&#8217;s iCloud Account Hack\",\"datePublished\":\"2012-08-06T20:47:11+00:00\",\"dateModified\":\"2015-02-04T19:12:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#webpage\"},\"wordCount\":809,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/icloud-header.jpeg\",\"keywords\":[\"iCloud Hack\",\"Mat Honan\",\"Password Security\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This past week, writer Mat Honan had the unthinkable happen. Someone got into his iCloud account, and they were able to remotely wipe his iPhone, iPad and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/","og_locale":"en_US","og_type":"article","og_title":"4 Security Lessons Learned from Mat Honan's iCloud Account Hack - The Mac Security Blog","og_description":"This past week, writer Mat Honan had the unthinkable happen. Someone got into his iCloud account, and they were able to remotely wipe his iPhone, iPad and","og_url":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-08-06T20:47:11+00:00","article_modified_time":"2015-02-04T19:12:58+00:00","og_image":[{"width":325,"height":220,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/icloud-header.jpeg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/icloud-header.jpeg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/icloud-header.jpeg","width":325,"height":220},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/","name":"4 Security Lessons Learned from Mat Honan's iCloud Account Hack - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#primaryimage"},"datePublished":"2012-08-06T20:47:11+00:00","dateModified":"2015-02-04T19:12:58+00:00","description":"This past week, writer Mat Honan had the unthinkable happen. Someone got into his iCloud account, and they were able to remotely wipe his iPhone, iPad and","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"4 Security Lessons Learned from Mat Honan&#8217;s iCloud Account Hack"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"4 Security Lessons Learned from Mat Honan&#8217;s iCloud Account Hack","datePublished":"2012-08-06T20:47:11+00:00","dateModified":"2015-02-04T19:12:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#webpage"},"wordCount":809,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/icloud-header.jpeg","keywords":["iCloud Hack","Mat Honan","Password Security"],"articleSection":["Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/4-security-lessons-learned-from-mat-honans-icloud-account-hack\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/icloud-header.jpeg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1q4","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5460"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=5460"}],"version-history":[{"count":10,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5460\/revisions"}],"predecessor-version":[{"id":5463,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5460\/revisions\/5463"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/28462"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=5460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=5460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=5460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}