{"id":5636,"date":"2012-09-06T12:04:50","date_gmt":"2012-09-06T19:04:50","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=5636"},"modified":"2015-03-26T13:52:29","modified_gmt":"2015-03-26T20:52:29","slug":"universities-extremely-vulnerable-to-hacking-and-network-security-breaches","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/","title":{"rendered":"Universities Extremely Vulnerable to Hacking and Network Security Breaches"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/student-studying\/\" rel=\"attachment wp-att-5787\"><img loading=\"lazy\" class=\"alignnone size-full wp-image-5787\" title=\"student-studying\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/student-studying.jpg\" alt=\"\" width=\"620\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/student-studying.jpg 620w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/student-studying-150x72.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/student-studying-300x145.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/student-studying-100x48.jpg 100w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/a><\/p>\n<p>You wanna see something kinda creepy? Try a little Google search with me. No, it\u2019s okay \u2013 I promise this isn\u2019t going to turn up images that require brain bleach. Look up the terms &#8220;university breached.&#8221; This search shows you an incredible number of stories about universities from the smallest to the largest in the country being hacked, and a disturbing number of those headlines contain the word \u201cagain.\u201d<\/p>\n<p>This is particularly upsetting, given that in a lot of these cases it\u2019s not just names or email addresses, but social security numbers, credit card or bank details, date of birth, phone numbers, plus names and email addresses. More than enough to thoroughly screw with someone\u2019s digital life and credit rating. Sure, you don\u2019t get the publicity and notoriety hacking a school that you do for dumping login credentials for a government agency or major vendor that has millions of customers. But the information you do gather is a lot more financially valuable, and it\u2019s apparently a very easy task. This makes universities a very tasty target for cybercriminals.<\/p>\n<p>Early in 2012 a group calling itself N0B0DY and N0LIFE tried to bring this situation to light with a\u00a0<a href=\"http:\/\/www.databreaches.net\/?p=23496\">hacktivism campaign they called #OpEdu<\/a>, short for Operation Education. They hacked into six different schools over the course of about a month before (temporarily?) suspending the campaign. Another hacker called Joinse7en posted a list of URLs pointing to vulnerable universities, which comprised 16 different major universities. And these were hardly isolated incidents.<\/p>\n<p>Security researcher Kurt Aubuchon did a\u00a0<a href=\"http:\/\/www.infosecisland.com\/blogview\/16161-Universities-Account-for-a-Higher-Number-of-Breaches.html\">search of publicly reported breaches<\/a>\u00a0that happened between 2009 and 2011, and even when excluding inside jobs (namely staff or students hacking the network), universities are hacked 357 times more than would be expected, if breaches were distributed evenly among US firms. That\u2019s more than hospitals, hotels and resorts, bars and restaurants by quite a bit. Keep in mind that 2011 had\u00a0<a href=\"http:\/\/www.net-security.org\/secworld.php?id=12579\">fewer attacks on higher education<\/a>\u00a0than any year since 2005, both in terms of the number of institutions and records affected. However, by all accounts, 2012 already appears to be one of the worst years yet for attacks on schools.<\/p>\n<p>There are a lot of possible reasons why universities have been so heavily targeted, aside from all that juicy <a href=\"http:\/\/en.wikipedia.org\/wiki\/Personally_identifiable_information\">PII<\/a>\u00a0(which hospitals also have in abundance). It\u2019s widely known within InfoSec circles that universities are particularly difficult to defend. Part of this is the culture of openness, as well as increasing budget troubles for most schools. Automated hacking tools are certainly helping people locate poorly defended targets much more quickly and easily too.<\/p>\n<p>To quote Aubuchon:<\/p>\n<blockquote><p>\u201cIt may be the case that, perceiving a conflict between security and academic freedom, these institutions leave themselves poorly defended against external attacks, or that they for other reasons fail to address information security effectively.\u201d<\/p><\/blockquote>\n<p>But not all schools view network security as a failure of academic idealism. In a future article we\u2019ll see how some schools use network security as a chance for valuable education to prepare students for a rapidly growing career field.<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"http:\/\/www.flickr.com\/photos\/cdevers\/5702488800\/\">Chris Devers<\/a> via <a href=\"http:\/\/photopin.com\">photo pin<\/a> <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/2.0\/\">cc<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You wanna see something kinda creepy? Try a little Google search with me. No, it\u2019s okay \u2013 I promise this isn\u2019t going to turn up images that require brain bleach. Look up the terms &#8220;university breached.&#8221; This search shows you an incredible number of stories about universities from the smallest to the largest in the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":14055,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[1921,1918],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"You wanna see something kinda creepy? Try a little Google search with me. No, it\u2019s okay \u2013 I promise this isn\u2019t going to turn up images that require brain\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Universities Extremely Vulnerable to Hacking and Network Security Breaches - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"You wanna see something kinda creepy? Try a little Google search with me. No, it\u2019s okay \u2013 I promise this isn\u2019t going to turn up images that require brain\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-09-06T19:04:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-03-26T20:52:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/apple-unknown-wifi-networks-thumb.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/apple-unknown-wifi-networks-thumb.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/apple-unknown-wifi-networks-thumb.jpg\",\"width\":400,\"height\":260},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/\",\"name\":\"Universities Extremely Vulnerable to Hacking and Network Security Breaches - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#primaryimage\"},\"datePublished\":\"2012-09-06T19:04:50+00:00\",\"dateModified\":\"2015-03-26T20:52:29+00:00\",\"description\":\"You wanna see something kinda creepy? Try a little Google search with me. No, it\\u2019s okay \\u2013 I promise this isn\\u2019t going to turn up images that require brain\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Universities Extremely Vulnerable to Hacking and Network Security Breaches\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Universities Extremely Vulnerable to Hacking and Network Security Breaches\",\"datePublished\":\"2012-09-06T19:04:50+00:00\",\"dateModified\":\"2015-03-26T20:52:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#webpage\"},\"wordCount\":529,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/apple-unknown-wifi-networks-thumb.jpg\",\"keywords\":[\"Network Security\",\"Universities\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"You wanna see something kinda creepy? Try a little Google search with me. No, it\u2019s okay \u2013 I promise this isn\u2019t going to turn up images that require brain","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Universities Extremely Vulnerable to Hacking and Network Security Breaches - The Mac Security Blog","og_description":"You wanna see something kinda creepy? Try a little Google search with me. No, it\u2019s okay \u2013 I promise this isn\u2019t going to turn up images that require brain","og_url":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-09-06T19:04:50+00:00","article_modified_time":"2015-03-26T20:52:29+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/apple-unknown-wifi-networks-thumb.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/apple-unknown-wifi-networks-thumb.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/apple-unknown-wifi-networks-thumb.jpg","width":400,"height":260},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/","name":"Universities Extremely Vulnerable to Hacking and Network Security Breaches - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#primaryimage"},"datePublished":"2012-09-06T19:04:50+00:00","dateModified":"2015-03-26T20:52:29+00:00","description":"You wanna see something kinda creepy? Try a little Google search with me. No, it\u2019s okay \u2013 I promise this isn\u2019t going to turn up images that require brain","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Universities Extremely Vulnerable to Hacking and Network Security Breaches"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Universities Extremely Vulnerable to Hacking and Network Security Breaches","datePublished":"2012-09-06T19:04:50+00:00","dateModified":"2015-03-26T20:52:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#webpage"},"wordCount":529,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/apple-unknown-wifi-networks-thumb.jpg","keywords":["Network Security","Universities"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/universities-extremely-vulnerable-to-hacking-and-network-security-breaches\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2013\/04\/apple-unknown-wifi-networks-thumb.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1sU","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5636"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=5636"}],"version-history":[{"count":16,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5636\/revisions"}],"predecessor-version":[{"id":5941,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/5636\/revisions\/5941"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/14055"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=5636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=5636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=5636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}