{"id":60391,"date":"2017-01-17T08:13:38","date_gmt":"2017-01-17T16:13:38","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=60391"},"modified":"2017-01-18T09:52:22","modified_gmt":"2017-01-18T17:52:22","slug":"the-year-in-mac-security-2016","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/","title":{"rendered":"The Year in Mac Security 2016"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-61522\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/year-in-mac-security-2016.jpg\" alt=\"The Year in Mac Security 2016\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/year-in-mac-security-2016.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/year-in-mac-security-2016-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/year-in-mac-security-2016-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>As we enter 2017, we all tend to look back on the good and the bad experienced during another trip around the sun. And\u00a0for Mac users, there were plenty of bad things that happened in 2016 related to security threats, but also\u00a0some good things that happened on the privacy front.<\/p>\n<p>Some of the bad news was just the reality of being a computer user in today\u2019s digital world, including new threats targeting Macs, malware infections, fresh vulnerabilities in third-party software, plug-in security issues, and data breaches. You can\u2019t hold those against Apple. Some people get infected by malware, other people avoid it. On the contrary, there was some good news as Apple&#8217;s\u00a0release of\u00a0macOS Sierra implemented several\u00a0new security features and plugged security holes.<\/p>\n<p>What&#8217;s\u00a0changed since our previous installment on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-state-of-mac-security-in-2016\/\" target=\"_blank\">the state of Mac security<\/a>\u00a0at the beginning of 2016? Truth be told, 2016 was\u00a0a busy year. This article is a summary of the year&#8217;s security issues that affected Macs. Read on to discover\u00a0the worst Mac threats in 2016, along with\u00a0some of Apple&#8217;s\u00a0more notable security improvements over the year.<\/p>\n<h3>Mac Malware<\/h3>\n<p><img loading=\"lazy\" class=\"size-full wp-image-61252 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/wares-banner.jpg\" alt=\"wares-banner\" width=\"600\" height=\"200\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/wares-banner.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/wares-banner-150x50.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/wares-banner-300x100.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The year in malware was kicked off early in 2016 by the discovery of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/fake-flash-player-update-infects-mac-with-scareware\/\" target=\"_blank\">InstallCore<\/a>, a fake Flash Player update that, once installed, used scare tactics to try and get money out of users to fix various system problems. Scareware is\u00a0a very effective method of getting to a user\u2019s wallet or potentially\u00a0cause a malware infection. In fact, one of the most well known scareware campaigns targeting Macs is still <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-macdefender-fake-antivirus\/\" target=\"_blank\">Mac Defender<\/a>, discovered by\u00a0Intego nearly 5 years ago.<\/p>\n<p>Shortly after InstallCore made its rounds, OS X malware identified as\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/oceanlotus-os-x-malware-disguises-itself-as-adobe-flash-update\/\" target=\"_blank\">OceanLotus<\/a> made the spotlight. Initially discovered in 2015, the Mac version of this malware did not get any stage time until February 2016. Using a fake Flash Player update and spread through watering holes and spear-phishing, the malware installed a LaunchAgent on infected systems and awaited instructions from a command-and-control server. At the time of testing, these servers appeared to be offline, most likely discontinued after the first report of OceanLotus by researchers at Qihoo 360.<\/p>\n<p>In March, a new version of Hacking Team\u2019s Remote Control System was <a href=\"https:\/\/www.intego.com\/mac-security-blog\/hacked-spyware-company-seems-to-have-released-more-mac-malware\/\" target=\"_blank\">uncovered<\/a>. This not only showed that Hacking Team was still in business, despite their not so great year in 2015, but also that new malware delivery mechanisms were under development. Known as Crisis or Morcut, the malware did not pose a significant threat and was easily removed from an infected system. It was a reminder, however, that companies like these are still out there working hard to undermine the security of your Mac.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-61219\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/transmission-update-crop.jpg\" alt=\"transmission-update-crop\" width=\"500\" height=\"231\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/transmission-update-crop.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/transmission-update-crop-150x69.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/transmission-update-crop-300x139.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>The myth that Macs can\u2019t get viruses still persists even in 2016, but most people know by now it\u2019s just that, a myth. Having said that, for many years\u00a0Mac users could proudly boast that\u00a0ransomware does not exist for Macs. However, in early March that all changed as the first ever ransomware for Mac,<a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-hit-by-rare-ransomware-attack-spread-via-transmission-bittorrent-app\/\" target=\"_blank\"> KeRanger<\/a>, was discovered. Hackers planted an altered installer of the BitTorrent client Transmission that had the ransomware hidden inside of it. Once\u00a0installed, the ransomware laid dormant for 3 days, but then it would awaken and\u00a0start encrypting files and demand one bitcoin payment to get the encrypted data back.<\/p>\n<p>Merely a\u00a0month later, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-users-attacked-fake-adobe-update\/\" target=\"_blank\">another InstallCore variant<\/a> was found to use a fake Flash Player update to install Potentially Unwanted Programs (PUP\u2019s), like MegaBackup, ZipCloud and MacKeeper.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft wp-image-61231 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/EasyDoc-crop-1.jpg\" width=\"198\" height=\"149\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/EasyDoc-crop-1.jpg 198w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/EasyDoc-crop-1-150x113.jpg 150w\" sizes=\"(max-width: 198px) 100vw, 198px\" \/>Then in July, a piece of malware named<a href=\"https:\/\/www.intego.com\/mac-security-blog\/eleanor-is-dangerous-mac-malware-that-can-steal-data\/\" target=\"_blank\"> Eleanor<\/a>, posing as a file converter application, installed a backdoor on infected systems that enabled an attacker to have full access to the operating system, webcam and more.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/adwind-rat-malware-everything-you-need-to-know\/\" target=\"_blank\">Adwind RAT<\/a>, a remote access trojan was discovered in August. Though the infection risk was low, it was notable because it was written in Java, which made it cross-platform. Adwind RAT was spread via a spam email campaign.<\/p>\n<p>The same month, BitTorrent client Transmission made the news again, this time spreading malware, named<a href=\"https:\/\/www.intego.com\/mac-security-blog\/malware-spreads-through-modified-transmission-application-again\/\" target=\"_blank\"> Keydnap<\/a>, capable of stealing the contents of a Mac\u2019s keychain. Once again, hackers replaced the legitimate download of the app with a modified one just like it did with the KeRanger ransomware in March. Transmission decided that twice was enough and moved their website and files to GitHub to prevent future attacks on their server.<\/p>\n<p>In September, Intego learned of a potential<a href=\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/\" target=\"_blank\"> new Adwind RAT<\/a>\u00a0being spread via email. Opening a backdoor on infected systems, this version posed no immediate threat. It has not been seen since and clearing an infected system was an affected\u00a0Mac user needed\u00a0to do. Unfortunately, however, we may not have seen the last of Adwind.<\/p>\n<p>Also in September, Intego learned of another trojan posing as a fake Flash Player installer. This malware variant\u00a0shared similarities with a previously found <a href=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/\" target=\"_blank\">iWorm trojan<\/a>, and while this may have been a proof-of-concept (PoC) not causing any grief at the time, Intego added it to its <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">VirusBarrier<\/a>\u00a0anti-virus\u00a0definitions to protect its customers from any possible future encounters.<\/p>\n<p>A cross-platform backdoor, called <a href=\"https:\/\/www.intego.com\/mac-security-blog\/uptick-in-malware-and-vulnerabilities-what-you-need-to-know\/\" target=\"_blank\">Mokes<\/a>, for OS X that can take screenshots of an infected Mac as well as steal Office documents, record keystrokes and capture audio and video was discovered as well.\u2028\u2028 As if September was not already interesting enough, a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-komplex-trojan-malware-targeting-macs\/\" target=\"_blank\">trojan called Komplex<\/a> was discovered to spread via spear phishing. Posing as a fake Russian aerospace program information PDF attachment, once opened, Komplex installs files and was able to download, execute or delete files. Luckily, the command-and-control server it contacted did not instruct the trojan to do anything after installing itself.<\/p>\n<p>In October, Intego\u2019s malware researchers discovered a new fake Flash Player installer, identified as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\" target=\"_blank\">SilverInstaller<\/a>,\u00a0which behaved differently from other installers of its kind. SilverInstaller appeared to use new techniques to avoid detection. Intego later uncovered more details and fount the malware was\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-sneakier-than-previously-thought\/\" target=\"_blank\">more sophisticated<\/a> than previously thought, as it was attempting to avoid detection by malware researches by looking for common analysis tools and techniques.<\/p>\n<p><strong>Didn&#8217;t Apple Fix All This with Gatekeeper?<\/strong><\/p>\n<p>What does all of the Mac malware from 2016 have in common? It\u2019s all signed by valid developer ID\u2019s.\u00a0This is done to circumvent Gatekeeper, one of macOS\u2019s built-in defense layers.<\/p>\n<p><a href=\"https:\/\/support.apple.com\/en-us\/HT202491\" target=\"_blank\">According to Apple<\/a>, \u201cGatekeeper helps protect your Mac from apps that could adversely affect it,\u201d and \u201cThe Developer ID allows Gatekeeper to block apps created by malware developers and verify that apps haven&#8217;t been tampered with since they were signed.\u201d<\/p>\n<p><a href=\"https:\/\/support.apple.com\/en-us\/HT202491\" target=\"_blank\"><img loading=\"lazy\" class=\"alignleft size-full wp-image-61210\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/gatekeeper-both-gates-open.jpg\" alt=\"gatekeeper-both-gates-open\" width=\"201\" height=\"207\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/gatekeeper-both-gates-open.jpg 201w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/gatekeeper-both-gates-open-146x150.jpg 146w\" sizes=\"(max-width: 201px) 100vw, 201px\" \/><\/a>With malware being signed by a Developer ID, Gatekeeper will\u00a0not block it from running. Instead, it will give the default warning that the app was downloaded from the Internet and to proceed with caution, a warning Mac users are now so used to it is often given barely a glance. Gatekeeper only becomes useful if malware is discovered, reported and the offending Developer ID is blocked. This will cause the application to be blocked and unable to install. The problem with this is that it only works for new installations after the Developer ID is blocked, and so anyone that already has the malicious application installed is not protected by this as the application will continue to run.<\/p>\n<p>Because\u00a0it takes time for a malicious application to be reported and for Apple to revoke the Developer ID, signing malware with such an ID typically guarantees infected users for days (or even weeks) before the ID is blocked.\u2028\u2028 This makes Gatekeeper a good idea but not something to rely on as your only layer of protection, because there are easy ways around it. Of course, Gatekeeper is just one layer, it works hand in hand with XProtect that is designed to flag and block known malware and vulnerable plug-in versions.<\/p>\n<p>XProtect received several updates in 2016. For El Capitan and Sierra, there were at least 12 updates, and they included some of the following:<\/p>\n<ul>\n<li>Adobe Flash Player, which is frequently patched and updated to fix serious vulnerabilities, had older versions blocked 7 times<\/li>\n<li>13 pieces of malware were added to the block list<\/li>\n<li>11 Safari extensions were blocked<\/li>\n<\/ul>\n<p>To put this in contrast, Intego added over 5,000\u00a0malware signatures to <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">VirusBarrier<\/a>.<\/p>\n<p>Since we\u2019re talking about Apple, let\u2019s see what they did to make their operating systems more secure in 2016.<\/p>\n<h3>macOS\u00a0Vulnerabilities<\/h3>\n<p>OS X El Capitan, at version 10.11.2 going into 2016, received four point updates and three security updates after macOS Sierra was released. Addressing a combined 215 CVE\u2019s in 2016. macOS 10.12 Sierra, released in September and updated twice since, addressed 158 CVE\u2019s. OS X 10.10 Yosemite received seven security updates in 2016, patching 62 vulnerabilities, and OS X 10.9 Mavericks received four security updates, patching 53 vulnerabilities.<\/p>\n<p><img loading=\"lazy\" class=\"size-full wp-image-61201 aligncenter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/macOS_security_update.jpg\" alt=\"macos_security_update\" width=\"496\" height=\"119\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/macOS_security_update.jpg 496w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/macOS_security_update-150x36.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/macOS_security_update-300x72.jpg 300w\" sizes=\"(max-width: 496px) 100vw, 496px\" \/><\/p>\n<p>With the release of macOS Sierra, support for Mavericks was dropped, causing its users to miss out on the security update that specifically patched the vulnerabilities, nicknamed<a href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-el-capitan-yosemite-security-updates-patch-trident-flaws-2\/\" target=\"_blank\"> Trident<\/a>, exploited by the Pegasus spyware. Even though the security update was released on September 1 and macOS Sierra was not released until September 20, Apple chose not to offer the full patch to its Mavericks users. While a Safari update that was available for Mavericks addressed part of the vulnerabilities, it did not patch all of it.<\/p>\n<p>Speaking of software vulnerabilities, Apple updated Safari eight times and patched 89 vulnerabilities,\u00a0bringing us from version 9.0.3 to 10.0.2\u2028.<\/p>\n<p>macOS Sierra itself implemented several <a href=\"https:\/\/www.intego.com\/mac-security-blog\/macos-sierra-10-12-vulnerability-fixes-and-security-enhancements\/\" target=\"_blank\">new security features and enhancements<\/a>, such as the Gatekeeper option to allow unsigned applications to open from anywhere, Path Randomization, the removal of the weak RC4 cipher suite and Auto Unlock, among other <a href=\"https:\/\/www.intego.com\/mac-security-blog\/macos-sierra-security-and-privacy-features-overview\/\" target=\"_blank\">Sierra security and privacy features<\/a>.<\/p>\n<p>Along with macOS Sierra came Safari 10.0. Its biggest security feature was the disabling of plug-ins by default. This meant that Flash Player, Silverlight, Java and other plug-ins need to be manually enabled first before they work. As vulnerabilities in plug-ins are often exploited, this was a big security step in the right direction.<\/p>\n<h3>Plug-in Security Issues<\/h3>\n<p>Something that makes any system administrator, tech support or security researcher cringe is the mention of Adobe Flash Player. Often updated but never secure, it is typically a security risk to have it installed. Even with browsers now disabling Flash Player and other plug-ins by default, having it installed means you are more likely to fall for <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\">fake Flash Player update scams<\/a>. If you don\u2019t have Flash Player installed, you\u2019ll know that any site prompting you for an update is bogus.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft size-full wp-image-61240\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/flash-install-icon.jpg\" alt=\"flash-install-icon\" width=\"71\" height=\"61\" \/>Flash Player was\u00a0updated several times over the year\u00a0year and, at the time of writing this article, <a href=\"https:\/\/www.cvedetails.com\/product\/6761\/Adobe-Flash-Player.html?vendor_id=53\" target=\"_blank\">racked up over 260 vulnerability entries<\/a>\u00a0with the majority related to\u00a0code execution. The amount of CVE&#8217;s is not necessarily a bad thing. Apple, for example, had <a href=\"https:\/\/www.cvedetails.com\/product\/156\/Apple-Mac-Os-X.html?vendor_id=49\" target=\"_blank\">215 CVE&#8217;s listed for OS X<\/a>\u00a0at the time of writing and <a href=\"https:\/\/www.cvedetails.com\/product\/15556\/Apple-Iphone-Os.html?vendor_id=49\" target=\"_blank\">161 CVE&#8217;s for iOS<\/a>. What should be watched is the severity of these vulnerabilities; when it comes to severity, Flash Player has far more than OS X or iOS.<\/p>\n<p>On the severity of\u00a0vulnerabilities, the worst is known as a &#8220;0-day,&#8221; which is a vulnerability that is being actively exploited by bad guys and that has no fix available. Flash Player had six of those by my count, which is pretty significant.\u00a0It had them in 2015, 2014, 2013 and most likely before that, too. There is no reason to think this will get any better in 2017, so the recommendation to uninstall Flash Player and never look back remains\u00a0a good one.<\/p>\n<p>While Flash Player grabs the majority of headlines due to security flaws, other plug-ins were not without their issues. Microsoft started the year by patching a Silverlight 0-day vulnerability that was discovered in 2015 as a result of the <a href=\"http:\/\/www.securityweek.com\/hacking-team-leak-leads-discovery-silverlight-zero-day\" target=\"_blank\">Hacking Team leaks<\/a>. Silverlight doesn&#8217;t make the news often, but it is a favorite among exploit kits, just like Flash Player, Acrobat Reader and Java.<\/p>\n<p>Adobe discontinued Adobe Reader X (version 10.x) <a href=\"https:\/\/blogs.adobe.com\/documentcloud\/adobe-acrobat-x-and-adobe-reader-x-end-of-support\/\" target=\"_blank\">over a year ago<\/a>, meaning, &#8220;Adobe will no longer provide any updates or address any existing bugs or security issues in the software.&#8221; Switching to Acrobat Reader DC was recommended, but not many people got the memo as Adobe Reader X is still very common on a lot of systems, which\u00a0makes it a very attractive target.<\/p>\n<h3>Third-Party Software and Macs<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-61246\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/skype-icon.jpg\" alt=\"skype-icon\" width=\"85\" height=\"85\" \/>We already mentioned some of the third-party software woes experienced during 2016,\u00a0such as EasyDoc Converter (distributing Eleanor) and Transmission (distributing KeRanger). Other\u00a0well known software made headlines, too. Skype for Mac was found to have a backdoor that had been around <a href=\"https:\/\/www.trustwave.com\/Resources\/SpiderLabs-Blog\/A-Backdoor-in-Skype-for-Mac-OS-X\/\" target=\"_blank\">for at least 5 years<\/a>. Those are the kind of vulnerabilities that make excellent 0-days, and this may very well have been one without anyone knowing. Skype addressed the vulnerability, and so\u00a0the good news is that the latest version of Skype is backdoor free.<\/p>\n<p>Microsoft&#8217;s Office 2011 and 2016 also received several security updates, patching remote code execution and memory corruption vulnerabilities.<\/p>\n<p>Whether it&#8217;s the operating system, a plug-in or third-party software, security bugs and vulnerabilities will always be there. After all, code is written by humans and humans make mistakes. Therefore, it&#8217;s imperative to keep your software current with the latest available updates as this is the biggest step you can take to improve your security.<\/p>\n<h3>Data Breaches<\/h3>\n<p>From apparently harmless attacks, like those done by hacking group OurMine, to more serious players like Fancy Bear, and to the biggest breach of all time at Yahoo, 2016 was\u00a0an interesting year.<\/p>\n<p>OurMine,\u00a0a hacking group that breaks into accounts and leaves a message,\u00a0<a href=\"https:\/\/www.wired.com\/2016\/06\/meet-ourmine-security-group-hacking-ceos-celebs\/\" target=\"_blank\">stating<\/a>, &#8220;Don&#8217;t worry we are just testing your security,&#8221; managed to compromise the Quora account of Google CEO, Sundar Pichai, and the Twitter account of FaceBook CEO, Mark Zucherberg. Spotify founder, Daniel Ek, Amazon CTO, Werner Vogels, and actor Channing Tatum were some of their other targets.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-61258\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/fancy-bear-150x107.png\" alt=\"fancy-bear\" width=\"150\" height=\"107\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/fancy-bear-150x107.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/fancy-bear-300x213.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/fancy-bear.png 558w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Russian hacking group <a href=\"http:\/\/news.sky.com\/story\/fancy-bears-infiltration-of-wada-shows-how-hacking-is-changing-10579315\" target=\"_blank\">Fancy Bear<\/a> broke into the World Anti-Doping Agency (WADA) database and released medical records of U.S. athletes. You may recall the name Fancy Bear as their group was found to be responsible for the Komplex trojan mentioned earlier. This hack not only showed that the Olympics may as well show big &#8220;made possible by banned substances&#8221; banners, but also pointed out the flawed therapeutic use exemption (TUE) system. Oh and, of course, it upset a lot of athletes.<\/p>\n<p>In December, LinkedIn&#8217;s Lynda.com was <a href=\"http:\/\/www.komando.com\/happening-now\/383714\/9-5-million-accounts-hacked-on-linkedin-sister-site\" target=\"_blank\">hacked<\/a> by an &#8220;unauthorized third party&#8221; that accessed a database that included some learning data. Contact information and which courses were viewed for 55,000 accounts were <a href=\"https:\/\/www.linkedin.com\/help\/lynda\/answer\/75205?sf47317849=1\" target=\"_blank\">listed<\/a> as the only compromised data.<\/p>\n<p>Moving on to some larger scale hacks, the <a href=\"https:\/\/techcrunch.com\/2016\/08\/08\/hacked-bitcoin-exchange-bitfinex-will-reduce-balances-by-36-to-distribute-losses-amongst-all-users\/\" target=\"_blank\">bitcoin exchange BitFinex<\/a> was hacked by unknown attackers and their digital wallet was made $70 million lighter. The incident is still being investigated.<\/p>\n<p>Point of Sale (PoS) systems were again a popular target this year. A Russian organized cybercrime group <a href=\"https:\/\/krebsonsecurity.com\/2016\/08\/data-breach-at-oracles-micros-point-of-sale-division\/\" target=\"_blank\">breached hundreds of computer systems<\/a> at software giant Oracle Corp, compromising a customer support portal for companies using Oracle&#8217;s MICROS PoS credit card payment systems. MICROS, a huge vendor in the global sale of PoS systems, is used at over 330,000 cash registers world wide. The scale of the hack is still unknown, as is the time it first started. HEI Hotels and Resorts found twenty of its hotels, including Marriot, Hyatt and Intercontinental, <a href=\"http:\/\/www.reuters.com\/article\/us-hotels-cyber-idUSKCN10P0ZM\" target=\"_blank\">infected with malware<\/a> on their payment systems. These systems were used at restaurants, bars, spas and shops. Hackers may have gotten away with customer names, account numbers, credit card expiration dates and verification codes.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/nearly-300-million-email-accounts-hacked-change-your-passwords\/\" target=\"_blank\">Hacked email accounts<\/a> were a common theme in 2016. The biggest breach was reserved for Yahoo. After revealing a 2014 hack affected more than <a href=\"https:\/\/www.cnet.com\/news\/yahoo-500-million-accounts-hacked-data-breach\/\" target=\"_blank\">500 million user accounts<\/a>, they found an <a href=\"https:\/\/www.cnet.com\/uk\/news\/yahoo-hack-1-billion-users-affected-2013-record\/\" target=\"_blank\">older breach in 2013<\/a> compromised over 1 billion user accounts. While technically a breach from three years ago, it was not discovered until recently, which means the hackers may have had access to all of the accounts for years.<\/p>\n<h3>Privacy Issues<\/h3>\n<p>The biggest story this year was Apple&#8217;s defense of security and privacy,\u00a0when it refused to cooperate with the FBI&#8217;s request to build a custom iOS version that circumvents several important security features. In a message to its customers, Apple <a href=\"https:\/\/www.apple.com\/customer-letter\/\" target=\"_blank\">wrote<\/a>:<\/p>\n<blockquote>[T]he U.S. government has asked us for something we simply do not have, and something we consider too dangerous to create. They have asked us to build a backdoor to the iPhone. [&#8230;] In the wrong hands, this software \u2014 which does not exist today \u2014 would have the potential to unlock any iPhone in someone\u2019s physical possession. [&#8230;] We are challenging the FBI\u2019s demands with the deepest respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications. While we believe the FBI\u2019s intentions are good, it would be wrong for the government to force us to build a backdoor into our products. And ultimately, we fear that this demand would undermine the very freedoms and liberty our government is meant to protect.<\/p><\/blockquote>\n<p>The issue caused mix reactions.<\/p>\n<p>For instance, at a time when\u00a0many supported Apple&#8217;s decision, then-Republican presidential candidate Donald Trump called for a boycott of Apple until they helped the FBI unlock the iPhone belonging to a terrorist. His comments came as the U.S. Department of Justice filed a motion seeking to force Apple to comply with a judge&#8217;s order for the company to unlock the iPhone, igniting a showdown between the Obama administration and Silicon Valley over security and privacy. As the story goes, the FBI found a different way to get the information they were after, without Apple&#8217;s help, and stopped pressuring Apple. A big win for the privacy and security of Apple customers.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-61264\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/yahoo-logo-150x53.jpg\" alt=\"yahoo-logo\" width=\"150\" height=\"53\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/yahoo-logo-150x53.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/yahoo-logo.jpg 200w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Yahoo made headlines several times in 2016,\u00a0and the previously mentioned data breaches were just a part of their news coverage. In October, a story broke revealing <a href=\"http:\/\/www.reuters.com\/article\/us-yahoo-nsa-exclusive-idUSKCN1241YT\" target=\"_blank\">Yahoo had been scanning customer emails<\/a> on behest of the federal government. This was not mentioned as a breach, because\u00a0Yahoo built and implemented the scanning software themselves. Not even Yahoo&#8217;s own security team knew about this until after the program went live and made them believe they got hacked. Reportedly this course of events caused Yahoo&#8217;s own cyber security chief Stamos to quit and move to FaceBook a month later.<\/p>\n<p>In April, <a href=\"https:\/\/whispersystems.org\/blog\/whatsapp-complete\/\" target=\"_blank\">WhatsApp finished migrating all of its users<\/a> over to Open Whisper Systems\u2019 standard-setting encryption. With a billion people using WhatsApp, this suddenly caused a fair percentage of the world&#8217;s population to start messaging securely, whether they knew it or not.<\/p>\n<blockquote><p>This includes chats, group chats, attachments, voice notes, and voice calls.<\/p><\/blockquote>\n<p>This makes WhatsApp a solid messenger that is both secure and private regardless of it being owned by Facebook, which is not exactly known for being privacy conscious.<\/p>\n<h3>DDoS Attacks<\/h3>\n<p>From attacks that crippled parts of the internet to attacks with a specific target, Distributed Denial of Service (DDoS) has a name. Say hello to the Mirai botnet.<\/p>\n<p>Mirai, malware that hijacks IoT devices, is not the largest botnet out there, but nevertheless it has been responsible for the largest DDoS attack recorded. In September, it was <a href=\"https:\/\/krebsonsecurity.com\/2016\/09\/krebsonsecurity-hit-with-record-ddos\/\" target=\"_blank\">targeted at the website of security journalist Brian Krebs<\/a> and was recorded at 620 Gbps of traffic per second. The attack caused\u00a0Krebs&#8217; site to go offline for a while as Akamai, who successfully mitigated the attack, asked Krebs to seek protection elsewhere. A few days later, 1.1Tbps of traffic was directed at French-based hosting provider OVH via multiple simultaneous attacks, and in October the <a href=\"https:\/\/krebsonsecurity.com\/2016\/10\/source-code-for-iot-botnet-mirai-released\/\" target=\"_blank\">source code for Mirai was released<\/a> online, making it available to anyone that wants to use it.<\/p>\n<p>Just a few days later, a whopping 1.2Tbps directed at Dyn brought down much of America\u2019s Internet.\u00a0Dyn, a company that controls much of the Internet\u2019s domain name system (DNS) infrastructure, was under attack for most of the day. This resulted in the websites of Twitter, the Guardian, Netflix, Reddit, CNN and many others.<\/p>\n<p>Botnets are nothing new, but Mirai is mostly made up of IoT devices. The IoT is growing at an enormous pace, giving malware, like Mirai, more ammunition every month and every year.<\/p>\n<p>Manufacturers need to step up and secure the IoT devices that they supply, and\/or release updated firmware to devices already out there. This would greatly reduce the efficacy of botnets like Mirai. Users who\u00a0purchase IoT devices must\u00a0learn that &#8220;plug and play,&#8221; while easy, often brings security risks. Change the default name\/password on any new devices, and if that&#8217;s not possible, return the device and purchase one that is better secured.<\/p>\n<h3>Encryption by Default<\/h3>\n<p>As mentioned earlier, WhatsApp rolling out end-to-end encryption by default and Apple fighting off the FBI&#8217;s demand for a weakened iOS, were important moments this year. Constant reminders in the news about hacks, breaches and surveillance along with industry and government calls to use HTTPS sped up the adoption of encryption. The Internet Security Research Group (ISRG)&#8217;s <a href=\"https:\/\/letsencrypt.org\/stats\/\" target=\"_blank\">Let&#8217;s Encrypt helped secure over 21 million websites<\/a>, most of which never had certificates before.<br \/>\n<img loading=\"lazy\" class=\"alignnone wp-image-60631 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/12\/eff-lets-encrypt-2016-plot.png\" alt=\"eff-lets-encrypt-2016-plot\" width=\"940\" height=\"450\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/12\/eff-lets-encrypt-2016-plot.png 940w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/12\/eff-lets-encrypt-2016-plot-150x72.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/12\/eff-lets-encrypt-2016-plot-300x144.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/12\/eff-lets-encrypt-2016-plot-768x368.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/12\/eff-lets-encrypt-2016-plot-657x315.png 657w\" sizes=\"(max-width: 940px) 100vw, 940px\" \/><br \/>\nWordpress.org, OVH, Shopify, Tumblr and Squarespace are some of the many hosting providers that chose to make HTTPS the default. From metrics collected by Mozilla, close to 50% of all page loads were done over HTTPS. Thus, 2016 was a good year for encryption!<\/p>\n<p>Encrypting content matters, regardless of the size or popularity of a site or service. Of course, Intego protects its website, blog and Mac anti-virus software update streams with encryption to ensure your privacy and security when using our services.<\/p>\n<h3>Summary<\/h3>\n<p>As you have seen, 2016 was a very eventful year for Mac malware and security issues. Not only was\u00a0the first Mac ransomware discovered during the year, hidden inside an altered installer of the BitTorrent client Transmission, but the persistence of fake Flash Player installers plagued Mac users; furthermore, many operating system and third-party software vulnerabilities were found that compromised the security of Macs.<\/p>\n<p>A great number of these operating system flaws pave the way for unseen malware attacks. Some of them are such that merely visiting a booby-trapped webpage can compromise a Mac. This underscores the importance of security software that protects not\u00a0only from malware but also from web threats and many other kinds of menaces that target Macs. It also highlights the need to keep software up-to-date.<\/p>\n<p>Both for macOS and for third-party software, Mac users should make sure to have the latest versions of software at all times, because some programs\u2014such as Java and Adobe Flash Player\u2014are easy to attack with known exploits circulating in the wild.<\/p>\n<p>As always, Intego is at the forefront in protecting Mac users from the dangers of the Internet. With its Malware Research Team continuously monitoring the threats to Mac users, <strong><a href=\"https:\/\/www.intego.com\/mac-protection-bundle\">Intego Mac Premium Bundle<\/a><\/strong> proves, yet again, to be the best security with layers of protection\u00a0against malware and network threats. Malware writers have Mac users in their crosshairs, and Intego helps protect Macs from all types of security threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we enter 2017, we all tend to look back on the good and the bad experienced during another trip around the sun. And\u00a0for Mac users, there were plenty of bad things that happened in 2016 related to security threats, but also\u00a0some good things that happened on the privacy front. Some of the bad news [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":61528,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,3,151,13],"tags":[2680,80,199,3175],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"As we enter 2017, we all tend to look back on the good and the bad experienced during another trip around the sun. And\u00a0for Mac users, there were plenty of\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Year in Mac Security 2016 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"As we enter 2017, we all tend to look back on the good and the bad experienced during another trip around the sun. And\u00a0for Mac users, there were plenty of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-17T16:13:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-18T17:52:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/mac-security-2016.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"19 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/mac-security-2016.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/mac-security-2016.jpg\",\"width\":400,\"height\":260,\"caption\":\"Year in Mac Security 2016\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/\",\"name\":\"The Year in Mac Security 2016 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#primaryimage\"},\"datePublished\":\"2017-01-17T16:13:38+00:00\",\"dateModified\":\"2017-01-18T17:52:22+00:00\",\"description\":\"As we enter 2017, we all tend to look back on the good and the bad experienced during another trip around the sun. And\\u00a0for Mac users, there were plenty of\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Year in Mac Security 2016\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"The Year in Mac Security 2016\",\"datePublished\":\"2017-01-17T16:13:38+00:00\",\"dateModified\":\"2017-01-18T17:52:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#webpage\"},\"wordCount\":3772,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/mac-security-2016.jpg\",\"keywords\":[\"2016\",\"Mac OS X\",\"Mac Security\",\"macOS\"],\"articleSection\":[\"Apple\",\"Intego\",\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"As we enter 2017, we all tend to look back on the good and the bad experienced during another trip around the sun. And\u00a0for Mac users, there were plenty of","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/","og_locale":"en_US","og_type":"article","og_title":"The Year in Mac Security 2016 - The Mac Security Blog","og_description":"As we enter 2017, we all tend to look back on the good and the bad experienced during another trip around the sun. And\u00a0for Mac users, there were plenty of","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-01-17T16:13:38+00:00","article_modified_time":"2017-01-18T17:52:22+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/mac-security-2016.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"19 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/mac-security-2016.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/mac-security-2016.jpg","width":400,"height":260,"caption":"Year in Mac Security 2016"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/","name":"The Year in Mac Security 2016 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#primaryimage"},"datePublished":"2017-01-17T16:13:38+00:00","dateModified":"2017-01-18T17:52:22+00:00","description":"As we enter 2017, we all tend to look back on the good and the bad experienced during another trip around the sun. And\u00a0for Mac users, there were plenty of","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The Year in Mac Security 2016"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"The Year in Mac Security 2016","datePublished":"2017-01-17T16:13:38+00:00","dateModified":"2017-01-18T17:52:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#webpage"},"wordCount":3772,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/mac-security-2016.jpg","keywords":["2016","Mac OS X","Mac Security","macOS"],"articleSection":["Apple","Intego","Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/mac-security-2016.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-fI3","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/60391"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=60391"}],"version-history":[{"count":106,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/60391\/revisions"}],"predecessor-version":[{"id":61633,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/60391\/revisions\/61633"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/61528"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=60391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=60391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=60391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}