{"id":61693,"date":"2017-02-14T08:56:02","date_gmt":"2017-02-14T16:56:02","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=61693"},"modified":"2022-03-09T00:35:21","modified_gmt":"2022-03-09T08:35:21","slug":"apple-security-trends-what-to-expect-in-2017","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/","title":{"rendered":"Apple Security Trends: What to Expect in 2017"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-62575\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/intego-mac-security-predictions-2017.jpg\" alt=\"Intego Mac Security Predictions 2017\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/intego-mac-security-predictions-2017.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/intego-mac-security-predictions-2017-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/intego-mac-security-predictions-2017-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>We&#8217;re a little over a month into 2017 and fresh reports of new malware have already surfaced, including small scale <a href=\"https:\/\/www.intego.com\/mac-security-blog\/targeted-malware-attacks-and-the-importance-of-layered-protection\/\" target=\"_blank\" rel=\"noopener\">targeted attacks<\/a>\u00a0and a new Mac threat just last\u00a0week <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-malware-underscores-the-danger-of-assumed-mac-security\/\" target=\"_blank\" rel=\"noopener\">masquerading as an Adobe Flash Player update<\/a>. Sure enough,\u00a02017 promises to be a lot more eventful, so what&#8217;s on the horizon?<\/p>\n<p>There are a number of troubling trends and macOS threats that consumers and businesses should be aware of, both native to Apple&#8217;s operating system and also within the wider security sphere. What are these troubling trends, you ask? Intego presents to you the following Apple security predictions and what you can expect to see in 2017.<\/p>\n<h3>DDoS Attacks<\/h3>\n<p>Distributed Denial of Service (DDoS) is nothing new, in fact, they\u00a0have\u00a0been around for a long time and are\u00a0not\u00a0going anywhere anytime soon. What we will see, however, is an increase in frequency and size this year. With the source code for IoT botnet <a href=\"https:\/\/krebsonsecurity.com\/2016\/10\/source-code-for-iot-botnet-mirai-released\/\" target=\"_blank\" rel=\"noopener\">Mirai<\/a> available to anyone, we anticipate that\u00a0it may be used in attacks similar to what we saw\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/\" target=\"_blank\" rel=\"noopener\">last year<\/a>.<\/p>\n<p>With manufacturers of networking equipment and IoT devices <a href=\"https:\/\/arstechnica.com\/tech-policy\/2017\/01\/unsecure-routers-webcams-prompt-feds-to-sue-d-link\/\" target=\"_blank\" rel=\"noopener\">being sued<\/a> now, hopefully this will prompt other manufacturers to build more secure equipment. This will give botnets, such as Mirai, less ammunition. Until things improve, however, we&#8217;ll see targeted sites being attacked with ever increasing bandwidth. DDoS and the Internet as a whole might feel this again if DNS providers find themselves in the crosshairs of such attacks.<\/p>\n<h3>Router exploits<\/h3>\n<p>Rather than attacking the user&#8217;s web browser, malvertising campaigns have been focusing on finding router exploits. Why mess with an endpoint if you can control the network? Before the end of the last year, security researchers from Proofpoint <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/malvertising-campaign-infects-your-router-instead-of-your-browser\/\" target=\"_blank\" rel=\"noopener\">discovered<\/a> a campaign that found malicious ads serving exploit code to infect routers, instead of browsers, in order to insert ads in every site users are visiting.<\/p>\n<p>For the same reasons that make botnets like Mirai so successful, the\u00a0technique of going after unprotected or poorly secured hardware will likely be observed more this year as attackers make\u00a0use of hardware vulnerabilities.<\/p>\n<h3>Data Breaches<\/h3>\n<p>Some big names were the target of data breaches last year, Yahoo being the biggest. According to a new <a href=\"https:\/\/www.idtheftcenter.org\/post\/data-breaches-increase-40-percent-in-2016-finds-new-report-from-identity-theft-resource-center-and-cyberscout\/\" target=\"_blank\" rel=\"noopener\">report<\/a> by the Identify Theft Resource Center (ITRC) and Cyber Scout, the number of U.S. data breaches soared 40 percent to an all-time record high of 1,093 in 2016. To combat this growing threat, the Trump administration has vowed to strengthen America&#8217;s cyber capabilities.<\/p>\n<p>&#8220;Cyberwarfare is an emerging battlefield, and we must take every measure to safeguard our national security secrets and systems,&#8221; reads a <a href=\"https:\/\/web.archive.org\/web\/20170214044904\/https:\/\/www.whitehouse.gov\/making-our-military-strong-again\" target=\"_blank\" rel=\"noopener\">page<\/a> on the official whitehouse.gov website.\u00a0Still, we believe 2017\u00a0will be no different than previous years, and that we will see quite a few more data breaches globally, including new ones and old hacks that went undiscovered until now.<\/p>\n<h3>Linux as a target<\/h3>\n<p>Before the end of 2016,\u00a0a <a href=\"https:\/\/arstechnica.com\/security\/2016\/12\/fedora-and-ubuntu-0days-show-that-hacking-desktop-linux-is-now-a-thing\/\" target=\"_blank\" rel=\"noopener\">0-day exploit was published<\/a> that affected mainstream versions of Linux. With Linux users boasting all-too\u00a0familiar\u00a0&#8220;we&#8217;re protected from most nasties out there&#8221; beliefs, which\u00a0Mac users used to have (and most still do), it&#8217;s starting to look like this is no longer the case. This year we may see more focus on Linux.<\/p>\n<h3>Mac Malware<\/h3>\n<p>With macOS Sierra being a little trickier to infect with malware and the easy detection of most malware in the past through simple use of LaunchAgents, the easiest way to get to a user&#8217;s money or data is through adware or PUPs. And historically the most effective way to get these on a Mac is through fake Flash Player updates. The updated <a href=\"https:\/\/www.intego.com\/mac-security-blog\/macos-sierra-security-and-privacy-features-overview\/\" target=\"_blank\" rel=\"noopener\">defenses in macOS Sierra<\/a> may have forced malware authors to learn new ways to properly infect a Mac, which could be the reason we have thus far not seen more ransomware and other malware.<\/p>\n<p>Ransomware is something we thought we&#8217;d see more of last year, but surprisingly, this did not happen. With how successful ransomware is on the Windows platform, it would be very unusual not to not Mac users. Though probably not very sophisticated, ransomware on the Mac will make another appearance this year.<\/p>\n<p>Using techniques that have proven successful in the past to get malware\/PUPs on a user&#8217;s Mac, such as fake Flash Player updates and phishing, combined with smarter installers, such as <a href=\"https:\/\/www.intego.com\/mac-security-blog\/silverinstaller-uses-new-techniques-to-install-puapup\/\" target=\"_blank\" rel=\"noopener\">SilverInstaller<\/a>, and hijacking the download server of an existing product, planting\u00a0malware on a target system can be done. The problem is scale. Getting all of the above mentioned factors set up\u2014and making sure a large amount of users are drawn to it\u2014is not exactly an easy task. We believe this year Mac users could encounter more\u00a0clever phishing emails or browser campaigns that will leverage such techniques to reach a big audience.<\/p>\n<h3>Flash Player Prompts<\/h3>\n<p>With major browsers now disabling Flash Player and other plug-ins by default, sites that previously automatically started Flash Player content will now prompt for it. As with frequent prompts in general, people get annoyed by them and will click anything to make them go away and to get to their content faster, without reading what the prompts actually say. This will make fake Flash Player or media player prompts more successful.<\/p>\n<h3>App Store as Attack Surface \/ Developer ID<\/h3>\n<p>As mentioned in the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/\" target=\"_blank\" rel=\"noopener\">2016 year in security review article<\/a>, every piece of malware had one thing in common\u2014a valid Developer ID. Bypassing Gatekeeper is an important step to ensure malware is installed by as many people as possible, so the use of a Developer ID has become very popular among malware authors. This trend will continue in 2017, and\u00a0it will probably seep over into the App Store as well. There are already several apps in the App Store that promise anti-virus protection, but offer none whatsoever. At the time, these &#8220;antivirus&#8221; apps only take your money by charging for the app, it is not at all unreasonable to think such\u00a0apps will start serving malware down the road.<\/p>\n<h3>Password Security<\/h3>\n<p>The worst passwords of 2016 were just as bad as those of 2015 or 2011. Sadly, 2017 will be no different unless websites and services start enforcing <a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-tips-for-creating-secure-passwords\/\" target=\"_blank\" rel=\"noopener\">stronger passwords<\/a>. The trade-off between convenience and security is mostly made in favor of convenience, which is why the use of good passwords is generally not enforced. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\" target=\"_blank\" rel=\"noopener\">Two-Factor authentication<\/a> ads a layer of protection, but even when available this is often not enabled by the user as it ads an extra step in getting to their content. While more awareness of\u00a0tools such as password managers and Two-Factor authentication will increase this year, it will be a few more years before the state of <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/weak-passwords\/\" target=\"_blank\" rel=\"noopener\">weak password<\/a> usage improves.<\/p>\n<h3>How to Protect Your Mac in 2017 and Beyond<\/h3>\n<p>To protect yourself, your data and your wallet this year, be the change. Start by using a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-choose-the-right-password-manager-for-you\/\" target=\"_blank\" rel=\"noopener\">password manager<\/a> to secure not only your passwords but also your credit card information, notes with sensitive information, and more. Other best practices include the use of a <a href=\"https:\/\/www.intego.com\/mac-security-blog\/this-home-vpn-router-setup-protects-your-traffic-wherever-you-are\/\" target=\"_blank\" rel=\"noopener\">VPN<\/a> when on a public Wi-Fi network, keeping your operating system\u00a0and applications up to date, uninstalling Flash Player and other vulnerable plug-ins (or installing updates <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\" rel=\"noopener\">only directly from the vendor<\/a> that publishes them), and reading the latest security news\u00a0on websites, such as the Mac Security Blog,\u00a0to stay current on the latest threats that may impact you.<\/p>\n<p>Spreading the word is, of course, a great idea. When you learn of a vulnerability or a new best practice in security, pass it on! This is how security awareness will spread, which will eventually lead to a more secure user base.<\/p>\n<h3>How can I learn more?<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" target=\"_blank\" rel=\"noopener noreferrer\"><img class=\"alignleft\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/04\/intego-podcast-artwork-400.jpg\" alt=\"\" width=\"80\" \/><\/a>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes!<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We&#8217;re a little over a month into 2017 and fresh reports of new malware have already surfaced, including small scale targeted attacks\u00a0and a new Mac threat just last\u00a0week masquerading as an Adobe Flash Player update. Sure enough,\u00a02017 promises to be a lot more eventful, so what&#8217;s on the horizon? There are a number of troubling [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":62581,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[3,13,5],"tags":[3268,3151,174,3271],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We&#039;re a little over a month into 2017 and fresh reports of new malware have already surfaced, including small scale targeted attacks\u00a0and a new Mac threat\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Security Trends: What to Expect in 2017 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We&#039;re a little over a month into 2017 and fresh reports of new malware have already surfaced, including small scale targeted attacks\u00a0and a new Mac threat\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-14T16:56:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-09T08:35:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/2017-apple-security-trends.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/2017-apple-security-trends.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/2017-apple-security-trends.jpg\",\"width\":400,\"height\":260,\"caption\":\"2017 Apple Security Trends\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/\",\"name\":\"Apple Security Trends: What to Expect in 2017 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#primaryimage\"},\"datePublished\":\"2017-02-14T16:56:02+00:00\",\"dateModified\":\"2022-03-09T08:35:21+00:00\",\"description\":\"We're a little over a month into 2017 and fresh reports of new malware have already surfaced, including small scale targeted attacks\\u00a0and a new Mac threat\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Security Trends: What to Expect in 2017\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"Apple Security Trends: What to Expect in 2017\",\"datePublished\":\"2017-02-14T16:56:02+00:00\",\"dateModified\":\"2022-03-09T08:35:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#webpage\"},\"wordCount\":1349,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/2017-apple-security-trends.jpg\",\"keywords\":[\"2017\",\"Apple\",\"Mac\",\"Security Predictions\"],\"articleSection\":[\"Intego\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We're a little over a month into 2017 and fresh reports of new malware have already surfaced, including small scale targeted attacks\u00a0and a new Mac threat","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/","og_locale":"en_US","og_type":"article","og_title":"Apple Security Trends: What to Expect in 2017 - The Mac Security Blog","og_description":"We're a little over a month into 2017 and fresh reports of new malware have already surfaced, including small scale targeted attacks\u00a0and a new Mac threat","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-02-14T16:56:02+00:00","article_modified_time":"2022-03-09T08:35:21+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/2017-apple-security-trends.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/2017-apple-security-trends.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/2017-apple-security-trends.jpg","width":400,"height":260,"caption":"2017 Apple Security Trends"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/","name":"Apple Security Trends: What to Expect in 2017 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#primaryimage"},"datePublished":"2017-02-14T16:56:02+00:00","dateModified":"2022-03-09T08:35:21+00:00","description":"We're a little over a month into 2017 and fresh reports of new malware have already surfaced, including small scale targeted attacks\u00a0and a new Mac threat","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Security Trends: What to Expect in 2017"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"Apple Security Trends: What to Expect in 2017","datePublished":"2017-02-14T16:56:02+00:00","dateModified":"2022-03-09T08:35:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#webpage"},"wordCount":1349,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/2017-apple-security-trends.jpg","keywords":["2017","Apple","Mac","Security Predictions"],"articleSection":["Intego","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-security-trends-what-to-expect-in-2017\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/02\/2017-apple-security-trends.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-g33","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/61693"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=61693"}],"version-history":[{"count":37,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/61693\/revisions"}],"predecessor-version":[{"id":95450,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/61693\/revisions\/95450"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/62581"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=61693"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=61693"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=61693"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}