{"id":63487,"date":"2017-03-20T12:55:11","date_gmt":"2017-03-20T19:55:11","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=63487"},"modified":"2017-03-20T12:55:11","modified_gmt":"2017-03-20T19:55:11","slug":"rsa-conference-2017-highlights","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/","title":{"rendered":"RSA Conference 2017 Highlights"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignright wp-image-64069 size-medium\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSAC-logo-300x300.png\" alt=\"RSA Conference 2017\" width=\"250\" height=\"250\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSAC-logo-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSAC-logo-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSAC-logo.png 512w\" sizes=\"(max-width: 250px) 100vw, 250px\" \/><strong>RSA Conference (RSAC)<\/strong> is an event focused on information security, comprised of keynotes, panel discussions, speaker sessions, trainings, and an expo floor filled with vendor booths. The annual RSA Conference (USA) took place from February 13\u201317, 2017 in San Francisco, California, at the Moscone Center and the nearby Marriott Marquis.<\/p>\n<p>One of the common themes discussed this year was <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/ransomware\/\" target=\"_blank\"><strong>ransomware<\/strong><\/a> (a term which typically refers to malicious software that holds a user&#8217;s computer or files hostage, often encrypting documents so they cannot be opened, and demands a ransom be paid before returning access to the user\u2014if they&#8217;re lucky). Ransomware was a focus due to the increasingly common occurrence of major ransomware attacks in 2016 and early 2017.<\/p>\n<p>Other hot topics at RSAC 2017 included the lack of security of many <strong>&#8220;Internet of Things&#8221; (IoT)<\/strong> devices (more on that below), as well as how <strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Artificial_intelligence\" target=\"_blank\">artificial intelligence (AI)<\/a><\/strong> and <strong><a href=\"https:\/\/en.wikipedia.org\/wiki\/Machine_learning\" target=\"_blank\">machine learning<\/a><\/strong>\u00a0technologies could potentially benefit the information security space (and a pinch of concern about the potential dangers; who can forget the Terminator movie series and many other science fiction examples of AI going rogue and fighting against humanity?).<\/p>\n<p>Over\u00a0the past four\u00a0weeks, RSAC has posted videos of keynotes, short &#8220;RSAC TV&#8221; interviews, and a handful of speaker sessions on the conference&#8217;s official <a href=\"https:\/\/www.youtube.com\/playlist?list=PLeUGLKUYzh_j1Q75yeae8upX-T1FLmZWf\" target=\"_blank\">YouTube channel<\/a>.<\/p>\n<p>Many of the speakers from the sessions I attended gave me permission to record the audio from their sessions. RSAC and individual speakers have also published\u00a0slides from several sessions and\u00a0keynotes.<\/p>\n<p>Following is a brief selection\u00a0of RSAC official videos and my authorized audio recordings that may be of particular interest to our readers.\u00a0I&#8217;ve also included a brief synopsis\u00a0and official descriptions of the sessions or keynotes, and links to download the slides if they&#8217;ve been made available.<\/p>\n<h3>Meet and Greet with the macOS Malware Class of 2016<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-64072\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PatrickWardle.jpg\" width=\"480\" height=\"360\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PatrickWardle.jpg 773w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PatrickWardle-150x113.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PatrickWardle-300x225.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PatrickWardle-768x576.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/PatrickWardle-657x493.jpg 657w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>Brief synopsis:\u00a0<strong>Patrick Wardle<\/strong> gives an excellent overview of the Mac malware of 2016.<\/p>\n<p>Official description:\u00a0&#8220;Say hello to KeRanger, Eleanor, Keydnap and more! 2016 was a busy year for Mac malware authors who released a variety of new macOS malware creations. The talk will provide a technical overview of this malware, by discussing their infection vectors, persistence mechanisms and features. The talk will conclude by discussing various generic detections and best security practices to secure Macs.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/archive.org\/download\/RSAC2017PatrickWardle\/RSAC-USA-2017-PatrickWardle.mp3\">MP3 Audio<\/a> (48 minutes; recorded with the speaker&#8217;s permission)<\/li>\n<li><a href=\"https:\/\/speakerdeck.com\/patrickwardle\/rsa-2017-meet-and-greet-with-the-mac-malware-class-of-2016\" target=\"_blank\">Slides<\/a>; see also Patrick&#8217;s <a href=\"https:\/\/objective-see.com\/blog\/blog_0x16.html\" target=\"_blank\">blog post<\/a> that aligns with this talk<\/li>\n<li>Related Intego article: <a href=\"https:\/\/www.intego.com\/mac-security-blog\/the-year-in-mac-security-2016\/\">The Year in Mac Security 2016<\/a><\/li>\n<\/ul>\n<h3>OSX Pirrit: Why You Should Care about Malicious Mac Adware<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-64075\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/AmitSerper-1024x768.jpg\" width=\"480\" height=\"360\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/AmitSerper-1024x768.jpg 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/AmitSerper-150x113.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/AmitSerper-300x225.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/AmitSerper-768x576.jpg 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/AmitSerper-657x493.jpg 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/AmitSerper.jpg 1090w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>Brief synopsis:\u00a0<strong>Amit Serper<\/strong> walks through an analysis of Pirrit, malicious Mac adware from last year.<\/p>\n<p>Official description:\u00a0&#8220;Adware isn\u2019t taken seriously, especially threats targeting Macs. But OSX Pirrit, which can obtain root access and has components found in malware, shows that adware can become a huge security issue. Amit Serper will explain how OSX Pirrit works, why security professionals may want to rethink how commodity threats are handled and why Macs aren\u2019t as secure as people think.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/archive.org\/download\/RSAC2017AmitSerper\/RSAC-USA-2017-AmitSerper.mp3\">MP3 Audio<\/a> (53 minutes; recorded with the speaker&#8217;s permission)<\/li>\n<li><a href=\"https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/hta-f03-osx_pirrit-_why-you-should-care-about-malicious-mac-adware.pdf\" target=\"_blank\">Slides<\/a> (PDF)<\/li>\n<\/ul>\n<h3>Lessons from a Billion Breached Records<\/h3>\n<p>Brief synopsis: <strong>Troy Hunt<\/strong> talks about some interesting things he has learned while operating his popular <a href=\"https:\/\/haveibeenpwned.com\" target=\"_blank\">haveibeenpwned.com<\/a> site.<\/p>\n<p>Official description: &#8220;What motivates attackers to dump data publicly? How is it sold, traded and redistributed? These are questions the presenter dealt with while running the ethical data breach search service &#8216;Have I been pwned.&#8217; This talk will share the lessons from working with more than a billion publicly dumped records and provide a unique inside look at security from a very real-world and very actionable perspective.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/www.rsaconference.com\/videos\/lessons-from-a-billion-breached-records\" target=\"_blank\">Video<\/a> (46 minutes)<\/li>\n<\/ul>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/luPEPUM1Shs?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span>\n<h3>Mirai and IoT Botnet Analysis<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-64078\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RobertGraham.jpg\" width=\"480\" height=\"360\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RobertGraham.jpg 638w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RobertGraham-150x112.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RobertGraham-300x225.jpg 300w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>Brief synopsis: <strong>Robert Graham<\/strong> shares his personal experience with buying an Internet-connected security camera and allowing it to get infected by Mirai so he could analyze it.<\/p>\n<p>Official description: &#8220;This presentation will examine the Mirai botnet, technical details on how it operates and the technical details about the cameras it infects. It will also discuss other IoT botnet issues, such as an &#8216;IoT threat model,&#8217; and how such devices will be infected in the future.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/archive.org\/download\/RSAC2017RobertGraham\/RSAC-USA-2017-RobertGraham.mp3\">MP3 Audio<\/a> (44 minutes; recorded with the speaker&#8217;s permission) \u2014\u00a0Note: the &#8220;Josh&#8221; to whom he refers toward the end\u00a0is Josh Corman, not me.<\/li>\n<li><a href=\"https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/hta-w10-mirai-and-iot-botnet-analysis.pdf\">Slides<\/a> (PDF)<\/li>\n<\/ul>\n<h3>Reversing the Year: Let&#8217;s Hack IoT, Ransomware and Evasive Payloads<\/h3>\n<p>Brief synopsis: <strong>James Lyne<\/strong> shares some fun things about\u00a0IoT devices&#8217;\u00a0terrible security, shows ransomware in action, and reveals a Dark Web site that takes you step by step through customizing and distributing ransomware.<\/p>\n<p>Official description:\u00a0&#8220;Join @jameslyne for a talk with few slides and more demos than are sensible or reasonable. We will hack IoT devices, deconstruct funny ransomware fails\/wins, bypass security controls and more!&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/www.rsaconference.com\/videos\/reversing-the-year-lets-hack-iot-ransomware-and-evasive-payloads\">Video<\/a> (45 minutes)<\/li>\n<\/ul>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/J11c2QmPW8o?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span>\n<h3>Gamification Using &#8220;Science of Habit Cycle&#8221; to Transform User Behavior<\/h3>\n<p>Brief synopsis: <strong>Bikash Barai<\/strong>\u00a0explains\u00a0the psychology behind habits, explaining how one can train oneself to replace bad habits (for example,\u00a0not paying close attention to URLs and getting phished) with good habits.<\/p>\n<p>Official description:\u00a0&#8220;Forty percent of our daily activities are automated routines or habits which are not under conscious control. Learn how to use gamification beyond awareness program in the context of the science of habits.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/www.rsaconference.com\/videos\/gamification-using-science-of-habit-cycle-to-transform-user-behavior\">Video<\/a> (40 minutes)<\/li>\n<li><a href=\"https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/hum-f03-using-behavioral-psychology-and-science-of-habit-to-change-user-behavior.pdf\">Slides PDF, from 2016 version<\/a>\u00a0(note that the 2017\u00a0version&#8217;s slides are shown\u00a0in the video)<\/li>\n<\/ul>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/IK-7mM_I8t8?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span>\n<h3>IoT End of Days<em> (Car Hacking&#8230; Without Any Hacking)<\/em><\/h3>\n<p>Brief synopsis: <strong>Charles Henderson<\/strong> talks about how he can still remotely control functionality of a car he owned years ago, and how the car manufacturer and dealer aren&#8217;t doing much about it.<\/p>\n<p>Official description: &#8220;In the mad rush to sling electronics into the hands of consumers, developers and manufacturers are making it easier than ever to get enrolled into their IoT ecosystems. The time from sale to access is shorter than ever. The question is: Where do we go from there? This talk will analyze responsibly disclosed vulnerabilities in the next steps of identity management and access control in IoT.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/www.rsaconference.com\/videos\/iot-end-of-days\">Video<\/a>\u00a0(35 minutes)<\/li>\n<li><a href=\"https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/mbs-f02-iot-end-of-days.pdf\" target=\"_blank\">Slides<\/a> (PDF)<\/li>\n<\/ul>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/hjf4zEM5_mA?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span>\n<h3>Hello False Flags! The Art of Deception in Targeted Attack Attribution<\/h3>\n<p>Brief synopsis: <strong>Brian Bartholomew<\/strong> and <strong>Juan Andr\u00e9s Guerrero-Saade<\/strong> explain the challenges of attempting to attribute an attack or malware to a particular country of origin or government sponsorship.<\/p>\n<p>Official description: &#8220;False flags are planted by threat actors to derail attribution\u2014do they succeed? This talk will present real-world examples from unpublished research to answer this question and more.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/www.rsaconference.com\/videos\/hello-false-flags-the-art-of-deception-in-targeted-attack-attribution\">Video<\/a> (42 minutes)<\/li>\n<li><a href=\"https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/ht-w11-hello-false-flags-the-art-of-deception-in-targeted-attack-attribution.pdf\" target=\"_blank\">Slides<\/a> (PDF)<\/li>\n<\/ul>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/AU28-Y9b-VQ?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span>\n<h3>Lessons Learned from Responding to Disruptive Breaches<\/h3>\n<p>Brief synopsis: <strong>Charles Carmakal<\/strong> and <strong>Robert Wallace<\/strong> shared some things that IT administrators and small business owners can learn from recent destructive attacks regarding how to protect their systems.<\/p>\n<p>Official description: &#8220;Learn how Mandiant has responded to incidents where attackers destroyed critical business systems, leaked confidential data, held companies for ransom and taunted executives.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/www.rsaconference.com\/videos\/lessons-learned-from-responding-to-disruptive-breaches\">Video<\/a> (45 minutes)<\/li>\n<li><a href=\"https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/cxo-r03-lessons-learned-from-responding-to-disruptive-breaches.pdf\" target=\"_blank\">Slides<\/a> (PDF)<\/li>\n<\/ul>\n<span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/9Plg1gPypYk?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation\"><\/iframe><\/span>\n<h3>The Cryptographers&#8217; Panel<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-64084\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Rivest-Shamir-Diffie-Landau.png\" width=\"480\" height=\"316\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Rivest-Shamir-Diffie-Landau.png 912w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Rivest-Shamir-Diffie-Landau-150x99.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Rivest-Shamir-Diffie-Landau-300x197.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Rivest-Shamir-Diffie-Landau-768x505.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Rivest-Shamir-Diffie-Landau-305x200.png 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Rivest-Shamir-Diffie-Landau-657x432.png 657w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>Brief synopsis:\u00a0Panel discussion featuring Drs. <strong>Ron Rivest<\/strong> and <strong>Adi Shamir<\/strong> (the R and S of the RSA crypto graphic algorithm), <strong>Whitfield Diffie<\/strong> (co-inventor of public key cryptography), and <strong>Susan Landau<\/strong> (a professor with expertise in security, privacy, and policy).<\/p>\n<p>Official description:\u00a0&#8220;Join the founders and leaders of the field for an engaging discussion about the latest advances and revelations in cryptography, including research areas to watch in 2017 and new threats facing the field of cryptography.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=Ihpaoq_NbMg\" target=\"_blank\">Video<\/a> (38 minutes)<\/li>\n<\/ul>\n<h3>Regulating the Internet of Things<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-64081\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-1024x768.png\" width=\"480\" height=\"360\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-1024x768.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-150x112.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-300x225.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-768x576.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-657x493.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier.png 1067w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>Brief synopsis:\u00a0Keynote featuring noted cryptographer <strong>Bruce Schneier<\/strong>, wherein (among other things) he shares his perspective\u00a0about government regulation of Internet security\u2014which, he suggests, is becoming &#8220;everything security.&#8221;<\/p>\n<p>Official description: &#8220;IoT security will change our industry, because failure will affect the world in a direct physical manner. Schneier discusses how.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=b05ksqy9F7k\" target=\"_blank\">Video<\/a> (47 minutes)<\/li>\n<\/ul>\n<h3>Seminar on Ransomware<\/h3>\n<p>Brief synopsis: This is a series of sessions on the topic of ransomware; see the agenda\u00a0and\u00a0list of presenters\u00a0<a href=\"https:\/\/www.rsaconference.com\/events\/us17\/agenda\/sessions\/7072-Ransomware\" target=\"_blank\">here<\/a>.<\/p>\n<p>Official description:\u00a0&#8220;Explosive growth demands focused understanding, so we\u2019ve developed this new seminar to give attendees a full day all about ransomware, and its multifaceted implications across technical, policy, compliance and financial response. Sessions will discuss innovative research, present case studies on response and recovery to ransomware, explore combatting ransomware and debate if\u2014and when\u2014you should pay the ransom.&#8221;<\/p>\n<ul>\n<li><a href=\"https:\/\/www.rsaconference.com\/writable\/presentations\/file_upload\/sem-m03_ransomware.pdf\" target=\"_blank\">Notes<\/a> (PDF)<\/li>\n<\/ul>\n<h3>Innovation Sandbox: Most Innovative Startup &#8211; Live Competition<\/h3>\n<p>Brief synopsis: Startup companies pitch new security-focused products and technologies (a live event, somewhat similar in nature to\u00a0&#8220;Shark Tank&#8221;).<\/p>\n<ul>\n<li><a href=\"https:\/\/www.rsaconference.com\/events\/us17\/downloads-and-media?keywords=innovation+sandbox&amp;track=&amp;type=media\" target=\"_blank\">Videos<\/a>\u00a0(totaling\u00a0about 34\u00a0minutes)<\/li>\n<\/ul>\n<h3>An Astrophysicist Reads the Newspaper: Dr. Neil deGrasse Tyson Explores Our World<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-64087\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/NeildeGrasseTyson-1024x768.png\" width=\"480\" height=\"360\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/NeildeGrasseTyson-1024x768.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/NeildeGrasseTyson-150x113.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/NeildeGrasseTyson-300x225.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/NeildeGrasseTyson-768x576.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/NeildeGrasseTyson-657x493.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/NeildeGrasseTyson.png 1700w\" sizes=\"(max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>Brief synopsis:\u00a0Keynote featuring astrophysicist and TV\u00a0personality <strong>Neil deGrasse Tyson<\/strong>, wherein he\u00a0talks about\u2026 science\u00a0(not security)\u2014but it&#8217;s a very fun and entertaining\u00a0keynote.<\/p>\n<p>Official description:\u00a0&#8220;As a passionate astrophysicist Dr. Tyson will forever change the way we look at the beauty and grandeur of the universe. The world looks different when you are scientifically literate. Explore with Dr. Tyson all that is funny, illuminating and alarming about what appears in the world\u2019s current events as seen through the lens of an astrophysicist.&#8221;<\/p>\n<p>Sadly, RSAC\u00a0has\u00a0not posted the whole keynote, but here are some clips:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=QSzeBhoRl60\" target=\"_blank\">Space Travel and the Elements<\/a> (6 minutes) \u2014\u00a0Official description:\u00a0&#8220;Neil DeGrasse Tyson dazzles RSAC attendees with space travel, element discovery, and reducing the cost of exploration: &#8216;Let the goal guide the ingenuity.'&#8221;<\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=Z5fOGZ-R1sk\" target=\"_blank\">New Horizons and Pluto<\/a> (1 minute) \u2014\u00a0Official description:\u00a0&#8220;Discussing the findings of the new horizons mission, Neil DeGrasse Tyson shows breathtaking footage of Pluto\u2014along with an image &#8216;you won&#8217;t be able to unsee.'&#8221;<\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=T3fo5Hi5Rxk\" target=\"_blank\">\u2019Murica&#8217;s Eclipse<\/a> (1 minute) \u2014\u00a0Official description:\u00a0&#8220;In a total solar eclipse, the moon completely covers the sun. See how rockstar astrophyiscist and director of the Hayden Planetarium, Neil DeGrasse Tyson explains &#8216;\u2019Mmmmurica&#8217;s eclipse&#8217; happening on August 21, 2017 in his presentation at RSAC.&#8221;<\/li>\n<\/ul>\n<hr \/>\n<p>This is only a small sampling of the great content at RSAC. More videos are still being uploaded to the\u00a0RSAC YouTube channel; check them out <a href=\"https:\/\/www.youtube.com\/user\/RSAConference\/videos\" target=\"_blank\">here<\/a>.<\/p>\n<p>Don&#8217;t forget to subscribe to The Mac Security Blog for\u00a0the latest Mac and iOS tips and security news!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>RSA Conference (RSAC) is an event focused on information security, comprised of keynotes, panel discussions, speaker sessions, trainings, and an expo floor filled with vendor booths. The annual RSA Conference (USA) took place from February 13\u201317, 2017 in San Francisco, California, at the Moscone Center and the nearby Marriott Marquis. One of the common themes [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":64141,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3316,3322,3313,3319,2098,3298,136,2350],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"RSA Conference (RSAC) is an event focused on information security, comprised of keynotes, panel discussions, speaker sessions, trainings, and an expo\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"RSA Conference 2017 Highlights - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"RSA Conference (RSAC) is an event focused on information security, comprised of keynotes, panel discussions, speaker sessions, trainings, and an expo\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2017-03-20T19:55:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSA-Conference-2017-Highlights.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSA-Conference-2017-Highlights.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSA-Conference-2017-Highlights.png\",\"width\":400,\"height\":260,\"caption\":\"RSA Conference 2017 Highlights\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/\",\"name\":\"RSA Conference 2017 Highlights - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#primaryimage\"},\"datePublished\":\"2017-03-20T19:55:11+00:00\",\"dateModified\":\"2017-03-20T19:55:11+00:00\",\"description\":\"RSA Conference (RSAC) is an event focused on information security, comprised of keynotes, panel discussions, speaker sessions, trainings, and an expo\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"RSA Conference 2017 Highlights\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"RSA Conference 2017 Highlights\",\"datePublished\":\"2017-03-20T19:55:11+00:00\",\"dateModified\":\"2017-03-20T19:55:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#webpage\"},\"wordCount\":1712,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSA-Conference-2017-Highlights.png\",\"keywords\":[\"AI\",\"audio\",\"Internet of Things (IoT)\",\"machine learning\",\"RSA\",\"RSA Conference\",\"Video\",\"Videos\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"RSA Conference (RSAC) is an event focused on information security, comprised of keynotes, panel discussions, speaker sessions, trainings, and an expo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/","og_locale":"en_US","og_type":"article","og_title":"RSA Conference 2017 Highlights - The Mac Security Blog","og_description":"RSA Conference (RSAC) is an event focused on information security, comprised of keynotes, panel discussions, speaker sessions, trainings, and an expo","og_url":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2017-03-20T19:55:11+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSA-Conference-2017-Highlights.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSA-Conference-2017-Highlights.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSA-Conference-2017-Highlights.png","width":400,"height":260,"caption":"RSA Conference 2017 Highlights"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/","name":"RSA Conference 2017 Highlights - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#primaryimage"},"datePublished":"2017-03-20T19:55:11+00:00","dateModified":"2017-03-20T19:55:11+00:00","description":"RSA Conference (RSAC) is an event focused on information security, comprised of keynotes, panel discussions, speaker sessions, trainings, and an expo","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"RSA Conference 2017 Highlights"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"RSA Conference 2017 Highlights","datePublished":"2017-03-20T19:55:11+00:00","dateModified":"2017-03-20T19:55:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#webpage"},"wordCount":1712,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSA-Conference-2017-Highlights.png","keywords":["AI","audio","Internet of Things (IoT)","machine learning","RSA","RSA Conference","Video","Videos"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/rsa-conference-2017-highlights\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/RSA-Conference-2017-Highlights.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-gvZ","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/63487"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=63487"}],"version-history":[{"count":15,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/63487\/revisions"}],"predecessor-version":[{"id":64189,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/63487\/revisions\/64189"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/64141"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=63487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=63487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=63487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}