{"id":65587,"date":"2017-04-27T09:02:52","date_gmt":"2017-04-27T16:02:52","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=65587"},"modified":"2017-04-27T09:19:19","modified_gmt":"2017-04-27T16:19:19","slug":"month-in-review-apple-security-in-april-2017","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/","title":{"rendered":"Month in Review: Apple Security in April 2017"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-65617\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/month-in-security-april-2017.jpg\" alt=\"Month in Review: Apple Security in April 2017\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/month-in-security-april-2017.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/month-in-security-april-2017-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/month-in-security-april-2017-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The end of April is upon us, can you believe it&#8217;s almost May already?\u00a0A\u00a0lot has happened since this time last month, so let&#8217;s jump right in\u00a0with April&#8217;s security news\u00a0roundup.<\/p>\n<p>Some of the highlights in April include Apple security updates, a phishing scam targeting iPhone users, and an update on the Apple ID extortion attempt, among a slue of other important security news. Read on for the details!<\/p>\n<h3>Apple\u00a0Security (and, Oops\u2026 Insecurity) Updates<\/h3>\n<p><img loading=\"lazy\" class=\"alignright wp-image-64594 size-medium\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Apple-macOS-Sierra-10.12.4-300x150.jpeg\" alt=\"Apple Releases macOS Sierra 10.12.4\" width=\"300\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Apple-macOS-Sierra-10.12.4-300x150.jpeg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Apple-macOS-Sierra-10.12.4-150x75.jpeg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/Apple-macOS-Sierra-10.12.4.jpeg 600w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Apple released several\u00a0security updates in late March and early April.<\/p>\n<p>We covered\u00a0the following updates in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-sierra-10-12-4-and-more-with-security-fixes\/\" target=\"_blank\">this article<\/a> late last month:<\/p>\n<ul>\n<li><strong>macOS Sierra 10.12.4<\/strong><\/li>\n<li><strong>Security Update 2017-001<\/strong> for El Capitan and Yosemite<\/li>\n<li><strong>iOS 10.3<\/strong><\/li>\n<li><strong>tvOS 10.2<\/strong><\/li>\n<li><strong>watchOS 3.2<\/strong><\/li>\n<li><strong>Safari 10.1<\/strong><\/li>\n<li><strong>Keynote 7.1<\/strong>, <strong>Numbers 4.1<\/strong>, and <strong>Pages 6.1<\/strong> for Mac<\/li>\n<li><strong>Keynote,\u00a0Numbers, and Pages 3.1<\/strong> for\u00a0iOS<\/li>\n<li><strong>macOS Server 5.3<\/strong><\/li>\n<\/ul>\n<p>Apple subsequently released the following security updates:<\/p>\n<ul>\n<li><strong>iCloud for Windows 6.2<\/strong>\u00a0resolved six CVEs by improving certificate and memory handling\u00a0and input validation, as disclosed by Apple\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT207607\" target=\"_blank\">here<\/a><\/li>\n<li><strong>iOS 10.3.1<\/strong>\u00a0mitigated a serious issue with Broadcom&#8217;s Wi-Fi system on a chip (SoC) found in many iOS and Android devices that could have allowed a nearby attacker to execute arbitrary code on the Wi-Fi chip, as disclosed by Apple\u00a0<a href=\"https:\/\/support.apple.com\/en-us\/HT207688\">here<\/a>, with further coverage from <a href=\"http:\/\/www.techtimes.com\/articles\/204269\/20170408\/google-researcher-reveals-flaw-in-android-and-ios-that-can-be-hacked-via-wi-fi.htm\" target=\"_blank\">Tech Times<\/a><\/li>\n<li><strong>Apple Music 2.0 for Android<\/strong> resolved a certificate validation issue that could have allowed an attacker in a privileged network position to obtain sensitive user information, as disclosed by Apple <a href=\"https:\/\/support.apple.com\/en-us\/HT207605\" target=\"_blank\">here<\/a><\/li>\n<\/ul>\n<p>Along with these security updates, however, Apple inadvertently introduced a new\u00a0<em>insecurity<\/em>\u00a0as well.<\/p>\n<p>According to Mac\u00a0security researcher Patrick Wardle, Apple unintentionally introduced a new zero-day vulnerability in\u00a0macOS Sierra 10.12.4 in an attempt to fix another security bug\u00a0that Wardle had reported.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Apple &#8216;fixed&#8217; one of my reported kernel bugs in macOS 10.12.4 by 1) not fixing it at all 2) introducing an 0day kernel info leak ?\u200d\u2642\ufe0f <a href=\"https:\/\/twitter.com\/hashtag\/0day?src=hash\">#0day<\/a> <a href=\"https:\/\/t.co\/YtMDjrj9uP\">https:\/\/t.co\/YtMDjrj9uP<\/a><\/p>\n<p>\u2014 patrick wardle (@patrickwardle) <a href=\"https:\/\/twitter.com\/patrickwardle\/status\/850097680189579264\">April 6, 2017<\/a><\/p><\/blockquote>\n<p>Exploitation of the vulnerability requires network-level auditing to be enabled, which Wardle notes must\u00a0be turned on with root privileges. For this reason, it&#8217;s unlikely that many end users will be affected by this vulnerability before Apple releases a fix.<\/p>\n<p>More than two weeks after Wardle published the <a href=\"https:\/\/objective-see.com\/blog\/blog_0x1B.html\" target=\"_blank\">complete details<\/a> of his findings, Apple still has not\u00a0released an update for macOS Sierra to address this vulnerability.<\/p>\n<h3>SMS Phishing Scam Targets iPhone Users<\/h3>\n<p>BGR <a href=\"http:\/\/bgr.com\/2017\/04\/20\/iphone-security-phishing-apple-id\/\" target=\"_blank\">reported<\/a> that phishing scam text messages targeting iPhone users have been\u00a0making the rounds this past week.<\/p>\n<p>Some iPhone users have been receiving SMS text messages claiming that their Apple ID will be disabled, unless they confirm their &#8220;informations&#8221; by tapping on a shortened URL.<\/p>\n<div id=\"attachment_65605\" style=\"width: 510px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-65605\" loading=\"lazy\" class=\"wp-image-65605 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/ios-phishing-edited.png\" width=\"500\" height=\"286\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/ios-phishing-edited.png 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/ios-phishing-edited-150x86.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/ios-phishing-edited-300x172.png 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><p id=\"caption-attachment-65605\" class=\"wp-caption-text\">Apple has not disabled your Apple ID; don&#8217;t fall for this scam. Image credit: <a href=\"http:\/\/bgr.com\/2017\/04\/20\/iphone-security-phishing-apple-id\/\">BGR<\/a><\/p><\/div>\n<p>Apple will\u00a0never\u00a0disable your Apple ID until you tap on a link in a text message.<\/p>\n<p>Anyone who may have fallen victim to this scam should change their password immediately at <a href=\"https:\/\/appleid.apple.com\" target=\"_blank\">https:\/\/appleid.apple.com<\/a>. We also advise Apple users to\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/two-factor-authentication-how-it-works-and-why-you-should-use-it\/\" target=\"_blank\">enable two-factor authentication<\/a> for their Apple\u00a0ID to help avoid their account becoming compromised by similar\u00a0scams.<\/p>\n<h3>Apple ID &#8220;Breach&#8221; Extortion Update<\/h3>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/\" target=\"_blank\">Last month<\/a><a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/\"><img loading=\"lazy\" class=\"alignright wp-image-9233 size-medium\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/hacking-thumb-300x195.jpg\" width=\"300\" height=\"195\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/hacking-thumb-300x195.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/hacking-thumb-150x97.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/hacking-thumb.jpg 400w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a>, we reported that a group of extortionists calling itself\u00a0Turkish Crime Family was threatening to remotely wipe Apple devices and reset iCloud accounts if Apple had not paid a hefty US $75,000 ransom by April 7.<\/p>\n<p>Apple claimed last month that iCloud itself had not been breached, and this claim was corroborated by a report in early April\u00a0from &#8220;Have I Been Pwned?&#8221; creator Troy Hunt, who <a href=\"https:\/\/www.troyhunt.com\/heres-where-the-apple-accounts-hackers-are-threatening-to-wipe-came-from\/\" target=\"_blank\">confirmed<\/a> that the primary\u00a0source of the Apple\u00a0e-mail addresses and passwords that Turkish Crime Family had shared with reporters seemed to have been a previous breach of gaming company Evony.<\/p>\n<p>So what happened on April 7? There were no major media reports indicating that a large number of devices had been remotely erased or iCloud accounts reset. As for Turkish Crime Family,\u00a0a Twitter account apparently belonging to the group claimed that more than $476,000 worth of Bitcoin had been paid\u00a0to the group on April 7.\u00a0The implication that the ransom had been paid\u00a0seems rather suspicious considering that the group had only asked Apple for $75,000.<\/p>\n<p>The crime group&#8217;s Twitter account\u00a0has not\u00a0been updated\u00a0since April 7.<\/p>\n<h3>Find My Mac Easily\u00a0Disabled with Physical Access<\/h3>\n<p>The Mac Observer <a href=\"https:\/\/www.macobserver.com\/tips\/quick-tip\/psa-find-mac-serious-security-vulnerability\/\" target=\"_blank\">reported<\/a> that it&#8217;s possible to disable Apple&#8217;s <a href=\"https:\/\/support.apple.com\/en-us\/HT205362\" target=\"_blank\">Find My Mac<\/a> feature by simply resetting a\u00a0Mac&#8217;s NVRAM (a classic Mac repair feature that was once known as &#8220;zapping the PRAM&#8221;).<\/p>\n<p>Thus,\u00a0if a thief steals your Mac, in theory they\u00a0could simply reboot your Mac (holding down the Command-Option-P-R\u00a0keystroke) and prevent you from\u00a0being able to locate your computer.<\/p>\n<div id=\"attachment_65602\" style=\"width: 783px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-65602\" loading=\"lazy\" class=\"wp-image-65602 \" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Apple_iMac_Keyboard_A1242-PRAM-1024x464.png\" width=\"773\" height=\"350\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Apple_iMac_Keyboard_A1242-PRAM-1024x464.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Apple_iMac_Keyboard_A1242-PRAM-150x68.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Apple_iMac_Keyboard_A1242-PRAM-300x136.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Apple_iMac_Keyboard_A1242-PRAM-768x348.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Apple_iMac_Keyboard_A1242-PRAM-657x298.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Apple_iMac_Keyboard_A1242-PRAM.png 1500w\" sizes=\"(max-width: 773px) 100vw, 773px\" \/><p id=\"caption-attachment-65602\" class=\"wp-caption-text\">This keystroke can be used to disable Find My Mac unless you have a firmware password set. Image credit: <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Apple_iMac_Keyboard_A1242.JPG\">JohnHWiki<\/a><\/p><\/div>\n<p>To mitigate the weakness, TMO recommended setting a firmware password on your Mac. On a\u00a0Mac\u00a0with a firmware\u00a0password, the\u00a0NVRAM cannot be reset without first entering the password at boot time.<\/p>\n<h3>Unofficial App Store Hidden in an App Store App<\/h3>\n<div id=\"attachment_65596\" style=\"width: 188px\" class=\"wp-caption alignright\"><img aria-describedby=\"caption-attachment-65596\" loading=\"lazy\" class=\"wp-image-65596 \" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/unofficial-app-store-in-app-267x300.png\" width=\"178\" height=\"200\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/unofficial-app-store-in-app-267x300.png 267w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/unofficial-app-store-in-app-134x150.png 134w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/unofficial-app-store-in-app.png 480w\" sizes=\"(max-width: 178px) 100vw, 178px\" \/><p id=\"caption-attachment-65596\" class=\"wp-caption-text\">Image credit: <a href=\"https:\/\/www.itnews.com.au\/news\/dastardly-dev-hides-app-store-in-apple-app-store-app-455911\">iTnews<\/a><\/p><\/div>\n<p>An unofficial app store was temporarily available within an app in Apple&#8217;s official App Store, according to a <a href=\"https:\/\/www.itnews.com.au\/news\/dastardly-dev-hides-app-store-in-apple-app-store-app-455911\" target=\"_blank\">report<\/a> from iTnews.<\/p>\n<p>According to the report, a\u00a0Japanese-language\u00a0app that claimed to have been a household financial helper program was, in fact, a subversive way of getting an unofficial Mandarin Chinese-language app store past Apple&#8217;s vetting process to get it into the official App Store.<\/p>\n<p>It&#8217;s unclear what exactly\u00a0the\u00a0developer&#8217;s intention was;\u00a0perhaps it was intended as a way to install third-party apps, or modified versions of apps, without having to jailbreak a device. However, one app that was available on the unofficial store was a jailbreaking app.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-65593 \" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xzibit-app-stores-meme.png\" width=\"525\" height=\"350\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xzibit-app-stores-meme.png 720w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xzibit-app-stores-meme-150x100.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xzibit-app-stores-meme-300x200.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xzibit-app-stores-meme-657x438.png 657w\" sizes=\"(max-width: 525px) 100vw, 525px\" \/><\/p>\n<p>The important take-away for users of iPhone, iPad, and iPod touch devices is that Apple&#8217;s app vetting process is not perfect, and occasionally some dubious apps make their way into the App Store. Users should exercise caution with any\u00a0App Store apps\u00a0that are either new or\u00a0have very few reviews.<\/p>\n<h3>Unicode Implementation Issue Facilitates Phishing<\/h3>\n<p><img loading=\"lazy\" class=\"alignright wp-image-65611 size-medium\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/firefox-opera-chrome-300x100.png\" width=\"300\" height=\"100\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/firefox-opera-chrome-300x100.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/firefox-opera-chrome-150x50.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/firefox-opera-chrome-768x256.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/firefox-opera-chrome-1024x341.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/firefox-opera-chrome-657x219.png 657w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>An implementation issue in the way that Mozilla Firefox, Opera, and\u00a0Google Chrome browsers have displayed URLs could\u00a0make it easier for an attacker to\u00a0make\u00a0a\u00a0very convincing\u00a0phishing site, as <a href=\"https:\/\/www.wordfence.com\/blog\/2017\/04\/chrome-firefox-unicode-phishing\/\" target=\"_blank\">explained<\/a>\u00a0by Wordfence.<\/p>\n<p>Essentially, an attacker can register a domain with a\u00a0URL that in Firefox and Opera\u00a0(and old\u00a0versions of Chrome) will look identical, or nearly identical, to the address of a legitimate site.<\/p>\n<p>Wordfence used the example of epic.com, a healthcare site, and registered the domain &#8220;xn--e1awd7f.com&#8221; which uses look-alike, internationalized domain name (IDN) characters that in some browsers appears as &#8220;epic.com&#8221; in the address bar.<\/p>\n<p>Less than a week after Wordfence published its findings, another researcher registered a look-alike apple.com domain,\u00a0xn--80ak6aa92e.com, as <a href=\"https:\/\/arstechnica.com\/security\/2017\/04\/chrome-firefox-and-opera-users-beware-this-isnt-the-apple-com-you-want\/\" target=\"_blank\">reported<\/a> by Ars Technica.<\/p>\n<div id=\"attachment_65608\" style=\"width: 759px\" class=\"wp-caption aligncenter\"><img aria-describedby=\"caption-attachment-65608\" loading=\"lazy\" class=\" wp-image-65608\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xn-80ak6aa92e_com-not-apple_com-1024x437.png\" alt=\"\" width=\"749\" height=\"320\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xn-80ak6aa92e_com-not-apple_com-1024x437.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xn-80ak6aa92e_com-not-apple_com-150x64.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xn-80ak6aa92e_com-not-apple_com-300x128.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xn-80ak6aa92e_com-not-apple_com-768x328.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xn-80ak6aa92e_com-not-apple_com-657x281.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/xn-80ak6aa92e_com-not-apple_com.png 1812w\" sizes=\"(max-width: 749px) 100vw, 749px\" \/><p id=\"caption-attachment-65608\" class=\"wp-caption-text\">Firefox displays this site&#8217;s address as https:\/\/www.apple.com rather than https:\/\/www.xn--80ak6aa92e.com<\/p><\/div>\n<p>Both example sites have a free TLS (&#8220;SSL&#8221;) certificate from LetsEncrypt, adding legitimacy to the\u00a0way the sites\u00a0appear in affected browsers&#8217; address bars.<\/p>\n<p>The idea of IDN homograph attacks is not new; there&#8217;s actually a <a href=\"https:\/\/en.wikipedia.org\/wiki\/IDN_homograph_attack\" target=\"_blank\">Wikipedia article<\/a> for it.\u00a0However, after\u00a0the recent\u00a0media attention, two of the three affected browsers are taking action to address the issue.<\/p>\n<p>Google\u00a0has already mitigated this issue by releasing\u00a0<strong>Chrome version\u00a058<\/strong>.<\/p>\n<p><strong>Opera users can use the <a href=\"https:\/\/www.opera.com\/computer\/beta\" target=\"_blank\">beta<\/a> version, 45<\/strong>, or the developer version, 46, which mitigate the issue. \u00a0The current stable release, version 44 (44.0.2510.1218), does not address\u00a0the issue.<\/p>\n<p>Meanwhile, according to Ars Technica, Mozilla&#8217;s lead developers have indicated that they do not plan to address the issue by changing Firefox&#8217;s default behavior. <strong>Firefox users who wish to mitigate this issue\u00a0themselves<\/strong> may do the following:<\/p>\n<ol>\n<li>Type &#8220;about:config&#8221; into the address bar<\/li>\n<li>Agree to accept the risk<\/li>\n<li>Search for &#8220;network.IDN_show_punycode&#8221;<\/li>\n<li>Double-click the item to change from the default &#8220;false&#8221; setting to &#8220;true&#8221;<\/li>\n<\/ol>\n<p>Apple&#8217;s Safari browser does <em>not<\/em> display these sites&#8217; addresses\u00a0in a misleading manner.<\/p>\n<h3>EFF Releases &#8220;Troubling&#8221; Report on Ed-Tech App Privacy<\/h3>\n<p>The Electronic Frontier Foundation\u00a0has released a report (<a href=\"https:\/\/www.eff.org\/press\/releases\/effs-spying-students-report-highlights-tech-companies-data-collection-parents\" target=\"_blank\">summary<\/a>; <a href=\"https:\/\/www.eff.org\/wp\/school-issued-devices-and-student-privacy\" target=\"_blank\">full report<\/a>) detailing privacy concerns with regard to\u00a0devices issued by schools to students. Those who work\u00a0in\u00a0education, or concerned parents, may be interested in reviewing the report, which mentions iPads and some popular\u00a0edtech apps.<\/p>\n<blockquote class=\"twitter-tweet\">\n<p dir=\"ltr\" lang=\"en\">Ed tech apps show troubling trends in data retention and encryption. Read more in our new student privacy report. <a href=\"https:\/\/t.co\/bxckLiNz4h\">https:\/\/t.co\/bxckLiNz4h<\/a><\/p>\n<p>\u2014 EFF (@EFF) <a href=\"https:\/\/twitter.com\/EFF\/status\/853262138286014464\">April 15, 2017<\/a><\/p><\/blockquote>\n<h3>Stay Tuned! Subscribe to The Mac Security Blog<\/h3>\n<p>Be sure to subscribe to\u00a0<strong>The Mac Security Blog<\/strong>\u00a0to stay informed about Apple security throughout each month.<\/p>\n<p>If you missed Intego&#8217;s previous Apple security news roundups for 2017, you can check them out here:<\/p>\n<blockquote data-secret=\"cFYhwS85wz\" class=\"wp-embedded-content\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/\">Month in Review: Apple Security in March 2017<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-march-2017\/embed\/#?secret=cFYhwS85wz\" data-secret=\"cFYhwS85wz\" width=\"500\" height=\"282\" title=\"&#8220;Month in Review: Apple Security in March 2017&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote data-secret=\"KUKZMJkR8P\" class=\"wp-embedded-content\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/\">Month in Review: Apple Security in February 2017<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2017\/embed\/#?secret=KUKZMJkR8P\" data-secret=\"KUKZMJkR8P\" width=\"500\" height=\"282\" title=\"&#8220;Month in Review: Apple Security in February 2017&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<blockquote data-secret=\"4Fzimeirfm\" class=\"wp-embedded-content\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-january-2017\/\">Month in Review: Apple Security in January 2017<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" src=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-january-2017\/embed\/#?secret=4Fzimeirfm\" data-secret=\"4Fzimeirfm\" width=\"500\" height=\"282\" title=\"&#8220;Month in Review: Apple Security in January 2017&#8221; &#8212; The Mac Security Blog\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The end of April is upon us, can you believe it&#8217;s almost May already?\u00a0A\u00a0lot has happened since this time last month, so let&#8217;s jump right in\u00a0with April&#8217;s security news\u00a0roundup. Some of the highlights in April include Apple security updates, a phishing scam targeting iPhone users, and an update on the Apple ID extortion attempt, among [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":65626,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3151,3250],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The end of April is upon us, can you believe it&#039;s almost May already?\u00a0A\u00a0lot has happened since this time last month, so let&#039;s jump right in\u00a0with April&#039;s\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Month in Review: Apple Security in April 2017 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The end of April is upon us, can you believe it&#039;s almost May already?\u00a0A\u00a0lot has happened since this time last month, so let&#039;s jump right in\u00a0with April&#039;s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-27T16:02:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-04-27T16:19:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/apple-security-april-2017.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/apple-security-april-2017.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/apple-security-april-2017.jpg\",\"width\":400,\"height\":260,\"caption\":\"Apple Security in April 2017\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/\",\"name\":\"Month in Review: Apple Security in April 2017 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#primaryimage\"},\"datePublished\":\"2017-04-27T16:02:52+00:00\",\"dateModified\":\"2017-04-27T16:19:19+00:00\",\"description\":\"The end of April is upon us, can you believe it's almost May already?\\u00a0A\\u00a0lot has happened since this time last month, so let's jump right in\\u00a0with April's\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Month in Review: Apple Security in April 2017\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Month in Review: Apple Security in April 2017\",\"datePublished\":\"2017-04-27T16:02:52+00:00\",\"dateModified\":\"2017-04-27T16:19:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#webpage\"},\"wordCount\":1488,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/apple-security-april-2017.jpg\",\"keywords\":[\"Apple\",\"Month in Security\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The end of April is upon us, can you believe it's almost May already?\u00a0A\u00a0lot has happened since this time last month, so let's jump right in\u00a0with April's","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/","og_locale":"en_US","og_type":"article","og_title":"Month in Review: Apple Security in April 2017 - The Mac Security Blog","og_description":"The end of April is upon us, can you believe it's almost May already?\u00a0A\u00a0lot has happened since this time last month, so let's jump right in\u00a0with April's","og_url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2017-04-27T16:02:52+00:00","article_modified_time":"2017-04-27T16:19:19+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/apple-security-april-2017.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/apple-security-april-2017.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/apple-security-april-2017.jpg","width":400,"height":260,"caption":"Apple Security in April 2017"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/","name":"Month in Review: Apple Security in April 2017 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#primaryimage"},"datePublished":"2017-04-27T16:02:52+00:00","dateModified":"2017-04-27T16:19:19+00:00","description":"The end of April is upon us, can you believe it's almost May already?\u00a0A\u00a0lot has happened since this time last month, so let's jump right in\u00a0with April's","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Month in Review: Apple Security in April 2017"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Month in Review: Apple Security in April 2017","datePublished":"2017-04-27T16:02:52+00:00","dateModified":"2017-04-27T16:19:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#webpage"},"wordCount":1488,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/apple-security-april-2017.jpg","keywords":["Apple","Month in Security"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-april-2017\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/apple-security-april-2017.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-h3R","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65587"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=65587"}],"version-history":[{"count":12,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65587\/revisions"}],"predecessor-version":[{"id":65698,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65587\/revisions\/65698"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/65626"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=65587"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=65587"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=65587"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}