	{"id":65776,"date":"2017-08-23T09:45:13","date_gmt":"2017-08-23T16:45:13","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=65776"},"modified":"2017-08-24T09:51:49","modified_gmt":"2017-08-24T16:51:49","slug":"how-malicious-plugins-can-compromise-your-mac","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/","title":{"rendered":"How Malicious Plugins Can Compromise Your Mac"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-69331\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins.png\" alt=\"How Malicious Plugins Can Compromise Your Mac\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>I cannot remember a time in which my browsers did not have a few plug-ins installed. My Safari has three\u00a0and my Firefox has seven;\u00a0they&#8217;re the first thing I install on a new system, and I really dislike browsing the Web without them. Plug-ins (also called extensions or add-ons) are not always useful enhancements though,\u00a0and may even be installed without your knowledge \u2014 some of which may even be malicious and can compromise your Mac.<\/p>\n<p>So what are some\u00a0things you should look out for when using plugins? And how can you tell if they&#8217;re legit or malicious plugins? It&#8217;s not always easy to tell, but there are tried and true methods to help you navigate the Web more safely.\u00a0In this article, we will cover some best practices for the use of plug-ins and how you can stay safe when using them.<\/p>\n<h3>Get plug-ins only from a trusted source<\/h3>\n<p>If you need to use a plug-in, it&#8217;s best to only get it from a trusted source. For example, if you want the Adblock plug-in for Safari, you should get it from the official\u00a0<a href=\"https:\/\/adblockplus.org\" target=\"_blank\" rel=\"noopener noreferrer\">Adblock website<\/a> or from the <a href=\"https:\/\/safari-extensions.apple.com\/?category=security\" target=\"_blank\" rel=\"noopener noreferrer\">Safari Extensions web page<\/a>\u00a0hosted by Apple.<\/p>\n<p>Do not get plug-ins from a web page or a pop-up that prompts you to install it!\u00a0These potentially harmful prompts are\u00a0most often seen in the form of fake Flash Player updates. If you do see a pop-up that suggests a plug-in you might actually want to install, close the pop-up window and get that plug-in from a trusted source. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-tell-if-adobe-flash-player-update-is-valid\/\" target=\"_blank\"><strong>(RELATED: How to Tell if Adobe Flash Player Update is Valid)<\/strong><\/a><\/p>\n<p><em>Note:<\/em> While blocking ads makes my browsing experience much better overall, I do unblock websites that show a normal amount of ads that are relevant to the site&#8217;s content. Ads pay the bills for a lot of websites, so I&#8217;m happy to contribute to sites I frequent often.<\/p>\n<h3>Plug-ins to avoid<\/h3>\n<p>Flash Player, Java, Silverlight and Acrobat are most often exploited and should be avoided if you can. That said, each plug-in that you install increases the potential attack surface, so don&#8217;t install a plug-in unless you really need it.<\/p>\n<h3>Keeping your plug-ins up to date<\/h3>\n<p>Your browser should be doing this for you, but you can verify your browser is set up for auto-updating plug-ins. Here are steps to keep your plug-ins up-to-date in Safari and Firefox:<\/p>\n<h4><strong>Safari<\/strong><\/h4>\n<p>Open the <strong>Preferences,<\/strong>\u00a0and then click the <strong>Extensions tab<\/strong>. At the bottom of that window, you will see a checkbox that will enable the automatic updating of extensions; make sure it&#8217;s checked.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-65782 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Safari-Auto-Update-Extensions.png\" alt=\"Update extensions from the Safari Extensions Gallery\" width=\"664\" height=\"47\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Safari-Auto-Update-Extensions.png 664w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Safari-Auto-Update-Extensions-150x11.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Safari-Auto-Update-Extensions-300x21.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Safari-Auto-Update-Extensions-657x47.png 657w\" sizes=\"(max-width: 664px) 100vw, 664px\" \/><\/p>\n<h4><strong>Firefox<\/strong><\/h4>\n<p>From the <strong>Tools menu<\/strong>, select <strong>Add-ons<\/strong>. Click on the button with a cog wheel in it and make sure &#8220;Update Add-ons Automatically&#8221; is checked.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-65788 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Firefox-Auto-Update-Addons.png\" alt=\"Update add-ons automatically\" width=\"338\" height=\"178\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Firefox-Auto-Update-Addons.png 338w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Firefox-Auto-Update-Addons-150x79.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Firefox-Auto-Update-Addons-300x158.png 300w\" sizes=\"(max-width: 338px) 100vw, 338px\" \/><\/p>\n<h3>How your Mac and browsers protect you<\/h3>\n<p>Every major browser has implemented a system where plug-ins are activated only if you tell it to activate. This way you can choose to let one website use a plug-in while every other website cannot access it. A website that requires one of your plug-ins to work will display a message similar to\u00a0this one:<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-65794 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Use-Quicktime.png\" alt=\"Click to use QuickTime\" width=\"192\" height=\"59\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Use-Quicktime.png 192w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Use-Quicktime-150x46.png 150w\" sizes=\"(max-width: 192px) 100vw, 192px\" \/><br \/>\nAnd when you click that button, the browser will show an additional warning and asks you to confirm.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter wp-image-65797 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Use-Quicktime-confirm.png\" alt=\"Do you want to trust the website?\" width=\"420\" height=\"156\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Use-Quicktime-confirm.png 420w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Use-Quicktime-confirm-150x56.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/04\/Use-Quicktime-confirm-300x111.png 300w\" sizes=\"(max-width: 420px) 100vw, 420px\" \/><br \/>\nThis gives you two chances to really consider the choice you&#8217;re making, and unless it&#8217;s content you really need from a site you trust, will likely make you think twice before granting the site access to that plug-in.<\/p>\n<p>macOS disables known vulnerable versions of plug-ins for you as well, through its <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/xprotect\/\" target=\"_blank\">XProtect<\/a> mechanism. Though it mostly focuses on Flash Player, in the past it has been used to set a minimum required version for Java and Silverlight as well. Unless you have the version Apple recommends or newer, the plug-ins do not work on your system. While a nice additional security measure, it has a very narrow focus when it comes to plug-ins and is not updated to keep up with all threats.<\/p>\n<h3>How a plug-in can compromise your Mac<\/h3>\n<p>There are two types of plug-ins that can compromise your Mac: vulnerable plug-ins and malicious plug-ins.<\/p>\n<p><strong>Vulnerable plug-ins<\/strong>:\u00a0These are plug-ins that are not designed with any malicious intent, but they have vulnerabilities that can be exploited by a malicious website or script. In some cases, such as with Flash Player, these vulnerable plug-ins have been\u00a0riddled with vulnerabilities for so long, they should be labeled as intentionally malicious just for being stubborn and keeping it available; but, that&#8217;s just my two cents. Vulnerabilities can happen to any plug-in and, if exploited, can allow a maliciously crafted website or script to gain access to more data than it should. Saved browser passwords or even data on your hard drive are at risk; it depends on the type of plug-in and the vulnerability.<\/p>\n<p><strong>Malicious plug-ins<\/strong>:<strong>\u00a0<\/strong>These plug-ins are specifically designed to put your system or your information at risk. These are the plug-ins that are typically installed by malware or a PUA (Potentially Unwanted Application) and cause advertisements to be injected on webpages that you visit. They can also be installed through malicious websites that prompt you to install &#8220;this amazing plug-in&#8221; and end up giving you a plug-in that does something completely different. One such example is <a href=\"https:\/\/discussions.apple.com\/thread\/6444260?start=0&amp;tstart=0\" target=\"_blank\" rel=\"noopener noreferrer\">Awesome Screenshot<\/a>\u00a0from some years ago. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/genieo\/\" target=\"_blank\">Genieo<\/a> is another adware that typically gets installed through application installers that come from dodgy websites. You think you&#8217;re downloading VLC Player, MPlayer X or UnRarX, but the installer also puts plug-ins in your browser, so it can start injecting ads on pages you visit. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/osxinstallcore\/\" target=\"_blank\">InstallCore<\/a> is another such adware. Malicious plug-ins are not built to provide the best quality in terms of code and quality control, so they likely introduce several vulnerabilities that can be exploited by other 3rd parties as well.<\/p>\n<p>When it comes to malicious plug-ins, <a href=\"https:\/\/www.intego.com\/antivirus-mac-internet-security\">Intego\u00a0VirusBarrier<\/a> has you covered. Intego&#8217;s anti-virus for Mac blocks\u00a0the malware\/PUA\/Plug-in before it gets installed, and\u00a0if you&#8217;ve recently joined the Intego family, it keeps you safe by neutralizing whatever malicious software was already on your system. As for non-malicious but vulnerable plug-ins, use the tips above to either stay away from them completely or at least make sure they stay up-to-date and only activate when you explicitly tell them to.<\/p>\n<p>Happy browsing! \ud83d\ude42<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I cannot remember a time in which my browsers did not have a few plug-ins installed. My Safari has three\u00a0and my Firefox has seven;\u00a0they&#8217;re the first thing I install on a new system, and I really dislike browsing the Web without them. Plug-ins (also called extensions or add-ons) are not always useful enhancements though,\u00a0and may [&hellip;]<\/p>\n","protected":false},"author":79,"featured_media":69340,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13],"tags":[86,243],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"I cannot remember a time in which my browsers did not have a few plug-ins installed. My Safari has three\u00a0and my Firefox has seven;\u00a0they&#039;re the first thing\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Malicious Plugins Can Compromise Your Mac - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"I cannot remember a time in which my browsers did not have a few plug-ins installed. My Safari has three\u00a0and my Firefox has seven;\u00a0they&#039;re the first thing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-23T16:45:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-08-24T16:51:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jay Vrijenhoek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-Security.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-Security.png\",\"width\":400,\"height\":260,\"caption\":\"How Malicious Plugins Compromise Mac Security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/\",\"name\":\"How Malicious Plugins Can Compromise Your Mac - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#primaryimage\"},\"datePublished\":\"2017-08-23T16:45:13+00:00\",\"dateModified\":\"2017-08-24T16:51:49+00:00\",\"description\":\"I cannot remember a time in which my browsers did not have a few plug-ins installed. My Safari has three\\u00a0and my Firefox has seven;\\u00a0they're the first thing\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Malicious Plugins Can Compromise Your Mac\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\"},\"headline\":\"How Malicious Plugins Can Compromise Your Mac\",\"datePublished\":\"2017-08-23T16:45:13+00:00\",\"dateModified\":\"2017-08-24T16:51:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#webpage\"},\"wordCount\":1050,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-Security.png\",\"keywords\":[\"Malware\",\"Plugins\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0\",\"name\":\"Jay Vrijenhoek\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g\",\"caption\":\"Jay Vrijenhoek\"},\"description\":\"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"I cannot remember a time in which my browsers did not have a few plug-ins installed. My Safari has three\u00a0and my Firefox has seven;\u00a0they're the first thing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/","og_locale":"en_US","og_type":"article","og_title":"How Malicious Plugins Can Compromise Your Mac - The Mac Security Blog","og_description":"I cannot remember a time in which my browsers did not have a few plug-ins installed. My Safari has three\u00a0and my Firefox has seven;\u00a0they're the first thing","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-08-23T16:45:13+00:00","article_modified_time":"2017-08-24T16:51:49+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-Security.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jay Vrijenhoek","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-Security.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-Security.png","width":400,"height":260,"caption":"How Malicious Plugins Compromise Mac Security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/","name":"How Malicious Plugins Can Compromise Your Mac - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#primaryimage"},"datePublished":"2017-08-23T16:45:13+00:00","dateModified":"2017-08-24T16:51:49+00:00","description":"I cannot remember a time in which my browsers did not have a few plug-ins installed. My Safari has three\u00a0and my Firefox has seven;\u00a0they're the first thing","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How Malicious Plugins Can Compromise Your Mac"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0"},"headline":"How Malicious Plugins Can Compromise Your Mac","datePublished":"2017-08-23T16:45:13+00:00","dateModified":"2017-08-24T16:51:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#webpage"},"wordCount":1050,"commentCount":1,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-Security.png","keywords":["Malware","Plugins"],"articleSection":["Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-malicious-plugins-can-compromise-your-mac\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/0106660ab83668e429deecc051dfa8c0","name":"Jay Vrijenhoek","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8f43effd03d0bb31acff4b88613f0d4a?s=96&d=mm&r=g","caption":"Jay Vrijenhoek"},"description":"Jay Vrijenhoek is an IT consultant with a passion for Mac security research.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/jay-vrijenhoek\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/08\/Malicious-Plugins-Security.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-h6U","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65776"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=65776"}],"version-history":[{"count":20,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65776\/revisions"}],"predecessor-version":[{"id":69295,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/65776\/revisions\/69295"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/69340"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=65776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=65776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=65776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}