{"id":6583,"date":"2012-10-16T09:53:19","date_gmt":"2012-10-16T16:53:19","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=6583"},"modified":"2024-07-29T12:07:10","modified_gmt":"2024-07-29T19:07:10","slug":"politically-motivated-malware-attacks-increasing-regardless-of-operating-system","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/","title":{"rendered":"Politically Motivated Malware Attacks Increasing Regardless of Operating System"},"content":{"rendered":"<p>Those of us in the anti-malware industry spend a lot of time talking about financially motivated malware. For those of you reading this, that is what most of you are most likely to be affected by, as everyone has something of value to cybercriminals on their machine, even if it&#8217;s just using the processing power of the machine to send spam. However, there are groups of people that have much more to worry about \u2013 they&#8217;re also in the malware cross-hairs for political reasons. In these cases, it doesn&#8217;t matter what sort of machine you use. Malware authors will find a way to get to you, regardless of how rare it is for the general population to be affected on that OS, unless you take the threat seriously.<\/p>\n<p>A recent article that <a href=\"https:\/\/web.archive.org\/web\/20221207183126\/https:\/\/www.esecurityplanet.com\/endpoint\/apts-target-mac-users\/\" target=\"_blank\" rel=\"noopener\">quoted Seth Hardy of The Citizen Lab<\/a>\u00a0brought up an interesting point about threats that have been discovered for Macs over the past few months: There has been an increasing number of politically-motivated targeted attacks. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-imuler-variant-found-steer-clear-of-your-dirty-pics\/\">Imuler<\/a>, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/tibet-c-malware-delivered-by-poisoned-word-documents-installs-backdoors-on-macs\/\">Tibet<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/new-sabpab-variant-uses-word-files-to-infect-macs\/\">Sabpab<\/a> targeted Tibetan activists, and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxcrisis-has-been-used-as-part-of-a-targeted-attack\/\">Crisis<\/a> targeted Moroccan journalists. There is evidence that a lot of people who are in positions to be targeted have moved away from Windows, thinking Macs were malware-proof. Clearly, that\u2019s not the case, and spyware continues to plague them.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/tibetan-activists.jpg\"><img loading=\"lazy\" class=\"aligncenter size-full wp-image-22005\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/tibetan-activists.jpg\" alt=\"tibetan activists\" width=\"500\" height=\"333\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/tibetan-activists.jpg 500w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/tibetan-activists-150x99.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/10\/tibetan-activists-300x199.jpg 300w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><em>Activists are increasingly becoming susceptible to malware attacks. <\/em><\/p>\n<p>Malware authors have proven on every platform that if there is a \u201cneed\u201d for malware (especially spyware), it can and will be created. <a href=\"https:\/\/www.eweek.com\/security\/zeus-trojan-variant-found-on-blackberry-phones\/\" target=\"_blank\" rel=\"noopener\">Trojans<\/a> and commercial spyware tools have even been discovered for Blackberries, which were ostensibly created with security in mind, for business applications. These spyware applications were created for cell phones as soon as phones started having the ability to run code \u2013 the more powerful the device, the more powerful the spyware could be.<\/p>\n<p>It\u2019s not significantly more difficult to develop malware for Macs, it\u2019s just that there is less money to be had on Macs due to the smaller market share. The malware landscape of OS X often resembles sort of a malware writer\u2019s value-add, creating an OS X version of an existing Windows malware kit. But if money is not the malware writer&#8217;s aim, if their end-goal is instead to spy on someone, a different OS version is not a significant hurdle.<\/p>\n<p>Regardless of what computing device you\u2019re using, you need to protect yourself. This can be of life or death importance if you\u2019re involved with politically sensitive groups like activism or journalism. The same advice we\u2019ve been giving for over a decade still applies:<\/p>\n<ul>\n<li>Don\u2019t open attachments you were not expecting (no matter how scary or titillating their content may seem)<\/li>\n<li>Apply layered security \u2013 paranoia plus anti-virus software alone does not count. Be sure to encrypt your traffic and use a firewall in addition to employing anti-virus software and paranoia.<\/li>\n<\/ul>\n<p>It&#8217;s unlikely that this surge in targeted attacks on OS X will decrease \u2013 the people sending these spyware tools have found success with the attacks, however limited they may be. If the attackers only need a few bits of information, the malware doesn&#8217;t need to be on a machine for long to be successful. Not every targeted attack needs to be like the <a href=\"https:\/\/www.wired.com\/2012\/06\/internet-security-fail\/\" target=\"_blank\" rel=\"noopener\">Stuxnet or Flame trojans<\/a> and lie dormant for years. If what you&#8217;re doing on your computer could be considered a threat to a government or state agency, your anonymity can be critically important, not something to simply be trusted to whatever protection may lie within the obscurity of your operating system of choice.<\/p>\n<p><span style=\"font-size: x-small;\">photo credit: <a href=\"https:\/\/www.flickr.com\/photos\/cyrilcavalie\/2398922618\/\" target=\"_blank\" rel=\"noopener\">Cyril Cavali\u00e9<\/a> (<a href=\"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/2.0\/\" target=\"_blank\" rel=\"noopener\">CC BY-ND 2.0<\/a>)<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Those of us in the anti-malware industry spend a lot of time talking about financially motivated malware. For those of you reading this, that is what most of you are most likely to be affected by, as everyone has something of value to cybercriminals on their machine, even if it&#8217;s just using the processing power [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":8763,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[86,863,125,2773,295],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Those of us in the anti-malware industry spend a lot of time talking about financially motivated malware. For those of you reading this, that is what most\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Politically Motivated Malware Attacks Increasing Regardless of Operating System - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Those of us in the anti-malware industry spend a lot of time talking about financially motivated malware. For those of you reading this, that is what most\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-16T16:53:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-29T19:07:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Lysa Myers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"width\":\"400\",\"height\":\"260\",\"caption\":\"Malware Alert from Intego\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/\",\"name\":\"Politically Motivated Malware Attacks Increasing Regardless of Operating System - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#primaryimage\"},\"datePublished\":\"2012-10-16T16:53:19+00:00\",\"dateModified\":\"2024-07-29T19:07:10+00:00\",\"description\":\"Those of us in the anti-malware industry spend a lot of time talking about financially motivated malware. For those of you reading this, that is what most\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Politically Motivated Malware Attacks Increasing Regardless of Operating System\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\"},\"headline\":\"Politically Motivated Malware Attacks Increasing Regardless of Operating System\",\"datePublished\":\"2012-10-16T16:53:19+00:00\",\"dateModified\":\"2024-07-29T19:07:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#webpage\"},\"wordCount\":605,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg\",\"keywords\":[\"Malware\",\"Moroccan journalists\",\"Spyware\",\"Tibetan\",\"Tibetan Activists\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a\",\"name\":\"Lysa Myers\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g\",\"caption\":\"Lysa Myers\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Those of us in the anti-malware industry spend a lot of time talking about financially motivated malware. For those of you reading this, that is what most","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/","og_locale":"en_US","og_type":"article","og_title":"Politically Motivated Malware Attacks Increasing Regardless of Operating System - The Mac Security Blog","og_description":"Those of us in the anti-malware industry spend a lot of time talking about financially motivated malware. For those of you reading this, that is what most","og_url":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-10-16T16:53:19+00:00","article_modified_time":"2024-07-29T19:07:10+00:00","og_image":[{"width":"400","height":"260","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Lysa Myers","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","width":"400","height":"260","caption":"Malware Alert from Intego"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/","name":"Politically Motivated Malware Attacks Increasing Regardless of Operating System - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#primaryimage"},"datePublished":"2012-10-16T16:53:19+00:00","dateModified":"2024-07-29T19:07:10+00:00","description":"Those of us in the anti-malware industry spend a lot of time talking about financially motivated malware. For those of you reading this, that is what most","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Politically Motivated Malware Attacks Increasing Regardless of Operating System"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a"},"headline":"Politically Motivated Malware Attacks Increasing Regardless of Operating System","datePublished":"2012-10-16T16:53:19+00:00","dateModified":"2024-07-29T19:07:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#webpage"},"wordCount":605,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","keywords":["Malware","Moroccan journalists","Spyware","Tibetan","Tibetan Activists"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/politically-motivated-malware-attacks-increasing-regardless-of-operating-system\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/12b11624d5a648c576d8dce6f93b230a","name":"Lysa Myers","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/783af524dca7753ceb3cd9a576398a0e?s=96&d=mm&r=g","caption":"Lysa Myers"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/lysam\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/12\/MalwareAlert-intego.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-1Ib","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/6583"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=6583"}],"version-history":[{"count":21,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/6583\/revisions"}],"predecessor-version":[{"id":101262,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/6583\/revisions\/101262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/8763"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=6583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=6583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=6583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}