{"id":67825,"date":"2017-07-06T08:59:18","date_gmt":"2017-07-06T15:59:18","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=67825"},"modified":"2017-07-06T08:59:18","modified_gmt":"2017-07-06T15:59:18","slug":"the-iphone-at-10-still-no-major-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/","title":{"rendered":"The iPhone at 10: Still No Major Malware"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-67873\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/iPhone-10-year-anniversary-no-malware.jpg\" alt=\"The iPhone at 10: Still No Major Malware\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/iPhone-10-year-anniversary-no-malware.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/iPhone-10-year-anniversary-no-malware-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/06\/iPhone-10-year-anniversary-no-malware-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Many people are writing about the success of the iPhone, and how ten years on, we can clearly see how it changed personal computing. As the fastest-selling consumer electronic device ever, this pocket computer has swept across the globe like a tsunami, selling hundreds of millions of units. In the past year alone, Apple has sold more than 200 million iPhones.<\/p>\n<p>One of the biggest successes of the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-10-security-and-privacy-features-explained\/\" target=\"_blank\">iPhone is its security<\/a>. In a time when surfing the web has its dangers, there has\u00a0been no serious malware in the ten years of its existence. Computer users have long been used to needing anti-virus software on their devices, especially on Windows PCs. Generally speaking, this software can slow down computers, isn&#8217;t totally reliable, and may be costly. (Free anti-virus software exists, but paid software is always better and more efficient.) Yet\u00a0we simply don&#8217;t need this on the iPhone.<\/p>\n<p>There has been <a href=\"https:\/\/www.intego.com\/mac-security-blog\/ios-malware-xsser-mrat-targets-jailbroken-ios-devices\/\" target=\"_blank\">malware found on\u00a0iOS devices<\/a>, but in limited circumstances, such as on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/225000-reasons-not-to-jailbreak-your-iphone-ios-malware-in-the-wild\/\" target=\"_blank\">Jailbroken iPhones<\/a>.\u00a0When users install a hacked version of iOS onto their phone, called &#8220;jailbreaking,&#8221; it allows the users to install apps that Apple doesn&#8217;t sell in its App Store; as a result, these\u00a0phones are susceptible to malware, since these &#8220;hacked&#8221; versions of iOS don&#8217;t have the same protection as the real thing.<\/p>\n<p>The occasional malware that surfaces targeting iOS devices, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/\" target=\"_blank\">including<\/a> <a href=\"https:\/\/www.intego.com\/mac-security-blog\/hackers-target-ios-using-government-officials-and-journalists-in-pawn-storm-malware-attack\/\" target=\"_blank\">non-jailbroken iPhones<\/a>, have thus far required users to perform a number of steps in order to get infected. For example, one malware, <a href=\"https:\/\/www.intego.com\/mac-security-blog\/acedeceiver-malware-can-infect-non-jailbroken-ios-devices\/\" target=\"_blank\">dubbed AceDeceiver<\/a>, would only infect devices if users install an infected app on their Windows PCs. The Windows app managed to get around Apple&#8217;s FairPlay DRM system to install malicious apps on the device.<\/p>\n<p>In other cases,\u00a0apps may be installed via <a href=\"https:\/\/www.intego.com\/mac-security-blog\/masque-attack-ios-vulnerability-or-feature-by-design\/\" target=\"_blank\">enterprise provisioning<\/a>, a system that allows companies to install apps they&#8217;ve developed, for their employees only, and not sold on the App Store. If someone manages to hack one of these apps, they can infect devices. However, this malware can&#8217;t spread beyond the pool of iPhones that use the company&#8217;s provisioning profile, and their effect on an iPhone is very limited.<\/p>\n<p>In total, only <a href=\"https:\/\/www.theiphonewiki.com\/wiki\/Malware_for_iOS\">a few dozen malicious apps or exploits<\/a> have been discovered, most of which require jailbroken iPhones, can only target specific people, or only work on older versions of iOS.<\/p>\n<p>So, how has Apple managed to create a mobile platform with no major malware in its first 10 years of existence?\u00a0Here\u00a0are\u00a0five ways Apple&#8217;s iOS protects you from major malware.<\/p>\n<h3 id=\"theappstore\">1. The App Store<\/h3>\n<p>Apple&#8217;s first line of defense is its App Store. Every app is reviewed, and, while it&#8217;s possible that the occasional app can sneak through the review process, this is rare. Since you can only install software from the App Store \u2014 with the exception of jailbroken devices, where you know you are taking a risk, and the limited case of enterprise provisioning \u2014 you&#8217;re much safer than on other platforms.<\/p>\n<p>It&#8217;s not possible to install an app on an iOS device from, say, a web page, so you won&#8217;t encounter &#8220;drive-by downloads,&#8221; which you may see on the desktop. These are apps that are downloaded automatically when you visit malicious web pages, and that, in some cases, according to your computer&#8217;s settings, may install surreptitiously.<\/p>\n<h3 id=\"codesigning\">2. Code Signing<\/h3>\n<p>Code signing is something used with the App Store, but also with apps that one may design and install oneself, such as through enterprise provisioning. Each app developer has a certificate provided by Apple, and these certificates \u2014 think of them as a sort of key \u2014 ensure that an app is validated. Apps cannot masquerade as other apps. If you&#8217;re of a technical bent, and want to learn more (a lot more) about iOS security, you can read Apple&#8217;s <a href=\"https:\/\/www.apple.com\/business\/docs\/iOS_Security_Guide.pdf\">iOS Security Guide<\/a>.<\/p>\n<h3 id=\"sandboxing\">3. Sandboxing<\/h3>\n<p>With sandboxing, each app or process than runs is isolated from the rest of the operating system, from apps, and from your personal files, with the exception of those files that it is intended to work with. This is one of the most powerful tools that prevents malware from accessing data or infecting other apps, as well as ensuring that your data is safe.<\/p>\n<h3 id=\"privileges\">4. Privileges<\/h3>\n<p>As part of sandboxing, each app runs in a &#8220;container,&#8221; which limits its access to other apps, files, and data. An app asks for &#8220;entitlements,&#8221; which are the system resources it needs to use, and cannot access any other part of the operating system, or any other data.<\/p>\n<h3 id=\"iosupdates\">5. iOS Updates<\/h3>\n<p>Apple&#8217;s iOS is updated regularly, both in incremental releases, which include security fixes, and in major versions, such as iOS 9, iOS 10, etc. The fact that these are free and available to most operating iOS devices means that the majority of users upgrade. They are therefore protected through new security mechanisms, and this also limits older potential malware from affecting devices.<\/p>\n<p>As of writing\u00a0this article, 86%\u00a0of iOS devices run iOS 10. Compare this to Android, where, because of the way updates are distributed, only a few percent of users are running the most up to date version of the operating system.<\/p>\n<h3 id=\"summingup\">Bottom Line<\/h3>\n<p>No operating system is 100% secure, but Apple has done a great job of protecting iOS users, and their data. The most serious threats on iOS devices come from websites that may look legitimate and ask users to enter their user name and password. But in 10 years of the iPhone, there has not been a single case of malware that was more than just a flash in the pan. With Apple&#8217;s stringent security on the platform, it&#8217;s safe to assume that this will continue.<\/p>\n<p><strong><i>Have something to say about this story? Share your comments below!<\/i><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many people are writing about the success of the iPhone, and how ten years on, we can clearly see how it changed personal computing. As the fastest-selling consumer electronic device ever, this pocket computer has swept across the globe like a tsunami, selling hundreds of millions of units. In the past year alone, Apple has [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":67885,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7],"tags":[69,9,86,319],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Many people are writing about the success of the iPhone, and how ten years on, we can clearly see how it changed personal computing. As the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The iPhone at 10: Still No Major Malware - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Many people are writing about the success of the iPhone, and how ten years on, we can clearly see how it changed personal computing. As the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-06T15:59:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/iPhone-10-Years.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/iPhone-10-Years.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/iPhone-10-Years.jpg\",\"width\":400,\"height\":260,\"caption\":\"iPhone 10 Years No Malware\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/\",\"name\":\"The iPhone at 10: Still No Major Malware - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#primaryimage\"},\"datePublished\":\"2017-07-06T15:59:18+00:00\",\"dateModified\":\"2017-07-06T15:59:18+00:00\",\"description\":\"Many people are writing about the success of the iPhone, and how ten years on, we can clearly see how it changed personal computing. As the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The iPhone at 10: Still No Major Malware\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"The iPhone at 10: Still No Major Malware\",\"datePublished\":\"2017-07-06T15:59:18+00:00\",\"dateModified\":\"2017-07-06T15:59:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#webpage\"},\"wordCount\":942,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/iPhone-10-Years.jpg\",\"keywords\":[\"iOS\",\"iPhone\",\"Malware\",\"Security\"],\"articleSection\":[\"Apple\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Many people are writing about the success of the iPhone, and how ten years on, we can clearly see how it changed personal computing. As the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/","og_locale":"en_US","og_type":"article","og_title":"The iPhone at 10: Still No Major Malware - The Mac Security Blog","og_description":"Many people are writing about the success of the iPhone, and how ten years on, we can clearly see how it changed personal computing. As the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-07-06T15:59:18+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/iPhone-10-Years.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/iPhone-10-Years.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/iPhone-10-Years.jpg","width":400,"height":260,"caption":"iPhone 10 Years No Malware"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/","name":"The iPhone at 10: Still No Major Malware - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#primaryimage"},"datePublished":"2017-07-06T15:59:18+00:00","dateModified":"2017-07-06T15:59:18+00:00","description":"Many people are writing about the success of the iPhone, and how ten years on, we can clearly see how it changed personal computing. As the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The iPhone at 10: Still No Major Malware"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"The iPhone at 10: Still No Major Malware","datePublished":"2017-07-06T15:59:18+00:00","dateModified":"2017-07-06T15:59:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#webpage"},"wordCount":942,"commentCount":3,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/iPhone-10-Years.jpg","keywords":["iOS","iPhone","Malware","Security"],"articleSection":["Apple"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-iphone-at-10-still-no-major-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/07\/iPhone-10-Years.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-hDX","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/67825"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=67825"}],"version-history":[{"count":20,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/67825\/revisions"}],"predecessor-version":[{"id":67894,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/67825\/revisions\/67894"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/67885"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=67825"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=67825"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=67825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}