{"id":76207,"date":"2018-03-06T15:12:11","date_gmt":"2018-03-06T23:12:11","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=76207"},"modified":"2022-09-27T11:58:56","modified_gmt":"2022-09-27T18:58:56","slug":"month-in-review-apple-security-in-february-2018","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/","title":{"rendered":"Month in review: Apple security in February 2018"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-76306\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/apple-security-news-feb-2018.png\" alt=\"Apple security news February 2018\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/apple-security-news-feb-2018.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/apple-security-news-feb-2018-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/apple-security-news-feb-2018-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>February\u00a0brought to light\u00a0four families of Mac malware: Intego discovered OSX\/Shlayer, two RATs were found, and a popular Mac software download site distributed Trojanized versions of Firefox, OnyX, and Deeper.<\/p>\n<p>Meanwhile:\u00a0a single Telugu character\u00a0allowed pranksters\u00a0to crash\u00a0iOS devices and Macs, Apple&#8217;s T2 chip\u00a0brings security improvements to the new iMac Pro, and a government contractor claims it can unlock any iOS device.\u00a0Read on for these stories and more!<\/p>\n<h3>New Mac Malware: OSX\/Shlayer Discovered by Intego<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-75826\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-300x177.png\" alt=\"\" width=\"300\" height=\"177\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-300x177.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-150x89.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-768x453.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-1024x604.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo-657x388.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/OSX-Shlayer_logo.png 1525w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>In mid-February, Intego researchers discovered <strong>OSX\/Shlayer<\/strong>, an interesting new twist on a classic malware attack. OSX\/Shlayer comes in the form of a\u00a0fake Flash Player installer, but what&#8217;s unusual\u00a0is that it\u00a0leverages code-signed shell scripts\u00a0to do its dirty work.<\/p>\n<p>Intego researchers found OSX\/Shlayer spreading via BitTorrent file sharing sites, appearing as a\u00a0fake Flash Player update when a user attempted to select a link to copy a torrent\u00a0<a href=\"https:\/\/lifehacker.com\/5875899\/what-are-magnet-links-and-how-do-i-use-them-to-download-torrents\" target=\"_blank\" rel=\"noopener\">magnet link<\/a>.\u00a0Of course, readers who don&#8217;t search for torrents should still be wary;\u00a0fake Flash Player alerts can be found in many places on the Web.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-31660\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350-139x150.jpeg\" alt=\"\" width=\"139\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350-139x150.jpeg 139w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350-278x300.jpeg 278w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/09\/trojan-325x350.jpeg 325w\" sizes=\"(max-width: 139px) 100vw, 139px\" \/>OSX\/Shlayer is both a <strong>Trojan horse<\/strong>\u2014meaning that it masquerades as something that it&#8217;s not,\u00a0in this case a Flash Player installer\u2014and a <strong>dropper<\/strong>, meaning that its main purpose is to download a secondary infection.<\/p>\n<p>Intego observed variants of\u00a0OSX\/Shlayer downloading and installing\u00a0<strong>OSX\/MacOffers<\/strong>\u00a0or\u00a0<strong>OSX\/Bundlore<\/strong> adware onto infected Macs.<\/p>\n<p>Intego VirusBarrier\u00a0was the first anti-virus software to detect this malware;\u00a0its\u00a0three variants\u00a0are detected as\u00a0<strong>OSX\/Shlayer.A<\/strong>,\u00a0<strong>OSX\/Shlayer.B<\/strong>, and\u00a0<strong>OSX\/Shlayer.C<\/strong>. VirusBarrier also detects the secondary adware infections.<\/p>\n<p>For more details about OSX\/Shlayer, shell scripts, and code signing, see our featured article:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"ovyAFlEhi8\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\">OSX\/Shlayer: New Mac malware comes out of its shell<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;OSX\/Shlayer: New Mac malware comes out of its shell&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/embed\/#?secret=ovyAFlEhi8\" data-secret=\"ovyAFlEhi8\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>New Mac Malware:\u00a0OSX\/Coldroot RAT<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-76099\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/OSX-ColdRoot-Logo-248x300.png\" alt=\"\" width=\"165\" height=\"200\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/OSX-ColdRoot-Logo-248x300.png 248w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/OSX-ColdRoot-Logo-124x150.png 124w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/OSX-ColdRoot-Logo-657x795.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/OSX-ColdRoot-Logo.png 661w\" sizes=\"(max-width: 165px) 100vw, 165px\" \/>Coincidentally, the same weekend that Intego researchers discovered OSX\/Shlayer,\u00a0Patrick Wardle smelled a RAT.<\/p>\n<p>In\u00a0preparation for a talk at an upcoming security conference,\u00a0Wardle searched\u00a0VirusTotal\u00a0for a sample of malware that attempts to\u00a0directly modify\u00a0a macOS database file (TCC.db) to grant itself special permissions. He found\u00a0a sample that was undetected by all 60 of VirusTotal&#8217;s anti-virus engines but that\u00a0nevertheless looked suspicious to a trained researcher&#8217;s eye.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-76111\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured-150x98.png\" alt=\"\" width=\"150\" height=\"98\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured-150x98.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured-300x195.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured-305x200.png 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Coldroot-official-logo-featured.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Wardle discovered that the sample was a previously undetected RAT\u2014a remote administration tool designed to be installed with malicious intent, without the user&#8217;s knowledge. Evidently developed in 2016 and 2017, the malware had kept a low profile until Wardle&#8217;s discovery.<\/p>\n<p>The\u00a0RAT, which Intego VirusBarrier detects as <strong>OSX\/Coldroot<\/strong>,\u00a0has the capability of performing a number of functions for\u00a0a\u00a0remote\u00a0attacker such as:<\/p>\n<ul>\n<li>log everything the user types, including passwords<\/li>\n<li>list, rename, or delete files and folders<\/li>\n<li>list the apps that are currently running<\/li>\n<li>launch or quit apps<\/li>\n<li>download or upload files<\/li>\n<li>determine which window is currently in the foreground<\/li>\n<li>stream continuous screenshots to the attacker<\/li>\n<li>shut down the computer<\/li>\n<\/ul>\n<p>For more details about OSX\/Coldroot including how to\u00a0know whether\u00a0your Mac is infected, and for a comparison with other recently discovered Mac RATs, see our featured article:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"zHbkyVVVlg\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/\">OSX\/Coldroot and the RAT invasion<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;OSX\/Coldroot and the RAT invasion&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/osxcoldroot-and-the-rat-invasion\/embed\/#?secret=zHbkyVVVlg\" data-secret=\"zHbkyVVVlg\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>New Mac Malware:\u00a0OSX\/EvilOSX RAT<\/h3>\n<p>Coldroot wasn&#8217;t the only RAT discovered in February.<\/p>\n<p><strong><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76033\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/EvilOSX-Malware-139x150.png\" alt=\"EvilOSX RAT logo\" width=\"139\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/EvilOSX-Malware-139x150.png 139w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/EvilOSX-Malware-279x300.png 279w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/EvilOSX-Malware.png 325w\" sizes=\"(max-width: 139px) 100vw, 139px\" \/>OSX\/EvilOSX<\/strong>, which first appeared in 2017, coincidentally came out with a new variant right around the time that Wardle discovered OSX\/Coldroot.<\/p>\n<p>Interestingly, in spite of including features that are overtly malicious in nature, EvilOSX is developed as open-source software that&#8217;s freely available on GitHub, a popular software development repository.<\/p>\n<p>This makes it relatively easy for any\u00a0would-be attacker to download the software and\u00a0use it to gain remote administrator privileges over\u00a0someone else&#8217;s Mac\u2014as long as they can get physical access, or can trick\u00a0a victim\u00a0into installing the software.<\/p>\n<p>An attacker\u00a0can supposedly leverage EvilOSX to\u00a0do things such as the following with\u00a0a victim&#8217;s Mac:<\/p>\n<ul>\n<li>take a picture using the Mac&#8217;s built-in camera<\/li>\n<li>retrieve passwords from Google Chrome<\/li>\n<li>retrieve browser history from Safari\u00a0and Chrome<\/li>\n<li>retrieve iCloud tokens and contacts<\/li>\n<li>phish\u00a0for iCloud passwords via iTunes<\/li>\n<li>download\u00a0or upload files<\/li>\n<li>engage in a denial of service (DoS) attack<\/li>\n<\/ul>\n<p>Intego detects this RAT as <strong>OSX\/EvilOSX<\/strong>.\u00a0For more details, see our featured article:<\/p>\n<p>https:\/\/www.intego.com\/mac-security-blog\/new-evilosx-malware-spotlights-risk-of-poor-password-hygiene\/<a name=\"CreativeUpdater\"><\/a><\/p>\n<h3>MacUpdate Mistakenly Distributes Trojanized Apps<\/h3>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-76243\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firefox-OnyX-Deeper.png\" alt=\"\" width=\"400\" height=\"179\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firefox-OnyX-Deeper.png 647w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firefox-OnyX-Deeper-150x67.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Firefox-OnyX-Deeper-300x134.png 300w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/>At the beginning of February, popular Mac software download site MacUpdate unintentionally distributed infected copies of three Mac apps:\u00a0Mozilla&#8217;s\u00a0Firefox browser, and Titanium Software&#8217;s utility\u00a0apps OnyX and Deeper.<\/p>\n<p>Evidently, attackers\u00a0successfully tricked MacUpdate admins into changing the download links for the three apps by registering look-alike domain names. The attackers had repackaged the legitimate utilities and added a malicious payload to them: dropper malware that would download a cryptocurrency miner\u00a0hosted on\u00a0Adobe Creative Cloud servers.<\/p>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76123\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-150x150.png\" alt=\"\" width=\"125\" height=\"125\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-768x771.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-657x659.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/App-Store-icon-High-Sierra.png 916w\" sizes=\"(max-width: 125px) 100vw, 125px\" \/>It&#8217;s generally safest to\u00a0download apps from\u00a0Apple&#8217;s official App Stores if possible. Whenever an app isn&#8217;t available though the Mac App Store (as is the case with Firefox, OnyX, and Deeper), it&#8217;s safest to download the software\u00a0directly from the developer&#8217;s own site\u00a0rather than trying to obtain them via a third-party download site.<\/p>\n<p>If you&#8217;re interested in all\u00a0the\u00a0technical details about the malware,\u00a0you can read Patrick Wardle&#8217;s <a href=\"https:\/\/objective-see.com\/blog\/blog_0x29.html\" target=\"_blank\" rel=\"noopener\">write-up<\/a>.<\/p>\n<p>Intego VirusBarrier detects the infection&#8217;s components as <strong>OSX\/CreativeUpdater<\/strong> and <strong>OSX\/Miner<\/strong>.<\/p>\n<h3>New iMac Pro&#8217;s T2 Chip\u00a0Enhances Security<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-76237\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Apple_T2_chip-292x300.jpg\" alt=\"\" width=\"146\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Apple_T2_chip-292x300.jpg 292w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Apple_T2_chip-146x150.jpg 146w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Apple_T2_chip-32x32.jpg 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Apple_T2_chip-50x50.jpg 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Apple_T2_chip.jpg 467w\" sizes=\"(max-width: 146px) 100vw, 146px\" \/>Apple announced that its new iMac Pro desktop computers contain an Apple chip called T2,\u00a0which\u00a0improves both security and performance. T2 is the\u00a0successor to the\u00a0T1 chip\u00a0included in Apple&#8217;s MacBook Pro with Touch Bar.<\/p>\n<p>Apple says that its T2 chip includes &#8220;a Secure Enclave coprocessor that provides the foundation for new encrypted storage and secure boot capabilities.&#8221;<\/p>\n<p>Let&#8217;s just hope that Apple&#8217;s inclusion of a chip called &#8220;T2&#8221; doesn&#8217;t mean that <a href=\"https:\/\/en.wikipedia.org\/wiki\/Terminator_2:_Judgment_Day\" target=\"_blank\" rel=\"noopener\">Judgment Day<\/a> is nigh.<\/p>\n<p>For more details, see our featured article:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"Vjr1a8M2ko\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/\">Apple&#8217;s New iMac Pro Delivers Enhanced Security with the T2 Chip<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple&#8217;s New iMac Pro Delivers Enhanced Security with the T2 Chip&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apples-new-imac-pro-delivers-enhanced-security-with-the-t2-chip\/embed\/#?secret=Vjr1a8M2ko\" data-secret=\"Vjr1a8M2ko\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>Apple Security Updates<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-full wp-image-75307\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iOS-Settings-app-software-update-available.png\" alt=\"\" width=\"111\" height=\"112\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iOS-Settings-app-software-update-available.png 221w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iOS-Settings-app-software-update-available-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iOS-Settings-app-software-update-available-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iOS-Settings-app-software-update-available-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iOS-Settings-app-software-update-available-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iOS-Settings-app-software-update-available-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/iOS-Settings-app-software-update-available-128x128.png 128w\" sizes=\"(max-width: 111px) 100vw, 111px\" \/>Apple issued security updates on February 19 for macOS High Sierra (as a Supplemental Update for 10.13.3), iOS (as 11.2.6), watchOS (as 4.2.3), and tvOS (as 11.2.6).<\/p>\n<p>The updates addressed only a single vulnerability,\u00a0via which &#8220;a maliciously crafted string&#8221; of characters could cause memory corruption, leading to a crash or unstable state.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-75883\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Telugu-character-145x150.png\" alt=\"\" width=\"87\" height=\"90\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Telugu-character-145x150.png 145w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Telugu-character-290x300.png 290w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Telugu-character-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/02\/Telugu-character.png 442w\" sizes=\"(max-width: 87px) 100vw, 87px\" \/>The bug became widely known in mid-February when a particular Telugu character\u00a0sent via iMessage or\u00a0through third-party messaging apps caused Apple devices to crash (as <a href=\"http:\/\/podcast.intego.com\/19\" target=\"_blank\" rel=\"noopener\">discussed<\/a> on the <a href=\"https:\/\/podcast.intego.com\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a>).<\/p>\n<p>Interestingly, the bug may have been reported to Apple more than a month earlier; Apple seems to have reserved\u00a0the bug&#8217;s\u00a0<a href=\"http:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-4124\" target=\"_blank\" rel=\"noopener\">CVE\u00a0number<\/a>\u00a0on January 2.<\/p>\n<p>For more details on\u00a0the updates, see our featured article:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"j2HIUwAONI\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-security-updates-to-patch-the-telugu-character-bug\/\">Apple Releases Security Updates to Patch the Telugu Character Bug<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Apple Releases Security Updates to Patch the Telugu Character Bug&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-security-updates-to-patch-the-telugu-character-bug\/embed\/#?secret=j2HIUwAONI\" data-secret=\"j2HIUwAONI\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<h3>iBoot Source Code from iOS 9 Leaked<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-70324\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-150x150.png\" alt=\"\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/09\/iOS-9-icon-1024x1024.png 1024w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>Source code\u00a0from iOS 9&#8217;s version of iBoot, the bootloader portion of\u00a0Apple&#8217;s mobile operating system, was leaked\u00a0on GitHub in early February, <a href=\"https:\/\/techcrunch.com\/2018\/02\/08\/apple-addresses-ios-source-code-leak-says-it-appears-to-be-tied-to-three-year-old-software\/\" target=\"_blank\" rel=\"noopener\">reports<\/a> TechCrunch.<\/p>\n<p>Although this does not pose an immediate threat to iOS device users, it could potentially give hackers greater insight into how Apple&#8217;s boot process works. Motherboard <a href=\"https:\/\/motherboard.vice.com\/amp\/en_us\/article\/a34g9j\/iphone-source-code-iboot-ios-leak\" target=\"_blank\" rel=\"noopener\">notes<\/a> that past vulnerabilities in iBoot have\u00a0enabled\u00a0&#8220;jailbreakers and hackers to brute-force their way through the iPhone&#8217;s lock screen and decrypt a user&#8217;s data,&#8221; but thanks to the <a href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-august-2017\/\" target=\"_blank\" rel=\"noopener\">Secure Enclave Processor<\/a> and other modern enhancements, such a\u00a0leak poses less risk today.<\/p>\n<p>Motherboard later <a href=\"https:\/\/motherboard.vice.com\/en_us\/article\/xw5yd7\/how-iphone-iboot-source-code-leaked-on-github\" target=\"_blank\" rel=\"noopener\">reported<\/a>\u00a0details about how the iBoot source code was leaked, allegedly through an intern who worked at Apple&#8217;s Cupertino headquarters in 2016.<\/p>\n<h3>Cellebrite Claims It Can Unlock Any iOS Device<\/h3>\n<p><img loading=\"lazy\" class=\"alignright size-medium wp-image-76240\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Cellebrite_logo-300x62.png\" alt=\"\" width=\"300\" height=\"62\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Cellebrite_logo-300x62.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Cellebrite_logo-150x31.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Cellebrite_logo-768x158.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Cellebrite_logo-1024x211.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Cellebrite_logo-657x135.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Cellebrite_logo.png 1030w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>Cellebrite,\u00a0the Israeli company which the FBI <a href=\"http:\/\/appleinsider.com\/articles\/16\/03\/23\/fbi-using-israeli-firm-cellebrite-to-help-break-into-san-bernardino-terrorists-iphone\">allegedly\u00a0hired<\/a> to unlock San Bernardino shooter Syed Farook&#8217;s iPhone, claims it\u00a0now has the capability to unlock any iOS device\u00a0running\u00a0all recent\u00a0versions of the operating system,\u00a0from iOS\u00a05 through the latest iOS\u00a011.2.6,\u00a0<a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/02\/26\/government-can-access-any-apple-iphone-cellebrite\/\" target=\"_blank\" rel=\"noopener\">reports<\/a>\u00a0Forbes.<\/p>\n<p><img loading=\"lazy\" class=\"alignleft size-thumbnail wp-image-70768\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/apple-iphone-8-vs-iphone-x-150x102.png\" alt=\"iPhone 8 and iPhone X\" width=\"150\" height=\"102\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/apple-iphone-8-vs-iphone-x-150x102.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/apple-iphone-8-vs-iphone-x-300x203.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/apple-iphone-8-vs-iphone-x.png 325w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>The company can reportedly unlock all iOS devices, including all models of iPhone (even the newest ones, iPhone\u00a08 and iPhone X), iPad, iPad mini, iPad Pro,\u00a0and iPod touch.<\/p>\n<p>Rather than offering this feature via software to governments\u00a0and law enforcement agencies, Cellebrite\u00a0requires that agencies\u00a0must physically send devices to the company. Presumably, Cellebrite&#8217;s goal is to\u00a0delay the inevitable:\u00a0Apple eventually finding and patching the vulnerability that&#8217;s being used\u00a0to\u00a0break into the devices.<\/p>\n<p>Should privacy-conscious iOS users be worried? Perhaps not. Cryptography expert Bruce Schneier\u00a0<a href=\"https:\/\/www.schneier.com\/blog\/archives\/2018\/02\/cellebrite_unlo.html\" target=\"_blank\" rel=\"noopener\">remarks<\/a> that,<\/p>\n<blockquote><p><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-64081\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-150x112.png\" alt=\"\" width=\"150\" height=\"112\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-150x112.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-300x225.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-768x576.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-1024x768.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier-657x493.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/03\/BruceSchneier.png 1067w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>&#8220;There&#8217;s&#8230; a credible rumor that Cellebrite&#8217;s\u00a0[methods] only defeat the mechanism that limits the number of password attempts. It does not allow engineers to move the encrypted data off the phone and run an offline password cracker. If this is true, then strong passwords are still secure.&#8221;<\/p><\/blockquote>\n<h3>Other Security News, in Brief<\/h3>\n<p>There were other notable goings-on in the security world in February. Some highlights:<\/p>\n<ul>\n<li><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-71818\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png\" alt=\"\" width=\"40\" height=\"40\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png 300w\" sizes=\"(max-width: 40px) 100vw, 40px\" \/>Four episodes of the\u00a0<strong>Intego\u00a0Mac Podcast<\/strong>\u00a0were published in February.\u00a0<strong>Be sure to\u00a0<a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe<\/a><\/strong>\u00a0to make sure you don&#8217;t miss\u00a0any future episodes!\u00a0This month&#8217;s topics\u00a0included:\n<ul>\n<li><a href=\"http:\/\/podcast.intego.com\/17\" target=\"_blank\" rel=\"noopener\">Blocking ads: the ethics and the benefits<\/a><\/li>\n<li><a href=\"http:\/\/podcast.intego.com\/18\" target=\"_blank\" rel=\"noopener\">Mac backup tips \/ Namecheap subdomain hack\u00a0\/ top stories of 2017<\/a><\/li>\n<li><a href=\"http:\/\/podcast.intego.com\/19\" target=\"_blank\" rel=\"noopener\">Inviting AIs to spy on us (Siri, Alexa, et al.) \/ Telugu character causes crashes<\/a><\/li>\n<li><a href=\"http:\/\/podcast.intego.com\/20\" target=\"_blank\" rel=\"noopener\">OSX\/Shlayer malware \/ Apple OSes: &#8220;To beta or not to beta&#8221; \/ APFS bug<br \/>\n<\/a><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" class=\"alignnone size-thumbnail wp-image-73078\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes-150x55.png\" alt=\"Get it on iTunes\" width=\"109\" height=\"40\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes-150x55.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes-300x110.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/Get-it-on-iTunes.png 646w\" sizes=\"(max-width: 109px) 100vw, 109px\" \/><\/a><\/li>\n<\/ul>\n<\/li>\n<li><strong><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76249\" title=\"Flag of the People's Republic of China\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Flag_of_the_Peoples_Republic_of_China-320px-150x100.png\" alt=\"Flag of the People's Republic of China\" width=\"40\" height=\"27\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Flag_of_the_Peoples_Republic_of_China-320px-150x100.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Flag_of_the_Peoples_Republic_of_China-320px-300x200.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Flag_of_the_Peoples_Republic_of_China-320px-305x200.png 305w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Flag_of_the_Peoples_Republic_of_China-320px.png 320w\" sizes=\"(max-width: 40px) 100vw, 40px\" \/>Apple has begun hosting Chinese citizens&#8217; iCloud accounts in a new data center in China<\/strong>\u00a0to comply with Chinese law,\u00a0<a href=\"https:\/\/www.reuters.com\/article\/us-china-apple-icloud-insight\/apple-moves-to-store-icloud-keys-in-china-raising-human-rights-fears-idUSKCN1G8060\" target=\"_blank\" rel=\"noopener\">reports<\/a>\u00a0Reuters; this allows Chinese authorities to avoid having to go through the U.S. legal system to request access to Chinese citizens&#8217; iCloud accounts<\/li>\n<li><strong><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76252\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/fish-hook-phishing-75x150.png\" alt=\"\" width=\"20\" height=\"40\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/fish-hook-phishing-75x150.png 75w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/fish-hook-phishing-150x300.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/fish-hook-phishing.png 320w\" sizes=\"(max-width: 20px) 100vw, 20px\" \/>Apple warns how to avoid App Store and iTunes Store phishing e-mails<\/strong> in a new <a href=\"https:\/\/support.apple.com\/en-us\/HT201679\" target=\"_blank\" rel=\"noopener\">support document<\/a><\/li>\n<li><strong>Those\u00a0who have bought or sold\u00a0a used Mac<\/strong>, or who\u00a0are considering doing so, should read Brenden Mulligan&#8217;s\u00a0<a href=\"https:\/\/medium.com\/@mulligan\/how-i-sold-an-old-mac-and-unknowingly-tracked-its-location-for-over-3-years-9a35cd3ca4cf\" target=\"_blank\" rel=\"noopener\">report<\/a>\u00a0about how he unknowingly had access to a Mac&#8217;s location for 3 years after he sold it<\/li>\n<li><strong>More than four thousand sites\u2014including U.S. government\u00a0sites\u2014were hijacked\u00a0for cryptomining<img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-73084\" title=\"Monero cryptocurrency logo\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-150x150.png\" alt=\"Monero cryptocurrency logo\" width=\"40\" height=\"40\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-1024x1024.png 1024w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/monero-128x128.png 128w\" sizes=\"(max-width: 40px) 100vw, 40px\" \/><\/strong>, facilitated by the sites&#8217; use of Browsealoud, a JavaScript file hosted on a third-party site that was compromised,\u00a0<a href=\"https:\/\/www.grahamcluley.com\/government-websites-hijacked-cryptomining-plugin\/\" target=\"_blank\" rel=\"noopener\">reports<\/a> Graham Cluley; the attackers only mined U.S. $24 worth of Monero cryptocurrency before being shut down,\u00a0<a href=\"https:\/\/www.theguardian.com\/technology\/2018\/feb\/14\/cryptojacking-campaign-24-dollars-hackers-cryptocurrency-salon\" target=\"_blank\" rel=\"noopener\">reports<\/a> The Guardian\n<ul>\n<li>In case you missed it,\u00a0we covered\u00a0cryptojacking\u2014and how to protect yourself from it\u2014in\u00a0the <a href=\"http:\/\/podcast.intego.com\/5\" target=\"_blank\" rel=\"noopener\">November 15 episode<\/a> of the Intego Mac Podcast<\/li>\n<\/ul>\n<\/li>\n<li><strong><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76258\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Have_I_Been_Pwned_logo-150x150.png\" alt=\"\" width=\"40\" height=\"40\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Have_I_Been_Pwned_logo-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Have_I_Been_Pwned_logo-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Have_I_Been_Pwned_logo-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Have_I_Been_Pwned_logo-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Have_I_Been_Pwned_logo-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Have_I_Been_Pwned_logo-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Have_I_Been_Pwned_logo.png 240w\" sizes=\"(max-width: 40px) 100vw, 40px\" \/>Have I Been Pwned launched a new version of its Pwned Passwords service<\/strong>\u00a0that allows users to\u00a0look up whether\u00a0a\u00a0password has been leaked in a past data breach,\u00a0<a href=\"https:\/\/www.troyhunt.com\/ive-just-launched-pwned-passwords-version-2\/\" target=\"_blank\" rel=\"noopener\">reports<\/a>\u00a0service creator Troy Hunt; AgileBits <a href=\"https:\/\/blog.agilebits.com\/2018\/02\/22\/finding-pwned-passwords-with-1password\/\" target=\"_blank\" rel=\"noopener\">reports<\/a>\u00a0that it has updated its 1Password.com online\u00a0password manager\u00a0to integrate\u00a0with this lookup service<\/li>\n<li><strong><img loading=\"lazy\" class=\"alignright size-thumbnail wp-image-76255\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-150x150.png\" alt=\"\" width=\"40\" height=\"40\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-150x150.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-300x300.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-768x768.png 768w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-657x657.png 657w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-32x32.png 32w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-50x50.png 50w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-64x64.png 64w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-96x96.png 96w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon-128x128.png 128w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/Signal-iOS-icon.png 1024w\" sizes=\"(max-width: 40px) 100vw, 40px\" \/>Open Whisper Systems has launched the Signal Foundation<\/strong>, a 501(c)(3) nonprofit organization, to support\u00a0the development of Signal, a popular secure messaging app,\u00a0<a href=\"https:\/\/signal.org\/blog\/signal-foundation\/\" target=\"_blank\" rel=\"noopener\">reports<\/a>\u00a0OWS founder Moxie Marlinspike<\/li>\n<li>As a reminder, in the United States tax season began on January 30;\u00a0<strong>U.S. citizens should file their tax returns as soon as practical<\/strong>\u00a0to help\u00a0prevent scammers from fraudulently filing for you<\/li>\n<\/ul>\n<h3>Stay Tuned! Subscribe to The Mac Security Blog<\/h3>\n<p>Be sure to subscribe to\u00a0<strong>The Mac Security Blog<\/strong>\u00a0to stay informed about Apple security throughout each month.<\/p>\n<p>Also, each week we discuss Mac and iOS security news and other topics of interest on the\u00a0<strong>Intego Mac Podcast<\/strong>. You&#8217;ll want to\u00a0<a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\">subscribe in iTunes\/Podcasts<\/a>\u00a0to make sure you don&#8217;t miss any shows! Show notes are available at\u00a0<a href=\"http:\/\/podcast.intego.com\" target=\"_blank\" rel=\"noopener\">podcast.intego.com<\/a>.<\/p>\n<p>Last but not least,\u00a0be sure to\u00a0<a href=\"https:\/\/www.youtube.com\/subscription_center?add_user=IntegoVideo\" target=\"_blank\" rel=\"noopener\">subscribe<\/a>\u00a0to\u00a0the\u00a0<strong>Intego YouTube channel<\/strong>\u00a0to get informative video updates, and click on\u00a0YouTube&#8217;s bell\u00a0icon (?) so you&#8217;ll get notified when each new episode is available.<br \/>\n<span style=\"font-size: x-small;\">T2 chip\u00a0image credit:\u00a0<a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Apple_T2_APL1027.jpg\" target=\"_blank\" rel=\"noopener\">Henriok<\/a>.\u00a0&#8220;Cold root&#8221; image composed by Joshua Long\u00a0using public-domain images of\u00a0<a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:Dicotyledoneae_Asteraceae_herb_-_root_system,_primary_root_becomes_tap_root_and_lateral_roots.JPG\" target=\"_blank\" rel=\"noopener\">roots<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.publicdomainpictures.net\/view-image.php?image=100663&amp;picture=icicles\" target=\"_blank\" rel=\"noopener\">icicles<\/a>.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>February\u00a0brought to light\u00a0four families of Mac malware: Intego discovered OSX\/Shlayer, two RATs were found, and a popular Mac software download site distributed Trojanized versions of Firefox, OnyX, and Deeper. Meanwhile:\u00a0a single Telugu character\u00a0allowed pranksters\u00a0to crash\u00a0iOS devices and Macs, Apple&#8217;s T2 chip\u00a0brings security improvements to the new iMac Pro, and a government contractor claims it can [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":76315,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[5],"tags":[3955,1261,4162,3946,3961,2281,3988,3250,4096,3952,3958,3949,3928,3913],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"February\u00a0brought to light\u00a0four families of Mac malware: Intego discovered OSX\/Shlayer, two RATs were found, and a popular Mac software download site\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Month in review: Apple security in February 2018 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"February\u00a0brought to light\u00a0four families of Mac malware: Intego discovered OSX\/Shlayer, two RATs were found, and a popular Mac software download site\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-06T23:12:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-27T18:58:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/mac-security-news-feb2018.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/mac-security-news-feb2018.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/mac-security-news-feb2018.png\",\"width\":400,\"height\":260,\"caption\":\"Mac security news February 2018\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/\",\"name\":\"Month in review: Apple security in February 2018 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#primaryimage\"},\"datePublished\":\"2018-03-06T23:12:11+00:00\",\"dateModified\":\"2022-09-27T18:58:56+00:00\",\"description\":\"February\\u00a0brought to light\\u00a0four families of Mac malware: Intego discovered OSX\/Shlayer, two RATs were found, and a popular Mac software download site\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Month in review: Apple security in February 2018\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Month in review: Apple security in February 2018\",\"datePublished\":\"2018-03-06T23:12:11+00:00\",\"dateModified\":\"2022-09-27T18:58:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#webpage\"},\"wordCount\":1909,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/mac-security-news-feb2018.png\",\"keywords\":[\"Cellebrite\",\"China\",\"Cryptojacking\",\"EvilOSX\",\"iBoot\",\"iOS 9\",\"Monero\",\"Month in Security\",\"OSX\/Bundlore\",\"OSX\/Coldroot\",\"OSX\/CreativeUpdate\",\"OSX\/EvilOSX\",\"OSX\/Shlayer\",\"T2 Chip\"],\"articleSection\":[\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"February\u00a0brought to light\u00a0four families of Mac malware: Intego discovered OSX\/Shlayer, two RATs were found, and a popular Mac software download site","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/","og_locale":"en_US","og_type":"article","og_title":"Month in review: Apple security in February 2018 - The Mac Security Blog","og_description":"February\u00a0brought to light\u00a0four families of Mac malware: Intego discovered OSX\/Shlayer, two RATs were found, and a popular Mac software download site","og_url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2018-03-06T23:12:11+00:00","article_modified_time":"2022-09-27T18:58:56+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/mac-security-news-feb2018.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/mac-security-news-feb2018.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/mac-security-news-feb2018.png","width":400,"height":260,"caption":"Mac security news February 2018"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/","name":"Month in review: Apple security in February 2018 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#primaryimage"},"datePublished":"2018-03-06T23:12:11+00:00","dateModified":"2022-09-27T18:58:56+00:00","description":"February\u00a0brought to light\u00a0four families of Mac malware: Intego discovered OSX\/Shlayer, two RATs were found, and a popular Mac software download site","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Month in review: Apple security in February 2018"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Month in review: Apple security in February 2018","datePublished":"2018-03-06T23:12:11+00:00","dateModified":"2022-09-27T18:58:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#webpage"},"wordCount":1909,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/mac-security-news-feb2018.png","keywords":["Cellebrite","China","Cryptojacking","EvilOSX","iBoot","iOS 9","Monero","Month in Security","OSX\/Bundlore","OSX\/Coldroot","OSX\/CreativeUpdate","OSX\/EvilOSX","OSX\/Shlayer","T2 Chip"],"articleSection":["Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/month-in-review-apple-security-in-february-2018\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/03\/mac-security-news-feb2018.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-jP9","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76207"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=76207"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76207\/revisions"}],"predecessor-version":[{"id":88231,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/76207\/revisions\/88231"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/76315"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=76207"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=76207"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=76207"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}