{"id":79459,"date":"2018-06-01T10:28:04","date_gmt":"2018-06-01T17:28:04","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=79459"},"modified":"2022-07-06T09:40:53","modified_gmt":"2022-07-06T16:40:53","slug":"the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/","title":{"rendered":"Cryptojacking and router malware &#8211; Intego Mac Podcast, Episode 33"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73558\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png\" alt=\"New Intego Mac Podcast Episode\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The <a href=\"http:\/\/podcast.intego.com\/33\" target=\"_blank\" rel=\"noopener\">Intego Mac Podcast<\/a> episode 33 is now available!<\/p>\n<p>Hosts Kirk and Josh\u00a0discuss Apple&#8217;s recent operating system updates,\u00a0as well as what they didn&#8217;t update. They also cover some new Mac threats\u2014the recent cryptojacking malware, called mshelper,\u00a0and Russian router malware\u2014and then offer parents\u00a0a close look at using parental controls on the Mac and on iOS.<\/p>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p>Check out the latest episode\u00a0for a roundup of important Apple news you need to know, industry opinions\u00a0about Macs and iOS devices, and how to keep them secure.\u00a0If you like what you hear, be sure to rate and review the Intego Mac Podcast on iTunes!<\/p>\n<p><strong>We want to hear from you! <\/strong><\/p>\n<p>Take our podcast listener survey for a chance to win a $100 Visa gift card.<\/p>\n<p><a href=\"https:\/\/www.surveymonkey.com\/r\/integopodcast\"><img loading=\"lazy\" class=\"aligncenter wp-image-28024 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/take-survey.png\" width=\"241\" height=\"50\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/take-survey.png 241w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/take-survey-150x31.png 150w\" sizes=\"(max-width: 241px) 100vw, 241px\" \/><\/a><\/p>\n<p><strong>Have a question for our hosts? Ask us!<\/strong><\/p>\n<p>A new episode is available weekly, every Friday. Want your question aired in our next episode of the Intego Mac Podcast? Listeners and fans of the podcast can <a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"noopener\">contact Intego<\/a> via email at\u00a0podcast@intego.com and ask us any question that your burning heart desires, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Intego Mac Podcast episode 33 is now available! Hosts Kirk and Josh\u00a0discuss Apple&#8217;s recent operating system updates,\u00a0as well as what they didn&#8217;t update. They also cover some new Mac threats\u2014the recent cryptojacking malware, called mshelper,\u00a0and Russian router malware\u2014and then offer parents\u00a0a close look at using parental controls on the Mac and on iOS. Check [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":73561,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390,190,13,5],"tags":[4162,3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Intego Mac Podcast episode 33 is now available! Hosts Kirk and Josh\u00a0discuss Apple&#039;s recent operating system updates,\u00a0as well as what they didn&#039;t\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cryptojacking and router malware - Intego Mac Podcast, Episode 33 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Intego Mac Podcast episode 33 is now available! Hosts Kirk and Josh\u00a0discuss Apple&#039;s recent operating system updates,\u00a0as well as what they didn&#039;t\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-01T17:28:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-07-06T16:40:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/\",\"name\":\"Cryptojacking and router malware - Intego Mac Podcast, Episode 33 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#primaryimage\"},\"datePublished\":\"2018-06-01T17:28:04+00:00\",\"dateModified\":\"2022-07-06T16:40:53+00:00\",\"description\":\"The Intego Mac Podcast episode 33 is now available! Hosts Kirk and Josh\\u00a0discuss Apple's recent operating system updates,\\u00a0as well as what they didn't\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cryptojacking and router malware &#8211; Intego Mac Podcast, Episode 33\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Cryptojacking and router malware &#8211; Intego Mac Podcast, Episode 33\",\"datePublished\":\"2018-06-01T17:28:04+00:00\",\"dateModified\":\"2022-07-06T16:40:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#webpage\"},\"wordCount\":199,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png\",\"keywords\":[\"Cryptojacking\",\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\",\"Malware\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Intego Mac Podcast episode 33 is now available! Hosts Kirk and Josh\u00a0discuss Apple's recent operating system updates,\u00a0as well as what they didn't","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/","og_locale":"en_US","og_type":"article","og_title":"Cryptojacking and router malware - Intego Mac Podcast, Episode 33 - The Mac Security Blog","og_description":"The Intego Mac Podcast episode 33 is now available! Hosts Kirk and Josh\u00a0discuss Apple's recent operating system updates,\u00a0as well as what they didn't","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-06-01T17:28:04+00:00","article_modified_time":"2022-07-06T16:40:53+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/","name":"Cryptojacking and router malware - Intego Mac Podcast, Episode 33 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#primaryimage"},"datePublished":"2018-06-01T17:28:04+00:00","dateModified":"2022-07-06T16:40:53+00:00","description":"The Intego Mac Podcast episode 33 is now available! Hosts Kirk and Josh\u00a0discuss Apple's recent operating system updates,\u00a0as well as what they didn't","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Cryptojacking and router malware &#8211; Intego Mac Podcast, Episode 33"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Cryptojacking and router malware &#8211; Intego Mac Podcast, Episode 33","datePublished":"2018-06-01T17:28:04+00:00","dateModified":"2022-07-06T16:40:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#webpage"},"wordCount":199,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","keywords":["Cryptojacking","Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast","Malware","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-intego-mac-podcast-episode-33-cryptojacking-and-router-malware\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-kFB","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/79459"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=79459"}],"version-history":[{"count":14,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/79459\/revisions"}],"predecessor-version":[{"id":87247,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/79459\/revisions\/87247"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/73561"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=79459"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=79459"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=79459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}