{"id":81610,"date":"2018-08-10T08:10:08","date_gmt":"2018-08-10T15:10:08","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=81610"},"modified":"2019-05-08T19:46:20","modified_gmt":"2019-05-09T02:46:20","slug":"should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/","title":{"rendered":"Should you worry about porn blackmail emails? &#8211; Intego Mac Podcast, Episode 43"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-80881\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/intego-mac-podcast-new-episode-lead.png\" alt=\"Intego Mac Podcast\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/intego-mac-podcast-new-episode-lead.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/intego-mac-podcast-new-episode-lead-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/intego-mac-podcast-new-episode-lead-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The Intego Mac Podcast <a href=\"http:\/\/podcast.intego.com\/43\" target=\"_blank\" rel=\"noopener\">episode 43<\/a> is now available!<\/p>\n<p>How would you react to an email from someone claiming to have hacked your webcam and recorded your most private moments? What if they threatened you with blackmail unless you payed a ransom?\u00a0And what does it mean if the email includes a real password that you&#8217;ve used in the past? Should you be worried?<\/p>\n<p>Intego has received an eyebrow raising number of calls lately from people who received blackmail emails, which claim they were filmed while watching porn. Hosts Kirk and Josh explain how this scam work and how you can protect yourself should such an email land in your inbox or junk box. They also talk about the difference between 32-bit and 64-bit apps, Firefox&#8217;s new DNS scheme, and much more.<\/p>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on iTunes!<\/p>\n<p><strong>We want to hear from you! <\/strong><\/p>\n<p>Take our podcast listener survey for a chance to win a $100 Visa gift card.<\/p>\n<p><a href=\"https:\/\/www.surveymonkey.com\/r\/integopodcast\"><img loading=\"lazy\" class=\"aligncenter wp-image-28024 size-thumbnail\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/take-survey-150x31.png\" width=\"150\" height=\"31\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/take-survey-150x31.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/take-survey.png 241w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong><\/p>\n<p>Want your question aired in our next episode of the Intego Mac Podcast? Listeners can <a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"noopener\">contact Intego<\/a> via email at podcast@intego.com and ask us any question that your burning heart desires, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Intego Mac Podcast episode 43 is now available! How would you react to an email from someone claiming to have hacked your webcam and recorded your most private moments? What if they threatened you with blackmail unless you payed a ransom?\u00a0And what does it mean if the email includes a real password that you&#8217;ve [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Intego Mac Podcast episode 43 is now available! How would you react to an email from someone claiming to have hacked your webcam and recorded your\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Should you worry about porn blackmail emails? - Intego Mac Podcast, Episode 43 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Intego Mac Podcast episode 43 is now available! How would you react to an email from someone claiming to have hacked your webcam and recorded your\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-10T15:10:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-09T02:46:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/\",\"name\":\"Should you worry about porn blackmail emails? - Intego Mac Podcast, Episode 43 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#primaryimage\"},\"datePublished\":\"2018-08-10T15:10:08+00:00\",\"dateModified\":\"2019-05-09T02:46:20+00:00\",\"description\":\"The Intego Mac Podcast episode 43 is now available! How would you react to an email from someone claiming to have hacked your webcam and recorded your\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Should you worry about porn blackmail emails? &#8211; Intego Mac Podcast, Episode 43\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Should you worry about porn blackmail emails? &#8211; Intego Mac Podcast, Episode 43\",\"datePublished\":\"2018-08-10T15:10:08+00:00\",\"dateModified\":\"2019-05-09T02:46:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#webpage\"},\"wordCount\":229,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Intego Mac Podcast episode 43 is now available! How would you react to an email from someone claiming to have hacked your webcam and recorded your","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/","og_locale":"en_US","og_type":"article","og_title":"Should you worry about porn blackmail emails? - Intego Mac Podcast, Episode 43 - The Mac Security Blog","og_description":"The Intego Mac Podcast episode 43 is now available! How would you react to an email from someone claiming to have hacked your webcam and recorded your","og_url":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-08-10T15:10:08+00:00","article_modified_time":"2019-05-09T02:46:20+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/","name":"Should you worry about porn blackmail emails? - Intego Mac Podcast, Episode 43 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#primaryimage"},"datePublished":"2018-08-10T15:10:08+00:00","dateModified":"2019-05-09T02:46:20+00:00","description":"The Intego Mac Podcast episode 43 is now available! How would you react to an email from someone claiming to have hacked your webcam and recorded your","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Should you worry about porn blackmail emails? &#8211; Intego Mac Podcast, Episode 43"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Should you worry about porn blackmail emails? &#8211; Intego Mac Podcast, Episode 43","datePublished":"2018-08-10T15:10:08+00:00","dateModified":"2019-05-09T02:46:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#webpage"},"wordCount":229,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/should-you-worry-about-porn-blackmail-emails-intego-mac-podcast-episode-43\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-lei","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/81610"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=81610"}],"version-history":[{"count":9,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/81610\/revisions"}],"predecessor-version":[{"id":87199,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/81610\/revisions\/87199"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=81610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=81610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=81610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}