{"id":83602,"date":"2018-10-12T15:36:41","date_gmt":"2018-10-12T22:36:41","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=83602"},"modified":"2019-05-08T19:43:25","modified_gmt":"2019-05-09T02:43:25","slug":"was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/","title":{"rendered":"Was Bloomberg&#8217;s &#8220;Big Hack&#8221; legit? And celebrating our first anniversary &#8211; Intego Mac Podcast, Episode 52"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-73558\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png\" alt=\"New Intego Mac Podcast Episode\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/12\/New-Intego-Mac-Podcast-Episode-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>The Intego Mac Podcast <a href=\"http:\/\/podcast.intego.com\/52\" target=\"_blank\" rel=\"noopener\">episode 52<\/a> is now available!<\/p>\n<p>Was it really a big hack? Bloomberg claims that a Chinese hardware hack affected Apple, Amazon, and others, but the companies deny this accusation. And we look back on the first year of the podcast.<\/p>\n<p><a href=\"https:\/\/itunes.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on iTunes!<\/p>\n<p><strong>We want to hear from you! <\/strong><\/p>\n<p>Take our podcast listener survey for a chance to win a $100 Visa gift card.<\/p>\n<p><a href=\"https:\/\/www.surveymonkey.com\/r\/integopodcast\"><img loading=\"lazy\" class=\"aligncenter wp-image-28024 size-thumbnail\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/take-survey-150x31.png\" width=\"150\" height=\"31\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/take-survey-150x31.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2014\/06\/take-survey.png 241w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong><\/p>\n<p>Want your question aired in our next episode of the Intego Mac Podcast? Listeners can <a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"noopener\">contact Intego<\/a> via email at podcast@intego.com and ask us any question that your burning heart desires, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Intego Mac Podcast episode 52 is now available! Was it really a big hack? Bloomberg claims that a Chinese hardware hack affected Apple, Amazon, and others, but the companies deny this accusation. And we look back on the first year of the podcast. If you like what you hear, be sure to rate and [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[7,4390,13,5],"tags":[3151,66,3715,69,80,3154],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Intego Mac Podcast episode 52 is now available! Was it really a big hack? Bloomberg claims that a Chinese hardware hack affected Apple, Amazon, and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Was Bloomberg&#039;s &quot;Big Hack&quot; legit? And celebrating our first anniversary - Intego Mac Podcast, Episode 52 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Intego Mac Podcast episode 52 is now available! Was it really a big hack? Bloomberg claims that a Chinese hardware hack affected Apple, Amazon, and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-10-12T22:36:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-09T02:43:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/\",\"name\":\"Was Bloomberg's \\\"Big Hack\\\" legit? And celebrating our first anniversary - Intego Mac Podcast, Episode 52 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#primaryimage\"},\"datePublished\":\"2018-10-12T22:36:41+00:00\",\"dateModified\":\"2019-05-09T02:43:25+00:00\",\"description\":\"The Intego Mac Podcast episode 52 is now available! Was it really a big hack? Bloomberg claims that a Chinese hardware hack affected Apple, Amazon, and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Was Bloomberg&#8217;s &#8220;Big Hack&#8221; legit? And celebrating our first anniversary &#8211; Intego Mac Podcast, Episode 52\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Was Bloomberg&#8217;s &#8220;Big Hack&#8221; legit? And celebrating our first anniversary &#8211; Intego Mac Podcast, Episode 52\",\"datePublished\":\"2018-10-12T22:36:41+00:00\",\"dateModified\":\"2019-05-09T02:43:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#webpage\"},\"wordCount\":144,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Apple\",\"Intego\",\"Intego Mac Podcast\",\"iOS\",\"Mac OS X\",\"Security &amp; Privacy\"],\"articleSection\":[\"Apple\",\"Intego Mac Security Podcast\",\"Security &amp; Privacy\",\"Security News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Intego Mac Podcast episode 52 is now available! Was it really a big hack? Bloomberg claims that a Chinese hardware hack affected Apple, Amazon, and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/","og_locale":"en_US","og_type":"article","og_title":"Was Bloomberg's \"Big Hack\" legit? And celebrating our first anniversary - Intego Mac Podcast, Episode 52 - The Mac Security Blog","og_description":"The Intego Mac Podcast episode 52 is now available! Was it really a big hack? Bloomberg claims that a Chinese hardware hack affected Apple, Amazon, and","og_url":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/","og_site_name":"The Mac Security Blog","article_published_time":"2018-10-12T22:36:41+00:00","article_modified_time":"2019-05-09T02:43:25+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/","name":"Was Bloomberg's \"Big Hack\" legit? And celebrating our first anniversary - Intego Mac Podcast, Episode 52 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#primaryimage"},"datePublished":"2018-10-12T22:36:41+00:00","dateModified":"2019-05-09T02:43:25+00:00","description":"The Intego Mac Podcast episode 52 is now available! Was it really a big hack? Bloomberg claims that a Chinese hardware hack affected Apple, Amazon, and","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Was Bloomberg&#8217;s &#8220;Big Hack&#8221; legit? And celebrating our first anniversary &#8211; Intego Mac Podcast, Episode 52"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Was Bloomberg&#8217;s &#8220;Big Hack&#8221; legit? And celebrating our first anniversary &#8211; Intego Mac Podcast, Episode 52","datePublished":"2018-10-12T22:36:41+00:00","dateModified":"2019-05-09T02:43:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#webpage"},"wordCount":144,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Apple","Intego","Intego Mac Podcast","iOS","Mac OS X","Security &amp; Privacy"],"articleSection":["Apple","Intego Mac Security Podcast","Security &amp; Privacy","Security News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/was-the-big-hack-really-big-and-we-celebrate-our-one-year-anniversary-intego-mac-podcast-episode-52\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-lKq","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/83602"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=83602"}],"version-history":[{"count":4,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/83602\/revisions"}],"predecessor-version":[{"id":87172,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/83602\/revisions\/87172"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=83602"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=83602"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=83602"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}