{"id":88765,"date":"2019-07-19T02:02:08","date_gmt":"2019-07-19T09:02:08","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=88765"},"modified":"2020-06-26T10:26:42","modified_gmt":"2020-06-26T17:26:42","slug":"zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/","title":{"rendered":"Zoom zero-day, and unmasking Mac malware makers &#8211; Intego Mac Podcast, Episode 92"},"content":{"rendered":"<p><center><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/s\/GegHgcrH+FyDItnOb\/iframe\" width=\"560\" height=\"80\" frameborder=\"no\" scrolling=\"no\"><\/iframe><\/center>If you like what you hear, be sure to subscribe, and rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p>The Intego Mac Podcast <a href=\"https:\/\/podcast.intego.com\/92\" target=\"_blank\" rel=\"noopener noreferrer\">episode 92<\/a> is now available!<\/p>\n<p>An app named Zoom may sound like a good thing, but this app exposed the Macs of users who had it installed\u2014including Kirk\u2014to a serious security vulnerability. This led Apple to take the rare action of pushing out a silent security update to Macs. And Josh tells us all about how to find out who creates malware. Check out the full <a href=\"https:\/\/podcast.intego.com\/92\" target=\"_blank\" rel=\"noopener noreferrer\">show notes<\/a>\u00a0for links.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us!<\/strong><\/p>\n<p>Listeners can <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">contact Intego<\/a> via email at podcast@intego.com and ask us any questions that they want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you like what you hear, be sure to subscribe, and rate and review the Intego Mac Podcast on Apple Podcasts. The Intego Mac Podcast episode 92 is now available! An app named Zoom may sound like a good thing, but this app exposed the Macs of users who had it installed\u2014including Kirk\u2014to a serious [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715,143,4581],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"If you like what you hear, be sure to subscribe, and rate and review the Intego Mac Podcast on Apple Podcasts. The Intego Mac Podcast episode 92 is now\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zoom zero-day, and unmasking Mac malware makers - Intego Mac Podcast, Episode 92 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"If you like what you hear, be sure to subscribe, and rate and review the Intego Mac Podcast on Apple Podcasts. The Intego Mac Podcast episode 92 is now\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-19T09:02:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-26T17:26:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/\",\"name\":\"Zoom zero-day, and unmasking Mac malware makers - Intego Mac Podcast, Episode 92 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#primaryimage\"},\"datePublished\":\"2019-07-19T09:02:08+00:00\",\"dateModified\":\"2020-06-26T17:26:42+00:00\",\"description\":\"If you like what you hear, be sure to subscribe, and rate and review the Intego Mac Podcast on Apple Podcasts. The Intego Mac Podcast episode 92 is now\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zoom zero-day, and unmasking Mac malware makers &#8211; Intego Mac Podcast, Episode 92\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Zoom zero-day, and unmasking Mac malware makers &#8211; Intego Mac Podcast, Episode 92\",\"datePublished\":\"2019-07-19T09:02:08+00:00\",\"dateModified\":\"2020-06-26T17:26:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#webpage\"},\"wordCount\":147,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\",\"Vulnerabilities\",\"Zoom\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"If you like what you hear, be sure to subscribe, and rate and review the Intego Mac Podcast on Apple Podcasts. The Intego Mac Podcast episode 92 is now","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/","og_locale":"en_US","og_type":"article","og_title":"Zoom zero-day, and unmasking Mac malware makers - Intego Mac Podcast, Episode 92 - The Mac Security Blog","og_description":"If you like what you hear, be sure to subscribe, and rate and review the Intego Mac Podcast on Apple Podcasts. The Intego Mac Podcast episode 92 is now","og_url":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/","og_site_name":"The Mac Security Blog","article_published_time":"2019-07-19T09:02:08+00:00","article_modified_time":"2020-06-26T17:26:42+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/","name":"Zoom zero-day, and unmasking Mac malware makers - Intego Mac Podcast, Episode 92 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#primaryimage"},"datePublished":"2019-07-19T09:02:08+00:00","dateModified":"2020-06-26T17:26:42+00:00","description":"If you like what you hear, be sure to subscribe, and rate and review the Intego Mac Podcast on Apple Podcasts. The Intego Mac Podcast episode 92 is now","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Zoom zero-day, and unmasking Mac malware makers &#8211; Intego Mac Podcast, Episode 92"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Zoom zero-day, and unmasking Mac malware makers &#8211; Intego Mac Podcast, Episode 92","datePublished":"2019-07-19T09:02:08+00:00","dateModified":"2020-06-26T17:26:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#webpage"},"wordCount":147,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast","Vulnerabilities","Zoom"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/zoom-zero-day-and-unmasking-mac-malware-makers-intego-mac-podcast-episode-92\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-n5H","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88765"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=88765"}],"version-history":[{"count":5,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88765\/revisions"}],"predecessor-version":[{"id":91752,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/88765\/revisions\/91752"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=88765"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=88765"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=88765"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}