{"id":90238,"date":"2019-10-31T07:04:49","date_gmt":"2019-10-31T14:04:49","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=90238"},"modified":"2019-11-07T10:25:39","modified_gmt":"2019-11-07T18:25:39","slug":"increase-your-privacy-with-cyberghost-vpn","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/","title":{"rendered":"Increase your privacy with CyberGhost VPN"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-90472\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-600x300.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-600x300.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-600x300-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-600x300-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>If you&#8217;ve followed Intego&#8217;s blog and podcast for a while, you may recall that we&#8217;ve mentioned the privacy and security benefits of VPNs\u2014virtual private networks\u2014<a href=\"https:\/\/www.intego.com\/mac-security-blog\/topic\/vpn\/\" target=\"_blank\" rel=\"noopener\">several times<\/a>. As a quick recap, here are just a handful of the advantages that a good personal VPN can provide:<\/p>\n<ul>\n<li>hide your personal IP address from sites you visit, apps you use, and people you e-mail<\/li>\n<li>secure your Internet traffic when using public or untrusted Wi-Fi networks (e.g. at a hotel or restaurant)<\/li>\n<li>enable you to see the Web as it&#8217;s displayed in other countries<\/li>\n<li>watch your favorite <a href=\"https:\/\/www.cyberghostvpn.com\/en_US\/unblock-streaming\" target=\"_blank\" rel=\"noopener\">video streaming<\/a> services when you&#8217;re traveling outside of your home country<\/li>\n<li>get <a href=\"https:\/\/www.cyberghostvpn.com\/en_US\/vpn-for-travel\" target=\"_blank\" rel=\"noopener\">better deals<\/a> on hotels and flights (some companies offer better pricing depending on your perceived geolocation)<\/li>\n<\/ul>\n<p>Of course, it&#8217;s very important to choose a trustworthy VPN provider. We&#8217;ve mentioned on the Intego Mac Podcast that <strong><a href=\"https:\/\/www.cyberghostvpn.com\/en_US\/buy\/cyberghost-vpn-2?coupon=FlashSale&amp;campaign=halloween19&amp;media_source=intego&amp;conversionpoint=blogintego\" target=\"_blank\" rel=\"noopener\">CyberGhost VPN<\/a><\/strong> is Intego&#8217;s sister company, and it&#8217;s our top recommendation for a safe, secure, and private VPN.<\/p>\n<p><a href=\"https:\/\/www.cyberghostvpn.com\/en_US\/buy\/cyberghost-vpn-2?coupon=FlashSale&amp;campaign=halloween19&amp;media_source=intego&amp;conversionpoint=blogintego\" target=\"_blank\" rel=\"noopener\"><strong>For a limited time, Intego customers can get a special discount via this link.<\/strong><\/a><\/p>\n<p>If you don&#8217;t subscribe to a VPN service yet, increase your privacy and mobile security now with CyberGhost VPN at a great price.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you&#8217;ve followed Intego&#8217;s blog and podcast for a while, you may recall that we&#8217;ve mentioned the privacy and security benefits of VPNs\u2014virtual private networks\u2014several times. As a quick recap, here are just a handful of the advantages that a good personal VPN can provide: hide your personal IP address from sites you visit, apps [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":90370,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[2311],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"If you&#039;ve followed Intego&#039;s blog and podcast for a while, you may recall that we&#039;ve mentioned the privacy and security benefits of VPNs\u2014virtual private\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Increase your privacy with CyberGhost VPN - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"If you&#039;ve followed Intego&#039;s blog and podcast for a while, you may recall that we&#039;ve mentioned the privacy and security benefits of VPNs\u2014virtual private\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-31T14:04:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-11-07T18:25:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-400x260.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-400x260.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-400x260.jpg\",\"width\":400,\"height\":260,\"caption\":\"CyberGhost VPN logo\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/\",\"name\":\"Increase your privacy with CyberGhost VPN - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#primaryimage\"},\"datePublished\":\"2019-10-31T14:04:49+00:00\",\"dateModified\":\"2019-11-07T18:25:39+00:00\",\"description\":\"If you've followed Intego's blog and podcast for a while, you may recall that we've mentioned the privacy and security benefits of VPNs\\u2014virtual private\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Increase your privacy with CyberGhost VPN\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Increase your privacy with CyberGhost VPN\",\"datePublished\":\"2019-10-31T14:04:49+00:00\",\"dateModified\":\"2019-11-07T18:25:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#webpage\"},\"wordCount\":204,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-400x260.jpg\",\"keywords\":[\"VPN\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"If you've followed Intego's blog and podcast for a while, you may recall that we've mentioned the privacy and security benefits of VPNs\u2014virtual private","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/","og_locale":"en_US","og_type":"article","og_title":"Increase your privacy with CyberGhost VPN - The Mac Security Blog","og_description":"If you've followed Intego's blog and podcast for a while, you may recall that we've mentioned the privacy and security benefits of VPNs\u2014virtual private","og_url":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2019-10-31T14:04:49+00:00","article_modified_time":"2019-11-07T18:25:39+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-400x260.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-400x260.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-400x260.jpg","width":400,"height":260,"caption":"CyberGhost VPN logo"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/","name":"Increase your privacy with CyberGhost VPN - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#primaryimage"},"datePublished":"2019-10-31T14:04:49+00:00","dateModified":"2019-11-07T18:25:39+00:00","description":"If you've followed Intego's blog and podcast for a while, you may recall that we've mentioned the privacy and security benefits of VPNs\u2014virtual private","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Increase your privacy with CyberGhost VPN"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Increase your privacy with CyberGhost VPN","datePublished":"2019-10-31T14:04:49+00:00","dateModified":"2019-11-07T18:25:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#webpage"},"wordCount":204,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-400x260.jpg","keywords":["VPN"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/increase-your-privacy-with-cyberghost-vpn\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2019\/10\/CyberGhost-VPN-logo-400x260.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nts","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/90238"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=90238"}],"version-history":[{"count":7,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/90238\/revisions"}],"predecessor-version":[{"id":90475,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/90238\/revisions\/90475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/90370"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=90238"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=90238"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=90238"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}