{"id":91075,"date":"2020-03-13T07:59:41","date_gmt":"2020-03-13T14:59:41","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=91075"},"modified":"2023-08-16T11:18:19","modified_gmt":"2023-08-16T18:18:19","slug":"the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/","title":{"rendered":"The history of Apple malware, with guest John McAfee &#8211; Intego Mac Podcast Episode 126"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+dx_akFmp?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Malware has affected Apple computers since even before the release of the Macintosh. In fact, the very first computer virus that spread in the wild affected the Apple II. We discus the history of Apple malware, and we talk with John McAfee, creator of the first commercial antivirus, about how he created the software.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/key-moments-in-the-history-of-mac-malware-1982-to-the-present\/\" rel=\"noopener\">Key Moments in the History of Mac Malware<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/John_McAfee\" target=\"_blank\" rel=\"noopener\">John McAfee<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Elk_Cloner\" target=\"_blank\" rel=\"noopener\">Elk Cloner<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Apple_DOS\" target=\"_blank\" rel=\"noopener\">Apple DOS<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/NVIR\" target=\"_blank\" rel=\"noopener\">nVIR<\/a><\/li>\n<li><a href=\"https:\/\/hypercard.org\" target=\"_blank\" rel=\"noopener\">HyperCard<\/a><\/li>\n<li><a href=\"https:\/\/pweilstudio.com\/project\/silly-noisy-house\/\" target=\"_blank\" rel=\"noopener\">A Silly Noisy House<\/a><\/li>\n<li><a href=\"https:\/\/tidbits.com\/1998\/05\/07\/john-norstad-retires-disinfectant\/\" target=\"_blank\" rel=\"noopener\">Disinfectant<\/a><\/li>\n<li><a href=\"https:\/\/support.microsoft.com\/en-gb\/help\/211607\/frequently-asked-questions-about-word-macro-viruses\" target=\"_blank\" rel=\"noopener\">Frequently asked questions about Word macro viruses<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/MacOS\" target=\"_blank\" rel=\"noopener\">Mac OS X<\/a><\/li>\n<li><a href=\"https:\/\/www.newscientist.com\/article\/dn6576-worm-targets-macs-latest-operating-system\/\" target=\"_blank\" rel=\"noopener\">Renepo\/Opener<\/a><\/li>\n<li><a href=\"https:\/\/www.macworld.com\/article\/1049473\/leapafollow.html\" target=\"_blank\" rel=\"noopener\">Leap.A \/ Oompa-Loompa<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/wirelurker-malware-infects-macs-attacks-non-jailbroken-iphones\/\" rel=\"noopener\">WireLurker Malware Infects Macs, Attacks Non-Jailbroken iPhones<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/\" rel=\"noopener\">How Flashback Malware Infects Macs <\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-security-memo-macdefender-fake-antivirus\/\" rel=\"noopener\">MAC Defender Fake Antivirus Program Targets Mac Users<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/osxshlayer-new-mac-malware-comes-out-of-its-shell\/\" rel=\"noopener\">OSX\/Shlayer: New Mac malware comes out of its shell<\/a><\/li>\n<li><a href=\"https:\/\/podcast.intego.com\/28\" rel=\"noopener\">Episode 28: Beware of Trustjacking (discussion of Shlayer)<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-linker-new-mac-malware-attempts-zero-day-gatekeeper-bypass\/\" rel=\"noopener\">OSX\/Linker: New Mac malware attempts zero-day Gatekeeper bypass<\/a><\/li>\n<li><a href=\"https:\/\/podcast.intego.com\/88\" target=\"_blank\" rel=\"noopener\">Episode 88: Flash, Incognito Mode, Porn, and a Malware Extravaganza (discussion of Linker)<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-crescentcore-mac-malware-designed-to-evade-antivirus\/\" rel=\"noopener\">OSX\/CrescentCore: Mac malware designed to evade antivirus<\/a><\/li>\n<li><a href=\"https:\/\/podcast.intego.com\/89\" target=\"_blank\" rel=\"noopener\">Episode 89: New Mac Malware, Apple Public Betas, and More (discussion of CrescentCore)<\/a><\/li>\n<li><a href=\"https:\/\/objectivebythesea.org\/v3\/\" target=\"_blank\" rel=\"noopener\">Objective by the Sea v3.0<\/a><\/li>\n<\/ul>\n<p>If you like this episode, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong><a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Contact Intego<\/a> and with any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware has affected Apple computers since even before the release of the Macintosh. In fact, the very first computer virus that spread in the wild affected the Apple II. We discus the history of Apple malware, and we talk with John McAfee, creator of the first commercial antivirus, about how he created the software. Key [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715,1999,86,160],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Malware has affected Apple computers since even before the release of the Macintosh. In fact, the very first computer virus that spread in the wild\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The history of Apple malware, with guest John McAfee - Intego Mac Podcast Episode 126 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Malware has affected Apple computers since even before the release of the Macintosh. In fact, the very first computer virus that spread in the wild\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-13T14:59:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-16T18:18:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/\",\"name\":\"The history of Apple malware, with guest John McAfee - Intego Mac Podcast Episode 126 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#primaryimage\"},\"datePublished\":\"2020-03-13T14:59:41+00:00\",\"dateModified\":\"2023-08-16T18:18:19+00:00\",\"description\":\"Malware has affected Apple computers since even before the release of the Macintosh. In fact, the very first computer virus that spread in the wild\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The history of Apple malware, with guest John McAfee &#8211; Intego Mac Podcast Episode 126\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"The history of Apple malware, with guest John McAfee &#8211; Intego Mac Podcast Episode 126\",\"datePublished\":\"2020-03-13T14:59:41+00:00\",\"dateModified\":\"2023-08-16T18:18:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#webpage\"},\"wordCount\":234,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\",\"Interview\",\"Malware\",\"Virus\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Malware has affected Apple computers since even before the release of the Macintosh. In fact, the very first computer virus that spread in the wild","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/","og_locale":"en_US","og_type":"article","og_title":"The history of Apple malware, with guest John McAfee - Intego Mac Podcast Episode 126 - The Mac Security Blog","og_description":"Malware has affected Apple computers since even before the release of the Macintosh. In fact, the very first computer virus that spread in the wild","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-03-13T14:59:41+00:00","article_modified_time":"2023-08-16T18:18:19+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/","name":"The history of Apple malware, with guest John McAfee - Intego Mac Podcast Episode 126 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#primaryimage"},"datePublished":"2020-03-13T14:59:41+00:00","dateModified":"2023-08-16T18:18:19+00:00","description":"Malware has affected Apple computers since even before the release of the Macintosh. In fact, the very first computer virus that spread in the wild","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The history of Apple malware, with guest John McAfee &#8211; Intego Mac Podcast Episode 126"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"The history of Apple malware, with guest John McAfee &#8211; Intego Mac Podcast Episode 126","datePublished":"2020-03-13T14:59:41+00:00","dateModified":"2023-08-16T18:18:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#webpage"},"wordCount":234,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast","Interview","Malware","Virus"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-history-of-apple-malware-with-guest-john-mcafee-intego-mac-podcast-episode-126\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nGX","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91075"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=91075"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91075\/revisions"}],"predecessor-version":[{"id":98643,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91075\/revisions\/98643"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=91075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=91075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=91075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}