{"id":91560,"date":"2020-06-05T02:38:19","date_gmt":"2020-06-05T09:38:19","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=91560"},"modified":"2020-06-26T10:33:24","modified_gmt":"2020-06-26T17:33:24","slug":"polymorphic-viruses-intego-mac-podcast-episode-138","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/","title":{"rendered":"The pic that can brick an Android phone &#8211; Intego Mac Podcast Episode 138"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+oi5Qz-Sn?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\n<p>On this episode of the Intego Mac Podcast\u2026 We begin by learning how Josh got interesting in computer security. We then discuss Apple patches and flaws, end-to-end encryption, coronavirus scams, a Google lawsuit, and a photo that can crash Android phones.<\/p>\n<ul>\n<li><a href=\"https:\/\/books.google.co.uk\/books?id=tkzKwAEACAAJ\" target=\"_blank\" rel=\"noopener noreferrer\">Computer Viruses, Artificial Life and Evolution by Mark Ludwig<\/a><\/li>\n<li><a href=\"https:\/\/bhavukjain.com\/blog\/2020\/05\/30\/zeroday-signin-with-apple\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zero-day in Sign in with Apple<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/guide\/iphone\/set-up-face-id-iph6d162927a\/ios\" target=\"_blank\" rel=\"noopener noreferrer\">Turn off Face ID on your iPhone<\/a><\/li>\n<li><a href=\"https:\/\/www.bbc.co.uk\/mediacentre\/latestnews\/2020\/bbc-world-service-access-to-chat-apps\" target=\"_blank\" rel=\"noopener noreferrer\">BBC World Service Director calls for trusted news access to chat apps<\/a><\/li>\n<li><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2020-06-03\/zoom-s-pledge-to-work-with-law-enforcement-spurs-online-blowback\" target=\"_blank\" rel=\"noopener noreferrer\">Zoom\u2019s Pledge to Work with Law Enforcement Spurs Online Blowback<\/a><\/li>\n<li><a href=\"https:\/\/www.telegraph.co.uk\/news\/2020\/05\/30\/nhs-contact-tracing-undermined-hackers-sending-fraudulent-warnings\/\" target=\"_blank\" rel=\"noopener noreferrer\">NHS contact tracing undermined by hackers sending fraudulent warnings to public<\/a><\/li>\n<li><a href=\"https:\/\/contact-tracing.phe.gov.uk\" target=\"_blank\" rel=\"noopener noreferrer\">NHS Contact Tracing website<\/a><\/li>\n<li><a href=\"https:\/\/www.reuters.com\/article\/us-alphabet-google-privacy-lawsuit\/google-is-sued-in-u-s-for-tracking-users-private-internet-browsing-idUSKBN23933H\" target=\"_blank\" rel=\"noopener noreferrer\">Google faces $5 billion lawsuit in U.S. for tracking &#8216;private&#8217; internet use<\/a><\/li>\n<li><a href=\"https:\/\/www.bbc.co.uk\/news\/technology-52891650\" target=\"_blank\" rel=\"noopener noreferrer\">Android: Why this photo is bricking some phones<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong><\/p>\n<p>Listeners can <a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">contact Intego<\/a> via email at podcast@intego.com and ask us any questions that they want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We begin by learning how Josh got interesting in computer security. We then discuss Apple patches and flaws, end-to-end encryption, coronavirus scams, a Google lawsuit, and a photo that can crash Android phones. <\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[21,4586,3715,4039,116,4581],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We begin by learning how Josh got interesting in computer security. We then discuss Apple patches and flaws, end-to-end encryption, coronavirus scams, a Google lawsuit, and a photo that can crash Android phones.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The pic that can brick an Android phone - Intego Mac Podcast Episode 138 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We begin by learning how Josh got interesting in computer security. We then discuss Apple patches and flaws, end-to-end encryption, coronavirus scams, a Google lawsuit, and a photo that can crash Android phones.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-05T09:38:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-26T17:33:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/\",\"name\":\"The pic that can brick an Android phone - Intego Mac Podcast Episode 138 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#primaryimage\"},\"datePublished\":\"2020-06-05T09:38:19+00:00\",\"dateModified\":\"2020-06-26T17:33:24+00:00\",\"description\":\"We begin by learning how Josh got interesting in computer security. We then discuss Apple patches and flaws, end-to-end encryption, coronavirus scams, a Google lawsuit, and a photo that can crash Android phones.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The pic that can brick an Android phone &#8211; Intego Mac Podcast Episode 138\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"The pic that can brick an Android phone &#8211; Intego Mac Podcast Episode 138\",\"datePublished\":\"2020-06-05T09:38:19+00:00\",\"dateModified\":\"2020-06-26T17:33:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#webpage\"},\"wordCount\":192,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Android\",\"Contact Tracing\",\"Intego Mac Podcast\",\"Online Scams\",\"Scam\",\"Zoom\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We begin by learning how Josh got interesting in computer security. We then discuss Apple patches and flaws, end-to-end encryption, coronavirus scams, a Google lawsuit, and a photo that can crash Android phones.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/","og_locale":"en_US","og_type":"article","og_title":"The pic that can brick an Android phone - Intego Mac Podcast Episode 138 - The Mac Security Blog","og_description":"We begin by learning how Josh got interesting in computer security. We then discuss Apple patches and flaws, end-to-end encryption, coronavirus scams, a Google lawsuit, and a photo that can crash Android phones.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-06-05T09:38:19+00:00","article_modified_time":"2020-06-26T17:33:24+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/","name":"The pic that can brick an Android phone - Intego Mac Podcast Episode 138 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#primaryimage"},"datePublished":"2020-06-05T09:38:19+00:00","dateModified":"2020-06-26T17:33:24+00:00","description":"We begin by learning how Josh got interesting in computer security. We then discuss Apple patches and flaws, end-to-end encryption, coronavirus scams, a Google lawsuit, and a photo that can crash Android phones.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The pic that can brick an Android phone &#8211; Intego Mac Podcast Episode 138"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"The pic that can brick an Android phone &#8211; Intego Mac Podcast Episode 138","datePublished":"2020-06-05T09:38:19+00:00","dateModified":"2020-06-26T17:33:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#webpage"},"wordCount":192,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Android","Contact Tracing","Intego Mac Podcast","Online Scams","Scam","Zoom"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/polymorphic-viruses-intego-mac-podcast-episode-138\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nOM","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91560"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=91560"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91560\/revisions"}],"predecessor-version":[{"id":91723,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91560\/revisions\/91723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=91560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=91560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=91560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}