	{"id":91924,"date":"2020-07-31T02:09:40","date_gmt":"2020-07-31T09:09:40","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=91924"},"modified":"2020-08-26T13:38:09","modified_gmt":"2020-08-26T20:38:09","slug":"how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/","title":{"rendered":"How computer security is depicted in movies &#8211; Intego Mac Podcast Episode 146"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+u67OuAZP?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>We talk about an update on the Great Twitter Hack of 2020, discuss a ransomware attack on Garmin that shut down the company&#8217;s services, and even its assembly lines, and warn listeners about some Netgear devices that have vulnerabilities and can&#8217;t be updated. We then discuss the often ridiculous way hacking is portrayed in movies and TV.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.reuters.com\/article\/us-twitter-cyber-access-exclusive\/exclusive-more-than-1000-people-at-twitter-had-ability-to-aid-hack-of-accounts-idUSKCN24O34E\" target=\"_blank\" rel=\"noopener noreferrer\">More than 1,000 people at Twitter had ability to aid hack of accounts<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/google-amp\/article\/garmin-services-and-production-go-down-after-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Garmin services and production go down after ransomware attack<\/a><\/li>\n<li><a href=\"https:\/\/grahamcluley.com\/garmin-staggers-back-online-after-ransomware-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">Garmin staggers back online after ransomware attack<\/a><\/li>\n<li><a href=\"https:\/\/www.theregister.com\/2020\/07\/30\/netgear_abandons_45_routers_vuln_patching\/\" target=\"_blank\" rel=\"noopener noreferrer\">If you own one of these 45 Netgear devices, replace it: Kit maker won&#8217;t patch vulnerable gear despite live proof-of-concept code<\/a><\/li>\n<li><a href=\"https:\/\/tidbits.com\/2020\/07\/27\/surprise-fujitsu-releases-64-bit-scansnap-manager-for-older-scanners\/\" target=\"_blank\" rel=\"noopener noreferrer\">Surprise! Fujitsu Releases 64-Bit ScanSnap Manager for Older Scanners<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/\" target=\"_blank\" rel=\"noopener noreferrer\">How computer security is depicted in movies<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p>Related story:<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"FV67dWw2V0\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/\">How computer security is depicted in movies and TV<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;How computer security is depicted in movies and TV&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-and-tv\/embed\/#?secret=FV67dWw2V0\" data-secret=\"FV67dWw2V0\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><strong>Have a question? Ask us! <\/strong><\/p>\n<p>Listeners can <a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">contact Intego<\/a> via email at podcast@intego.com and ask us any questions that they want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We talk about an update on the Great Twitter Hack of 2020, discuss a ransomware attack on Garmin that shut down the company&#8217;s services, and even its assembly lines, and warn listeners about some Netgear devices that have vulnerabilities and can&#8217;t be updated. We then discuss the often ridiculous way hacking is portrayed in movies [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715,109,134],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We talk about an update on the Great Twitter Hack of 2020, discuss a ransomware attack on Garmin that shut down the company&#039;s services, and even its\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How computer security is depicted in movies - Intego Mac Podcast Episode 146 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We talk about an update on the Great Twitter Hack of 2020, discuss a ransomware attack on Garmin that shut down the company&#039;s services, and even its\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-31T09:09:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-26T20:38:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/\",\"name\":\"How computer security is depicted in movies - Intego Mac Podcast Episode 146 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#primaryimage\"},\"datePublished\":\"2020-07-31T09:09:40+00:00\",\"dateModified\":\"2020-08-26T20:38:09+00:00\",\"description\":\"We talk about an update on the Great Twitter Hack of 2020, discuss a ransomware attack on Garmin that shut down the company's services, and even its\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How computer security is depicted in movies &#8211; Intego Mac Podcast Episode 146\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"How computer security is depicted in movies &#8211; Intego Mac Podcast Episode 146\",\"datePublished\":\"2020-07-31T09:09:40+00:00\",\"dateModified\":\"2020-08-26T20:38:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#webpage\"},\"wordCount\":198,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\",\"Ransomware\",\"X (Twitter)\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We talk about an update on the Great Twitter Hack of 2020, discuss a ransomware attack on Garmin that shut down the company's services, and even its","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/","og_locale":"en_US","og_type":"article","og_title":"How computer security is depicted in movies - Intego Mac Podcast Episode 146 - The Mac Security Blog","og_description":"We talk about an update on the Great Twitter Hack of 2020, discuss a ransomware attack on Garmin that shut down the company's services, and even its","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-07-31T09:09:40+00:00","article_modified_time":"2020-08-26T20:38:09+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/","name":"How computer security is depicted in movies - Intego Mac Podcast Episode 146 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#primaryimage"},"datePublished":"2020-07-31T09:09:40+00:00","dateModified":"2020-08-26T20:38:09+00:00","description":"We talk about an update on the Great Twitter Hack of 2020, discuss a ransomware attack on Garmin that shut down the company's services, and even its","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How computer security is depicted in movies &#8211; Intego Mac Podcast Episode 146"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"How computer security is depicted in movies &#8211; Intego Mac Podcast Episode 146","datePublished":"2020-07-31T09:09:40+00:00","dateModified":"2020-08-26T20:38:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#webpage"},"wordCount":198,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast","Ransomware","X (Twitter)"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-computer-security-is-depicted-in-movies-intego-mac-podcast-episode-146\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nUE","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91924"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=91924"}],"version-history":[{"count":4,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91924\/revisions"}],"predecessor-version":[{"id":92011,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91924\/revisions\/92011"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=91924"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=91924"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=91924"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}