{"id":92511,"date":"2020-11-05T00:30:10","date_gmt":"2020-11-05T08:30:10","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=92511"},"modified":"2021-05-03T09:06:32","modified_gmt":"2021-05-03T16:06:32","slug":"what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/","title":{"rendered":"What to do if you think you have malware on your Mac &#8211; Intego Mac Podcast Episode 160"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+qIC3D2IS?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Sometimes when things start going wrong on your Mac, you may think you have malware. In this episode, Josh and Kirk discuss the possible signs of a malware attack, and the steps to take if you think that you&#8217;ve been infection. <\/p>\n<p>In the introduction, we said we didn&#8217;t think there would be much Apple-related news this week, but we learned that Apple will be announcing new Macs, and the release date for macOS Big Sur, on November 10, so we&#8217;ll be covering that in the next episode. <\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac\/\" target=\"_blank\" rel=\"noopener noreferrer\">What to Do if You Think You Have Malware on Your Mac<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Kernel_panic\" target=\"_blank\" rel=\"noopener noreferrer\">Kernel panic (Wikipedia)<\/a><\/li>\n<li><a href=\"https:\/\/www.backblaze.com\/b2\/hard-drive-test-data.html\" target=\"_blank\" rel=\"noopener noreferrer\">Backblaze Hard Drive Data and Stats<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/data-backup-plan-how-to-implement-the-3-2-1-backup-strategy\/\" target=\"_blank\" rel=\"noopener noreferrer\">Data Backup Plan: How to Implement the 3-2-1 Backup Strategy<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-verify-your-backups-are-working-properly\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to Verify Your Backups are Working Properly<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/4-types-of-backup-hard-drives-for-mac\/\" target=\"_blank\" rel=\"noopener noreferrer\">4 Types of Backup Hard Drives for Mac<\/a><\/li>\n<li><a href=\"https:\/\/podcast.intego.com\/6\" target=\"_blank\" rel=\"noopener noreferrer\">Episode 6: Passwords Are Hard (correcthorsebatterystaple)<\/a><\/li>\n<li><a href=\"https:\/\/xkcd.com\/936\/\" target=\"_blank\" rel=\"noopener noreferrer\">correcthorsebatterystaple (XKCD)<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/support\" target=\"_blank\" rel=\"noopener noreferrer\">Intego support<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong><\/p>\n<p>Listeners can <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">contact Intego<\/a> via email at podcast@intego.com and ask us any questions that they want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sometimes when things start going wrong on your Mac, you may think you have malware. In this episode, Josh and Kirk discuss the possible signs of a malware attack, and the steps to take if you think that you&#8217;ve been infection. <\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[31,3715,86],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Sometimes when things start going wrong on your Mac, you may think you have malware. In this episode, Josh and Kirk discuss the possible signs of a malware attack, and the steps to take if you think that you&#039;ve been infection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What to do if you think you have malware on your Mac - Intego Mac Podcast Episode 160 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Sometimes when things start going wrong on your Mac, you may think you have malware. In this episode, Josh and Kirk discuss the possible signs of a malware attack, and the steps to take if you think that you&#039;ve been infection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-05T08:30:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-03T16:06:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/\",\"name\":\"What to do if you think you have malware on your Mac - Intego Mac Podcast Episode 160 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#primaryimage\"},\"datePublished\":\"2020-11-05T08:30:10+00:00\",\"dateModified\":\"2021-05-03T16:06:32+00:00\",\"description\":\"Sometimes when things start going wrong on your Mac, you may think you have malware. In this episode, Josh and Kirk discuss the possible signs of a malware attack, and the steps to take if you think that you've been infection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What to do if you think you have malware on your Mac &#8211; Intego Mac Podcast Episode 160\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"What to do if you think you have malware on your Mac &#8211; Intego Mac Podcast Episode 160\",\"datePublished\":\"2020-11-05T08:30:10+00:00\",\"dateModified\":\"2021-05-03T16:06:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#webpage\"},\"wordCount\":217,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Backup\",\"Intego Mac Podcast\",\"Malware\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Sometimes when things start going wrong on your Mac, you may think you have malware. In this episode, Josh and Kirk discuss the possible signs of a malware attack, and the steps to take if you think that you've been infection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/","og_locale":"en_US","og_type":"article","og_title":"What to do if you think you have malware on your Mac - Intego Mac Podcast Episode 160 - The Mac Security Blog","og_description":"Sometimes when things start going wrong on your Mac, you may think you have malware. In this episode, Josh and Kirk discuss the possible signs of a malware attack, and the steps to take if you think that you've been infection.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-11-05T08:30:10+00:00","article_modified_time":"2021-05-03T16:06:32+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/","name":"What to do if you think you have malware on your Mac - Intego Mac Podcast Episode 160 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#primaryimage"},"datePublished":"2020-11-05T08:30:10+00:00","dateModified":"2021-05-03T16:06:32+00:00","description":"Sometimes when things start going wrong on your Mac, you may think you have malware. In this episode, Josh and Kirk discuss the possible signs of a malware attack, and the steps to take if you think that you've been infection.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"What to do if you think you have malware on your Mac &#8211; Intego Mac Podcast Episode 160"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"What to do if you think you have malware on your Mac &#8211; Intego Mac Podcast Episode 160","datePublished":"2020-11-05T08:30:10+00:00","dateModified":"2021-05-03T16:06:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#webpage"},"wordCount":217,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Backup","Intego Mac Podcast","Malware"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-think-you-have-malware-on-your-mac-intego-mac-podcast-episode-160\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-o47","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92511"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=92511"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92511\/revisions"}],"predecessor-version":[{"id":93651,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/92511\/revisions\/93651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=92511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=92511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=92511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}