	{"id":94122,"date":"2021-07-08T02:45:59","date_gmt":"2021-07-08T09:45:59","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=94122"},"modified":"2021-07-08T02:46:18","modified_gmt":"2021-07-08T09:46:18","slug":"the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/","title":{"rendered":"The Danger of Internet-Connected Devices &#8211; Intego Mac Podcast Episode 195"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+ZYbc9ZnA?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>We take another look at Windows 11 system requirements, we discuss another strange wi-fi network name that can break iPhones, and we look closely at the issue of Western Digital network storage devices that have had data deleted by hackers.<\/p>\n<ul>\n<li><a href=\"https:\/\/blogs.windows.com\/windows-insider\/2021\/06\/28\/update-on-windows-11-minimum-system-requirements\/\" target=\"_blank\" rel=\"noopener\">Update on Windows 11 minimum system requirements<\/a><\/li>\n<li><a href=\"https:\/\/www.zdnet.com\/article\/serious-wi-fi-bug-can-break-your-iphone-but-heres-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noopener\">This serious Wi-Fi bug can break your iPhone, but here&#8217;s how to protect yourself<\/a><\/li>\n<li><a href=\"https:\/\/arstechnica.com\/gadgets\/2021\/07\/passwords-in-amazon-echo-dots-live-on-even-after-you-factory-reset-them\/\" target=\"_blank\" rel=\"noopener\">Thinking about selling your Echo Dot\u2014or any IoT device? Read this first<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/what-to-do-if-you-have-western-digital-my-book-live-or-my-book-live-duo-devices\/\" target=\"_blank\" rel=\"noopener\">Got a WD My Book Live device? Your data is at risk\u2014here\u2019s what to do<\/a><\/li>\n<li><a href=\"https:\/\/www.backblaze.com\/b2\/hard-drive-test-data.html\" target=\"_blank\" rel=\"noopener\">Backblase Hard Drive Data and Stats<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We take another look at Windows 11 system requirements, we discuss another strange wi-fi network name that can break iPhones, and we look closely at the issue of Western Digital network storage devices that have had data deleted by hackers.<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We take another look at Windows 11 system requirements, we discuss another strange wi-fi network name that can break iPhones, and we look closely at the issue of Western Digital network storage devices that have had data deleted by hackers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Danger of Internet-Connected Devices - Intego Mac Podcast Episode 195 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We take another look at Windows 11 system requirements, we discuss another strange wi-fi network name that can break iPhones, and we look closely at the issue of Western Digital network storage devices that have had data deleted by hackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-08T09:45:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-08T09:46:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/\",\"name\":\"The Danger of Internet-Connected Devices - Intego Mac Podcast Episode 195 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#primaryimage\"},\"datePublished\":\"2021-07-08T09:45:59+00:00\",\"dateModified\":\"2021-07-08T09:46:18+00:00\",\"description\":\"We take another look at Windows 11 system requirements, we discuss another strange wi-fi network name that can break iPhones, and we look closely at the issue of Western Digital network storage devices that have had data deleted by hackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Danger of Internet-Connected Devices &#8211; Intego Mac Podcast Episode 195\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"The Danger of Internet-Connected Devices &#8211; Intego Mac Podcast Episode 195\",\"datePublished\":\"2021-07-08T09:45:59+00:00\",\"dateModified\":\"2021-07-08T09:46:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#webpage\"},\"wordCount\":156,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We take another look at Windows 11 system requirements, we discuss another strange wi-fi network name that can break iPhones, and we look closely at the issue of Western Digital network storage devices that have had data deleted by hackers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/","og_locale":"en_US","og_type":"article","og_title":"The Danger of Internet-Connected Devices - Intego Mac Podcast Episode 195 - The Mac Security Blog","og_description":"We take another look at Windows 11 system requirements, we discuss another strange wi-fi network name that can break iPhones, and we look closely at the issue of Western Digital network storage devices that have had data deleted by hackers.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/","og_site_name":"The Mac Security Blog","article_published_time":"2021-07-08T09:45:59+00:00","article_modified_time":"2021-07-08T09:46:18+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/","name":"The Danger of Internet-Connected Devices - Intego Mac Podcast Episode 195 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#primaryimage"},"datePublished":"2021-07-08T09:45:59+00:00","dateModified":"2021-07-08T09:46:18+00:00","description":"We take another look at Windows 11 system requirements, we discuss another strange wi-fi network name that can break iPhones, and we look closely at the issue of Western Digital network storage devices that have had data deleted by hackers.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The Danger of Internet-Connected Devices &#8211; Intego Mac Podcast Episode 195"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"The Danger of Internet-Connected Devices &#8211; Intego Mac Podcast Episode 195","datePublished":"2021-07-08T09:45:59+00:00","dateModified":"2021-07-08T09:46:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#webpage"},"wordCount":156,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-danger-of-internet-connected-devices-intego-mac-podcast-episode-195\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-ou6","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94122"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=94122"}],"version-history":[{"count":2,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94122\/revisions"}],"predecessor-version":[{"id":94124,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94122\/revisions\/94124"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=94122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=94122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=94122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}