{"id":94934,"date":"2021-11-04T03:12:19","date_gmt":"2021-11-04T10:12:19","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=94934"},"modified":"2023-05-30T09:03:10","modified_gmt":"2023-05-30T16:03:10","slug":"apples-poor-patching-policies-intego-mac-podcast-episode-212","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/","title":{"rendered":"Apple\u2019s Poor Patching Policies &#8211; Intego Mac Podcast Episode 212"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+Ag4eayeT?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>We look at how Apple&#8217;s inconsistent patching policies for fixing security threats puts users at risk. We also discuss Facebook&#8217;s decision to shut down their facial recognition program, and an interesting &#8220;Trojan source&#8221; attack that could allow malware to be inserted into source code using invisible characters.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.macrumors.com\/2021\/11\/01\/apple-privacy-social-media-companies\/\" target=\"_blank\" rel=\"noopener\">Apple&#8217;s Privacy Features Have Cost Social Media Companies Nearly $10 Billion in Revenue<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2021\/11\/02\/facebook-shutting-down-face-recognition\/\" target=\"_blank\" rel=\"noopener\">Facebook Shuttering Facial Recognition System, Will Delete Data From Over a Billion Users<\/a><\/li>\n<li><a href=\"https:\/\/www.theguardian.com\/us-news\/2021\/nov\/03\/nso-group-pegasus-spyware-us-blacklist\" target=\"_blank\" rel=\"noopener\">NSO Group (creator of Pegasus spyware) placed on U.S. government blacklist<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/trojan-source-attack-method-can-hide-bugs-into-open-source-code\/\" target=\"_blank\" rel=\"noopener\">&#8216;Trojan Source&#8217; attack method can hide bugs into open-source code<\/a><\/li>\n<li><a href=\"https:\/\/therecord.media\/cisa-creates-catalog-of-known-exploited-vulnerabilities-orders-agencies-to-patch\/\" target=\"_blank\" rel=\"noopener\">CISA creates catalog of known exploited vulnerabilities, orders agencies to patch<\/a><\/li>\n<li><a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\" rel=\"noopener\">CISA Known Exploited Vulnerabilities Catalog<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-potentially-make-users-security-and-privacy-precarious\/\" target=\"_blank\" rel=\"noopener\">Apple\u2019s Poor Patching Policies Potentially Make Users\u2019 Security and Privacy Precarious<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We look at how Apple&#8217;s inconsistent patching policies for fixing security threats puts users at risk. We also discuss Facebook&#8217;s decision to shut down their facial recognition program, and an interesting &#8220;Trojan source&#8221; attack that could allow malware to be inserted into source code using invisible characters.<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"We look at how Apple&#039;s inconsistent patching policies for fixing security threats puts users at risk. We also discuss Facebook&#039;s decision to shut down their facial recognition program, and an interesting &quot;Trojan source&quot; attack that could allow malware to be inserted into source code using invisible characters.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple\u2019s Poor Patching Policies - Intego Mac Podcast Episode 212 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"We look at how Apple&#039;s inconsistent patching policies for fixing security threats puts users at risk. We also discuss Facebook&#039;s decision to shut down their facial recognition program, and an interesting &quot;Trojan source&quot; attack that could allow malware to be inserted into source code using invisible characters.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-04T10:12:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-30T16:03:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/\",\"name\":\"Apple\\u2019s Poor Patching Policies - Intego Mac Podcast Episode 212 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#primaryimage\"},\"datePublished\":\"2021-11-04T10:12:19+00:00\",\"dateModified\":\"2023-05-30T16:03:10+00:00\",\"description\":\"We look at how Apple's inconsistent patching policies for fixing security threats puts users at risk. We also discuss Facebook's decision to shut down their facial recognition program, and an interesting \\\"Trojan source\\\" attack that could allow malware to be inserted into source code using invisible characters.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple\\u2019s Poor Patching Policies &#8211; Intego Mac Podcast Episode 212\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Apple\\u2019s Poor Patching Policies &#8211; Intego Mac Podcast Episode 212\",\"datePublished\":\"2021-11-04T10:12:19+00:00\",\"dateModified\":\"2023-05-30T16:03:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#webpage\"},\"wordCount\":183,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"We look at how Apple's inconsistent patching policies for fixing security threats puts users at risk. We also discuss Facebook's decision to shut down their facial recognition program, and an interesting \"Trojan source\" attack that could allow malware to be inserted into source code using invisible characters.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/","og_locale":"en_US","og_type":"article","og_title":"Apple\u2019s Poor Patching Policies - Intego Mac Podcast Episode 212 - The Mac Security Blog","og_description":"We look at how Apple's inconsistent patching policies for fixing security threats puts users at risk. We also discuss Facebook's decision to shut down their facial recognition program, and an interesting \"Trojan source\" attack that could allow malware to be inserted into source code using invisible characters.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/","og_site_name":"The Mac Security Blog","article_published_time":"2021-11-04T10:12:19+00:00","article_modified_time":"2023-05-30T16:03:10+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/","name":"Apple\u2019s Poor Patching Policies - Intego Mac Podcast Episode 212 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#primaryimage"},"datePublished":"2021-11-04T10:12:19+00:00","dateModified":"2023-05-30T16:03:10+00:00","description":"We look at how Apple's inconsistent patching policies for fixing security threats puts users at risk. We also discuss Facebook's decision to shut down their facial recognition program, and an interesting \"Trojan source\" attack that could allow malware to be inserted into source code using invisible characters.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple\u2019s Poor Patching Policies &#8211; Intego Mac Podcast Episode 212"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Apple\u2019s Poor Patching Policies &#8211; Intego Mac Podcast Episode 212","datePublished":"2021-11-04T10:12:19+00:00","dateModified":"2023-05-30T16:03:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#webpage"},"wordCount":183,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apples-poor-patching-policies-intego-mac-podcast-episode-212\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oHc","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94934"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=94934"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94934\/revisions"}],"predecessor-version":[{"id":98098,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/94934\/revisions\/98098"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=94934"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=94934"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=94934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}