	{"id":95079,"date":"2021-12-16T01:49:57","date_gmt":"2021-12-16T09:49:57","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95079"},"modified":"2022-02-14T07:47:26","modified_gmt":"2022-02-14T15:47:26","slug":"new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/","title":{"rendered":"Does the Log4j Vulnerability Affect You?  &#8211; Intego Mac Podcast Episode 218"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+y0sEz-6l?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>The Log4j vulnerability is making the news, and we discuss what it is and who should worry. We look at Apple&#8217;s new feature to detect nude photos in children&#8217;s messages, and we discuss the potential demise of the NSO Group.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-12-1-ios-15-2-watchos-8-3-and-more\/\" target=\"_blank\" rel=\"noopener\">Apple releases macOS 12.1, iOS 15.2, watchOS 8.3 and more<\/a><\/li>\n<li><a href=\"https:\/\/support.apple.com\/en-us\/HT212850\" target=\"_blank\" rel=\"noopener\">Apple: \u200b\u200bAbout communication safety in Messages<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2021\/12\/15\/apple-nixes-csam-references-website\/\" target=\"_blank\" rel=\"noopener\">Apple Removes All References to Controversial CSAM Scanning Feature From Its Child Safety Webpage<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2021\/12\/13\/android-tracker-detect-app\/\" target=\"_blank\" rel=\"noopener\">Apple Releases &#8216;Tracker Detect&#8217; App to Prevent Android Users From Being Tracked by AirTags<\/a><\/li>\n<li><a href=\"https:\/\/www.reuters.com\/world\/us\/exclusive-us-lawmakers-call-sanctions-against-israels-nso-other-spyware-firms-2021-12-15\/\" target=\"_blank\" rel=\"noopener\">U.S. lawmakers call for sanctions against Israel&#8217;s NSO, spyware firms<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2021\/12\/15\/pegasus-spyware-maker-nso-running-out-of-cash\/\" target=\"_blank\" rel=\"noopener\">After US ban and Apple action, Pegasus spyware maker NSO running out of cash<\/a><\/li>\n<li><a href=\"https:\/\/www.wired.com\/story\/log4j-flaw-hacking-internet\/\" target=\"_blank\" rel=\"noopener\">\u2018The Internet Is on Fire\u2019 &#8211; A vulnerability in the Log4j logging framework has security teams scrambling to put in a fix.<\/a><\/li>\n<li><a href=\"https:\/\/therecord.media\/cisa-tells-federal-agencies-to-patch-log4shell-before-christmas\" target=\"_blank\" rel=\"noopener\">CISA tells federal agencies to patch Log4Shell before Christmas<\/a><\/li>\n<li><a href=\"https:\/\/xkcd.com\/327\/\" target=\"_blank\" rel=\"noopener\">\u201cExploits of a Mom\u201d (Little Bobby Tables) XKCD comic<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2021\/12\/14\/apple-patches-log4shell-icloud-vulnerability\/\" target=\"_blank\" rel=\"noopener\">Apple patches Log4Shell iCloud vulnerability, described as most critical in a decade<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Log4j vulnerability is making the news, and we discuss what it is and who should worry. We look at Apple&#8217;s new feature to detect nude photos in children&#8217;s messages, and we discuss the potential demise of the NSO Group. <\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[4612,3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"The Log4j vulnerability is making the news, and we discuss what it is and who should worry. We look at Apple&#039;s new feature to detect nude photos in children&#039;s messages, and we discuss the potential demise of the NSO Group.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does the Log4j Vulnerability Affect You? - Intego Mac Podcast Episode 218 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"The Log4j vulnerability is making the news, and we discuss what it is and who should worry. We look at Apple&#039;s new feature to detect nude photos in children&#039;s messages, and we discuss the potential demise of the NSO Group.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-16T09:49:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-14T15:47:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/\",\"name\":\"Does the Log4j Vulnerability Affect You? - Intego Mac Podcast Episode 218 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#primaryimage\"},\"datePublished\":\"2021-12-16T09:49:57+00:00\",\"dateModified\":\"2022-02-14T15:47:26+00:00\",\"description\":\"The Log4j vulnerability is making the news, and we discuss what it is and who should worry. We look at Apple's new feature to detect nude photos in children's messages, and we discuss the potential demise of the NSO Group.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Does the Log4j Vulnerability Affect You? &#8211; Intego Mac Podcast Episode 218\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Does the Log4j Vulnerability Affect You? &#8211; Intego Mac Podcast Episode 218\",\"datePublished\":\"2021-12-16T09:49:57+00:00\",\"dateModified\":\"2022-02-14T15:47:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#webpage\"},\"wordCount\":225,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"AirTags\",\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"The Log4j vulnerability is making the news, and we discuss what it is and who should worry. We look at Apple's new feature to detect nude photos in children's messages, and we discuss the potential demise of the NSO Group.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/","og_locale":"en_US","og_type":"article","og_title":"Does the Log4j Vulnerability Affect You? - Intego Mac Podcast Episode 218 - The Mac Security Blog","og_description":"The Log4j vulnerability is making the news, and we discuss what it is and who should worry. We look at Apple's new feature to detect nude photos in children's messages, and we discuss the potential demise of the NSO Group.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/","og_site_name":"The Mac Security Blog","article_published_time":"2021-12-16T09:49:57+00:00","article_modified_time":"2022-02-14T15:47:26+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/","name":"Does the Log4j Vulnerability Affect You? - Intego Mac Podcast Episode 218 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#primaryimage"},"datePublished":"2021-12-16T09:49:57+00:00","dateModified":"2022-02-14T15:47:26+00:00","description":"The Log4j vulnerability is making the news, and we discuss what it is and who should worry. We look at Apple's new feature to detect nude photos in children's messages, and we discuss the potential demise of the NSO Group.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Does the Log4j Vulnerability Affect You? &#8211; Intego Mac Podcast Episode 218"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Does the Log4j Vulnerability Affect You? &#8211; Intego Mac Podcast Episode 218","datePublished":"2021-12-16T09:49:57+00:00","dateModified":"2022-02-14T15:47:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#webpage"},"wordCount":225,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["AirTags","Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-scam-emails-purport-to-come-from-nso-group-hacker-intego-mac-podcast-episode-218\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oJx","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95079"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95079"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95079\/revisions"}],"predecessor-version":[{"id":95342,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95079\/revisions\/95342"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}