{"id":95136,"date":"2021-12-30T02:10:23","date_gmt":"2021-12-30T10:10:23","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95136"},"modified":"2021-12-30T02:10:23","modified_gmt":"2021-12-30T10:10:23","slug":"the-challenge-with-alexa-intego-mac-podcast-episode-220","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/","title":{"rendered":"The Challenge with Alexa &#8211; Intego Mac Podcast Episode 220"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+kuwybX6q?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Amazon Alexa gave a dangerous answer to a child asking for a challenge; how much can we trust AI to provide safe, reliable information? We also look at the new RedLine malware, and discuss some iCloud settings to help you get back into your account if you&#8217;ve forgotten your password, and one that lets you set up a legacy contact.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/redline-malware-shows-why-passwords-shouldnt-be-saved-in-browsers\/\" target=\"_blank\" rel=\"noopener\">RedLine malware shows why passwords shouldn&#8217;t be saved in browsers<\/a><\/li>\n<li><a href=\"https:\/\/techcrunch.com\/2021\/12\/16\/buskill-kill-cord-self-destruct-laptop\/\" target=\"_blank\" rel=\"noopener\">This USB \u2018kill cord\u2019 can instantly wipe your laptop if snatched or stolen<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2021\/12\/28\/amazon-responds-after-alexa-encourages-dangerous-penny-challenge\/\" target=\"_blank\" rel=\"noopener\">Alexa encourages dangerous penny challenge<\/a><\/li>\n<li><a href=\"https:\/\/alexaanswers.amazon.com\/about\" target=\"_blank\" rel=\"noopener\">Alexa Answers<\/a><\/li>\n<li><a href=\"https:\/\/forums.moneysavingexpert.com\/discussion\/6229222\/365-day-1p-challenge-2021\" target=\"_blank\" rel=\"noopener\">The Penny (1p) Challenge<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-set-icloud-account-recovery-contacts-legacy-contacts-and-trusted-phone-numbers\/\" target=\"_blank\" rel=\"noopener\">How to Set iCloud Account Recovery Contacts, Legacy Contacts, and Trusted Phone Numbers<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-prepare-your-digital-legacy\/\" target=\"_blank\" rel=\"noopener\">How to Prepare Your Digital Legacy<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Amazon Alexa gave a dangerous answer to a child asking for a challenge; how much can we trust AI to provide safe, reliable information? We also look at the new RedLine malware, and discuss some iCloud settings to help you get back into your account if you&#8217;ve forgotten your password, and one that lets you set up a legacy contact.<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[4009,3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Amazon Alexa gave a dangerous answer to a child asking for a challenge; how much can we trust AI to provide safe, reliable information? We also look at the new RedLine malware, and discuss some iCloud settings to help you get back into your account if you&#039;ve forgotten your password, and one that lets you set up a legacy contact.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Challenge with Alexa - Intego Mac Podcast Episode 220 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Amazon Alexa gave a dangerous answer to a child asking for a challenge; how much can we trust AI to provide safe, reliable information? We also look at the new RedLine malware, and discuss some iCloud settings to help you get back into your account if you&#039;ve forgotten your password, and one that lets you set up a legacy contact.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-30T10:10:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/\",\"name\":\"The Challenge with Alexa - Intego Mac Podcast Episode 220 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#primaryimage\"},\"datePublished\":\"2021-12-30T10:10:23+00:00\",\"dateModified\":\"2021-12-30T10:10:23+00:00\",\"description\":\"Amazon Alexa gave a dangerous answer to a child asking for a challenge; how much can we trust AI to provide safe, reliable information? We also look at the new RedLine malware, and discuss some iCloud settings to help you get back into your account if you've forgotten your password, and one that lets you set up a legacy contact.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Challenge with Alexa &#8211; Intego Mac Podcast Episode 220\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"The Challenge with Alexa &#8211; Intego Mac Podcast Episode 220\",\"datePublished\":\"2021-12-30T10:10:23+00:00\",\"dateModified\":\"2021-12-30T10:10:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#webpage\"},\"wordCount\":173,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Alexa\",\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Amazon Alexa gave a dangerous answer to a child asking for a challenge; how much can we trust AI to provide safe, reliable information? We also look at the new RedLine malware, and discuss some iCloud settings to help you get back into your account if you've forgotten your password, and one that lets you set up a legacy contact.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/","og_locale":"en_US","og_type":"article","og_title":"The Challenge with Alexa - Intego Mac Podcast Episode 220 - The Mac Security Blog","og_description":"Amazon Alexa gave a dangerous answer to a child asking for a challenge; how much can we trust AI to provide safe, reliable information? We also look at the new RedLine malware, and discuss some iCloud settings to help you get back into your account if you've forgotten your password, and one that lets you set up a legacy contact.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/","og_site_name":"The Mac Security Blog","article_published_time":"2021-12-30T10:10:23+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/","name":"The Challenge with Alexa - Intego Mac Podcast Episode 220 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#primaryimage"},"datePublished":"2021-12-30T10:10:23+00:00","dateModified":"2021-12-30T10:10:23+00:00","description":"Amazon Alexa gave a dangerous answer to a child asking for a challenge; how much can we trust AI to provide safe, reliable information? We also look at the new RedLine malware, and discuss some iCloud settings to help you get back into your account if you've forgotten your password, and one that lets you set up a legacy contact.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The Challenge with Alexa &#8211; Intego Mac Podcast Episode 220"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"The Challenge with Alexa &#8211; Intego Mac Podcast Episode 220","datePublished":"2021-12-30T10:10:23+00:00","dateModified":"2021-12-30T10:10:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#webpage"},"wordCount":173,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Alexa","Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-challenge-with-alexa-intego-mac-podcast-episode-220\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oKs","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95136"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95136"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95136\/revisions"}],"predecessor-version":[{"id":95137,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95136\/revisions\/95137"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}