{"id":95143,"date":"2022-01-06T02:47:42","date_gmt":"2022-01-06T10:47:42","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95143"},"modified":"2022-01-06T02:47:42","modified_gmt":"2022-01-06T10:47:42","slug":"look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/","title":{"rendered":"Look-Alike Letters Lead Users to Lose Moola &#8211; Intego Mac Podcast Episode 221"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+0-pX8T41?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Attackers can simulate an iPhone restart to keep malware alive, and an interesting HomeKit vulnerability could brick your device. We discuss malicious QR codes, and we take a deep dive into Apple&#8217;s two-factor authentication, which more and more users need to use Apple devices. <\/p>\n<ul>\n<li><a href=\"https:\/\/arstechnica.com\/information-technology\/2022\/01\/exchange-server-bug-gets-a-fix-after-ruining-admins-new-years-plans\/\" target=\"_blank\" rel=\"noopener\">Microsoft fixes harebrained Y2K22 Exchange bug that disrupted email worldwide<\/a><\/li>\n<li><a href=\"https:\/\/therecord.media\/threat-actors-can-simulate-iphone-reboots-and-keep-ios-malware-on-a-device\/\" target=\"_blank\" rel=\"noopener\">\u201cNoReboot\u201d attack: Threat actors can simulate iPhone reboots and keep iOS malware on a device<\/a><\/li>\n<li><a href=\"https:\/\/trevorspiniolas.com\/doorlock\/doorlock.html\" target=\"_blank\" rel=\"noopener\">Doorlock<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/Austin_Police\/status\/1478122920371232770\" target=\"_blank\" rel=\"noopener\">Tweet by Austin, TX, police<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/theJoshMeister\/status\/985303880819916801\" target=\"_blank\" rel=\"noopener\">Josh&#8217;s tweet<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-use-two-factor-authentication-for-your-apple-id-and-icloud-account\/\" target=\"_blank\" rel=\"noopener\">How to Use Two-Factor Authentication for Your Apple ID and iCloud Account<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-set-icloud-account-recovery-contacts-legacy-contacts-and-trusted-phone-numbers\/\" target=\"_blank\" rel=\"noopener\">How to Set iCloud Account Recovery Contacts, Legacy Contacts, and Trusted Phone Numbers<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attackers can simulate an iPhone restart to keep malware alive, and an interesting HomeKit vulnerability could brick your device. We discuss malicious QR codes, and we take a deep dive into Apple&#8217;s two-factor authentication, which more and more users need to use Apple devices. <\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715,325],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Attackers can simulate an iPhone restart to keep malware alive, and an interesting HomeKit vulnerability could brick your device. We discuss malicious QR codes, and we take a deep dive into Apple&#039;s two-factor authentication, which more and more users need to use Apple devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Look-Alike Letters Lead Users to Lose Moola - Intego Mac Podcast Episode 221 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Attackers can simulate an iPhone restart to keep malware alive, and an interesting HomeKit vulnerability could brick your device. We discuss malicious QR codes, and we take a deep dive into Apple&#039;s two-factor authentication, which more and more users need to use Apple devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-06T10:47:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/\",\"name\":\"Look-Alike Letters Lead Users to Lose Moola - Intego Mac Podcast Episode 221 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#primaryimage\"},\"datePublished\":\"2022-01-06T10:47:42+00:00\",\"dateModified\":\"2022-01-06T10:47:42+00:00\",\"description\":\"Attackers can simulate an iPhone restart to keep malware alive, and an interesting HomeKit vulnerability could brick your device. We discuss malicious QR codes, and we take a deep dive into Apple's two-factor authentication, which more and more users need to use Apple devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Look-Alike Letters Lead Users to Lose Moola &#8211; Intego Mac Podcast Episode 221\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Look-Alike Letters Lead Users to Lose Moola &#8211; Intego Mac Podcast Episode 221\",\"datePublished\":\"2022-01-06T10:47:42+00:00\",\"dateModified\":\"2022-01-06T10:47:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#webpage\"},\"wordCount\":166,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\",\"Two-Factor Authentication\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Attackers can simulate an iPhone restart to keep malware alive, and an interesting HomeKit vulnerability could brick your device. We discuss malicious QR codes, and we take a deep dive into Apple's two-factor authentication, which more and more users need to use Apple devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/","og_locale":"en_US","og_type":"article","og_title":"Look-Alike Letters Lead Users to Lose Moola - Intego Mac Podcast Episode 221 - The Mac Security Blog","og_description":"Attackers can simulate an iPhone restart to keep malware alive, and an interesting HomeKit vulnerability could brick your device. We discuss malicious QR codes, and we take a deep dive into Apple's two-factor authentication, which more and more users need to use Apple devices.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-01-06T10:47:42+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/","name":"Look-Alike Letters Lead Users to Lose Moola - Intego Mac Podcast Episode 221 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#primaryimage"},"datePublished":"2022-01-06T10:47:42+00:00","dateModified":"2022-01-06T10:47:42+00:00","description":"Attackers can simulate an iPhone restart to keep malware alive, and an interesting HomeKit vulnerability could brick your device. We discuss malicious QR codes, and we take a deep dive into Apple's two-factor authentication, which more and more users need to use Apple devices.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Look-Alike Letters Lead Users to Lose Moola &#8211; Intego Mac Podcast Episode 221"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Look-Alike Letters Lead Users to Lose Moola &#8211; Intego Mac Podcast Episode 221","datePublished":"2022-01-06T10:47:42+00:00","dateModified":"2022-01-06T10:47:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#webpage"},"wordCount":166,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast","Two-Factor Authentication"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/look-alike-letters-lead-users-to-lose-moola-intego-mac-podcast-episode-221\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oKz","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95143"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95143"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95143\/revisions"}],"predecessor-version":[{"id":95144,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95143\/revisions\/95144"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}