{"id":95204,"date":"2022-01-27T02:55:04","date_gmt":"2022-01-27T10:55:04","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95204"},"modified":"2022-02-14T07:45:33","modified_gmt":"2022-02-14T15:45:33","slug":"the-enemy-in-your-pocket-intego-mac-podcast-episode-224","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/","title":{"rendered":"The Enemy in Your Pocket &#8211; Intego Mac Podcast Episode 224"},"content":{"rendered":"<p>The Enemy in Your Pocket &#8211; Intego Mac Podcast Episode 224<\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+IMwwZlPJ?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>DazzleSpy; Safari; vulnerability; malware. Nuff said? Don&#8217;t worry, we&#8217;ll have more. There&#8217;s quite a bit of money to be made from Apple&#8217;s bug bounty program; one recipient blabs on the payout. Time for procrastinators to update to iOS 15 as security updates dry up for earlier systems. Scammers are preying on prayers, prayer apps that is. And we&#8217;ve got another AirTags to the rescue adventure. Also, Apple released a whole slew of security updates right after we finished recording the podcast; check the link in the show notes for full info.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/dazzlespy-mac-malware-used-in-targeted-attacks\/\" rel=\"noopener\">DazzleSpy Mac Malware Used in Targeted Attacks<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2022\/01\/26\/apple-paid-bug-bounty-of-100k-for-mac-camera-hijack\/\" target=\"_blank\" rel=\"noopener\">Apple paid bug bounty of $100K for Mac webcam hijack &amp; more<\/a><\/li>\n<li><a href=\"https:\/\/www.apple.com\/ios\/ios-15\/features\/\" target=\"_blank\" rel=\"noopener\">iOS 15 Features<\/a><\/li>\n<li><a href=\"https:\/\/twitter.com\/theJoshMeister\/status\/1483955998964400128\" target=\"_blank\" rel=\"noopener\">iOS 14 updates are no longer being offered<\/a><\/li>\n<li><a href=\"https:\/\/9to5mac.com\/2022\/01\/13\/apple-ios-15-adoption-vs-ios-14\/\" target=\"_blank\" rel=\"noopener\">Apple says iOS 15 adoption is lower than usual, but here&#8217;s why<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2022\/01\/20\/safari-data-leak-bug-fix-ios-15-3\/\" target=\"_blank\" rel=\"noopener\">iOS 15.3 and macOS 12.2 (with Safari history leak fix) sill aren\u2019t out yet<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-macos-12-2-ios-15-3-watchos-8-4-and-more\/\" target=\"_blank\" rel=\"noopener\">Apple releases macOS 12.2, iOS 15.3, watchOS 8.4 and more<\/a><\/li>\n<li><a href=\"https:\/\/www.buzzfeednews.com\/article\/emilybakerwhite\/apps-selling-your-prayers\" target=\"_blank\" rel=\"noopener\">Nothing Sacred: These Apps Reserve The Right To Sell Your Prayers<\/a><\/li>\n<li><a href=\"https:\/\/reverttosaved.com\/2022\/01\/24\/icloud-sync-is-randomly-breaking\/\" target=\"_blank\" rel=\"noopener\">iCloud sync is randomly breaking<\/a><\/li>\n<li><a href=\"https:\/\/www.washingtonpost.com\/technology\/2022\/01\/24\/apple-airtag-helped-woman-catch-movers-lie\/\" target=\"_blank\" rel=\"noopener\">Woman put AirTag in one of her boxes and caught her mover lying about his location<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/16-things-you-can-track-with-airtags\/\" target=\"_blank\" rel=\"noopener\">24 Things You Can Track with Apple\u2019s New AirTags<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DazzleSpy; Safari; vulnerability; malware. Nuff said? Don&#8217;t worry, we&#8217;ll have more. There&#8217;s quite a bit of money to be made from Apple&#8217;s bug bounty program; one recipient blabs on the payout. Time for procrastinators to update to iOS 15 as security updates dry up for earlier systems. Scammers are preying on prayers, prayer apps that is. And we&#8217;ve got another AirTags to the rescue adventure. Also, Apple released a whole slew of security updates right after we finished recording the podcast; check the link in the show notes for full info.<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[4612,3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"DazzleSpy; Safari; vulnerability; malware. Nuff said? Don&#039;t worry, we&#039;ll have more. There&#039;s quite a bit of money to be made from Apple&#039;s bug bounty program; one recipient blabs on the payout. Time for procrastinators to update to iOS 15 as security updates dry up for earlier systems. Scammers are preying on prayers, prayer apps that is. And we&#039;ve got another AirTags to the rescue adventure. Also, Apple released a whole slew of security updates right after we finished recording the podcast; check the link in the show notes for full info.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Enemy in Your Pocket - Intego Mac Podcast Episode 224 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"DazzleSpy; Safari; vulnerability; malware. Nuff said? Don&#039;t worry, we&#039;ll have more. There&#039;s quite a bit of money to be made from Apple&#039;s bug bounty program; one recipient blabs on the payout. Time for procrastinators to update to iOS 15 as security updates dry up for earlier systems. Scammers are preying on prayers, prayer apps that is. And we&#039;ve got another AirTags to the rescue adventure. Also, Apple released a whole slew of security updates right after we finished recording the podcast; check the link in the show notes for full info.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-27T10:55:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-14T15:45:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/\",\"name\":\"The Enemy in Your Pocket - Intego Mac Podcast Episode 224 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#primaryimage\"},\"datePublished\":\"2022-01-27T10:55:04+00:00\",\"dateModified\":\"2022-02-14T15:45:33+00:00\",\"description\":\"DazzleSpy; Safari; vulnerability; malware. Nuff said? Don't worry, we'll have more. There's quite a bit of money to be made from Apple's bug bounty program; one recipient blabs on the payout. Time for procrastinators to update to iOS 15 as security updates dry up for earlier systems. Scammers are preying on prayers, prayer apps that is. And we've got another AirTags to the rescue adventure. Also, Apple released a whole slew of security updates right after we finished recording the podcast; check the link in the show notes for full info.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Enemy in Your Pocket &#8211; Intego Mac Podcast Episode 224\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"The Enemy in Your Pocket &#8211; Intego Mac Podcast Episode 224\",\"datePublished\":\"2022-01-27T10:55:04+00:00\",\"dateModified\":\"2022-02-14T15:45:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#webpage\"},\"wordCount\":261,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"AirTags\",\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"DazzleSpy; Safari; vulnerability; malware. Nuff said? Don't worry, we'll have more. There's quite a bit of money to be made from Apple's bug bounty program; one recipient blabs on the payout. Time for procrastinators to update to iOS 15 as security updates dry up for earlier systems. Scammers are preying on prayers, prayer apps that is. And we've got another AirTags to the rescue adventure. Also, Apple released a whole slew of security updates right after we finished recording the podcast; check the link in the show notes for full info.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/","og_locale":"en_US","og_type":"article","og_title":"The Enemy in Your Pocket - Intego Mac Podcast Episode 224 - The Mac Security Blog","og_description":"DazzleSpy; Safari; vulnerability; malware. Nuff said? Don't worry, we'll have more. There's quite a bit of money to be made from Apple's bug bounty program; one recipient blabs on the payout. Time for procrastinators to update to iOS 15 as security updates dry up for earlier systems. Scammers are preying on prayers, prayer apps that is. And we've got another AirTags to the rescue adventure. Also, Apple released a whole slew of security updates right after we finished recording the podcast; check the link in the show notes for full info.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-01-27T10:55:04+00:00","article_modified_time":"2022-02-14T15:45:33+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/","name":"The Enemy in Your Pocket - Intego Mac Podcast Episode 224 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#primaryimage"},"datePublished":"2022-01-27T10:55:04+00:00","dateModified":"2022-02-14T15:45:33+00:00","description":"DazzleSpy; Safari; vulnerability; malware. Nuff said? Don't worry, we'll have more. There's quite a bit of money to be made from Apple's bug bounty program; one recipient blabs on the payout. Time for procrastinators to update to iOS 15 as security updates dry up for earlier systems. Scammers are preying on prayers, prayer apps that is. And we've got another AirTags to the rescue adventure. Also, Apple released a whole slew of security updates right after we finished recording the podcast; check the link in the show notes for full info.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"The Enemy in Your Pocket &#8211; Intego Mac Podcast Episode 224"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"The Enemy in Your Pocket &#8211; Intego Mac Podcast Episode 224","datePublished":"2022-01-27T10:55:04+00:00","dateModified":"2022-02-14T15:45:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#webpage"},"wordCount":261,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["AirTags","Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/the-enemy-in-your-pocket-intego-mac-podcast-episode-224\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oLy","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95204"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95204"}],"version-history":[{"count":3,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95204\/revisions"}],"predecessor-version":[{"id":95273,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95204\/revisions\/95273"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}