	{"id":95378,"date":"2022-02-17T01:59:26","date_gmt":"2022-02-17T09:59:26","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95378"},"modified":"2022-02-17T01:59:26","modified_gmt":"2022-02-17T09:59:26","slug":"apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/","title":{"rendered":"Apple Vulns, Macro Viruses, and How Encryption Protects You &#8211; Intego Mac Podcast Episode 227"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+5ntDLfTm?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Apple has issued a mixed assortment of security updates, Microsoft is changing the way they warn about macros in Word and Excel documents, and we take a deep dive into end-to-end encryption, explaining why your security and privacy online depend on it.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-fixes-active-zero-day-vuln-with-macos-12-2-1-ios-15-3-1-safari-15-3\/\" target=\"_blank\" rel=\"noopener\">Apple fixes active zero-day vuln with macOS 12.2.1, iOS 15.3.1, Safari 15.3<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/cisa-orders-federal-agencies-to-update-iphones-macs-until-feb-25th\/\" target=\"_blank\" rel=\"noopener\">CISA orders federal agencies to update iPhones, Macs until Feb 25th<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-releases-mystery-security-updates-for-macos-big-sur-catalina\/\" target=\"_blank\" rel=\"noopener\">Apple releases mystery security updates for macOS Big Sur, Catalina<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2022\/02\/10\/airtag-updates-unwanted-tracking\/\" target=\"_blank\" rel=\"noopener\">Apple Announces AirTag Updates to Address Unwanted Tracking<\/a><\/li>\n<li><a href=\"https:\/\/grahamcluley.com\/microsoft-stab-macro-viruses\/\" target=\"_blank\" rel=\"noopener\">25 years on, Microsoft makes another stab at stopping macro virus malware<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/10-ways-end-to-encryption-protects-your-data-your-privacy-and-your-bank-balance\/\" target=\"_blank\" rel=\"noopener\">10 Ways End-to-Encryption Protects Your Data, Your Privacy, and Your Bank Balance<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/three-free-secure-email-hosts-that-protect-your-data\/\" target=\"_blank\" rel=\"noopener\">Three Free Secure Email Providers That Protect Your Data and Privacy<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Apple has issued a mixed assortment of security updates, Microsoft is changing the way they warn about macros in Word and Excel documents, and we take a deep dive into end-to-end encryption, explaining why your security and privacy online depend on it.<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Apple has issued a mixed assortment of security updates, Microsoft is changing the way they warn about macros in Word and Excel documents, and we take a deep dive into end-to-end encryption, explaining why your security and privacy online depend on it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apple Vulns, Macro Viruses, and How Encryption Protects You - Intego Mac Podcast Episode 227 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Apple has issued a mixed assortment of security updates, Microsoft is changing the way they warn about macros in Word and Excel documents, and we take a deep dive into end-to-end encryption, explaining why your security and privacy online depend on it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-17T09:59:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/\",\"name\":\"Apple Vulns, Macro Viruses, and How Encryption Protects You - Intego Mac Podcast Episode 227 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#primaryimage\"},\"datePublished\":\"2022-02-17T09:59:26+00:00\",\"dateModified\":\"2022-02-17T09:59:26+00:00\",\"description\":\"Apple has issued a mixed assortment of security updates, Microsoft is changing the way they warn about macros in Word and Excel documents, and we take a deep dive into end-to-end encryption, explaining why your security and privacy online depend on it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apple Vulns, Macro Viruses, and How Encryption Protects You &#8211; Intego Mac Podcast Episode 227\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Apple Vulns, Macro Viruses, and How Encryption Protects You &#8211; Intego Mac Podcast Episode 227\",\"datePublished\":\"2022-02-17T09:59:26+00:00\",\"dateModified\":\"2022-02-17T09:59:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#webpage\"},\"wordCount\":178,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Apple has issued a mixed assortment of security updates, Microsoft is changing the way they warn about macros in Word and Excel documents, and we take a deep dive into end-to-end encryption, explaining why your security and privacy online depend on it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/","og_locale":"en_US","og_type":"article","og_title":"Apple Vulns, Macro Viruses, and How Encryption Protects You - Intego Mac Podcast Episode 227 - The Mac Security Blog","og_description":"Apple has issued a mixed assortment of security updates, Microsoft is changing the way they warn about macros in Word and Excel documents, and we take a deep dive into end-to-end encryption, explaining why your security and privacy online depend on it.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-02-17T09:59:26+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/","name":"Apple Vulns, Macro Viruses, and How Encryption Protects You - Intego Mac Podcast Episode 227 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#primaryimage"},"datePublished":"2022-02-17T09:59:26+00:00","dateModified":"2022-02-17T09:59:26+00:00","description":"Apple has issued a mixed assortment of security updates, Microsoft is changing the way they warn about macros in Word and Excel documents, and we take a deep dive into end-to-end encryption, explaining why your security and privacy online depend on it.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Apple Vulns, Macro Viruses, and How Encryption Protects You &#8211; Intego Mac Podcast Episode 227"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Apple Vulns, Macro Viruses, and How Encryption Protects You &#8211; Intego Mac Podcast Episode 227","datePublished":"2022-02-17T09:59:26+00:00","dateModified":"2022-02-17T09:59:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#webpage"},"wordCount":178,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/apple-vulns-macro-viruses-and-how-encryption-protects-you-intego-mac-podcast-episode-227\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oOm","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95378"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95378"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95378\/revisions"}],"predecessor-version":[{"id":95379,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95378\/revisions\/95379"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}