{"id":95713,"date":"2022-06-02T02:35:44","date_gmt":"2022-06-02T09:35:44","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=95713"},"modified":"2022-06-02T02:35:44","modified_gmt":"2022-06-02T09:35:44","slug":"waiting-for-wwdc-intego-mac-podcast-episode-242","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/","title":{"rendered":"Waiting for WWDC &#8211; Intego Mac Podcast Episode 242"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+OrbCAuXu?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>As we await next week&#8217;s Worldwide Developer Conference, we discuss what Apple may present. We also look at a clever method hackers are using to steal WhatsApp accounts, remind users to update Zoom, and examine why Apple has earned the third-highest gaming revenue in 2021.<\/p>\n<ul>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/22\/05\/26\/icloud-time-machine-for-mac-new-airport-routers-pop-out-of-rumor-mill---but-hurdles-abound\" target=\"_blank\" rel=\"noopener\">iCloud Time Machine for Mac &#038; new AirPort routers pop out of rumor mill &#8211; but hurdles abound<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/why-apple-is-missing-the-boat-on-home-wifi\/\" target=\"_blank\" rel=\"noopener\">Why Apple Is Missing the Boat on Home Wi-fi<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2022\/05\/29\/apple-preparing-enhanced-lock-screen-and-more\/\" target=\"_blank\" rel=\"noopener\">Gurman: Apple Preparing to Debut Enhanced Lock Screen, Windowing in iPadOS, Redesigned Mac Apps, and More at WWDC<\/a><\/li>\n<li><a href=\"https:\/\/www.macrumors.com\/2022\/05\/29\/realityos-trademark-filing-ahead-of-wwdc\/\" target=\"_blank\" rel=\"noopener\">&#8216;realityOS&#8217; Trademark Filing Hints at Possible WWDC Announcement<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-steal-whatsapp-accounts-using-call-forwarding-trick\/\" target=\"_blank\" rel=\"noopener\">Hackers steal WhatsApp accounts using call forwarding trick<\/a><\/li>\n<li><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/messages-zoom-expose-cyberattack\/\" target=\"_blank\" rel=\"noopener\">Messages Sent Through Zoom Can Expose People to Cyber-Attack<\/a><\/li>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/22\/05\/31\/apple-earner-the-third-most-gaming-revenue-in-2021-outpacing-microsoft-nintendo\" target=\"_blank\" rel=\"noopener\">Apple earned the third-most gaming revenue in 2021, outpacing Microsoft &#038; Nintendo<\/a><\/li>\n<li><a href=\"https:\/\/appleinsider.com\/articles\/22\/05\/31\/apple-should-not-be-placing-ads-in-its-apple-music-playlists\" target=\"_blank\" rel=\"noopener\">Apple injects ads into \u201cad-free\u201d Apple Music playlists<\/a><\/li>\n<\/ul>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us! <\/strong> <a href=\"https:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener\">Contact Intego<\/a> via email if you have any questions you want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we await next week&#8217;s Worldwide Developer Conference, we discuss what Apple may present. We also look at a clever method hackers are using to steal WhatsApp accounts, remind users to update Zoom, and examine why Apple has earned the third-highest gaming revenue in 2021.<\/p>\n","protected":false},"author":46,"featured_media":84472,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"As we await next week&#039;s Worldwide Developer Conference, we discuss what Apple may present. We also look at a clever method hackers are using to steal WhatsApp accounts, remind users to update Zoom, and examine why Apple has earned the third-highest gaming revenue in 2021.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Waiting for WWDC - Intego Mac Podcast Episode 242 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"As we await next week&#039;s Worldwide Developer Conference, we discuss what Apple may present. We also look at a clever method hackers are using to steal WhatsApp accounts, remind users to update Zoom, and examine why Apple has earned the third-highest gaming revenue in 2021.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-02T09:35:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Intego-Mac-Podcast-New-Episode-Featured-325x220.png\" \/>\n\t<meta property=\"og:image:width\" content=\"325\" \/>\n\t<meta property=\"og:image:height\" content=\"220\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Intego-Mac-Podcast-New-Episode-Featured-325x220.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Intego-Mac-Podcast-New-Episode-Featured-325x220.png\",\"width\":325,\"height\":220,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/\",\"name\":\"Waiting for WWDC - Intego Mac Podcast Episode 242 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#primaryimage\"},\"datePublished\":\"2022-06-02T09:35:44+00:00\",\"dateModified\":\"2022-06-02T09:35:44+00:00\",\"description\":\"As we await next week's Worldwide Developer Conference, we discuss what Apple may present. We also look at a clever method hackers are using to steal WhatsApp accounts, remind users to update Zoom, and examine why Apple has earned the third-highest gaming revenue in 2021.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Waiting for WWDC &#8211; Intego Mac Podcast Episode 242\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Waiting for WWDC &#8211; Intego Mac Podcast Episode 242\",\"datePublished\":\"2022-06-02T09:35:44+00:00\",\"dateModified\":\"2022-06-02T09:35:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#webpage\"},\"wordCount\":190,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Intego-Mac-Podcast-New-Episode-Featured-325x220.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"As we await next week's Worldwide Developer Conference, we discuss what Apple may present. We also look at a clever method hackers are using to steal WhatsApp accounts, remind users to update Zoom, and examine why Apple has earned the third-highest gaming revenue in 2021.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/","og_locale":"en_US","og_type":"article","og_title":"Waiting for WWDC - Intego Mac Podcast Episode 242 - The Mac Security Blog","og_description":"As we await next week's Worldwide Developer Conference, we discuss what Apple may present. We also look at a clever method hackers are using to steal WhatsApp accounts, remind users to update Zoom, and examine why Apple has earned the third-highest gaming revenue in 2021.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/","og_site_name":"The Mac Security Blog","article_published_time":"2022-06-02T09:35:44+00:00","og_image":[{"width":325,"height":220,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Intego-Mac-Podcast-New-Episode-Featured-325x220.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Intego-Mac-Podcast-New-Episode-Featured-325x220.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Intego-Mac-Podcast-New-Episode-Featured-325x220.png","width":325,"height":220,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/","name":"Waiting for WWDC - Intego Mac Podcast Episode 242 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#primaryimage"},"datePublished":"2022-06-02T09:35:44+00:00","dateModified":"2022-06-02T09:35:44+00:00","description":"As we await next week's Worldwide Developer Conference, we discuss what Apple may present. We also look at a clever method hackers are using to steal WhatsApp accounts, remind users to update Zoom, and examine why Apple has earned the third-highest gaming revenue in 2021.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Waiting for WWDC &#8211; Intego Mac Podcast Episode 242"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Waiting for WWDC &#8211; Intego Mac Podcast Episode 242","datePublished":"2022-06-02T09:35:44+00:00","dateModified":"2022-06-02T09:35:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#webpage"},"wordCount":190,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Intego-Mac-Podcast-New-Episode-Featured-325x220.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/waiting-for-wwdc-intego-mac-podcast-episode-242\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/11\/Intego-Mac-Podcast-New-Episode-Featured-325x220.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-oTL","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95713"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=95713"}],"version-history":[{"count":1,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95713\/revisions"}],"predecessor-version":[{"id":95714,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/95713\/revisions\/95714"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/84472"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=95713"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=95713"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=95713"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}