	{"id":96329,"date":"2022-10-19T23:59:46","date_gmt":"2022-10-20T06:59:46","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=96329"},"modified":"2024-10-03T00:38:09","modified_gmt":"2024-10-03T07:38:09","slug":"intego-celebrates-its-25th-anniversary","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/","title":{"rendered":"Intego Celebrates Its 25th Anniversary"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-71308\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20-Year-Anniversary.png\" alt=\"\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20-Year-Anniversary.png 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20-Year-Anniversary-150x75.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20-Year-Anniversary-300x150.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>This month, Intego celebrates its twenty-fifth anniversary. Founded in 1997, Intego&#8217;s primary focus has always been protecting Mac users from the dangers of the Internet.<\/p>\n<p>Five years ago, for our twentieth anniversary in 2017, we wrote an extensive <a href=\"https:\/\/www.intego.com\/mac-security-blog\/happy-anniversary-intego-celebrates-20-years-in-business\/\">blog post<\/a> detailing fond memories of the company&#8217;s history. We had just launched the Intego Mac Podcast, and our <a href=\"https:\/\/podcast.intego.com\/2\">second episode<\/a> featured an interview of a long-time Intego developer. We hope you&#8217;ll enjoy learning about the early years of Intego&#8217;s history.<\/p>\n<p>The five years since then have brought many great advancements for Intego. A few of our notable achievements follow.<\/p>\n<h3>Intego joins global cybersecurity leader<\/h3>\n<p>In 2018, Intego <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-announces-its-acquisition-by-kape-technologies\/\">announced<\/a> that it was joining forces with <a href=\"https:\/\/www.kape.com\/\">Kape Technologies<\/a>. Today, Kape is a global leader in privacy-first cybersecurity software, with nearly a thousand employees worldwide and offices in ten countries. Kape is publicly traded on the London Stock Exchange (LON:KAPE).<\/p>\n<h3>Intego launches Windows antivirus software<\/h3>\n<p>In 2020, Intego <a href=\"https:\/\/www.intego.com\/mac-security-blog\/announcing-intego-antivirus-for-windows\/\">announced<\/a> a new product, <a href=\"https:\/\/www.intego.com\/lp\/free-windows-antivirus?channel=intblog&amp;lpx=download\">Intego Antivirus for Windows<\/a>. It&#8217;s the perfect companion software for Mac users who also have a Windows PC, or who run Windows via Boot Camp or in a virtual machine. Now Intego fans can recommend their most trusted brand to Windows-using friends and family.<\/p>\n<p>Also in 2020, Intego made a major behind-the-scenes upgrade to its Mac antivirus software, <a href=\"https:\/\/www.intego.com\/products\">VirusBarrier X9<\/a>. The update vastly improved detection of Windows malware and other malicious software when scanning Macs.<\/p>\n<h3>Intego launches VPN for Mac and Windows<\/h3>\n<p>In 2021, Intego began offering <a href=\"https:\/\/www.intego.com\/privacy-protection-vpn\">Intego Privacy Protection<\/a>, a full-featured virtual private network (VPN) for macOS and Windows. It boasts <a href=\"https:\/\/www.intego.com\/mac-security-blog\/is-apples-icloud-private-relay-a-vpn-not-even-close-heres-why\/\">numerous major advantages<\/a> over proxy services like Apple&#8217;s iCloud Private Relay. Intego Privacy Protection adds an additional layer of security and privacy that helps keep you safe no matter where you are: at home, out in public, or traveling.<\/p>\n<h3>There&#8217;s lots more to come<\/h3>\n<p>Of course, Intego is pleased to announce that our software will support macOS Ventura on the day Apple releases it, next Monday, October 24. We recognize the importance of providing early support for the latest Mac operating system each year. This empowers our customers to enjoy all the security improvements that Apple makes available in each new Mac operating system.<\/p>\n<p>Intego is proud of the advancements we&#8217;ve made in recent years. We excitedly look forward to bringing you many more innovations in the years to come!<\/p>\n<p>Be sure to keep up with Intego announcements by subscribing to our e-mail newsletter, our blog and podcast, and our social media channels using the links below.<\/p>\n<h3>How can I learn more?<\/h3>\n<p>For more about Intego&#8217;s history from our first twenty years, 1997\u20132017, check out our 2017 <a href=\"https:\/\/www.intego.com\/mac-security-blog\/happy-anniversary-intego-celebrates-20-years-in-business\/\">blog post<\/a> and <a href=\"https:\/\/podcast.intego.com\/2\">podcast episode<\/a> that celebrated our twentieth anniversary.<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"zRupe3qBCj\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/happy-anniversary-intego-celebrates-20-years-in-business\/\">Happy Anniversary! Intego Celebrates 20 Years in Business<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Happy Anniversary! Intego Celebrates 20 Years in Business&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/happy-anniversary-intego-celebrates-20-years-in-business\/embed\/#?secret=zRupe3qBCj\" data-secret=\"zRupe3qBCj\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/player.fireside.fm\/v2\/GegHgcrH+LmR5rUR4?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Each week on the <a href=\"https:\/\/podcast.intego.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Intego Mac Podcast<\/strong><\/a>, Intego&#8217;s Mac security experts discuss the latest Apple news, security and privacy stories, and offer practical advice on getting the most out of your Apple devices. Be sure to <a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" rel=\"noopener\"><strong>follow the podcast<\/strong><\/a> to make sure you don\u2019t miss any episodes.<\/p>\n<p>You can also subscribe to our <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-security-newsletter\/\"><strong>e-mail newsletter<\/strong><\/a> and keep an eye here on <a href=\"https:\/\/www.intego.com\/mac-security-blog\"><strong>The Mac Security Blog<\/strong><\/a> for the latest Apple security and privacy news. And don&#8217;t forget to follow Intego on your favorite social media channels: <a href=\"https:\/\/twitter.com\/IntegoSecurity\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Twitter\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Twitter-logo-icon-64.png\" alt=\"Follow Intego on Twitter\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.facebook.com\/Intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Facebook\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Facebook-logo-icon-64.png\" alt=\"Follow Intego on Facebook\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.youtube.com\/user\/IntegoVideo?sub_confirmation=1\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on YouTube\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/YouTube-logo-icon-64.png\" alt=\"Follow Intego on YouTube\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.pinterest.com\/intego\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(0, 0, 0, 0.2); border-radius: 8px;\" title=\"Follow Intego on Pinterest\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Pinterest-logo-icon-64.png\" alt=\"Follow Intego on Pinterest\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.linkedin.com\/company\/intego\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on LinkedIn\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/LinkedIn-logo-icon-64.png\" alt=\"Follow Intego on LinkedIn\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/www.instagram.com\/intego_security\/\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow Intego on Instagram\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2021\/10\/Instagram-logo-icon-64.png\" alt=\"Follow Intego on Instagram\" width=\"16\" \/><\/a>\u00a0<a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\" target=\"_blank\" rel=\"noopener\"><img style=\"border-width: 1px; border-style: solid; border-color: rgba(255, 255, 255, 0.2); border-radius: 8px;\" title=\"Follow the Intego Mac Podcast on Apple Podcasts\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/ios9-podcasts-app-tile.png\" alt=\"Follow the Intego Mac Podcast on Apple Podcasts\" width=\"16\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This month, Intego celebrates its twenty-fifth anniversary. Founded in 1997, Intego&#8217;s primary focus has always been protecting Mac users from the dangers of the Internet. Five years ago, for our twentieth anniversary in 2017, we wrote an extensive blog post detailing fond memories of the company&#8217;s history. We had just launched the Intego Mac Podcast, [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":71320,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[3],"tags":[66],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"This month, Intego celebrates its twenty-fifth anniversary. Founded in 1997, Intego&#039;s primary focus has always been protecting Mac users from the dangers\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intego Celebrates Its 25th Anniversary - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"This month, Intego celebrates its twenty-fifth anniversary. Founded in 1997, Intego&#039;s primary focus has always been protecting Mac users from the dangers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/JoshLong\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-20T06:59:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-03T07:38:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20th-Birthday.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@theJoshMeister\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Joshua Long\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20th-Birthday.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20th-Birthday.png\",\"width\":400,\"height\":260,\"caption\":\"Intego celebrates its 25th anniversary as a Mac-focused antivirus company\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/\",\"name\":\"Intego Celebrates Its 25th Anniversary - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#primaryimage\"},\"datePublished\":\"2022-10-20T06:59:46+00:00\",\"dateModified\":\"2024-10-03T07:38:09+00:00\",\"description\":\"This month, Intego celebrates its twenty-fifth anniversary. Founded in 1997, Intego's primary focus has always been protecting Mac users from the dangers\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intego Celebrates Its 25th Anniversary\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\"},\"headline\":\"Intego Celebrates Its 25th Anniversary\",\"datePublished\":\"2022-10-20T06:59:46+00:00\",\"dateModified\":\"2024-10-03T07:38:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#webpage\"},\"wordCount\":537,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20th-Birthday.png\",\"keywords\":[\"Intego\"],\"articleSection\":[\"Intego\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1\",\"name\":\"Joshua Long\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g\",\"caption\":\"Joshua Long\"},\"description\":\"Joshua Long (@theJoshMeister), formerly Intego\\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \\u2014\",\"sameAs\":[\"https:\/\/security.thejoshmeister.com\",\"https:\/\/www.facebook.com\/JoshLong\",\"https:\/\/www.instagram.com\/thejoshmeister\/\",\"https:\/\/www.linkedin.com\/in\/thejoshmeister\",\"https:\/\/www.pinterest.com\/thejoshmeister\/\",\"https:\/\/twitter.com\/theJoshMeister\",\"https:\/\/www.youtube.com\/@theJoshMeister\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"This month, Intego celebrates its twenty-fifth anniversary. Founded in 1997, Intego's primary focus has always been protecting Mac users from the dangers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/","og_locale":"en_US","og_type":"article","og_title":"Intego Celebrates Its 25th Anniversary - The Mac Security Blog","og_description":"This month, Intego celebrates its twenty-fifth anniversary. Founded in 1997, Intego's primary focus has always been protecting Mac users from the dangers","og_url":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/","og_site_name":"The Mac Security Blog","article_author":"https:\/\/www.facebook.com\/JoshLong","article_published_time":"2022-10-20T06:59:46+00:00","article_modified_time":"2024-10-03T07:38:09+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20th-Birthday.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_creator":"@theJoshMeister","twitter_misc":{"Written by":"Joshua Long","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20th-Birthday.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20th-Birthday.png","width":400,"height":260,"caption":"Intego celebrates its 25th anniversary as a Mac-focused antivirus company"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/","name":"Intego Celebrates Its 25th Anniversary - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#primaryimage"},"datePublished":"2022-10-20T06:59:46+00:00","dateModified":"2024-10-03T07:38:09+00:00","description":"This month, Intego celebrates its twenty-fifth anniversary. Founded in 1997, Intego's primary focus has always been protecting Mac users from the dangers","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Intego Celebrates Its 25th Anniversary"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1"},"headline":"Intego Celebrates Its 25th Anniversary","datePublished":"2022-10-20T06:59:46+00:00","dateModified":"2024-10-03T07:38:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#webpage"},"wordCount":537,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20th-Birthday.png","keywords":["Intego"],"articleSection":["Intego"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/intego-celebrates-its-25th-anniversary\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dcf592275ba6edde8d20f1e60029c6b1","name":"Joshua Long","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5ad29f4111ce14911abaa98cbbcdea42?s=96&d=mm&r=g","caption":"Joshua Long"},"description":"Joshua Long (@theJoshMeister), formerly Intego\u2019s Chief Security Analyst, is a renowned security researcher and writer, and an award-winning public speaker. Josh has a master\u2019s degree in IT concentrating in Internet Security and has taken doctorate-level coursework in Information Security. Apple has publicly acknowledged Josh for discovering an Apple\u00a0ID authentication vulnerability. Josh has conducted cybersecurity research for well over 25 years, which is often featured by major news outlets worldwide. Keep up with Josh via X\/Twitter, LinkedIn, Facebook, Instagram, YouTube, Patreon, Mastodon, the JoshMeister on Security, and more. \u2014","sameAs":["https:\/\/security.thejoshmeister.com","https:\/\/www.facebook.com\/JoshLong","https:\/\/www.instagram.com\/thejoshmeister\/","https:\/\/www.linkedin.com\/in\/thejoshmeister","https:\/\/www.pinterest.com\/thejoshmeister\/","https:\/\/twitter.com\/theJoshMeister","https:\/\/www.youtube.com\/@theJoshMeister"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/joshlong\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/10\/Intego-20th-Birthday.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-p3H","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96329"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=96329"}],"version-history":[{"count":8,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96329\/revisions"}],"predecessor-version":[{"id":101966,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/96329\/revisions\/101966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/71320"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=96329"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=96329"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=96329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}