{"id":115,"name":"Frederic Blaison","url":"","description":"Frederic is Intego\u2019s Antivirus Labs Tech Lead, overseeing research into macOS malware and persistent threats. With over 30 years of expertise in Apple technologies, Fred\u2019s background spans system administration, QA, and hands-on malware analysis, bringing deep technical insight to the front lines of macOS security.","link":"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/","slug":"frederic-blaison","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=96&d=mm&r=g"},"meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"profile\" \/>\n<meta property=\"og:title\" content=\"Frederic Blaison, Author at The Mac Security Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=500&#038;d=mm&#038;r=g\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ProfilePage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/\",\"name\":\"Frederic Blaison, Author at The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Archives for Frederic Blaison\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/08c0037f7ab259cf049d6c332f30c5b2\",\"name\":\"Frederic Blaison\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=96&d=mm&r=g\",\"caption\":\"Frederic Blaison\"},\"description\":\"Frederic is Intego\\u2019s Antivirus Labs Tech Lead, overseeing research into macOS malware and persistent threats. With over 30 years of expertise in Apple technologies, Fred\\u2019s background spans system administration, QA, and hands-on malware analysis, bringing deep technical insight to the front lines of macOS security.\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/#webpage\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/","og_locale":"en_US","og_type":"profile","og_title":"Frederic Blaison, Author at The Mac Security Blog","og_url":"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/","og_site_name":"The Mac Security Blog","og_image":[{"url":"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=500&d=mm&r=g"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ProfilePage","@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/","name":"Frederic Blaison, Author at The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Archives for Frederic Blaison"}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/08c0037f7ab259cf049d6c332f30c5b2","name":"Frederic Blaison","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=96&d=mm&r=g","caption":"Frederic Blaison"},"description":"Frederic is Intego\u2019s Antivirus Labs Tech Lead, overseeing research into macOS malware and persistent threats. With over 30 years of expertise in Apple technologies, Fred\u2019s background spans system administration, QA, and hands-on malware analysis, bringing deep technical insight to the front lines of macOS security.","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/#webpage"}}]}},"amp_dev_tools_enabled":false,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/115"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users"}]}}