{"id":26,"date":"2020-03-24T06:22:27","date_gmt":"2020-03-24T06:22:27","guid":{"rendered":"https:\/\/digihightech.com\/blogs\/?p=26"},"modified":"2020-03-24T06:22:27","modified_gmt":"2020-03-24T06:22:27","slug":"cyber-security-concerns-and-smartphones","status":"publish","type":"post","link":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/","title":{"rendered":"Cyber Security Concerns and Smartphones"},"content":{"rendered":"<p class=\"MsoNormal\">Sneaky Malware, Leaky applications make a cell phone can feel like a ticking time bomb to IT security experts. <span style=\"mso-spacerun: yes;\">\u00a0<\/span>With the BYOD slant presently settled in the workplace, and employees are less careful about maintaining a strategic distance from malicious links, the odds for trouble stay high. Yet, when your professional and personal meet on your telephone \u2013 as both includes confidential corporate information and email &#8211; it&#8217;s inescapable that somebody will lurch onto malware.<\/p>\n<p class=\"MsoNormal\">With these malicious apps and apparently innocent systems administration abilities, fraud people can steal your secret data among corporate mobile networks. This data can either be sold or used to the hindrance of the corporation, frequently by harming the credibility of the venture because of a loss or revealing of consumer information. Here we will discuss the top <b style=\"mso-bidi-font-weight: normal;\">Cyber Security Concerns and Smartphones<\/b>. And <b style=\"mso-bidi-font-weight: normal;\">best 7 ways for mobile device security.<\/b><\/p>\n<p class=\"MsoNormal\"><b style=\"mso-bidi-font-weight: normal;\">1. Untrustworthy devices<\/b>.<\/p>\n<p class=\"MsoNormal\">Not always applications are responsible for cyber threats sometimes the device itself can be imperfect or configured maliciously. And violates the CIA, \u201cConfidentiality, Integrity, <span style=\"mso-spacerun: yes;\">\u00a0<\/span>Availability\u201d. A Large Telecommunication Company named \u201cCheckpoint\u201d earlier found 36 infected Android devices and in every case, the breach caused by the malware stored on the device not by the user. According to the case studies, the malware were always on the devices even prior to be received by the user. These apps were not the portion of ROM supplied by the official seller but added somewhere with supply chain.<\/p>\n<p class=\"MsoNormal\"><b style=\"mso-bidi-font-weight: normal;\">2. Useful apps with unwanted information leakage. <\/b><\/p>\n<p class=\"MsoNormal\">We often install various applications for legitimate purpose but still they results into the misuse of personal information such as the extracting contacts from phone. There are many useful apps available with undesirable information leakage.<\/p>\n<p class=\"MsoNormal\">Some of the major mobile threats include the free applications which are downloaded onto mobile devices. Mainly there are two types of applications which raise the risk of vulnerability and security breach. <span style=\"mso-spacerun: yes;\">\u00a0<\/span>To begin with, secure and real versatile applications for enterprise users request and store corporate information. This data is frequently transmitted to off-site storage facility where the data can possibly be stolen or hacked into by cybercriminals.<\/p>\n<p class=\"MsoNormal\">At that point there are the enterprises marked applications that enable clients to dodge distribution capabilities. Utilizing private APIs or undertaking application marking authentications, these applications consider downloading without following proper protocol. Therefore, the applications can take corporate information, for example, enterprise network profiles or contact data, and spread this to cybercriminals.<\/p>\n<p class=\"MsoNormal\"><b style=\"mso-bidi-font-weight: normal;\">3. Malicious apps.<\/b><\/p>\n<p class=\"MsoNormal\">Malicious apps are such installed application which says that they perform one task and does something else which is quite vulnerable for your device.<\/p>\n<p class=\"MsoNormal\">Recently Checkpoint found malware on Google play. Which is identified as \u201cJudy\u201d, an auto-clicking adware created by Korean company. This malware is used to generate large amounts of fake clicks on ads, generating revenues using the infected devices. These malicious apps have been spread across 4 million and 18 million downloads.<\/p>\n<p class=\"MsoNormal\"><b style=\"mso-bidi-font-weight: normal;\">4. Ransomware.<\/b><\/p>\n<p class=\"MsoNormal\">Ransomware was one of the most known malware in the year 2017. It blocks mobile devices or desktop computer and then asks for money to unblock the device. <span style=\"mso-spacerun: yes;\">\u00a0<\/span>It first imposes a demand-for-payment window over all other windows which also include system windows.<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>It comes in various forms such as WannaCry malware which is responsible for Windows Desktop systems attacks. The ransomware has evolved itself into the \u201cransoworms\u201d which is generally a ransomware attached to a worm network.<\/p>\n<p class=\"MsoNormal\">It not only infect computer but also infect entire computers on that particular local network it could reach. After infecting one device it copy itself to every device on that local network. Cybercriminals mostly uses this malware to infect your devices.<\/p>\n<p class=\"MsoNormal\"><b style=\"mso-bidi-font-weight: normal;\">5. Banking malware<\/b>.<\/p>\n<p class=\"MsoNormal\">Banking Malwares are the most ongoing security threats used by cybercriminals. Cybercriminals usually steals credentials from online banking customers by using a phishing window to overlap banking apps. After stealing your credit card details, then can also steal entire mobile transactions, redirect calls and authentication number.<\/p>\n<p class=\"MsoNormal\">Cybercriminals are trying to create hybrid threats by adding file encryption features to mobile banking Trojans to lock user files and steal sensitive information at same time. One such Trojan is \u201cFaketoken\u201d which generates fake logins form for more than 1000 financial applications to steal login credentials. Some of the malicious apps display phishing pages with the help of which then can steal your credit card information and also they can read and send text messages. And Now Faketoken\u2019s developers have added the functionality to encrypt the user files which are stored on a mobile\u2019s SD card.<\/p>\n<p class=\"MsoNormal\"><b style=\"mso-bidi-font-weight: normal;\">How to tackle Mobile security concerns<\/b><\/p>\n<p class=\"MsoNormal\"><b style=\"mso-bidi-font-weight: normal;\">Reliance on Mobile Communications<\/b><\/p>\n<p class=\"MsoNormal\">Mobile Communication is the easiest and best way to tackle mobile security concerns in emergency situations. It is the most applicable one. As almost everyone owns a smartphone in our country, it is the mode of communication for all. It connects us from entire nation or worldwide in emergency whether its crisis, natural disaster, ascension. Today every company aims at providing the best secure communication method to preserve the security of the people at large number.<\/p>\n<p class=\"MsoNormal\"><b style=\"mso-bidi-font-weight: normal;\">Opting for Secured Mobile Crisis Communication Methods<\/b><\/p>\n<p class=\"MsoNormal\">While opting for Secured Mobile Crisis Communication Methods for public notification and internal communication, must keep in mind the thing that system which you are opting for must provide the utmost security. Otherwise you will risk your company with misguided information and false statements which will keep the health and welfare of the public at risk. Must learn about the best practices for a mobile strategy to increase the security of your mobile crisis communication.<\/p>\n<p class=\"MsoNormal\"><b style=\"mso-bidi-font-weight: normal;\">Best 7 ways for mobile device security <\/b><\/p>\n<p class=\"MsoNormal\">Here we bring the <b style=\"mso-bidi-font-weight: normal;\">best 7 ways for mobile device security<\/b>:<\/p>\n<p class=\"MsoListParagraphCxSpFirst\" style=\"text-indent: -.25in; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\">\u00fc<span style=\"font: 7.0pt 'Times New Roman';\">\u00a0 <\/span><\/span><\/span><!--[endif]-->Apply passcode authentication on your device<\/p>\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -.25in; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\">\u00fc<span style=\"font: 7.0pt 'Times New Roman';\">\u00a0 <\/span><\/span><\/span><!--[endif]-->Monitor the access and usage of your mobile device<\/p>\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -.25in; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\">\u00fc<span style=\"font: 7.0pt 'Times New Roman';\">\u00a0 <\/span><\/span><\/span><!--[endif]-->Quickly Patch your mobile devices<\/p>\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -.25in; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\">\u00fc<span style=\"font: 7.0pt 'Times New Roman';\">\u00a0 <\/span><\/span><\/span><!--[endif]-->Deny unauthorized<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>third-party application stores<\/p>\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -.25in; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\">\u00fc<span style=\"font: 7.0pt 'Times New Roman';\">\u00a0 <\/span><\/span><\/span><!--[endif]-->Take the entire Control of physical access to devices<\/p>\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"text-indent: -.25in; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\">\u00fc<span style=\"font: 7.0pt 'Times New Roman';\">\u00a0 <\/span><\/span><\/span><!--[endif]-->Estimate the app security compliance<\/p>\n<p class=\"MsoListParagraphCxSpLast\" style=\"text-indent: -.25in; mso-list: l0 level1 lfo1;\"><!-- [if !supportLists]--><span style=\"font-family: Wingdings; mso-fareast-font-family: Wingdings; mso-bidi-font-family: Wingdings;\"><span style=\"mso-list: Ignore;\">\u00fc<span style=\"font: 7.0pt 'Times New Roman';\">\u00a0 <\/span><\/span><\/span><!--[endif]-->Plan an incident response for<span style=\"mso-spacerun: yes;\">\u00a0 <\/span>stolen or lost mobile devices<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sneaky Malware, Leaky applications make a cell phone can feel like a ticking time bomb to IT security experts. \u00a0With the BYOD slant presently settled in the workplace, and employees are less careful about maintaining a strategic distance from malicious links, the odds for trouble stay high. Yet, when your professional and personal meet on [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":28,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"slim_seo":{"title":"Cyber Security Concerns and Smartphones - Digihightech","description":"Sneaky Malware, Leaky applications make a cell phone can feel like a ticking time bomb to IT security experts. \u00a0 With the BYOD slant presently settled in the wo"},"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[14,11,13],"tags":[8,9,10],"class_list":["post-26","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-app-development","category-digital-marketing","category-graphic-designing","tag-cybersecurity-in-phone","tag-how-to-make-phones-secure","tag-mobile-security","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security Concerns and Smartphones - Digihightech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Concerns and Smartphones - Digihightech\" \/>\n<meta property=\"og:description\" content=\"Sneaky Malware, Leaky applications make a cell phone can feel like a ticking time bomb to IT security experts. \u00a0With the BYOD slant presently settled in the workplace, and employees are less careful about maintaining a strategic distance from malicious links, the odds for trouble stay high. Yet, when your professional and personal meet on [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/\" \/>\n<meta property=\"og:site_name\" content=\"Digihightech\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-24T06:22:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"610\" \/>\n\t<meta property=\"og:image:height\" content=\"456\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/digihightech.com\/blogs\/#\/schema\/person\/267fdb0f8184651fd8e87dbc56b22f90\"},\"headline\":\"Cyber Security Concerns and Smartphones\",\"datePublished\":\"2020-03-24T06:22:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/\"},\"wordCount\":980,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg\",\"keywords\":[\"cybersecurity in phone\",\"how to make phones secure\",\"mobile security\"],\"articleSection\":[\"App Development\",\"Digital Marketing\",\"Graphic Designing\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/\",\"url\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/\",\"name\":\"Cyber Security Concerns and Smartphones - Digihightech\",\"isPartOf\":{\"@id\":\"https:\/\/digihightech.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg\",\"datePublished\":\"2020-03-24T06:22:27+00:00\",\"author\":{\"@id\":\"https:\/\/digihightech.com\/blogs\/#\/schema\/person\/267fdb0f8184651fd8e87dbc56b22f90\"},\"breadcrumb\":{\"@id\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#primaryimage\",\"url\":\"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg\",\"contentUrl\":\"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg\",\"width\":610,\"height\":456},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/digihightech.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Concerns and Smartphones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/digihightech.com\/blogs\/#website\",\"url\":\"https:\/\/digihightech.com\/blogs\/\",\"name\":\"Digihightech\",\"description\":\"Latest Tech Blogs\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/digihightech.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/digihightech.com\/blogs\/#\/schema\/person\/267fdb0f8184651fd8e87dbc56b22f90\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/digihightech.com\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ab0a499d6e1e157c807642c2b0f2c5625364018386da20afc6855534c7daeb4b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ab0a499d6e1e157c807642c2b0f2c5625364018386da20afc6855534c7daeb4b?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/digihightech.com\/blogs\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Concerns and Smartphones - Digihightech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Concerns and Smartphones - Digihightech","og_description":"Sneaky Malware, Leaky applications make a cell phone can feel like a ticking time bomb to IT security experts. \u00a0With the BYOD slant presently settled in the workplace, and employees are less careful about maintaining a strategic distance from malicious links, the odds for trouble stay high. Yet, when your professional and personal meet on [&hellip;]","og_url":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/","og_site_name":"Digihightech","article_published_time":"2020-03-24T06:22:27+00:00","og_image":[{"width":610,"height":456,"url":"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#article","isPartOf":{"@id":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/"},"author":{"name":"admin","@id":"https:\/\/digihightech.com\/blogs\/#\/schema\/person\/267fdb0f8184651fd8e87dbc56b22f90"},"headline":"Cyber Security Concerns and Smartphones","datePublished":"2020-03-24T06:22:27+00:00","mainEntityOfPage":{"@id":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/"},"wordCount":980,"commentCount":0,"image":{"@id":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#primaryimage"},"thumbnailUrl":"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg","keywords":["cybersecurity in phone","how to make phones secure","mobile security"],"articleSection":["App Development","Digital Marketing","Graphic Designing"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/","url":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/","name":"Cyber Security Concerns and Smartphones - Digihightech","isPartOf":{"@id":"https:\/\/digihightech.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#primaryimage"},"image":{"@id":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#primaryimage"},"thumbnailUrl":"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg","datePublished":"2020-03-24T06:22:27+00:00","author":{"@id":"https:\/\/digihightech.com\/blogs\/#\/schema\/person\/267fdb0f8184651fd8e87dbc56b22f90"},"breadcrumb":{"@id":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#primaryimage","url":"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg","contentUrl":"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg","width":610,"height":456},{"@type":"BreadcrumbList","@id":"https:\/\/digihightech.com\/blogs\/2020\/03\/24\/cyber-security-concerns-and-smartphones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/digihightech.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Concerns and Smartphones"}]},{"@type":"WebSite","@id":"https:\/\/digihightech.com\/blogs\/#website","url":"https:\/\/digihightech.com\/blogs\/","name":"Digihightech","description":"Latest Tech Blogs","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/digihightech.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/digihightech.com\/blogs\/#\/schema\/person\/267fdb0f8184651fd8e87dbc56b22f90","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/digihightech.com\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ab0a499d6e1e157c807642c2b0f2c5625364018386da20afc6855534c7daeb4b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ab0a499d6e1e157c807642c2b0f2c5625364018386da20afc6855534c7daeb4b?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/digihightech.com\/blogs\/author\/admin\/"}]}},"jetpack_featured_media_url":"https:\/\/digihightech.com\/blogs\/wp-content\/uploads\/2020\/03\/cybersecurity-data-lock-blue.jpg","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/posts\/26","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/comments?post=26"}],"version-history":[{"count":1,"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/posts\/26\/revisions"}],"predecessor-version":[{"id":27,"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/posts\/26\/revisions\/27"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/media\/28"}],"wp:attachment":[{"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/media?parent=26"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/categories?post=26"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digihightech.com\/blogs\/wp-json\/wp\/v2\/tags?post=26"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}