{"id":3359,"date":"2019-06-26T15:25:16","date_gmt":"2019-06-26T12:25:16","guid":{"rendered":"https:\/\/blog.eset.ee\/?p=3359"},"modified":"2019-06-26T15:16:48","modified_gmt":"2019-06-26T12:16:48","slug":"youd-better-change-your-birthday-hackers-may-know-your-pin","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/","title":{"rendered":"You\u2019d better change your birthday \u2013 hackers may know your PIN"},"content":{"rendered":"\n<p>You\u2019ve likely seen a list of&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/12\/17\/most-popular-passwords-2018-revealed\/\" target=\"_blank\" rel=\"noreferrer noopener\">top 25 passwords that get reused<\/a>&nbsp;time and time again \u2013 \u201cpassword\u201d is a usual suspect \u2013 but what about phone PIN numbers? How unique are the PIN codes that we choose to stop cybercriminals from getting into our phones and their eyes onto our most precious accounts?<\/p>\n\n\n\n<p>People tend to lock their phones with a code, but what if someone knew that code or could possibly work it out? Maybe they could guess it from frequently used PIN numbers? Would they then be able to read your emails, send a WhatsApp or view your Amazon basket?<\/p>\n\n\n\n<p>Recent research from the SANS Institute found&nbsp;<a href=\"https:\/\/twitter.com\/tarah\/status\/1134341170400808961\" target=\"_blank\" rel=\"noreferrer noopener\">the top 20 most common mobile phone PIN codes<\/a>&nbsp;were (and not in order):<\/p>\n\n\n\n<p>0000<br>1004<br>1010<br>1111<br>1122<br>1212<br>1234<br>1313<br>2000<br>2001<br>2222<br>4444<br>3333<br>4321<br>5555<br>6666<br>6969<br>7777<br>8888<br>9999<\/p>\n\n\n\n<p>They found that an astonishing 26% of all phones are cracked using these codes. There is a good chance that if your phone is stolen or lost, criminals could get into your phone within their first few attempts \u2013 even without knowing anything about you.<\/p>\n\n\n\n<p>So why do people \u2013 including&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=def3eBH-vWI\" target=\"_blank\" rel=\"noreferrer noopener\">Kanye West<\/a>&nbsp;\u2013 continue to use simple codes? Well, it might be best to answer this question first: When did you last change the PIN code to unlock your phone?<\/p>\n\n\n\n<p>Most people have now had a smart phone complete with a lock on it for around a decade and it must be said that in 2007, when the first Apple iPhone came out, we were more interested in its features than discussing attack vectors.<\/p>\n\n\n\n<p>Fingerprint readers were a few years off in 2007 and so when we had to enter the code up to 50, maybe even 100 times a day to unlock it, you can start to see why people wanted to get into their phones quickly and easily.<\/p>\n\n\n\n<p>The problem is, even with the introduction of longer codes, Face ID or Touch ID, people rarely change their PINs and settled with a code they use on every device \u2013 even though we now rarely unlock our phones with a PIN.<\/p>\n\n\n\n<p>Another method people use to remember PIN codes is to use numbers that mean something to them. However, a threat actor relies on people who tend to have an \u201c<em>it won\u2019t happen to me<\/em>\u201d attitude, so what if the person wanting to get into your phone knows a little about you? When phones have a 4-digit code, people will often use a year; when a 6-digit code is recommended, people often enter a memorable date to unlock their phone.<\/p>\n\n\n\n<p>This is an extremely dangerous way to secure your most cherished device and allows any cybercriminal with some open-source research skills to trial possible codes to unlock your phone.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why context matters<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/mobile-passcode-cracked.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img decoding=\"async\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2019\/06\/mobile-passcode-cracked.jpg\" alt=\"\" class=\"wp-image-126988\"\/><\/a><\/figure><\/div>\n\n\n\n<p>To give a little context about how easy it can be, I was recently at an event where I was giving a talk \u2013 ironically, about how to hack a business \u2013 and where I started discussing how cybercriminals can socially engineer passwords out of people. At that precise moment, a guy in the front row took his phone from his pocket and entered a PIN to unlock it. I noticed he entered a 6-digit code and I was able to view the last two digits, which were 1 and 4.<\/p>\n\n\n\n<p>To most people this might sound like just two random numbers but if I add context to these numbers I might be able to work out the other four. I decided to go off-piste in my talk, so I asked his name. He obliged willingly, and I entered his name into Facebook. On his \u201cabout\u201d page I found he was married but apart from her name, there wasn\u2019t much else to take in. I clicked on his wife\u2019s profile and went to her \u201cabout\u201d page.<\/p>\n\n\n\n<p>There I noticed she had lots of personal information open to public view, specifically the date when she got married which was the 1<sup>st<\/sup>&nbsp;September, yes you guessed it, 2014. I then politely asked the gentleman if I could hold his phone and attempt to get into it and, although not happily, for the sake of the test, he allowed me. I entered \u201c010914\u201d into his phone and bingo, I was in! I had live demoed a fantastic example of what can happen in real life and it was at that moment, half the audience then got out their phones and asked what the shortcut was to change their phone\u2019s PIN code.<\/p>\n\n\n\n<p>What about Face ID or Touch ID? Won\u2019t this fully protect us from attackers? Well, the short answer is no. Many people think that once they have a fingerprint reader or facial recognition on their device that they won\u2019t need to be so hot on PIN code security. Remember that there is still a default code to get into your phone and a hacker can work out this code far more easily than cutting off your finger or replicating your face to open your device. (On that note, I once used a dead finger to get access into a phone but that\u2019s one for another blog!)<\/p>\n\n\n\n<p>When I used to work in the Digital Forensics Unit for the police, we had a wonderful tool that could get into Apple iPhones. (You can view the same machine in action&nbsp;<a href=\"https:\/\/www.youtube.com\/watch?v=JrQYvjfqe-M\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>). Our code breaker would attempt all 4-digit codes incrementally from \u201c0000\u201d to \u201c9999\u201d without locking or wiping the phones. It took 4 seconds per attempt, so \u2013 ideally, to save time \u2013 we wanted to start the process on a number near to where the PIN could be located.<\/p>\n\n\n\n<p>We used to start the tool at \u201c1970\u201d and, more often than not, we would have access to the devices before it had reached \u201c2010\u201d. This is because so many people fall foul of using their date of birth, wedding year or the year where their child was born so they can more easily remember it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to stay safe<\/h2>\n\n\n\n<p>The best countermeasure is to start using a long unique alphanumeric code to unlock your phone; then, as this can be time consuming to unlock your device, turn on Touch ID or Face ID to speed up entry.<\/p>\n\n\n\n<p>It might also be a good idea to mention here that you should also be aware of your surroundings and who might be watching your movements. Far too frequently on public transport have I seen people enter PIN codes, passwords, or even been on the phone shouting out credit card details including the three-digit CVV number on the back!<\/p>\n\n\n\n<p>Finally, after backing up your device, you should add a further layer of security by turning on \u201cFind My iPhone\u201d for iOS or \u201cFind My Device\u201d on Android, which will allow you to wipe your phone remotely should it ever get stolen (anti-theft and remote-wipe features are also included in reputable mobile security solutions). Even though you may never see that device again, at least the criminals won\u2019t be able to get into your device and look through your personal data and information.<\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2019\/06\/19\/change-birthday-hackers-may-know-pin\/\">Welivesecurity<\/a><br><\/p>\n","protected":false},"excerpt":{"rendered":"<p>You\u2019ve likely seen a list of&nbsp;top 25 passwords that get reused&nbsp;time and time again \u2013 \u201cpassword\u201d is a usual suspect \u2013 but what about phone PIN numbers? How unique are the PIN codes that we choose to stop cybercriminals from getting into our phones and their eyes onto our most precious accounts? People tend to<\/p>\n","protected":false},"author":5,"featured_media":3360,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[161],"tags":[],"class_list":["post-3359","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>You\u2019d better change your birthday \u2013 hackers may know your PIN - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You\u2019d better change your birthday \u2013 hackers may know your PIN\" \/>\n<meta property=\"og:description\" content=\"You\u2019ve likely seen a list of&nbsp;top 25 passwords that get reused&nbsp;time and time again \u2013 \u201cpassword\u201d is a usual suspect \u2013 but what about phone PIN numbers? How unique are the PIN codes that we choose to stop cybercriminals from getting into our phones and their eyes onto our most precious accounts? People tend to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-26T12:25:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/PIN-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"You\u2019d better change your birthday \u2013 hackers may know your PIN\",\"datePublished\":\"2019-06-26T12:25:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/\"},\"wordCount\":1168,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/PIN-1.jpg\",\"articleSection\":[\"mobile security\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2019\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/\",\"name\":\"You\u2019d better change your birthday \u2013 hackers may know your PIN - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/PIN-1.jpg\",\"datePublished\":\"2019-06-26T12:25:16+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/PIN-1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/06\\\/PIN-1.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"You\u2019d better change your birthday \u2013 hackers may know your PIN\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2019\\\/06\\\/26\\\/youd-better-change-your-birthday-hackers-may-know-your-pin\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"You\u2019d better change your birthday \u2013 hackers may know your PIN - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/","og_locale":"en_US","og_type":"article","og_title":"You\u2019d better change your birthday \u2013 hackers may know your PIN","og_description":"You\u2019ve likely seen a list of&nbsp;top 25 passwords that get reused&nbsp;time and time again \u2013 \u201cpassword\u201d is a usual suspect \u2013 but what about phone PIN numbers? How unique are the PIN codes that we choose to stop cybercriminals from getting into our phones and their eyes onto our most precious accounts? People tend to","og_url":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2019-06-26T12:25:16+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/PIN-1.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"You\u2019d better change your birthday \u2013 hackers may know your PIN","datePublished":"2019-06-26T12:25:16+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/"},"wordCount":1168,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/PIN-1.jpg","articleSection":["mobile security"],"inLanguage":"en-US","copyrightYear":"2019","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/","url":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/","name":"You\u2019d better change your birthday \u2013 hackers may know your PIN - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/PIN-1.jpg","datePublished":"2019-06-26T12:25:16+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/PIN-1.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/06\/PIN-1.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"You\u2019d better change your birthday \u2013 hackers may know your PIN"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2019\/06\/26\/youd-better-change-your-birthday-hackers-may-know-your-pin\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/3359","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=3359"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/3359\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/3360"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=3359"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=3359"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=3359"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}