{"id":387,"date":"2017-02-17T12:10:49","date_gmt":"2017-02-17T12:10:49","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/10-reasons-why-cybercriminals-target-smartphones\/"},"modified":"2019-05-29T12:11:38","modified_gmt":"2019-05-29T12:11:38","slug":"10-reasons-why-cybercriminals-target-smartphones","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/","title":{"rendered":"10 reasons why cybercriminals target smartphones"},"content":{"rendered":"<p class=\"wls-paragraph\">There is little doubt that smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday existence easier and more enjoyable.<\/p>\n<p class=\"wls-paragraph\">But while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger target for cybercriminals.<\/p>\n<p class=\"wls-paragraph\">So why are criminals so eager to get into our devices?<\/p>\n<ol>\n<li><strong>A smartphone knows everything about us<\/strong><\/li>\n<\/ol>\n<p class=\"wls-paragraph\">The amount of information stored on a smartphone has skyrocketed in recent years.<\/p>\n<p class=\"wls-paragraph\">The connectivity of apps means we supply nearly every piece of information about ourselves, whether it\u2019s our bank account details or our preferred taste in pizza.<\/p>\n<p class=\"wls-paragraph\">For a cybercriminal potentially wanting to commit identity theft, a smartphone is a goldmine.<\/p>\n<ol start=\"2\">\n<li><strong>It\u2019s a way into companies and other organizations<\/strong><\/li>\n<\/ol>\n<p class=\"wls-paragraph\">The use of bring your own device (BYOD) has become one of the most prominent trends for companies around the globe.<\/p>\n<p class=\"wls-paragraph\">Research published in 2015 found that&nbsp;<a href=\"http:\/\/www.zdnet.com\/article\/research-74-percent-using-or-adopting-byod\/\" target=\"_blank\" rel=\"noopener noreferrer\">74% of companies<\/a>&nbsp;had either adopted or planned to roll out BYOD, with the market set to exceed <a href=\"https:\/\/www.hexaresearch.com\/press-release\/bring-your-own-device-byod-market\" target=\"_blank\" rel=\"noopener noreferrer\">$350 billion by 2022.<\/a><\/p>\n<p class=\"wls-paragraph\">Cybercriminals are viewing these devices as an ideal gateway into stealing valuable corporate information.<\/p>\n<ol start=\"3\">\n<li><strong>Security can be lax<\/strong><\/li>\n<\/ol>\n<p class=\"wls-paragraph\">The rise of BYOD has also caused plenty of headaches for a number of companies in various industries, mainly due to difficulties in rolling out a unified approach to security.<\/p>\n<p class=\"wls-paragraph\">In a recent&nbsp;<a href=\"http:\/\/www.techproresearch.com\/downloads\/cybersecurity-research-2016-weak-links-digital-forensics-and-international-concerns\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tech Pro Research survey<\/a>&nbsp;of CIOs, tech executives and IT workers, 45% of respondents said mobile devices posed the greatest risk to a company\u2019s infrastructure, with the fragmented nature of some mobile platforms cited as a primary reason.<\/p>\n<ol start=\"4\">\n<li><strong>Autofill has become our best friend<\/strong><\/li>\n<\/ol>\n<p class=\"wls-paragraph\">One of the reasons our phones are carrying more personal information than ever before is primarily down to our desire for convenience.<\/p>\n<p class=\"wls-paragraph\">With our devices now handling a myriad of services and subsequent apps, we find ourselves with a larger number login details than ever before.<\/p>\n<p class=\"wls-paragraph\">As a result, it\u2019s \u2018easy to get lazy\u2019. Many of us decide to make use of various autofill systems,&nbsp;<a href=\"http:\/\/www.theinquirer.net\/inquirer\/news\/3002106\/browser-autofill-systems-are-your-new-security-nightmare\" target=\"_blank\" rel=\"noopener noreferrer\">which, in turn, sometimes amounts to a security risk.<\/a><\/p>\n<ol start=\"5\">\n<li><strong>It\u2019s a route into your wallet<\/strong><\/li>\n<\/ol>\n<p class=\"wls-paragraph\">Our phones can be used to transfer money, pay our bills, and are even being used as a method of payment.<\/p>\n<p class=\"wls-paragraph\">Google Wallet, Apple Pay and Samsung Pay are all pushing mobile payments into the mainstream, and some experts expect it to be a <a href=\"https:\/\/www.cnet.com\/uk\/how-to\/pay-with-your-phone-apps-apple-pay-samsung-pay\/\" target=\"_blank\" rel=\"noopener noreferrer\">trend that will continue over the next few years.<\/a><\/p>\n<p class=\"wls-paragraph\">Of course, the only drawback is that they are likely to catch the attention of cybercriminals.<\/p>\n<ol start=\"6\">\n<li><strong>Phones know where you are and where you work<\/strong><\/li>\n<\/ol>\n<p class=\"wls-paragraph\">In many circumstances, the reasons behind tracking your device are entirely innocent, such as helping you get the most out of your data and your apps.<\/p>\n<p class=\"wls-paragraph\">For example, if you\u2019re out and about, you can check out restaurant or business recommendations with just a couple of swipes.<\/p>\n<p class=\"wls-paragraph\">However, hacking a device\u2019s GPS capabilities is not seen as a difficult task, with many gamers using it to cheat at the popular augmented reality game&nbsp;<a href=\"http:\/\/www.welivesecurity.com\/2016\/07\/18\/top-tips-use-pokemon-go-safely\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pokemon Go<\/a>&nbsp;In the hands of criminals, a compromised GPS could be an unnerving prospect.<\/p>\n<ol start=\"7\">\n<li><strong>Bluetooth<\/strong><\/li>\n<\/ol>\n<p class=\"wls-paragraph\">For several years now, Bluetooth has been a regular feature on smartphones and other mobile devices. Yet, like GPS, it is still seen as a potential entry point for cybercriminals.<\/p>\n<p class=\"wls-paragraph\">The effects of such an attack can result in Bluesnarfing \u2013 where a phone\u2019s private information is compromised, or Bluebugging, which allows a criminal to more or less take complete control of your phone.<\/p>\n<p class=\"wls-paragraph\">But while there is a risk, these methods are becoming increasingly harder for hackers to exploit.<\/p>\n<ol start=\"8\">\n<li><strong>Some scams are specific to mobile<\/strong><\/li>\n<\/ol>\n<p class=\"wls-paragraph\">There are several well-known ways in which cybercriminals can use your smartphone to make quick cash.<\/p>\n<p class=\"wls-paragraph\">In countries like China, for example, malware can be used to access devices and force them to call premium numbers that charge large amounts<\/p>\n<p class=\"wls-paragraph\">These scams are not only potentially lucrative, but can also spread across large numbers of devices.<\/p>\n<ol start=\"9\">\n<li><strong>They\u2019re a great way of sending spam<\/strong><\/li>\n<\/ol>\n<p class=\"wls-paragraph\">Everyone hates spam. Well, apart from cybercriminals, anyway.<\/p>\n<p class=\"wls-paragraph\">There are a number of reasons why a criminal would want to send spam, but many of them see smartphones as the ideal platform for sending these communications.<\/p>\n<p class=\"wls-paragraph\">This is mainly because it is much harder for service providers to track down and block offenders.<\/p>\n<ol start=\"10\">\n<li><strong> Users are ignorant about the dangers<\/strong><\/li>\n<\/ol>\n<p class=\"wls-paragraph\">Many of the most seasoned tech users are now well acquainted with best practice when it comes to using laptops or desktops, but smartphones often slip down the list of priorities.<\/p>\n<p class=\"wls-paragraph\">Which, in some ways is surprising, given that smartphones have increasingly been <a href=\"http:\/\/www.welivesecurity.com\/2016\/11\/01\/history-mobile-malware-cabir-sms-thief\/\" target=\"_blank\" rel=\"noopener noreferrer\">targeted since as early as 2005<\/a>.<\/p>\n<p class=\"wls-paragraph\">However, as the threat is more visible than ever, we\u2019re slowly beginning to understand that security matters. Let\u2019s treat them with the importance they deserve.<\/p>\n<p class=\"wls-paragraph\">Source: <a id=\"community-tab\" class=\"publisher-nav-color\" href=\"http:\/\/www.welivesecurity.com\/2017\/02\/28\/10-reasons-cybercriminals-target-smartphones\/\" target=\"_blank\" rel=\"noopener noreferrer\" data-action=\"community-sidebar\" data-forum=\"welivesecurity\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is little doubt that smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday existence easier and more enjoyable. But while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger target for cybercriminals. So why are<\/p>\n","protected":false},"author":5,"featured_media":1771,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-387","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>10 reasons why cybercriminals target smartphones - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 reasons why cybercriminals target smartphones\" \/>\n<meta property=\"og:description\" content=\"There is little doubt that smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday existence easier and more enjoyable. But while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger target for cybercriminals. So why are\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-17T12:10:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:11:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_372903454-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"10 reasons why cybercriminals target smartphones\",\"datePublished\":\"2017-02-17T12:10:49+00:00\",\"dateModified\":\"2019-05-29T12:11:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/\"},\"wordCount\":821,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_372903454-623x410.jpg\",\"articleSection\":[\"uncategorized\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/\",\"name\":\"10 reasons why cybercriminals target smartphones - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_372903454-623x410.jpg\",\"datePublished\":\"2017-02-17T12:10:49+00:00\",\"dateModified\":\"2019-05-29T12:11:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_372903454-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_372903454-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 reasons why cybercriminals target smartphones\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/02\\\/17\\\/10-reasons-why-cybercriminals-target-smartphones\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"10 reasons why cybercriminals target smartphones - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/","og_locale":"en_US","og_type":"article","og_title":"10 reasons why cybercriminals target smartphones","og_description":"There is little doubt that smartphones have become a central part of our lives, allowing us to perform all sorts of tasks that make our everyday existence easier and more enjoyable. But while they aim to heighten convenience, there is a real feeling that smartphones are becoming a bigger target for cybercriminals. So why are","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-02-17T12:10:49+00:00","article_modified_time":"2019-05-29T12:11:38+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_372903454-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"10 reasons why cybercriminals target smartphones","datePublished":"2017-02-17T12:10:49+00:00","dateModified":"2019-05-29T12:11:38+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/"},"wordCount":821,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_372903454-623x410.jpg","articleSection":["uncategorized"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/","name":"10 reasons why cybercriminals target smartphones - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_372903454-623x410.jpg","datePublished":"2017-02-17T12:10:49+00:00","dateModified":"2019-05-29T12:11:38+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_372903454-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_372903454-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"10 reasons why cybercriminals target smartphones"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/02\/17\/10-reasons-why-cybercriminals-target-smartphones\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/387","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=387"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/387\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1771"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=387"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=387"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=387"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}