{"id":439,"date":"2018-01-19T23:31:55","date_gmt":"2018-01-19T23:31:55","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/are-mobile-devices-insecure-by-nature\/"},"modified":"2019-05-29T11:52:50","modified_gmt":"2019-05-29T11:52:50","slug":"are-mobile-devices-insecure-by-nature","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/","title":{"rendered":"Are mobile devices insecure by nature?"},"content":{"rendered":"<p class=\"wls-paragraph\">It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future without these devices. Recent times have been marked by a diversity of trends that revolve around flexibility and that have by now become well established: <a href=\"https:\/\/www.welivesecurity.com\/2012\/04\/04\/byod-infographic-for-security-not-a-pretty-picture\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bring Your Own Device<\/a> (BYOD), <a href=\"https:\/\/www.welivesecurity.com\/2013\/02\/19\/from-byod-to-cyod-security-issues-with-personal-devices-in-the-workplace\/\" target=\"_blank\" rel=\"noopener noreferrer\">Choose Your Own Device<\/a>(CYOD), Bring Your Own App (BYOA) and Bring Your Own Cloud (BYOC), among others.<\/p>\n<p class=\"wls-paragraph\">Along with our growing dependence on these devices, we have been witnessing new advances, both in hardware and software architectures, which clearly demonstrate that <a href=\"https:\/\/en.wikipedia.org\/wiki\/Moore%27s_law\" target=\"_blank\" rel=\"noopener noreferrer\">Moore\u2019s law<\/a> continues to apply. These developments have been accompanied by a large body of research aimed at enhancing <a href=\"https:\/\/www.welivesecurity.com\/2015\/11\/06\/mobile-security-important-ever\/\" target=\"_blank\" rel=\"noopener noreferrer\">mobile security<\/a>.<\/p>\n<p class=\"wls-paragraph\">However, the prevailing public perception still views even the most capable phones as less secure devices than the average desktop computer, even with applications running in sandbox environments and with operating systems that are increasingly focused on security.<\/p>\n<p class=\"wls-paragraph\">A quick analysis \u2013 whether dealing with ensuring physical or logical access, the <a href=\"https:\/\/www.welivesecurity.com\/2015\/05\/06\/smartphone-authentication-passing-passcode\/\" target=\"_blank\" rel=\"noopener noreferrer\">authentication<\/a> of digital identities, platforms for <a href=\"https:\/\/www.welivesecurity.com\/2013\/02\/20\/who-goes-there-identity-and-multiple-authentication-factors\/\" target=\"_blank\" rel=\"noopener noreferrer\">software tokens<\/a>, or even the use of mobile phones as tools for verifying transactions in desktop computers \u2013 shows that mobile devices have by default an equivalent or better security posture than ordinary computers.<\/p>\n<p class=\"wls-paragraph\">If properly managed and protected, mobile devices are an effective platform for securing digital identities and online transactions. This is courtesy of a number of factors, including:<\/p>\n<ul>\n<li>\n<h3><strong>Mobile devices are not an easy target<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p class=\"wls-paragraph\">The properties of desktop malware \u2013 involving application-to-application migration, <a href=\"http:\/\/virusradar.com\/en\/glossary\/keylogger\" target=\"_blank\" rel=\"noopener noreferrer\">keylogging<\/a>, and memory hooking \u2013 are still not present in the vast majority of samples of mobile malware. In addition, mobile vulnerabilities tend to have a short life cycle.<\/p>\n<ul>\n<li>\n<h3><strong>Mobile devices have a smaller attack surface<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p class=\"wls-paragraph\"><a href=\"https:\/\/www.welivesecurity.com\/2017\/03\/10\/mobile-security-the-reality-of-malware-augmented\/\" target=\"_blank\" rel=\"noopener noreferrer\">Mobile malware<\/a> and the exploitation of vulnerabilities usually target specific hardware, firmware and operating system versions, which reduces the likelihood of large-scale compromises and, thus, the likelihood of profiting from them.<\/p>\n<ul>\n<li>\n<h3><strong>Mobile devices have a security-based architecture<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p class=\"wls-paragraph\">These days, devices that are not rooted or jailbroken are more secure thanks to a multilayered approach that is central to the development of mobile operating systems. The applications installed on the phones are digitally signed, which determines the privileges of each app together with the permissions that the user can grant to them individually.<\/p>\n<ul>\n<li>\n<h3><strong>Mobile devices use sandboxing techniques<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p class=\"wls-paragraph\">The apps are executed in sandbox environments, which means that, in principle, they cannot share, or gain access to, data belonging to other apps. This is an important feature that helps defend against sophisticated <a href=\"https:\/\/www.welivesecurity.com\/2016\/11\/01\/history-mobile-malware-cabir-sms-thief\/\" target=\"_blank\" rel=\"noopener noreferrer\">mobile malware<\/a>.<\/p>\n<ul>\n<li>\n<h3><strong>Legitimate apps are \u2018centralized\u2019 in official stores<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p class=\"wls-paragraph\">The success rate of app review processes by official stores is up for debate. However, there is no doubt that, with legitimate software available \u2018under one roof\u2019, software installation processes are simplified and the risk of installing malicious code is reduced.<\/p>\n<ul>\n<li>\n<h3><strong>Mobile data networks are more secure than public Wi-Fi<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p class=\"wls-paragraph\">Sometimes we\u2019re in coffee shops or shopping centers when we need to carry out transactions that involve sensitive data, such as buying online or <a href=\"https:\/\/www.welivesecurity.com\/2015\/11\/30\/online-banking-move-no-go\/\" target=\"_blank\" rel=\"noopener noreferrer\">checking our bank accounts<\/a>. In these situations, using the data network of our wireless carrier is certainly better than connecting our device to any <a href=\"https:\/\/www.welivesecurity.com\/2015\/10\/09\/public-wi-fi-convenience-trumps-risks\/\" target=\"_blank\" rel=\"noopener noreferrer\">open Wi-Fi network<\/a>.<\/p>\n<ul>\n<li>\n<h3><strong>Mobile devices are easily integrated with security-enhancing solutions<\/strong><\/h3>\n<\/li>\n<\/ul>\n<p class=\"wls-paragraph\">Solutions offering digital certificates, single-use codes known as one-time passwords (OTP) or application-specific PIN-unlock options further enhance the security of your device.<\/p>\n<p class=\"wls-paragraph\">Granted, not all that glitters is gold, and mobiles also come with some drawbacks in terms of the protection of information. There are a number of risks that users may face when trying to secure their information on mobiles and tablets, including software updates that are dependent on the <a href=\"https:\/\/www.welivesecurity.com\/2016\/12\/13\/security-design-mobile-device-manufacturers\/\" target=\"_blank\" rel=\"noopener noreferrer\">manufacturer<\/a> and may never be deployed, the difficulty in analyzing the properties of digital certificates when browsing, a large amount of malware that sneaks into official stores, <a href=\"https:\/\/www.welivesecurity.com\/2015\/10\/12\/3-recommendations-can-make-applications-safer\/\" target=\"_blank\" rel=\"noopener noreferrer\">vulnerable apps<\/a>, increased susceptibility to theft, loss or breakage, etc.<\/p>\n<p class=\"wls-paragraph\">The truth of the matter is that, these days, it is difficult to expect any device, user or application to be infallible. A great deal of security that a system provides is determined by the configuration set by the user and by the way in which he or she uses it. After all, many threats that result in millions of <a href=\"https:\/\/www.welivesecurity.com\/2015\/12\/16\/know-smartphone-compromised\/\" target=\"_blank\" rel=\"noopener noreferrer\">compromises<\/a> begin with a fraudulent email, a <a href=\"https:\/\/www.welivesecurity.com\/2015\/08\/18\/phishing-unravelled\/\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a> website, or an instant message within (not necessarily) complex multi-platform <a href=\"https:\/\/www.welivesecurity.com\/2015\/12\/30\/5-things-need-know-social-engineering\/\" target=\"_blank\" rel=\"noopener noreferrer\">social engineering<\/a> schemes.<\/p>\n<p class=\"wls-paragraph\">When all is said and done, it is useful to bear in mind the vast opportunities afforded by mobile devices that we carry in our pockets, and know how to make the&nbsp;best \u2013 and safe \u2013 use of them.<\/p>\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2018\/01\/19\/mobile-devices-insecure-nature\/\">Welivesecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future without these devices. Recent times have been marked by a diversity of trends that revolve around flexibility and that have<\/p>\n","protected":false},"author":5,"featured_media":1840,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[161],"tags":[],"class_list":["post-439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Are mobile devices insecure by nature? - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are mobile devices insecure by nature?\" \/>\n<meta property=\"og:description\" content=\"It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future without these devices. Recent times have been marked by a diversity of trends that revolve around flexibility and that have\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2018-01-19T23:31:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T11:52:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/electronics-1851218_640-623x426.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"Are mobile devices insecure by nature?\",\"datePublished\":\"2018-01-19T23:31:55+00:00\",\"dateModified\":\"2019-05-29T11:52:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/\"},\"wordCount\":781,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/electronics-1851218_640-623x426.jpg\",\"articleSection\":[\"mobile security\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2018\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/\",\"name\":\"Are mobile devices insecure by nature? - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/electronics-1851218_640-623x426.jpg\",\"datePublished\":\"2018-01-19T23:31:55+00:00\",\"dateModified\":\"2019-05-29T11:52:50+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/electronics-1851218_640-623x426.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/electronics-1851218_640-623x426.jpg\",\"width\":623,\"height\":426},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are mobile devices insecure by nature?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/01\\\/19\\\/are-mobile-devices-insecure-by-nature\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Are mobile devices insecure by nature? - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/","og_locale":"en_US","og_type":"article","og_title":"Are mobile devices insecure by nature?","og_description":"It is no easy feat to recall going through life without the vast variety of mobile devices that are now part of our day-to-day. What is more, it is downright impossible to imagine a future without these devices. Recent times have been marked by a diversity of trends that revolve around flexibility and that have","og_url":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2018-01-19T23:31:55+00:00","article_modified_time":"2019-05-29T11:52:50+00:00","og_image":[{"width":623,"height":426,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/electronics-1851218_640-623x426.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"Are mobile devices insecure by nature?","datePublished":"2018-01-19T23:31:55+00:00","dateModified":"2019-05-29T11:52:50+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/"},"wordCount":781,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/electronics-1851218_640-623x426.jpg","articleSection":["mobile security"],"inLanguage":"en-US","copyrightYear":"2018","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/","url":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/","name":"Are mobile devices insecure by nature? - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/electronics-1851218_640-623x426.jpg","datePublished":"2018-01-19T23:31:55+00:00","dateModified":"2019-05-29T11:52:50+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/electronics-1851218_640-623x426.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/electronics-1851218_640-623x426.jpg","width":623,"height":426},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"Are mobile devices insecure by nature?"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/01\/19\/are-mobile-devices-insecure-by-nature\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=439"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/439\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1840"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}