{"id":454,"date":"2018-05-11T07:00:58","date_gmt":"2018-05-11T07:00:58","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/"},"modified":"2019-05-29T12:47:55","modified_gmt":"2019-05-29T12:47:55","slug":"how-to-protect-yourself-as-the-threat-of-scam-apps-grows","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/","title":{"rendered":"How to protect yourself as the threat of scam apps grows"},"content":{"rendered":"\n<p>As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices?<\/p>\n\n\n\n<p>What can we do to protect ourselves against these fraudulent practices?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Be aware of the limitations of app store review processes<\/h3>\n\n\n\n<p>The policies and review procedures of major app stores do keep out a large number of fraudulent apps. While there are always more things they might and&nbsp;<a href=\"https:\/\/medium.com\/@johnnylin\/how-to-make-80-000-per-month-on-the-apple-app-store-bdb943862e88\" target=\"_blank\" rel=\"noreferrer noopener\">probably should be doing<\/a>&nbsp;to continue to address this problem, it is an ongoing learning process for all of us.<\/p>\n\n\n\n<p>There\u2019s nothing new about&nbsp;<a href=\"https:\/\/www.adweek.com\/digital\/4-deceptive-mobile-ad-tricks-and-what-marketers-can-learn-from-them\/\" target=\"_blank\" rel=\"noreferrer noopener\">advertisers<\/a>&nbsp;and&nbsp;<a href=\"https:\/\/www.forbes.com\/sites\/johnkoetsier\/2018\/10\/04\/app-scams-cheap-utility-apps-are-stealing-260-2500-or-even-4700-each-year-per-user\/#621df175162a\" target=\"_blank\" rel=\"noreferrer noopener\">app developers<\/a>&nbsp;using deceptive practices, but the&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/12\/03\/scam-ios-apps-promise-fitness-steal-money-instead\/\" target=\"_blank\" rel=\"noreferrer noopener\">Touch ID scam<\/a>&nbsp;that&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/author\/lstefanko\/\" target=\"_blank\" rel=\"noreferrer noopener\">Luk\u00e1\u0161 \u0160tefanko<\/a>&nbsp;wrote about recently is a significant twist in this ongoing story. Of course, iOS users are not alone in facing these dilemmas; as&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/06\/11\/android-popularity-faking-tricks-google-play\/\" target=\"_blank\" rel=\"noreferrer noopener\">Luk\u00e1\u0161 wrote earlier this year<\/a>, Android users are experiencing their own flood of predatory app tactics too.<\/p>\n\n\n\n<p>Due to the incredibly large total number of apps and updates that each major app store sees every day, much of the work involved in the review of new submissions is automated. This means that each app likely has functionality that will not necessarily be seen by a human or be tested specifically. Even very well-known and more-or-less legitimate app vendors&nbsp;<a href=\"https:\/\/www.theverge.com\/2017\/4\/23\/15399438\/apple-uber-app-store-fingerprint-program-tim-cook-travis-kalanick\" target=\"_blank\" rel=\"noreferrer noopener\">have been caught<\/a>&nbsp;doing things to try to evade having certain functionality reviewed. This means it\u2019s still crucial to do our own due diligence.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Read reviews<\/h3>\n\n\n\n<p>While most scam apps do in fact include numerous positive reviews, these often show signs of phoniness. Wording may be very vague, downright nonsensical, or exhibit repetitive patterns (including different reviews repeating the same phrases or having similar usernames, for example). It\u2019s a good idea to re-order the ranking options on reviews to see a more balanced picture: depending on the particular app store, you can sort the reviews to see those that have been deemed \u201cmost helpful\u201d or that are ranked \u201cmost critical\u201d first.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Be patient<\/h3>\n\n\n\n<p>The best time to figure out whether an app is a scam is&nbsp;<em>before<\/em>&nbsp;you download it. While it may be hard to calm the fear of missing out, it\u2019s best to wait a few days or weeks before downloading brand new apps, to let other people be the \u201cguinea pigs\u201d. This way you can read what other people have to say about the app\u2019s functionality before making a decision.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Use apps by developers you know and trust<\/h3>\n\n\n\n<p>If at all possible, it\u2019s a good idea to stick with reputable app developers. If you\u2019re new to a platform, that may be easier said than done. In that case, it\u2019s a good idea to do a little more research first, to get a better sense of whether a particular developer already has other well-reviewed and popular apps that are currently available for download.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Be aware of valid functionality<\/h3>\n\n\n\n<p>While it can be hard to keep up with the complete picture of what each new device can do, it\u2019s a good idea to be at least somewhat aware of the functionality of your device. For example: fingerprint&nbsp;<em>data<\/em>&nbsp;are not accessible to apps, only a \u201cyes\u201d or \u201cno\u201d verdict about whether your fingerprint matches the one previous stored on your device. This is to say that apps cannot use a scan of your finger to give advice on calorie data, nutrition information, how much water you should drink, or to present ancestry analysis. (It\u2019s worth noting that you couldn\u2019t really get valid information on any of those things from a scan of your finger even if the app could access those data.)<\/p>\n\n\n\n<p>If your phone has existing functionality like a QR reader or a flashlight app, it might not be a good idea to install an app that does that exact same thing, especially as many of these apps have a history of being problematic. If you\u2019re looking to specifically try a different app than one your phone already has \u2013 like a mail reader or an internet browser \u2013 be sure to read some third party reviews first, to see which options are well-reviewed and popular.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Dig deeper<\/h3>\n\n\n\n<p>There&nbsp;are a variety of things you can look at to find information that might indicate a predatory app. Do the developers have other apps available already, and are they reviewed well? Do they have a website that appears professional, including contact information? What results are returned if you do an internet search for the name of the app or developer plus the word \u201cscam\u201d? Can you find more information on third-party sources regarding subscription rates or in-app purchase prices? (Apple may offer information about the latter within the app description.) Does the app purport to give you a free or discount version of more expensive for-fee app? (These scams often cost&nbsp;<em>more than<\/em>&nbsp;just money!)<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Request a refund and report bad actors<\/h3>\n\n\n\n<p>If you\u2019ve gotten as far as having already downloaded an app that turned out to be a scam, ask the app store or the bank attached to your payment card to refund the charge. If the purchase was in the form of a subscription, this may be more complicated, but it will soon become worth your time and effort to have gone through the entire process. You can also report fraudulent apps to the app stores themselves, as well as contributing reviews that describe your experience.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>It\u2019s time to push back against \u201cdark patterns\u201d<\/strong><\/h3>\n\n\n\n<p>Many of us already vote with our wallets when it comes to sub-optimal software behavior, by choosing not to purchase or support companies that fail to consider privacy or security, or that behave in ways that we consider too predatory or problematic. But there is another area that more people should be aware of, that describes a more understated category of sketchy behavior.<\/p>\n\n\n\n<p>\u201c<a href=\"https:\/\/techcrunch.com\/2018\/07\/01\/wtf-is-dark-pattern-design\/\" target=\"_blank\" rel=\"noreferrer noopener\">Dark patterns<\/a>\u201d describe the scenario where a user interface is designed to intentionally trick or emotionally manipulate you into clicking where otherwise you might not. In the case of the&nbsp;<a href=\"https:\/\/www.welivesecurity.com\/2018\/12\/03\/scam-ios-apps-promise-fitness-steal-money-instead\/\" target=\"_blank\" rel=\"noreferrer noopener\">Fitness Balance<\/a>&nbsp;app, it takes advantage of the fact that the Home button on some iPhones or iPads can serve two purposes: your finger is already resting on a (fingerprint) sensor in a way that can also be used to select an option on the screen. Newer versions of the iPhone require you to make two distinct actions for these things; you must take your finger off the sensor for a moment after a fingerprint scan, before it can be used to select an option.<\/p>\n\n\n\n<p>Some dark patterns are much less obvious, because they take advantage of expectations that we may not be consciously aware that we have, or because they cause us to be more inattentive.<\/p>\n\n\n\n<p>Here are a few examples of scenarios in user interfaces that predatory app makers may try to manipulate:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>we expect an \u201cAccept\u201d option to be the bigger or more obvious one<\/li><li>we may rush decisions if we\u2019re overwhelmed or frustrated<\/li><li>we may be less cautious of what\u2019s on our screen if we\u2019re trying to brush away detritus<\/li><li>in many cultures, we expect red to mean \u201cstop\u201d and green to mean \u201cgo\u201d<\/li><li>we expect a \u201cclose\u201d button to appear in certain predictable locations<\/li><li>buttons may be labeled in ways that makes their meaning unclear<\/li><\/ul>\n\n\n\n<p>In cases where emotional manipulation is in play, there may be a confirmation dialog that tries to guilt-trip or scare you into changing a selection. This is where things can get a little nebulous: when is it a legitimate warning, rather than unnecessary fearmongering? This can be something of a value judgment, which is subject to our own interpretation. Whatever you decide, you can let software vendors know that you value a clear and predictable user experience that does not rely on fear, uncertainty and doubt.<\/p>\n\n\n\n<p>Source: <a href=\"https:\/\/www.welivesecurity.com\/2018\/12\/14\/protect-yourself-threat-scam-apps-grows\/\">Welivesecurity<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices? What can we do to protect ourselves against these fraudulent practices? Be aware of the limitations of app store review processes The policies and review procedures of major app stores do keep out a large number of<\/p>\n","protected":false},"author":5,"featured_media":1856,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[141,161,169],"tags":[],"class_list":["post-454","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-android","category-mobile-security","category-scams"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How to protect yourself as the threat of scam apps grows - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to protect yourself as the threat of scam apps grows\" \/>\n<meta property=\"og:description\" content=\"As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices? What can we do to protect ourselves against these fraudulent practices? Be aware of the limitations of app store review processes The policies and review procedures of major app stores do keep out a large number of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-11T07:00:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:47:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ScamApps_HowTo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"750\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"How to protect yourself as the threat of scam apps grows\",\"datePublished\":\"2018-05-11T07:00:58+00:00\",\"dateModified\":\"2019-05-29T12:47:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/\"},\"wordCount\":1332,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ScamApps_HowTo.png\",\"articleSection\":[\"android\",\"mobile security\",\"scams\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2018\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/\",\"name\":\"How to protect yourself as the threat of scam apps grows - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ScamApps_HowTo.png\",\"datePublished\":\"2018-05-11T07:00:58+00:00\",\"dateModified\":\"2019-05-29T12:47:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ScamApps_HowTo.png\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ScamApps_HowTo.png\",\"width\":1000,\"height\":750},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to protect yourself as the threat of scam apps grows\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2018\\\/05\\\/11\\\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to protect yourself as the threat of scam apps grows - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/","og_locale":"en_US","og_type":"article","og_title":"How to protect yourself as the threat of scam apps grows","og_description":"As the threat of bogus apps continues, what can we do to protect ourselves against these fraudulent practices? What can we do to protect ourselves against these fraudulent practices? Be aware of the limitations of app store review processes The policies and review procedures of major app stores do keep out a large number of","og_url":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2018-05-11T07:00:58+00:00","article_modified_time":"2019-05-29T12:47:55+00:00","og_image":[{"width":1000,"height":750,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ScamApps_HowTo.png","type":"image\/png"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"How to protect yourself as the threat of scam apps grows","datePublished":"2018-05-11T07:00:58+00:00","dateModified":"2019-05-29T12:47:55+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/"},"wordCount":1332,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ScamApps_HowTo.png","articleSection":["android","mobile security","scams"],"inLanguage":"en-US","copyrightYear":"2018","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/","url":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/","name":"How to protect yourself as the threat of scam apps grows - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ScamApps_HowTo.png","datePublished":"2018-05-11T07:00:58+00:00","dateModified":"2019-05-29T12:47:55+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ScamApps_HowTo.png","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/ScamApps_HowTo.png","width":1000,"height":750},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"How to protect yourself as the threat of scam apps grows"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2018\/05\/11\/how-to-protect-yourself-as-the-threat-of-scam-apps-grows\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=454"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/454\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1856"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}