{"id":1384,"date":"2020-09-17T15:03:28","date_gmt":"2020-09-17T09:33:28","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=1384"},"modified":"2020-09-17T15:04:14","modified_gmt":"2020-09-17T09:34:14","slug":"mobile-phishing-danger-for-users-and-companies","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/","title":{"rendered":"Mobile Phishing Danger For Users And Companies"},"content":{"rendered":"<p>As we use them in many ways today, smartphones have their development history behind them, from a pure telephone to a communication instrument, to a device that, in principle, no longer differs from a laptop in terms of its functions and technical features.<\/p>\n<p>With very few exceptions, such mobile devices no longer run on proprietary or device-specific operating systems. Instead, 97% of all mobile devices sold rely on one of two operating systems. The fact that hackers have long since taken advantage of. For a good reason.<\/p>\n<p>Current malware is now so significant that it can even target specific device types. This opens up a broad additional field of activity for hackers and one that can be opened up with limited resources. Modern mobile devices are susceptible to malware, man-in-the-middle attacks, SMS information interception, and, most importantly, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Phishing\"><span style=\"color: #0000ff;\"><strong>phishing<\/strong><\/span><\/a> attacks.<\/p>\n<p>Most attack scenarios benefit from the fact that, on a mobile device, we are much more inclined to click on a malicious link or to install legitimate-looking malware. Social engineering, phishing, or a combination of different attack vectors are the means of choice. The only way to protect yourself against attacks of this kind is to make the user aware and provide technological support.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655df3ce81273\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655df3ce81273\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#Attractive_Because_It_Is_Ubiquitous\" title=\"Attractive Because It Is Ubiquitous\">Attractive Because It Is Ubiquitous<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#Traditional_Security_Measures_Surrender_To_Mobile_Phishing_Attacks\" title=\"Traditional Security Measures Surrender To Mobile Phishing Attacks\">Traditional Security Measures Surrender To Mobile Phishing Attacks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#Private_Emails\" title=\"Private Emails\">Private Emails<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#Social_Networking_And_Mobile_Messaging_Apps\" title=\"Social Networking And Mobile Messaging Apps\">Social Networking And Mobile Messaging Apps<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#SMS_MMS\" title=\"SMS \/ MMS\">SMS \/ MMS<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Attractive_Because_It_Is_Ubiquitous\"><\/span>Attractive Because It Is Ubiquitous<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>One reason for the rapid increase is the ubiquitous professional use of mobile devices. In contrast to the &#8216;controlled&#8217; and concentrated use of a laptop or desktop, smartphones are used in multi-tasking mode: on the way to work or the next meeting, during a short break, or quickly in the evening on the couch before the news. Also, many devices are used in a mix for both professional and private purposes. This, combined with smaller screens and the limited possibilities on mobile platforms to distinguish real from fake, has opened up new possibilities for criminals. The development has even &#8220;forced&#8221; them to deal with attack methods on mobile platforms in order not only to &#8220;phish&#8221; access data from end-users.<\/p>\n<p>From a company perspective, the previously defined boundaries of traditional company networks and solution approaches are blurring and disappearing. Against this background, corresponding perimeter solutions are only partially effective if you want to protect yourself against phishing attempts on mobile devices, as devices are mostly used outside of your controllable network. Therefore, it is more comfortable and more profitable for cybercriminals to attack a mostly unprotected mobile device than a comparatively well-protected laptop or desktop.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Traditional_Security_Measures_Surrender_To_Mobile_Phishing_Attacks\"><\/span>Traditional Security Measures Surrender To Mobile Phishing Attacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Conventional <a href=\"https:\/\/www.trendstechblog.com\/category\/security\/\"><span style=\"color: #0000ff;\"><strong>security<\/strong><\/span><\/a> solutions such as secure email gateways filter out potential phishing emails and malicious URLs before they land on the email server or with the user. Secure Web Gateways, in turn, analyze the employees&#8217; Internet content for malicious code and phishing pages. Both methods are ideal for protecting company emails. However, employees use emails and a large number of different mobile messaging and social media applications on their devices in addition to <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/category\/business\/\"><strong>business<\/strong><\/a><\/span> and private emails.<\/p>\n<p>And to exacerbate the problem, the majority of smartphones are used outside of the company&#8217;s WLAN &#8211; i.e., in networks that companies cannot control. All in all, companies are increasingly lost when it comes to protection against mobile phishing and cannot avoid dealing more seriously than before with the topic of mobile security.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Private_Emails\"><\/span>Private Emails<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Hackers are aware that the sometimes strict security precautions for company emails are often missing in private accounts. Also, most people today read private and <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/write-for-us\/\"><strong>business<\/strong><\/a><\/span> emails first on their mobile devices. Phishing attempts that target personal email accounts work something like this:<\/p>\n<p>An employee receives a private email from her friend on her mobile phone to share photos via a new photo-sharing app. The said employee does not find this unusual. It&#8217;s not the first time she and her friend have exchanged photos via text and email. So the employee clicks on the link and downloads the app. After downloading, it initially looks like the app is not working. Later that afternoon, the employee makes a bank transfer to the shared family account, opens her mobile banking app, and enters her access data. What the employee missed, however, is that there is a banking Trojan behind the alleged &#8220;photo&#8221; app.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Social_Networking_And_Mobile_Messaging_Apps\"><\/span>Social Networking And Mobile Messaging Apps<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Mobile devices and their app stores make a flood of messaging apps and platforms accessible. The downside: They also open up entirely new avenues for attackers. Imagine an employee who regularly communicates with friends, family, and even colleagues and customers via WhatsApp. One day, a colleague that said employee typically chats with on WhatsApp sends a message asking him to review a batch of information for a customer meeting as soon as possible. Based on the shared history, the employee does not hesitate long and clicks on the link. This leads him to a Microsoft login page, where he enters his access data as usual because the team uses Office 365 for presentations.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"SMS_MMS\"><\/span>SMS \/ MMS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The third way that attackers like to launch a phishing attack is SMS or MMS. According to a study conducted by Lookout in the United States, over 25 percent of employees click a link in a text message if the fake phone number looks like it&#8217;s from the local area. Pegasus, one of the most sophisticated mobile advanced persistent threats (mAPT), used precisely this method. It was possible to crack an iPhone with just one click, install spyware, and leave the user just as smart as before.<\/p>\n<p>Once you understand how easy it is to exploit these weaknesses, it is hardly surprising that mobile phishing attacks are rising. In contrast, it is more surprising that most companies and organizations continue to protect, for example, only company emails from phishing attacks. Phishing attacks have long since developed well beyond the corporate email vector and are one of the primaries, but notoriously underestimated, gateways for accessing sensitive corporate data.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Also Read: <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/3-converters-from-pdf-bear-you-should-use\/\">3 Converters From PDF Bear You Should Use<\/a><\/span><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As we use them in many ways today, smartphones have their development history behind them, from a pure telephone to&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1385,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[97,96,290],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile Phishing Danger For Users And Companies<\/title>\n<meta name=\"description\" content=\"As we use them in many ways today, smartphones have their development history behind them, from a pure telephone to a communication.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Phishing Danger For Users And Companies\" \/>\n<meta property=\"og:description\" content=\"As we use them in many ways today, smartphones have their development history behind them, from a pure telephone to a communication.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-17T09:33:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-17T09:34:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/09\/Mobile-Phishing-Danger-For-Users-And-Companies.Jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"Mobile Phishing Danger For Users And Companies\",\"datePublished\":\"2020-09-17T09:33:28+00:00\",\"dateModified\":\"2020-09-17T09:34:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/\"},\"wordCount\":985,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"Computer Security\",\"Cybersecurity\",\"Mobile Phishing\"],\"articleSection\":[\"SECURITY\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/\",\"url\":\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/\",\"name\":\"Mobile Phishing Danger For Users And Companies\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2020-09-17T09:33:28+00:00\",\"dateModified\":\"2020-09-17T09:34:14+00:00\",\"description\":\"As we use them in many ways today, smartphones have their development history behind them, from a pure telephone to a communication.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECURITY\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Mobile Phishing Danger For Users And Companies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Phishing Danger For Users And Companies","description":"As we use them in many ways today, smartphones have their development history behind them, from a pure telephone to a communication.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Phishing Danger For Users And Companies","og_description":"As we use them in many ways today, smartphones have their development history behind them, from a pure telephone to a communication.","og_url":"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/","og_site_name":"Trends Tech Blog","article_published_time":"2020-09-17T09:33:28+00:00","article_modified_time":"2020-09-17T09:34:14+00:00","og_image":[{"width":1280,"height":675,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/09\/Mobile-Phishing-Danger-For-Users-And-Companies.Jpg.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"Mobile Phishing Danger For Users And Companies","datePublished":"2020-09-17T09:33:28+00:00","dateModified":"2020-09-17T09:34:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/"},"wordCount":985,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["Computer Security","Cybersecurity","Mobile Phishing"],"articleSection":["SECURITY"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/","url":"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/","name":"Mobile Phishing Danger For Users And Companies","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2020-09-17T09:33:28+00:00","dateModified":"2020-09-17T09:34:14+00:00","description":"As we use them in many ways today, smartphones have their development history behind them, from a pure telephone to a communication.","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/mobile-phishing-danger-for-users-and-companies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"SECURITY","item":"https:\/\/www.trendstechblog.com\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Mobile Phishing Danger For Users And Companies"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1384"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=1384"}],"version-history":[{"count":1,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1384\/revisions"}],"predecessor-version":[{"id":1386,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1384\/revisions\/1386"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/1385"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=1384"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=1384"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=1384"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}