{"id":2805,"date":"2022-07-25T12:00:00","date_gmt":"2022-07-25T12:00:00","guid":{"rendered":"https:\/\/www.hostrw.com\/kp\/?p=2805"},"modified":"2022-06-06T15:57:29","modified_gmt":"2022-06-06T13:57:29","slug":"top-5-mobile-device-attacks-you-need-to-watch-out-for","status":"publish","type":"post","link":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/","title":{"rendered":"Top 5 Mobile Device Attacks You Need to Watch Out For"},"content":{"rendered":"<p>Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They\u2019re more portable and can be used from anywhere.<\/p><p>We\u2019re seeing the takeover of many activities that used to be performed on traditional computers. Now, people are using mobile devices instead.<\/p><p>For example, Microsoft estimates that up to <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2020\/04\/07\/mobile-security-60-percent-problem\/\" target=\"_blank\" rel=\"noreferrer noopener\">80%<\/a> of the workload in many enterprise organizations is now done via mobile devices. Over half of all <a href=\"https:\/\/www.outerboxdesign.com\/web-design-articles\/mobile-ecommerce-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">web searches<\/a> are also now conducted from a mobile device rather than a desktop PC.<\/p><p>This has caused mobile devices to become more targeted over the past few years. As hackers realize they\u2019re holding many of the same sensitive information and app access as PCs, they\u2019ve been creating mobile malware and other exploits to breach mobile devices.<\/p><p>In 2020, approximately <a href=\"https:\/\/safeatlast.co\/blog\/mobile-malware-statistics\/\" target=\"_blank\" rel=\"noreferrer noopener\">36.5%<\/a> of organizations were impacted by mobile malware and 2.5 million people unknowingly downloaded multiple mobile adware apps.<\/p><p>It\u2019s important to start treating mobile devices in the same way as you do computers when it comes to their security. Smartphones and tablets need the same types of security precautions in place, including:<\/p><ul class=\"wp-block-list\"><li>Antivirus\/anti-malware<\/li><li>DNS filtering<\/li><li>Automated OS and app updates<\/li><li>Managed backup<\/li><\/ul><p>You need to be on the lookout for the most prevalent mobile device threats that allow your data to be leaked or breached. Here\u2019s a roundup of what those are.<\/p><h3 class=\"wp-block-heading\">1. Mobile Malware Hidden in Apps<\/h3><p>It\u2019s not easy at first glance to tell the difference between a legitimate free app and one that has malware hidden inside.<\/p><p>Scammers will use the same types of flashy graphics, and the app may even have a high star rating (most likely boosted through suspicious means). The app may even do what it says it will do when downloaded.<\/p><p>But malware can be hidden in the background, infecting a device as soon as the app is installed. And many of these apps will hide once on your phone or tablet by using the icon of a common default system app (like settings or calendar).<\/p><p>Mobile malware can include all the same types of malware that can infect a computer, such as ransomware, adware, spyware, trojans, and more.<\/p><h3 class=\"wp-block-heading\">2. Unprotected Communications<\/h3><p>Have you ever sent someone a password or credit card details over a text message or messaging app? Did you check to see if the communication was encrypted?<\/p><p>Many users will use various methods of communication from their mobile devices without knowing how secure those methods are. If sensitive information is transmitted and it\u2019s not encrypted, then a hacker could easily intercept it.<\/p><h3 class=\"wp-block-heading\">3. Public Wi-Fi &amp; Man-in-the-Middle Attacks<\/h3><p>Public Wi-Fi has long been known to be non-secure, yet people still use it when it\u2019s available. They want to save their mobile minutes or get a faster connection.<\/p><p><a href=\"https:\/\/hbr.org\/2017\/05\/why-you-really-need-to-stop-using-public-wi-fi\" target=\"_blank\" rel=\"noreferrer noopener\">75%<\/a> of people admit to connecting to email when on public Wi-Fi. Other activities people will do is sign into apps (even sensitive ones like online banking), and shop online, entering credit card details.<\/p><p>If you\u2019re on public Wi-Fi, then you\u2019re at high risk of a man-in-the-middle attack. This is when a hacker connects to the same network and looks for victims with unprotected communications. They can then capture any type of data they\u2019re transmitting.<\/p><p>One way to safely connect to public Wi-Fi is to use a VPN app, which will encrypt your communications.<\/p><h3 class=\"wp-block-heading\">4. Juice Jacking on Public USB Charging Stations<\/h3><p>Another public mobile breach danger is public USB charging stations. These are often welcome sights especially if you\u2019re low on battery power. However, hackers can infect public USB charging ports with malware and set up fake charging stations in public areas.<\/p><p>Then, when you insert your USB cord to charge your device, the malware is copying all the data on your phone and\/or infecting it with malicious code. See, USB cables aren\u2019t just for charging, they are also used for data transmission.<\/p><p>It\u2019s best to avoid public USB charging ports and charge with your power adapter that plugs into an outlet instead. You can also buy a \u201ccharge-only\u201d USB cord to use if USB charging is your only option.<\/p><h2 class=\"wp-block-heading\">5. Non-Updated Devices<\/h2><p>Approximately <a href=\"https:\/\/www.tomsguide.com\/us\/old-phones-unsafe,news-24846.html\" target=\"_blank\" rel=\"noreferrer noopener\">40%<\/a> of Android devices are running outdated operating systems that no longer get vital security updates.<\/p><p>When your mobile device is not kept updated, then it\u2019s easier for a hacker to use an exploit that takes advantage of a code vulnerability in the OS or one of the installed apps.<\/p><p>Many companies aren\u2019t paying attention to how many employees\u2019 work devices are running current operating systems, which puts their networks at higher risk of a breach.<\/p><p>You should ensure that all your apps and your OS are kept updated because many of these updates include critical security patches.<\/p><h2 class=\"wp-block-heading\">Ask Us About Mobile Device Security Solutions<\/h2><p>With mobile devices handling so much of the computing workload these days, it\u2019s vital they\u2019re properly protected. Contact us to discuss mobile security and management solutions.<\/p><p><\/p><p>&#8212;<br><a href=\"https:\/\/unsplash.com\/photos\/DoWZMPZ-M9s\" target=\"_blank\" rel=\"noreferrer noopener\">Featured Image Credit<\/a><\/p><p>This Article has been Republished with Permission from <a rel=\"canonical noopener noreferrer\" href=\"https:\/\/thetechnologypress.com\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/\" title=\"Top 5 Mobile Device Attacks You Need to Watch Out For\" target=\"_blank\">The Technology Press.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They\u2019re more portable and can be used from anywhere.We\u2019re seeing the takeover of many activities that used to be performed on traditional computers. Now, people are using mobile devices instead.For example, Microsoft estimates that up to 80% &#8230;<\/p>\n","protected":false},"author":1,"featured_media":2806,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[80],"tags":[],"class_list":["post-2805","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Top 5 Mobile Device Attacks You Need to Watch Out For - HostRW Computer Service<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Mobile Device Attacks You Need to Watch Out For - HostRW Computer Service\" \/>\n<meta property=\"og:description\" content=\"Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They\u2019re more portable and can be used from anywhere.We\u2019re seeing the takeover of many activities that used to be performed on traditional computers. Now, people are using mobile devices instead.For example, Microsoft estimates that up to 80% ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/\" \/>\n<meta property=\"og:site_name\" content=\"HostRW Computer Service\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-25T12:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/06\/Top-5-Mobile-Device-Attacks-You-Need-to-Watch-Out-Featured-image-scaled-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roelof\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hostrw\" \/>\n<meta name=\"twitter:site\" content=\"@hostrw\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roelof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-mobile-device-attacks-you-need-to-watch-out-for\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-mobile-device-attacks-you-need-to-watch-out-for\\\/\"},\"author\":{\"name\":\"Roelof\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\"},\"headline\":\"Top 5 Mobile Device Attacks You Need to Watch Out For\",\"datePublished\":\"2022-07-25T12:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-mobile-device-attacks-you-need-to-watch-out-for\\\/\"},\"wordCount\":852,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-mobile-device-attacks-you-need-to-watch-out-for\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-5-Mobile-Device-Attacks-You-Need-to-Watch-Out-Featured-image-scaled-1.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-mobile-device-attacks-you-need-to-watch-out-for\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-mobile-device-attacks-you-need-to-watch-out-for\\\/\",\"name\":\"Top 5 Mobile Device Attacks You Need to Watch Out For - HostRW Computer Service\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-mobile-device-attacks-you-need-to-watch-out-for\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-mobile-device-attacks-you-need-to-watch-out-for\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-5-Mobile-Device-Attacks-You-Need-to-Watch-Out-Featured-image-scaled-1.jpg\",\"datePublished\":\"2022-07-25T12:00:00+00:00\",\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-mobile-device-attacks-you-need-to-watch-out-for\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/top-5-mobile-device-attacks-you-need-to-watch-out-for\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-5-Mobile-Device-Attacks-You-Need-to-Watch-Out-Featured-image-scaled-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Top-5-Mobile-Device-Attacks-You-Need-to-Watch-Out-Featured-image-scaled-1.jpg\",\"width\":2560,\"height\":1920,\"caption\":\"Displaying Top 5 Mobile Device Attacks You Need to Watch Out - raw image.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"name\":\"HostRW Computer Service\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\",\"name\":\"HostRW Computer Service\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"width\":189,\"height\":57,\"caption\":\"HostRW Computer Service\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/hostrw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\",\"name\":\"Roelof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"caption\":\"Roelof\"},\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/author\\\/roelof\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Mobile Device Attacks You Need to Watch Out For - HostRW Computer Service","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/","og_locale":"nl_NL","og_type":"article","og_title":"Top 5 Mobile Device Attacks You Need to Watch Out For - HostRW Computer Service","og_description":"Smartphones and tablets are often the preferred device for communications, web searching, and accessing many types of apps. They\u2019re more portable and can be used from anywhere.We\u2019re seeing the takeover of many activities that used to be performed on traditional computers. Now, people are using mobile devices instead.For example, Microsoft estimates that up to 80% ...","og_url":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/","og_site_name":"HostRW Computer Service","article_published_time":"2022-07-25T12:00:00+00:00","og_image":[{"width":2560,"height":1920,"url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/06\/Top-5-Mobile-Device-Attacks-You-Need-to-Watch-Out-Featured-image-scaled-1.jpg","type":"image\/jpeg"}],"author":"Roelof","twitter_card":"summary_large_image","twitter_creator":"@hostrw","twitter_site":"@hostrw","twitter_misc":{"Geschreven door":"Roelof","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/#article","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/"},"author":{"name":"Roelof","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc"},"headline":"Top 5 Mobile Device Attacks You Need to Watch Out For","datePublished":"2022-07-25T12:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/"},"wordCount":852,"publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/06\/Top-5-Mobile-Device-Attacks-You-Need-to-Watch-Out-Featured-image-scaled-1.jpg","articleSection":["Cybersecurity"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/","url":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/","name":"Top 5 Mobile Device Attacks You Need to Watch Out For - HostRW Computer Service","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/#primaryimage"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/06\/Top-5-Mobile-Device-Attacks-You-Need-to-Watch-Out-Featured-image-scaled-1.jpg","datePublished":"2022-07-25T12:00:00+00:00","inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.hostrw.com\/kp\/top-5-mobile-device-attacks-you-need-to-watch-out-for\/#primaryimage","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/06\/Top-5-Mobile-Device-Attacks-You-Need-to-Watch-Out-Featured-image-scaled-1.jpg","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/06\/Top-5-Mobile-Device-Attacks-You-Need-to-Watch-Out-Featured-image-scaled-1.jpg","width":2560,"height":1920,"caption":"Displaying Top 5 Mobile Device Attacks You Need to Watch Out - raw image.jpg"},{"@type":"WebSite","@id":"https:\/\/www.hostrw.com\/kp\/en\/#website","url":"https:\/\/www.hostrw.com\/kp\/en\/","name":"HostRW Computer Service","description":"","publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostrw.com\/kp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization","name":"HostRW Computer Service","url":"https:\/\/www.hostrw.com\/kp\/en\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","width":189,"height":57,"caption":"HostRW Computer Service"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/hostrw"]},{"@type":"Person","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc","name":"Roelof","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","caption":"Roelof"},"url":"https:\/\/www.hostrw.com\/kp\/author\/roelof\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2805","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/comments?post=2805"}],"version-history":[{"count":1,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2805\/revisions"}],"predecessor-version":[{"id":2807,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2805\/revisions\/2807"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/media\/2806"}],"wp:attachment":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/media?parent=2805"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/categories?post=2805"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/tags?post=2805"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}