<\/path><\/svg><\/a><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"Don’t overlook mobile security threats! In this digitized era, we rely more and more on our mobile devices, making mobile security paramount. This article will explore the world of mobile security, common threats, how mobile devices can be exploited, and how to protect our sensitive data. Understanding Mobile App Security Mobile device security is a […]<\/p>\n","protected":false},"author":2,"featured_media":3873,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8],"tags":[11,10],"uagb_featured_image_src":{"full":["https:\/\/fbijohn.com\/wp-content\/uploads\/2019\/07\/Mobile-App-Security.jpg",1200,600,false],"thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2019\/07\/Mobile-App-Security-150x150.jpg",150,150,true],"medium":["https:\/\/fbijohn.com\/wp-content\/uploads\/2019\/07\/Mobile-App-Security-300x150.jpg",300,150,true],"medium_large":["https:\/\/fbijohn.com\/wp-content\/uploads\/2019\/07\/Mobile-App-Security-768x384.jpg",768,384,true],"large":["https:\/\/fbijohn.com\/wp-content\/uploads\/2019\/07\/Mobile-App-Security-1024x512.jpg",1024,512,true],"1536x1536":["https:\/\/fbijohn.com\/wp-content\/uploads\/2019\/07\/Mobile-App-Security.jpg",1200,600,false],"2048x2048":["https:\/\/fbijohn.com\/wp-content\/uploads\/2019\/07\/Mobile-App-Security.jpg",1200,600,false],"woocommerce_thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2019\/07\/Mobile-App-Security-300x300.jpg",300,300,true],"woocommerce_single":["https:\/\/fbijohn.com\/wp-content\/uploads\/2019\/07\/Mobile-App-Security-600x300.jpg",600,300,true],"woocommerce_gallery_thumbnail":["https:\/\/fbijohn.com\/wp-content\/uploads\/2019\/07\/Mobile-App-Security-100x100.jpg",100,100,true]},"uagb_author_info":{"display_name":"John Iannarelli","author_link":"https:\/\/fbijohn.com\/author\/john-i\/"},"uagb_comment_info":6,"uagb_excerpt":"Don’t overlook mobile security threats! In this digitized era, we rely more and more on our mobile devices, making mobile security paramount. This article will explore the world of mobile security, common threats, how mobile devices can be exploited, and how to protect our sensitive data. Understanding Mobile App Security Mobile device security is a…","_links":{"self":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/2510"}],"collection":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/comments?post=2510"}],"version-history":[{"count":8,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/2510\/revisions"}],"predecessor-version":[{"id":4556,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/posts\/2510\/revisions\/4556"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/media\/3873"}],"wp:attachment":[{"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/media?parent=2510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/categories?post=2510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fbijohn.com\/wp-json\/wp\/v2\/tags?post=2510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}