{"id":82965,"date":"2022-10-19T05:54:56","date_gmt":"2022-10-19T05:54:56","guid":{"rendered":"https:\/\/www.42gears.com\/?p=82965"},"modified":"2022-12-29T07:12:40","modified_gmt":"2022-12-29T07:12:40","slug":"7-interesting-security-threats-to-mobile-devices","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/","title":{"rendered":"7 Interesting Security Threats to Mobile Devices"},"content":{"rendered":"\n<p>Mobile devices have become a significant part of many organizations\u2019 IT infrastructures. The shift to remote work as a result of the COVID-19 pandemic has made mobile devices a convenient choice for many employees. However, mobile devices are vulnerable to serious cybersecurity risks. According to <a href=\"https:\/\/pages.checkpoint.com\/mobile-security-report-2021.html\" target=\"_blank\" rel=\"noreferrer noopener\">Check Point\u2019s Mobile Security Report 2021<\/a>, mobile security threats are on the rise. 97% of organizations now face mobile threats from several attack vectors due to the widespread adoption of remote working. Additionally, the survey shows that at least 40% of mobile devices worldwide are intrinsically susceptible to cyberattacks. This means that, with the increase in use of mobile devices, IT teams will have an increased number and wider range of devices to secure and protect.<\/p>\n\n\n\n<p>Typically, there are four main categories of cyber threats &#8211; application-based threats, web-based mobile security threats, mobile network security threats, and mobile device security threats. Let\u2019s look at the top 7 security threats to mobile devices and ways to safeguard against them:<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-suspicious-apps-and-websites\"><strong>Suspicious Apps and Websites<\/strong><\/h2>\n\n\n\n<p>Malicious apps come in the form of free or enterprise-signed apps found in official app stores. Their objective is to transfer personal or corporate data to a remote server where cybercriminals can mine it. These applications can even redirect your devices to more malicious sites, creating a cascading effect that could impact your life.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Unsecured Wi-Fi<\/strong><\/h2>\n\n\n\n<p>People tend to use free wireless hotspots wherever they find one and ignore the fact that most of the free Wi-Fi connections are unsecured. This happens mostly in high-traffic public places such as coffee shops, libraries, and airports. Hackers put up fake access points\u2014connections that seem like Wi-Fi networks but are actually traps. It is one of the easiest places for hackers to get users&rsquo; personal data. There is a high chance that users\u2019 personal data will be stolen when their devices are connected to unprotected Wi-Fi networks even for simple tasks such as creating a social network account, sending money through UPIs, or during VoIP calls.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Phishing Attacks<\/strong><\/h2>\n\n\n\n<p>As most mobile devices are always kept powered on, they have a high chance of being hacked. Cybercriminals may send your employees emails (phishing attacks) or text messages (smishing attacks) to try to trick them into giving out personal information like passwords or installing malware on their devices. A CSO poll found that security risks are higher for mobile users because they often check their email in real time, opening and reading messages as soon as they arrive. Email apps on mobile devices show less information because the screens are smaller. This makes users more vulnerable. Users usually click on malicious links without knowing it because the content of emails isn&rsquo;t always clear on smaller screens. This makes it easy for hackers to access sensitive information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Intercepting Network Communications<\/strong><\/h2>\n\n\n\n<p>A man-in-the-middle (MitM) attack is when an attacker intercepts network communications to either listen in or change the data being sent. While numerous systems may be vulnerable to this kind of attack, mobile devices are particularly prone to MitM attacks. Web traffic often uses encrypted HTTPS to talk to each other, but SMS messages are easy to intercept, and mobile apps may use unencrypted HTTP to send (sensitive) information.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Attacks due to Poor Password<\/strong><\/h2>\n\n\n\n<p>This usually happens when an employee sets poor passwords to access the company\u2019s VPN using personal devices. The fact that the same password is used for both personal and work accounts on the same device is a major security risk for organizations. It helps a cybercriminal to breach your systems easily. These attacks can then lead to credential-based brute force cyberattacks such as credential stuffing or password spraying, because bad actors can use poor or stolen credentials to access sensitive data through a company\u2019s mobile apps.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Outdated OS exploits<\/strong><\/h2>\n\n\n\n<p>Oftentimes, cybersecurity is mostly focused on top-level software, which makes the lower-level software easier to hack. If the operating system (OS) of a mobile device is out of date, cybercriminals find a way to take advantage of it. Jailbreaking and rooting are ways to get administrator access to an iOS or Android device. Attackers use bugs in mobile operating systems to get root access to these devices. Often, such attacks are more damaging compared to the higher-level ones, as they exist below and outside the visibility of a device\u2019s security solutions.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Loss or Theft of Mobile Devices<\/strong><\/h2>\n\n\n\n<p>Device theft and loss are not recent problems for enterprises. But since most employees access their company&rsquo;s network remotely from public places like cafes and coffee shops and use a wider range of devices, it&rsquo;s easy for devices to be stolen or lost.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>What Can You Do to Safeguard Your Devices Against Mobile Security Threats?<\/strong><\/h2>\n\n\n\n<p>Mobile security threats to mobile devices are both rising in number and evolving in scope. To keep devices and data safe, companies and employees need to know where common threats come from and be ready for the next wave of malicious activities.<\/p>\n\n\n\n<p>By using a strong MDM solution, they can get full safety coverage that goes beyond desktops and laptops to protect mobile devices, IoT devices, and other places where people connect to the internet. <a href=\"https:\/\/www.42gears.com\/products\/mobile-device-management\/\">SureMDM <\/a>by 42Gears is a robust MDM solution that works exceedingly well on all OSes, including Android, iOS\/iPadOS, Windows, Linux, macOS, Wear OS, VR, and IoT platforms.&nbsp;For more information on SureMDM, please click <a href=\"https:\/\/www.42gears.com\/products\/mobile-device-management\/\">here<\/a>.<\/p>\n\n\n\n<div style=\"background-image: url('https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/CTA-1.png'); background-position: right; padding: 40px; border-radius: 5px; margin-top: 16px; background-size: cover;\">\n<h2 style=\"font-size: 22px; color: #427ab7; margin-top: 0px; margin-right: 250px\">Choose a feature-rich MDM solution to safeguard against security threats to mobile devices<\/h2>\n<p style=\"margin-top: 32px; display: inline-block;\"><a href=\"https:\/\/suremdm.42gears.com\/console\/?_ga=2.36544608.1566672484.1665470034-1162250115.1659012575\" style=\"min-width: 148px; height: 48px; padding: 0 12px; text-align: center; display: inline-block; background-color: #ffffff; color: #427ab7; line-height: 48px; border-radius: 5px; letter-spacing: 1px; font-size: 12px; font-weight: bold; transition: all 0.5s; margin-bottom: 0px;\" target=\"_black\" rel=\"noopener noreferrer\">Try SureMDM<\/a>\n<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Mobile devices have become a significant part of many organizations\u2019 IT infrastructures. The shift to remote work as a result of the COVID-19 pandemic has made mobile devices a convenient choice for many employees. However, mobile devices are vulnerable to serious cybersecurity risks. According to Check Point\u2019s Mobile Security Report 2021, mobile security threats are&hellip;<\/p>\n","protected":false},"author":7,"featured_media":82941,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"new-blog-template.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-82965","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Common Security Threats to Mobile Devices One Should Be Aware Of<\/title>\n<meta name=\"description\" content=\"An increased use of mobile devices has opened the door to sophisticated security risks. Discover 7 Interesting Security Threats to Mobile Devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Interesting Security Threats to Mobile Devices\" \/>\n<meta property=\"og:description\" content=\"An increased use of mobile devices has opened the door to sophisticated security risks. Discover 7 Interesting Security Threats to Mobile Devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-19T05:54:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-29T07:12:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"7 Interesting Security Threats to Mobile Devices\",\"datePublished\":\"2022-10-19T05:54:56+00:00\",\"dateModified\":\"2022-12-29T07:12:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/\"},\"wordCount\":918,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/\",\"url\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/\",\"name\":\"The Common Security Threats to Mobile Devices One Should Be Aware Of\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png\",\"datePublished\":\"2022-10-19T05:54:56+00:00\",\"dateModified\":\"2022-12-29T07:12:40+00:00\",\"description\":\"An increased use of mobile devices has opened the door to sophisticated security risks. Discover 7 Interesting Security Threats to Mobile Devices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png\",\"width\":1000,\"height\":538,\"caption\":\"phishing scam vector image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Interesting Security Threats to Mobile Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"The Common Security Threats to Mobile Devices One Should Be Aware Of","description":"An increased use of mobile devices has opened the door to sophisticated security risks. Discover 7 Interesting Security Threats to Mobile Devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/","og_locale":"fr_FR","og_type":"article","og_title":"7 Interesting Security Threats to Mobile Devices","og_description":"An increased use of mobile devices has opened the door to sophisticated security risks. Discover 7 Interesting Security Threats to Mobile Devices.","og_url":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2022-10-19T05:54:56+00:00","article_modified_time":"2022-12-29T07:12:40+00:00","og_image":[{"width":1000,"height":538,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png","type":"image\/png"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"7 Interesting Security Threats to Mobile Devices","datePublished":"2022-10-19T05:54:56+00:00","dateModified":"2022-12-29T07:12:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/"},"wordCount":918,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png","articleSection":["Uncategorized"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/","url":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/","name":"The Common Security Threats to Mobile Devices One Should Be Aware Of","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png","datePublished":"2022-10-19T05:54:56+00:00","dateModified":"2022-12-29T07:12:40+00:00","description":"An increased use of mobile devices has opened the door to sophisticated security risks. Discover 7 Interesting Security Threats to Mobile Devices.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png","width":1000,"height":538,"caption":"phishing scam vector image"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/fr\/blog\/7-interesting-security-threats-to-mobile-devices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/fr\/"},{"@type":"ListItem","position":2,"name":"7 Interesting Security Threats to Mobile Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2022\/10\/featured-1.png","_links":{"self":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts\/82965","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/comments?post=82965"}],"version-history":[{"count":2,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts\/82965\/revisions"}],"predecessor-version":[{"id":83765,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts\/82965\/revisions\/83765"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/media\/82941"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/media?parent=82965"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/categories?post=82965"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/tags?post=82965"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}