{"id":4537,"date":"2022-11-29T09:08:46","date_gmt":"2022-11-29T14:08:46","guid":{"rendered":"https:\/\/ionic.io\/blog\/?p=4537"},"modified":"2024-02-09T14:29:15","modified_gmt":"2024-02-09T19:29:15","slug":"the-top-most-common-attack-vectors-for-mobile-threats","status":"publish","type":"post","link":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats","title":{"rendered":"Top Attack Vectors for Mobile Threats"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">According to Statista, consumers <\/span><a href=\"https:\/\/www.statista.com\/statistics\/271644\/worldwide-free-and-paid-mobile-app-store-downloads\/\"><span style=\"font-weight: 400;\">downloaded 230 billion mobile apps<\/span><\/a><span style=\"font-weight: 400;\"> to their connected devices in 2021, up 63% from five years prior. Even more jarring, these numbers account for only first-time downloads and exclude re-installs and installed updates to these same applications. This type of hyper-growth was fueled, in part, by the global pandemic. As a result, developers had to push out new apps to meet these unique environmental demands, as well as new features and improvements to account for the change in the way day-to-day tasks were to be completed. With such fast-paced development, it left the door open for a reduction in quality leading to self-inflicted issues or room for a third party to gain unauthorized access to systems and information. Unfortunately, a number of <\/span><a href=\"https:\/\/cybersecurity.asee.co\/blog\/most-significant-mobile-data-breaches\/\"><span style=\"font-weight: 400;\">high notoriety apps<\/span><\/a><span style=\"font-weight: 400;\"> proved this to be true.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s take a look at how prevalent these types of breaches are, what the attack vectors were, and how you can better secure your apps moving forward.<\/span><\/p>\n<p><!--more--><\/p>\n<h2>How prevalent are mobile security threats?<\/h2>\n<p><span style=\"font-weight: 400;\">One of the largest corporate team collaboration tools, Slack, fell victim to a data breach. A bug within their \u201cShared Invite Link\u201d was found to be transmitting a hashed version of the user\u2019s password. While Slack denied that clear-text versions of the password were made accessible, they forced those affected customers to reset their passwords and wipe app data logs.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Users of a mobile banking and payment app by Klarna found themselves confused as they were briefly exposed to different users\u2019 account information. Given the nature of potentially sensitive information being shared, the company had to lock down the service until the issue was rectified.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Apple and Google found themselves in hot water as well with flaws found in iMessage and 13 popular Android apps, respectively. The iMessage flaw exposed all of its 900 million active users to spyware granting access to the device owner\u2019s photos, messages, personal data, and location. The Android apps\u2019 issues exposed personal data including, emails, chat messages, passwords, and photos of as many as 100 million users.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even a private <\/span><a href=\"https:\/\/www.darkreading.com\/application-security\/mobile-application-security-2021-s-breaches\"><span style=\"font-weight: 400;\">Canadian COVID vaccination passport app<\/span><\/a><span style=\"font-weight: 400;\">, Portpass, found itself in harm&#8217;s way when ineffective data storage led to personal unencrypted data being made accessible in plaintext. Hackers were able to gain access to the data of 650,000 users.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As the number of devices and app downloads skyrockets year-over-year, the attack surface expands along with it. Mobile application security threats have never been more prevalent.<\/span><\/p>\n<h2>What are the common attack vectors?<\/h2>\n<p><span style=\"font-weight: 400;\">The data breaches outlined in the previous section highlight how important it is for developers to remain vigilant in their coding practices. Organizations such as The OWASP Foundation work to improve the security of software and bring to light common vulnerabilities, including <\/span><a href=\"https:\/\/owasp.org\/www-project-mobile-top-10\/\"><span style=\"font-weight: 400;\">those found in mobile applications<\/span><\/a><span style=\"font-weight: 400;\">. Alongside the list of popular risks are the associated attack vectors, security weaknesses, technical and business impacts, as well as information on whether you may have such a vulnerability and how you may go about protecting against it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The breaches outlined above fell perfectly into some of the OWASP Top 10 mobile risks buckets:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/owasp.org\/www-project-mobile-top-10\/2016-risks\/m2-insecure-data-storage\"><span style=\"font-weight: 400;\">M2: Insecure Data Storage<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Portpass app<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/owasp.org\/www-project-mobile-top-10\/2016-risks\/m3-insecure-communication\"><span style=\"font-weight: 400;\">M3: Insecure Communication<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Google apps<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/owasp.org\/www-project-mobile-top-10\/2016-risks\/m5-insufficient-cryptography\"><span style=\"font-weight: 400;\">M5: Insufficient Cryptography<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Slack app<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/owasp.org\/www-project-mobile-top-10\/2016-risks\/m7-client-code-quality\"><span style=\"font-weight: 400;\">M7: Client Code Quality<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Klarna banking and payment app<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/owasp.org\/www-project-mobile-top-10\/2016-risks\/m8-code-tampering\"><span style=\"font-weight: 400;\">M8: Code Tampering<\/span><\/a><span style=\"font-weight: 400;\"> &#8211; Apple iMessage<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Just from these few examples, we can see how commonplace some of these risks are. Five of the top 10 are showcased in these apps alone. Many more fall victim to these issues, as well as the remaining five. It\u2019s critical for every developer to familiarize themselves with these mobile risks to ensure they\u2019re well-equipped to build and release secure applications.<\/span><\/p>\n<h2>How can you ensure your apps are secure?<\/h2>\n<p><span style=\"font-weight: 400;\">The most proactive approach development teams can take is to get their code audited. There are professionals out there who assist in identifying these vulnerabilities so you can address them before they become catastrophic.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If any issues are found, taking immediate action to rectify them is crucial. Teams will need to strategize ways to best mitigate these risks. This could involve looking inward to the internal development team for fixes and improvements, or it may mean seeking external solutions where subject matter experts handle the problem via their services. Ionic\u2019s <\/span><a href=\"https:\/\/ionic.io\/enterprise-sdk\"><span style=\"font-weight: 400;\">Enterprise SDK<\/span><\/a><span style=\"font-weight: 400;\"> is just one example of how invaluable a trusted external partner can be to your development team. Ionic\u2019s professional <\/span><a href=\"https:\/\/ionic.io\/contact\/sales\"><span style=\"font-weight: 400;\">support and advisory services<\/span><\/a><span style=\"font-weight: 400;\"> ensure teams reach their goals, avoid technical debt, increase performance, and improve their mobile app\u2019s security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Ongoing security training and keeping the development team up to date on best practices are effective strategies for keeping apps secure. An informed team is better positioned to make reactive, as well as proactive, decisions on mobile app security risks.<\/span><\/p>\n<p>For thoughts on how to best address and mitigate these risks, take a look at <a href=\"https:\/\/ionic.io\/blog\/how-to-address-mobile-app-security-risks\">How to Address Mobile App Security Risks<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>According to Statista, consumers downloaded 230 billion mobile apps to their connected devices in 2021, up 63% from five years prior. Even more jarring, these numbers account for only first-time downloads and exclude re-installs and installed updates to these same applications. This type of hyper-growth was fueled, in part, by the global pandemic. As a [&hellip;]<\/p>\n","protected":false},"author":94,"featured_media":4538,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"publish_to_discourse":"0","publish_post_category":"26","wpdc_auto_publish_overridden":"","wpdc_topic_tags":"","wpdc_pin_topic":"","wpdc_pin_until":"","discourse_post_id":"556312","discourse_permalink":"http:\/\/forum.ionicframework.com\/t\/the-top-most-common-attack-vectors-for-mobile-threats\/229102","wpdc_publishing_response":"","wpdc_publishing_error":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,123],"tags":[265],"class_list":["post-4537","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all","category-perspectives","tag-ionic-enterprise-sdk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top Attack Vectors for Mobile Threats - Ionic Blog<\/title>\n<meta name=\"description\" content=\"The pandemic-driven shift of mobile devices becoming the mainstay for work has left organizations more vulnerable to mobile security threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top Attack Vectors for Mobile Threats\" \/>\n<meta property=\"og:description\" content=\"The pandemic-driven shift of mobile devices becoming the mainstay for work has left organizations more vulnerable to mobile security threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats\" \/>\n<meta property=\"og:site_name\" content=\"Ionic Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-29T14:08:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-09T19:29:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Conner Simmons\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@connerwsimmons\" \/>\n<meta name=\"twitter:site\" content=\"@ionicframework\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Conner Simmons\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#article\",\"isPartOf\":{\"@id\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats\"},\"author\":{\"name\":\"Conner Simmons\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/person\/b663dd102585af4f59055f5f8ff9defd\"},\"headline\":\"Top Attack Vectors for Mobile Threats\",\"datePublished\":\"2022-11-29T14:08:46+00:00\",\"dateModified\":\"2024-02-09T19:29:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats\"},\"wordCount\":815,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ionic.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png\",\"keywords\":[\"Ionic Enterprise SDK\"],\"articleSection\":[\"All\",\"Perspectives\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats\",\"url\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats\",\"name\":\"Top Attack Vectors for Mobile Threats - Ionic Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ionic.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png\",\"datePublished\":\"2022-11-29T14:08:46+00:00\",\"dateModified\":\"2024-02-09T19:29:15+00:00\",\"description\":\"The pandemic-driven shift of mobile devices becoming the mainstay for work has left organizations more vulnerable to mobile security threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#primaryimage\",\"url\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png\",\"contentUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png\",\"width\":2240,\"height\":1120},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ionic.io\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top Attack Vectors for Mobile Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ionic.io\/blog\/#website\",\"url\":\"https:\/\/ionic.io\/blog\/\",\"name\":\"ionic.io\/blog\",\"description\":\"Build amazing native and progressive web apps with the web\",\"publisher\":{\"@id\":\"https:\/\/ionic.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ionic.io\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ionic.io\/blog\/#organization\",\"name\":\"Ionic\",\"url\":\"https:\/\/ionic.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png\",\"contentUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png\",\"width\":1920,\"height\":854,\"caption\":\"Ionic\"},\"image\":{\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/ionicframework\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/person\/b663dd102585af4f59055f5f8ff9defd\",\"name\":\"Conner Simmons\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/03\/112-234-1-copy-150x150.jpg\",\"contentUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/03\/112-234-1-copy-150x150.jpg\",\"caption\":\"Conner Simmons\"},\"description\":\"Product Team\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/connersimmons\/\",\"https:\/\/x.com\/connerwsimmons\"],\"jobTitle\":\"Product Evangelist\",\"worksFor\":\"Ionic\",\"url\":\"https:\/\/ionic.io\/blog\/author\/conner\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top Attack Vectors for Mobile Threats - Ionic Blog","description":"The pandemic-driven shift of mobile devices becoming the mainstay for work has left organizations more vulnerable to mobile security threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats","og_locale":"en_US","og_type":"article","og_title":"Top Attack Vectors for Mobile Threats","og_description":"The pandemic-driven shift of mobile devices becoming the mainstay for work has left organizations more vulnerable to mobile security threats.","og_url":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats","og_site_name":"Ionic Blog","article_published_time":"2022-11-29T14:08:46+00:00","article_modified_time":"2024-02-09T19:29:15+00:00","og_image":[{"width":2240,"height":1120,"url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png","type":"image\/png"}],"author":"Conner Simmons","twitter_card":"summary_large_image","twitter_creator":"@connerwsimmons","twitter_site":"@ionicframework","twitter_misc":{"Written by":"Conner Simmons","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#article","isPartOf":{"@id":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats"},"author":{"name":"Conner Simmons","@id":"https:\/\/ionic.io\/blog\/#\/schema\/person\/b663dd102585af4f59055f5f8ff9defd"},"headline":"Top Attack Vectors for Mobile Threats","datePublished":"2022-11-29T14:08:46+00:00","dateModified":"2024-02-09T19:29:15+00:00","mainEntityOfPage":{"@id":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats"},"wordCount":815,"commentCount":0,"publisher":{"@id":"https:\/\/ionic.io\/blog\/#organization"},"image":{"@id":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#primaryimage"},"thumbnailUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png","keywords":["Ionic Enterprise SDK"],"articleSection":["All","Perspectives"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats","url":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats","name":"Top Attack Vectors for Mobile Threats - Ionic Blog","isPartOf":{"@id":"https:\/\/ionic.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#primaryimage"},"image":{"@id":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#primaryimage"},"thumbnailUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png","datePublished":"2022-11-29T14:08:46+00:00","dateModified":"2024-02-09T19:29:15+00:00","description":"The pandemic-driven shift of mobile devices becoming the mainstay for work has left organizations more vulnerable to mobile security threats.","breadcrumb":{"@id":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#primaryimage","url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png","contentUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png","width":2240,"height":1120},{"@type":"BreadcrumbList","@id":"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ionic.io\/blog"},{"@type":"ListItem","position":2,"name":"Top Attack Vectors for Mobile Threats"}]},{"@type":"WebSite","@id":"https:\/\/ionic.io\/blog\/#website","url":"https:\/\/ionic.io\/blog\/","name":"ionic.io\/blog","description":"Build amazing native and progressive web apps with the web","publisher":{"@id":"https:\/\/ionic.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ionic.io\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ionic.io\/blog\/#organization","name":"Ionic","url":"https:\/\/ionic.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png","contentUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png","width":1920,"height":854,"caption":"Ionic"},"image":{"@id":"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ionicframework"]},{"@type":"Person","@id":"https:\/\/ionic.io\/blog\/#\/schema\/person\/b663dd102585af4f59055f5f8ff9defd","name":"Conner Simmons","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ionic.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/03\/112-234-1-copy-150x150.jpg","contentUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/03\/112-234-1-copy-150x150.jpg","caption":"Conner Simmons"},"description":"Product Team","sameAs":["https:\/\/www.linkedin.com\/in\/connersimmons\/","https:\/\/x.com\/connerwsimmons"],"jobTitle":"Product Evangelist","worksFor":"Ionic","url":"https:\/\/ionic.io\/blog\/author\/conner"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity1-feature-image.png","_links":{"self":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts\/4537","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/comments?post=4537"}],"version-history":[{"count":1,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts\/4537\/revisions"}],"predecessor-version":[{"id":4571,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts\/4537\/revisions\/4571"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/media\/4538"}],"wp:attachment":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/media?parent=4537"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/categories?post=4537"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/tags?post=4537"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}