{"id":27319,"date":"2021-05-20T16:46:00","date_gmt":"2021-05-20T14:46:00","guid":{"rendered":"https:\/\/perseus.de\/smartphones-as-a-smart-gateway-for-hackers\/"},"modified":"2026-03-30T16:07:09","modified_gmt":"2026-03-30T14:07:09","slug":"smartphones-as-a-smart-gateway-for-hackers","status":"publish","type":"post","link":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/","title":{"rendered":"Smartphones as a smart gateway for hackers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"27319\" class=\"elementor elementor-27319 elementor-22631\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2ba0588 e-flex e-con-boxed e-con e-parent\" data-id=\"2ba0588\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6459d3d elementor-widget elementor-widget-image\" data-id=\"6459d3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"600\" height=\"339\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\" class=\"attachment-medium_large size-medium_large wp-image-27318\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg 600w, https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1-300x170.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Image Credit: Maxim Ilyahov via Unsplash<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0be203 e-flex e-con-boxed e-con e-parent\" data-id=\"e0be203\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b5130da e-con-full e-flex e-con e-child\" data-id=\"b5130da\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-0ab2847 e-con-full e-flex e-con e-child\" data-id=\"0ab2847\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f21d3a9 elementor-widget elementor-widget-text-editor\" data-id=\"f21d3a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h6>20.05.2021<\/h6>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f3e0d0 elementor-widget elementor-widget-heading\" data-id=\"7f3e0d0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Smartphones as a smart gateway for hackers\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1b5dd52 elementor-widget elementor-widget-text-editor\" data-id=\"1b5dd52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Cybersecurity | IT Protection | Attack Vectors<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7cfc3e3 e-con-full e-flex e-con e-child\" data-id=\"7cfc3e3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a6039b8 elementor-widget elementor-widget-text-editor\" data-id=\"a6039b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>For some time now, cybercriminals have identified and exploited mobile devices as supposedly easy entry points for their planned attacks. Recently, Perseus has also had to increasingly warn its customers about such attacks. An overview.  <\/strong><\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong>Verizon&#8217;s Mobile Security Index<\/strong><\/p>\n<p>The telecommunications company Verizon regularly publishes the &#8220;Mobile Security Index&#8221;. As the name suggests, the report focuses exclusively on threats to mobile devices. It explains which protective measures companies use to protect themselves from possible attacks. And finally, it also explained how often these measures unfortunately fail and lead to mobile devices being compromised.   <\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong>The threat is rising<\/strong><\/p>\n<p>Threats to mobile devices, such as smartphones, tablets and laptops, are rising sharply. Two-fifths of respondents said they believe mobile devices are the biggest IT security threat to the organization. Of the rest, 85 percent said that mobile devices are at least as vulnerable as other IT systems.  <\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong>This is why mobile devices are vulnerable<\/strong><\/p>\n<p>Although the number of mobile breaches has not increased this year, the scale is still alarming. More than one in five companies surveyed had experienced a security incident related to a mobile device in the previous 12 months. <\/p>\n<p>The reason for this is that mobile devices are used universally. One cannot say that the frequency of use has increased, but rather the extent of use. Users are used to completing all tasks with mobile devices \u2013 especially smartphones. Mobile devices have evolved from a practical companion to an indispensable business tool.   <\/p>\n<p>Advancing digitization and new, technological innovations are making the work of IT experts more difficult. According to Verizon, the pressure on IT from the company is growing. More than 75 percent of IT service providers have been asked by management to sacrifice the security of mobile devices in order to meet set deadlines or other business goals.  <\/p>\n<p>In addition, cybercriminals are working more and more professionally. The attacks are becoming more extensive, more complicated and more complex. Cybercriminals are increasingly able to develop targeted phishing attacks and attack their victims, for example. Often, these attacks are more successful on mobile devices. Malicious e-mails or fake websites are detected less quickly on a small screen than on other devices.    <\/p>\n<p><strong><br><\/strong><\/p>\n<p><strong>The influence of Covid-19<\/strong><\/p>\n<p>The influence of Covid-19 should also not be underestimated. Companies sent their employees to work from home overnight. Working within one&#8217;s own four walls was rather the exception before the pandemic. Now it is the new norm and will continue to be so in the future. However, according to the Verizon report, a quarter of respondents said their organization has neglected mobile device security to enable efficient working from home. At the same time, so-called shadow IT can emerge in the company. This is when employees use programs or private devices in connection with company data. This entails some risks, as the company&#8217;s own IT or the responsible IT expert has no influence on the use or deployment of the programs and devices and cannot understand whether the workforce adheres to regulations and defined processes.      <\/p>\n<p>You can find more information about shadow IT here.<\/p>\n<p>In addition, Covid-19 has been exploited by cybercriminals to create more and more phishing campaigns.&nbsp;  The constantly changing regulations, laws and regulations provided enough fodder for hackers to create tailor-made phishing attacks very quickly.<\/p>\n<p><strong><br><\/strong><\/p><p><strong>Current examples<\/strong><\/p>\n<p>Perseus has also noticed an increase in cyberattacks on mobile devices. In recent weeks, the Perseus team has sent a number of hazard warnings to its customers to point out current threats to mobile devices. <\/p>\n<ol>\n<li>On May 4, Apple and Android asked their users to install important security updates as various security vulnerabilities were discovered. In the case of Android, the affected element was Google&#8217;s Android operating system, an open-source platform for mobile devices. If successfully exploited, a remote, anonymous attacker could execute arbitrary program code with administrator privileges, elevate privileges, disclose information, and bypass security measures, i.e., gain almost complete control over the breached device. The vulnerabilities on Apple devices were already actively exploited when the incident was announced. The attacked vulnerabilities were located in the Webkit engine, which is used to display websites in web browsers.    <\/li>\n<li>On April 9, Perseus warned its customers about a malicious SMS campaign. Cybercriminals pretended to be parcel deliverers and sent their victims deceptively real messages with a fake link for a supposed parcel delivery. The perpetrators are apparently instrumentalizing the current Corona pandemic, in which orders are increasingly being placed online and in which many people are expecting packages. The aim was to tap personal data of consumers or install malware.   <\/li>\n<li>And just last week, Perseus reported on the malware &#8220;TeaBot&#8221;, which tries to spy on bank data on Android devices. Read the current hazard warning &nbsp;<a href=\"http:\/\/52.57.197.213\/2021\/05\/18\/schadsoftware-teabot-versucht-bankdaten-auf-android-geraeten-auszuspionieren\/\">here<\/a>.<\/li>\n<\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d84bbc e-flex e-con-boxed e-con e-parent\" data-id=\"4d84bbc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-05a335d elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"05a335d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Image Credit: Maxim Ilyahov via Unsplash 20.05.2021 Smartphones as a smart gateway for hackers Cybersecurity | IT Protection | Attack Vectors For some time now, cybercriminals have identified and exploited mobile devices as supposedly easy entry points for their planned attacks. Recently, Perseus has also had to increasingly warn its customers about such attacks. An [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":27318,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[60],"tags":[],"class_list":["post-27319","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Smartphones as a smart gateway for hackers - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smartphones as a smart gateway for hackers - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Image Credit: Maxim Ilyahov via Unsplash 20.05.2021 Smartphones as a smart gateway for hackers Cybersecurity | IT Protection | Attack Vectors For some time now, cybercriminals have identified and exploited mobile devices as supposedly easy entry points for their planned attacks. Recently, Perseus has also had to increasingly warn its customers about such attacks. An [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-20T14:46:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T14:07:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"339\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Smartphones as a smart gateway for hackers\",\"datePublished\":\"2021-05-20T14:46:00+00:00\",\"dateModified\":\"2026-03-30T14:07:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/\"},\"wordCount\":806,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/\",\"name\":\"Smartphones as a smart gateway for hackers - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\",\"datePublished\":\"2021-05-20T14:46:00+00:00\",\"dateModified\":\"2026-03-30T14:07:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg\",\"width\":600,\"height\":339},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/en\\\/smartphones-as-a-smart-gateway-for-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smartphones as a smart gateway for hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/en\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smartphones as a smart gateway for hackers - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Smartphones as a smart gateway for hackers - Perseus Technologies","og_description":"Image Credit: Maxim Ilyahov via Unsplash 20.05.2021 Smartphones as a smart gateway for hackers Cybersecurity | IT Protection | Attack Vectors For some time now, cybercriminals have identified and exploited mobile devices as supposedly easy entry points for their planned attacks. Recently, Perseus has also had to increasingly warn its customers about such attacks. An [&hellip;]","og_url":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/","og_site_name":"Perseus Technologies","article_published_time":"2021-05-20T14:46:00+00:00","article_modified_time":"2026-03-30T14:07:09+00:00","og_image":[{"width":600,"height":339,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg","type":"image\/jpeg"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Xenia Silbe","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Smartphones as a smart gateway for hackers","datePublished":"2021-05-20T14:46:00+00:00","dateModified":"2026-03-30T14:07:09+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/"},"wordCount":806,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/","url":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/","name":"Smartphones as a smart gateway for hackers - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg","datePublished":"2021-05-20T14:46:00+00:00","dateModified":"2026-03-30T14:07:09+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2021\/05\/csm_Mobile_Usage_via_Unsplash_Maxim_Ilyahov_85a5ceb6d2-600x339-1.jpg","width":600,"height":339},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/en\/smartphones-as-a-smart-gateway-for-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Smartphones as a smart gateway for hackers"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/en\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/comments?post=27319"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27319\/revisions"}],"predecessor-version":[{"id":27320,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/posts\/27319\/revisions\/27320"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media\/27318"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/media?parent=27319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/categories?post=27319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/en\/wp-json\/wp\/v2\/tags?post=27319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}