{"id":78030,"date":"2024-05-03T16:16:52","date_gmt":"2024-05-03T08:16:52","guid":{"rendered":"https:\/\/version-2.com\/?p=78030"},"modified":"2024-04-26T16:19:39","modified_gmt":"2024-04-26T08:19:39","slug":"imagine-vacationing-without-a-smartphone-cybercriminals-cant","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2024\/05\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/","title":{"rendered":"Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"78030\" class=\"elementor elementor-78030\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-71ae5294 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"71ae5294\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4a899f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e9119cd\" data-id=\"1e9119cd\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4f04f8cb elementor-widget elementor-widget-text-editor\" data-id=\"4f04f8cb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div id=\"content-c10526797\" class=\"frame frame-default frame-type-text frame-layout-0\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/vacation-smartphone-cblog-250x250.png\" alt=\"\" width=\"250\" height=\"250\" \/><\/div><div><div id=\"content-c10551006\" class=\"frame frame-default frame-type-text frame-layout-0\"><p><em>With all of the fake websites and apps out there, critical cybersecurity for travelers begins at home before the trip even starts.<\/em><\/p><p>In the past, when travelers prepared for a long trip, they worried about getting lost, so they packed, among other things, a map, a compass, a radio, a dictionary, and a flashlight. Now it\u00b4s all more compact \u2014 all integrated into a smartphone. Thus, it is no surprise that many of us can\u2019t imagine a trip without this little assistant.<\/p><p>But, just as travelers in history needed to be wary of pirates and highwaymen, so modern tourists preparing for the upcoming summer must also protect themselves from criminals operating in cyberspace.<\/p><\/div><div id=\"content-c10551007\" class=\"frame frame-default frame-type-html frame-layout-0\"><span style=\"background-color: #ffff00;\"><a class=\"btn\" style=\"background-color: #ffff00;\" href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.eset.ems2.gp&amp;referrer=utm_source%3Dchristmas%2520blog%26utm_medium%3Darticle\" target=\"_blank\" rel=\"noopener\"> Try ESET Mobile Security at 50% off until May 2, 2024 <\/a><\/span><\/div><div id=\"content-c10551076\" class=\"frame frame-default frame-type-text frame-layout-0\"><p>The stakes can be quite high. Threat actors can not only abuse smartphones to steal identities or money from their owners but also make an <a href=\"https:\/\/insights.samsung.com\/2023\/05\/31\/mobile-devices-and-your-employees-to-byod-or-not-to-byod\/\" target=\"_blank\" rel=\"noopener\">entrance into their employers\u2019 business systems<\/a>. Let\u2019s be honest: how many of us use personal smartphones for work or vice versa? They say don\u2019t mix business with pleasure, but nowadays it is hard to avoid.<\/p><\/div><div id=\"content-c10551077\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Cybersecurity begins at home<\/h3><\/header><p>As of April 2024, AV-TEST, the Independent IT-Security Institute, has shown that smartphones have faced <a href=\"https:\/\/portal.av-atlas.org\/malware\/statistics\" target=\"_blank\" rel=\"noopener\">nearly 35 million<\/a> instances of Android malware. The increasing greed shown by cybercriminals is also displayed in the latest ESET H2 2023 Threat Report noticing a rise of <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/eset-threat-report-h2-2023\/\" target=\"_blank\" rel=\"noopener\">Android threats by 22%<\/a>.<\/p><p>As cybercriminals become more creative, mobile device safety needs to be far more sophisticated than just keeping the device close and not accessing free Wi-Fi at coffee shops.<\/p><p>As <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/evasive-panda-leverages-monlam-festival-target-tibetans\/\" target=\"_blank\" rel=\"noopener\">this ESET research blog<\/a> shows, the dangers begin as soon as an eager traveler begins checking visitor\/tourist recommendations about a destination.<\/p><p>Threat actors <a href=\"https:\/\/www.welivesecurity.com\/en\/eset-research\/evasive-panda-leverages-monlam-festival-target-tibetans\/\" target=\"_blank\" rel=\"noopener\">can abuse legitimate festival<\/a>, traveling, or accommodation websites to steal victims\u2019 personal data, and money, and deliver malware or create impersonation websites to do the same. Another threat can come from abused apps such as <a href=\"https:\/\/www.welivesecurity.com\/2022\/10\/20\/domestic-kitten-campaign-spying-iranian-citizens-furball-malware\/\" target=\"_blank\" rel=\"noopener\">fake translation apps <\/a>or <a href=\"https:\/\/www.welivesecurity.com\/2023\/03\/16\/not-so-private-messaging-trojanized-whatsapp-telegram-cryptocurrency-wallets\/\" target=\"_blank\" rel=\"noopener\">trojanized legitimate chat apps<\/a>.<\/p><p>Moreover, some of those attacks do not truly take aim at smartphone users, but rather seek to abuse compromised mobile devices to <a href=\"https:\/\/insights.samsung.com\/2023\/05\/31\/mobile-devices-and-your-employees-to-byod-or-not-to-byod\/\" target=\"_blank\" rel=\"noopener\">access employers\u2019 internal systems <\/a>via hijacked corporate accounts, for example.<\/p><\/div><div id=\"content-c10551078\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Staying safe<\/h3><\/header><p>If you want to learn more about travel scams, <a href=\"https:\/\/www.welivesecurity.com\/2023\/06\/21\/vacation-stay-step-ahead-travel-scammers\/\" target=\"_blank\" rel=\"noopener\">check out this blog<\/a>. Here are a few tips on how to protect yourself:<\/p><ul><li>If possible, do not take corporate devices on vacation, and do not use your personal devices for work.<\/li><li>Update your software and back up your device data regularly.<\/li><li>Set up anti-theft tools to help you find a lost or stolen device.<\/li><li>Stop auto-connecting and think twice before connecting to any public wireless hotspot.<\/li><li>If forced to connect to a public wireless hotspot, use a VPN. Think twice before conducting sensitive operations such as online banking or online shopping.<\/li><li>Be cautious when downloading apps, especially from websites and third-party app stores.<\/li><li>Always check a developer\u2019s background and app reviews before downloading a new app.<\/li><li>If the new app starts to behave strangely, delete it immediately.<\/li><li>Only buy tickets from an event organizer or an official and trusted third-party vendor.<\/li><\/ul><\/div><div id=\"content-c10551079\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Reliable cybersecurity<\/h3><\/header><p>The last but arguably most important tip is to download reputable mobile security software emphasizing prevention. Without us going into much technical detail, be aware that there are sophisticated cybercampaigns that cannot be spotted by the human eye or caught by basic antivirus software.<\/p><p>This means that mobile users should have a reliable cybersecurity solution installed to protect them from these advanced threats, ideally before they execute.\u00a0<\/p><p><a href=\"https:\/\/www.eset.com\/int\/home\/mobile-security-android\/\" target=\"_blank\" rel=\"noopener\">ESET Mobile Security<\/a> takes a proactive approach and can detect and block threats during the download process, even before installation occurs. This means that the threat never reaches the user. EMS scans all files in download folders and can also be used to scan already existing apps to double-check that you haven\u2019t let in the devil in disguise.<\/p><p>ESET Mobile Security Premium also comes with handy tools such as <a href=\"https:\/\/help.eset.com\/ems\/9\/en-US\/antitheft.html?antiphishing.html\" target=\"_blank\" rel=\"noopener\">Anti-Phishing<\/a>, <a href=\"https:\/\/help.eset.com\/ems\/9\/en-US\/antitheft.html?antitheft.html\" target=\"_blank\" rel=\"noopener\">Anti-Theft<\/a>, <a href=\"https:\/\/help.eset.com\/ems\/9\/en-US\/antitheft.html?payment_protection.html\" target=\"_blank\" rel=\"noopener\">Payment Protection<\/a>, and <a href=\"https:\/\/help.eset.com\/ems\/9\/en-US\/antitheft.html?app_lock.html\" target=\"_blank\" rel=\"noopener\">App Lock<\/a>. These protect travelers\u2019 data in case they mistakenly visit a known phishing website, their mobile devices are stolen, or when someone wants to intercept their communications with a bank or an online shop.\u00a0\u00a0\u00a0<\/p><\/div><div id=\"content-c10551080\" class=\"frame frame-default frame-type-text frame-layout-0\"><header><h3 class=\"bold\">Enjoy your trip without looking over your shoulder<\/h3><\/header><p>None of this should discourage you from enjoying your trip. Quite the opposite, having a vacation should be a relaxing experience!<\/p><p>With the right cybersecurity solution (and a bit of awareness), you can have a great time without constantly looking over your shoulder in cyberspace knowing that your device is safe and your digital progress is protected. Have a great summer!<\/p><\/div><\/div><div class=\"csc-default\"><p>\u00a0<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1a1b0f4 elementor-widget elementor-widget-shortcode\" data-id=\"1a1b0f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18159\" class=\"elementor elementor-18159\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73b4cd0 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"73b4cd0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8d19c1e\" data-id=\"8d19c1e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8865cce elementor-widget elementor-widget-text-editor\" data-id=\"8865cce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About ESET<\/strong><br \/>For 30 years, ESET\u00ae has been developing industry-leading IT security software and services for businesses and consumers worldwide. With solutions ranging from endpoint security to encryption and two-factor authentication, ESET\u2019s high-performing, easy-to-use products give individuals and businesses the peace of mind to enjoy the full potential of their technology. ESET unobtrusively protects and monitors 24\/7, updating defenses in real time to keep users safe and businesses running without interruption. Evolving threats require an evolving IT security company. Backed by R&amp;D facilities worldwide, ESET became the first IT security company to earn 100 Virus Bulletin VB100 awards, identifying every single \u201cin-the-wild\u201d malware without interruption since 2003.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>With all of the fake websites and apps out there, criti [&hellip;]<\/p>","protected":false},"author":149011790,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1273,40,61],"tags":[41,1272],"class_list":["post-78030","post","type-post","status-publish","format-standard","hentry","category-1273","category-eset","category-press-release","tag-eset","tag-1272"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t - Version 2\" \/>\n<meta property=\"og:description\" content=\"With all of the fake websites and apps out there, criti [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-03T08:16:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/vacation-smartphone-cblog-250x250.png\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t\",\"datePublished\":\"2024-05-03T08:16:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/\"},\"wordCount\":773,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/vacation-smartphone-cblog-250x250.png\",\"keywords\":[\"ESET\",\"2024\"],\"articleSection\":[\"2024\",\"ESET\",\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/05\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/\",\"url\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/\",\"name\":\"Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/vacation-smartphone-cblog-250x250.png\",\"datePublished\":\"2024-05-03T08:16:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/vacation-smartphone-cblog-250x250.png\",\"contentUrl\":\"https:\\\/\\\/www.eset.com\\\/fileadmin\\\/ESET\\\/BLOG\\\/vacation-smartphone-cblog-250x250.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.eset.com\\\/blog\\\/consumer\\\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/","og_locale":"en_US","og_type":"article","og_title":"Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t - Version 2","og_description":"With all of the fake websites and apps out there, criti [&hellip;]","og_url":"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/","og_site_name":"Version 2","article_published_time":"2024-05-03T08:16:52+00:00","og_image":[{"url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/vacation-smartphone-cblog-250x250.png","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"Written by":"tracylamv2","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/05\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t","datePublished":"2024-05-03T08:16:52+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/05\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/"},"wordCount":773,"commentCount":0,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/vacation-smartphone-cblog-250x250.png","keywords":["ESET","2024"],"articleSection":["2024","ESET","Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/05\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/","url":"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/","name":"Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/#primaryimage"},"image":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/vacation-smartphone-cblog-250x250.png","datePublished":"2024-05-03T08:16:52+00:00","breadcrumb":{"@id":"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/#primaryimage","url":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/vacation-smartphone-cblog-250x250.png","contentUrl":"https:\/\/www.eset.com\/fileadmin\/ESET\/BLOG\/vacation-smartphone-cblog-250x250.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.eset.com\/blog\/consumer\/imagine-vacationing-without-a-smartphone-cybercriminals-cant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Imagine vacationing without a smartphone \u2014 cybercriminals can\u2019t"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/en\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kiy","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=78030"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78030\/revisions"}],"predecessor-version":[{"id":78034,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/78030\/revisions\/78034"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=78030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=78030"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=78030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}