{"id":19513,"date":"2011-01-04T09:00:37","date_gmt":"2011-01-04T14:00:37","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=19513"},"modified":"2011-01-04T09:00:37","modified_gmt":"2011-01-04T14:00:37","slug":"pickpocket-biggest-cyber-threat-for-2011","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/","title":{"rendered":"PickPocket Biggest Cyber Threat for 2011"},"content":{"rendered":"<p><a href=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/20110104Stock-Photograph-pickpocketing.jpg\"><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/20110104Stock-Photograph-pickpocketing-150x150.jpg\" alt=\"\" title=\"Stock Photograph - pickpocketing\" width=\"150\" height=\"150\" class=\"alignleft size-thumbnail wp-image-19573\" \/><\/a><\/p>\n<p>STOP!  THIEF!   Grab him,  he&#8217;s got his hand in your pocket right now.<\/p>\n<p>A staggering 140 million smart phones were sold last year and you can bet the bad guys are taking advantage of it.  For most people, smartphones are always on and always providing access to valuable data.<\/p>\n<p> Smartphones are being used for email, texting, billpaying and banking. All the threats that have ravaged your home computers are now coming to you pocket.  Be very aware of what you click and the  text you open<\/p>\n<p> The attack on smart phones started with the use of texting.  Unsuspecting users would open their phone bill and find charges totaling $100s more than they were expecting.  In many cases even your carrier is picking your pocket by charging you for texting update information.   You couldn&#8217;t refuse and you must pay for it.  Want it or not, like it or not, if you receive text messages you are being charged.<\/p>\n<p><p>Take a look at your most recent cell bill.  Unless you have  specifically unsubscribed, you will  find a charge for Premium Text Messaging.  Now check your previous phone bills and I bet you  find you have been charged for quite a while.  Simply telling your provider to stop will not stop the charges. If you have unknowingly given permission to these scammers, your cell company cannot stop the charges.<\/p>\n<div \nstyle=\"background-color:#dddddd;*margin:5px*\"> <\/p>\n<p><strong><\/p>\n<ul>What To Do.<\/ul>\n<p><\/strong><\/p>\n<p><strong>1.<\/strong>  You first need to ask your provider to put a block  on future Premium Text Messaging. This will protect you from accidentally subscribing to new scams.  In the future be very careful about who you give your phone number to.  I never provide my phone number at the checkout counter when asked.<\/p>\n<p>  Never respond to text messages from MySpace, Facebook, or gimmicks that suddenly appear on your phone. I take the attitude that if someone wants to be my friend that much,  they need to swing by the house so I can get to know them.<\/p>\n<p><strong>2.<\/strong>   Now you need to stop the pick pockets that are already stealing from you.  There will be a 5 digit number on your bill used to identify the Premium Text Message Service.  Take that code and text the word &#8220;Stop&#8221; or &#8220;Unsubscribe&#8221; to the slick scammers who are picking your pocket.<\/p>\n<p>Your provider should now send you the confirmation message that you have successfully unsubscribed.<\/p>\n<p><strong>3. <\/strong>Don&#8217;t forget your teens.  Teenagers do more texting that any other group. Different surveys give different figures but you can count on your teen for between 50 to 300 texts a day.   Be sure to block Premium Text Messaging for their phones and check that there are no existing scammers already billing. <\/p>\n<\/div>\n<p>Trojan attacks will continue to grow and  the once <em>unknown<\/em> Malware-as-a Service is  already the subject of many articles addressing rising security issues.   We can expect that all current threats will be coming soon to our smart phones.   Infact you better check and button up.<\/p>\n<div \nstyle=\"background-color:#dddddd;*margin:5px*\"> <\/p>\n<p><strong>What Next<\/strong><\/p>\n<p> Will your phone need an antivirus just like your home computer?  Will there be as many maintenance applications for you phone as for your laptop?  Let me know what you think.  Give your thoughts below.<\/p>\n<\/div>\n<p><strong>__________________<\/strong><\/p>\n<p><a href=\"https:\/\/www.mylookout.com\/\"target=\"blank\">Lookout Mobile Security<\/a><\/p>\n<p><a href=\"http:\/\/articles.cnn.com\/2009-10-25\/tech\/smartphone.security_1_smartphones-security-analysts-internet-security-experts?_s=PM:TECH\"target=\"_blank\">CNN<\/a><\/p>\n<p><a href=\"http:\/\/www.securityweek.com\/mobile-threats-top-concern-2011\"target=\"_blank\">Security Week<\/a><\/p>\n<p><a href=\"http:\/\/www.smartplanet.com\/business\/blog\/business-brains\/rutgers-researchers-warn-of-potential-smartphone-security-threats\/5264\/\"target=\"_blank\">SmartPlanet<\/a><\/p>\n<p><a href=\"http:\/\/www.consumeraffairs.com\/news04\/2006\/07\/cell_phone_charges.html\"target=\"_blank\">Texting Charges<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><a href=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/20110104Stock-Photograph-pickpocketing.jpg\"><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/20110104Stock-Photograph-pickpocketing-150x150.jpg\" alt=\"\" title=\"Stock Photograph - pickpocketing\" width=\"150\" height=\"150\" class=\"alignleft size-thumbnail wp-image-19573\" \/><\/a><\/p>\n<p>STOP!  THIEF!   Grab him,  he&#8217;s got his hand in your pocket right now.<\/p>\n<p>The convenience of banking from your pocket is hard to beat,  but be aware of new thieves and new methods.<\/p>\n","protected":false},"author":7,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[12],"tags":[21,22,23,24,25,26,27,28,29,30],"class_list":["post-19513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-pit-blog","tag-checkout-counter","tag-cyber-threat","tag-home","tag-messaging","tag-phone","tag-pick-pockets","tag-service","tag-stop-thief","tag-text","tag-unsuspecting-users"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PickPocket Biggest Cyber Threat for 2011<\/title>\n<meta name=\"description\" content=\"STOP! THIEF!  Grab him, he&#039;s got his hand in your pocket right now.The convenience of banking from your pocket is hard to beat, but be aware of new thieves and new methods.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PickPocket Biggest Cyber Threat for 2011\" \/>\n<meta property=\"og:description\" content=\"STOP! THIEF!  Grab him, he&#039;s got his hand in your pocket right now.The convenience of banking from your pocket is hard to beat, but be aware of new thieves and new methods.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2011-01-04T14:00:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"S.Hogan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"S.Hogan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/\"},\"author\":{\"name\":\"S.Hogan\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/c77560e23beee1fc0225a031e4995d4c\"},\"headline\":\"PickPocket Biggest Cyber Threat for 2011\",\"datePublished\":\"2011-01-04T14:00:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/\"},\"wordCount\":537,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"checkout counter\",\"cyber threat\",\"Home\",\"messaging\",\"phone\",\"pick pockets\",\"Service\",\"stop thief\",\"text\",\"unsuspecting users\"],\"articleSection\":[\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/\",\"name\":\"PickPocket Biggest Cyber Threat for 2011\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2011-01-04T14:00:37+00:00\",\"description\":\"STOP! THIEF! Grab him, he's got his hand in your pocket right now.The convenience of banking from your pocket is hard to beat, but be aware of new thieves and new methods.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pickpocket-biggest-cyber-threat-for-2011\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PickPocket Biggest Cyber Threat for 2011\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/c77560e23beee1fc0225a031e4995d4c\",\"name\":\"S.Hogan\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/shogan\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PickPocket Biggest Cyber Threat for 2011","description":"STOP! THIEF!  Grab him, he's got his hand in your pocket right now.The convenience of banking from your pocket is hard to beat, but be aware of new thieves and new methods.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/","og_locale":"en_US","og_type":"article","og_title":"PickPocket Biggest Cyber Threat for 2011","og_description":"STOP! THIEF!  Grab him, he's got his hand in your pocket right now.The convenience of banking from your pocket is hard to beat, but be aware of new thieves and new methods.","og_url":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2011-01-04T14:00:37+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"S.Hogan","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"S.Hogan","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/"},"author":{"name":"S.Hogan","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/c77560e23beee1fc0225a031e4995d4c"},"headline":"PickPocket Biggest Cyber Threat for 2011","datePublished":"2011-01-04T14:00:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/"},"wordCount":537,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["checkout counter","cyber threat","Home","messaging","phone","pick pockets","Service","stop thief","text","unsuspecting users"],"articleSection":["The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/","url":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/","name":"PickPocket Biggest Cyber Threat for 2011","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2011-01-04T14:00:37+00:00","description":"STOP! THIEF! Grab him, he's got his hand in your pocket right now.The convenience of banking from your pocket is hard to beat, but be aware of new thieves and new methods.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/pickpocket-biggest-cyber-threat-for-2011\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"PickPocket Biggest Cyber Threat for 2011"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/c77560e23beee1fc0225a031e4995d4c","name":"S.Hogan","url":"https:\/\/www.pcmatic.com\/blog\/author\/shogan\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/19513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=19513"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/19513\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=19513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=19513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=19513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}