{"version":"1.0","provider_name":"Computer Repair Blog","provider_url":"https:\/\/www.karlstechnology.com\/blog","author_name":"Kristin Willis","author_url":"https:\/\/www.karlstechnology.com\/blog\/author\/kristin\/","title":"Can Your Smartphone Get Hacked? - Computer Repair Blog","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"8K8RKplNCn\"><a href=\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/\">Can Your Smartphone Get Hacked?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.karlstechnology.com\/blog\/can-your-smartphone-get-hacked\/embed\/#?secret=8K8RKplNCn\" width=\"600\" height=\"338\" title=\"&#8220;Can Your Smartphone Get Hacked?&#8221; &#8212; Computer Repair Blog\" data-secret=\"8K8RKplNCn\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.karlstechnology.com\/blog\/wp-content\/uploads\/2019\/05\/My-Post-16.png","thumbnail_width":1200,"thumbnail_height":629,"description":"In short, yes. Many people assume it\u2019s only your computer. However, through fraudulent messaging clients, hackers can access data, location, photos and more from your personal or business mobile phones, invading your privacy. And there are a handful of ways they can get sneaky. According to EFF.org, \u201cThe trojanized apps, including Signal and WhatsApp, function [&hellip;]"}