{"id":8839,"date":"2020-04-09T09:09:38","date_gmt":"2020-04-09T13:09:38","guid":{"rendered":"https:\/\/www.cscdigitalbrand.services\/blog\/?p=8839"},"modified":"2021-11-09T14:29:07","modified_gmt":"2021-11-09T19:29:07","slug":"coronavirus-online-threats-part-3","status":"publish","type":"post","link":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/","title":{"rendered":"Coronavirus Online Threats Going Viral, Part 3: Mobile Apps"},"content":{"rendered":"\n<i><br \/> By Dr. David Barnett,<br \/>subject matter expert, brand monitoring<\/i> <span style=\"padding-left:100px\">Share this post \n<a class=\"social\" id=\"linkedinShare\" href=\"https:\/\/www.linkedin.com\/sharing\/share-offsite\/?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/LinkedIn18x20.png\" style=\"padding-left:5px\"\/><\/a>\n<a class=\"social\" id=\"twitterShare\" href=\"https:\/\/twitter.com\/intent\/tweet?url=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Twitter18x20.png\"\/><\/a>\n<a class=\"social\" id=\"facebookShare\" href=\"https:\/\/www.facebook.com\/sharer\/sharer.php?u=\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2019\/06\/Facebook18x20.png\"\/><\/a>\n<\/span>\n\n\n\n<p>In part three of this series of posts\nlooking at emerging internet content relating to coronavirus, we turn our\nattention to mobile apps\u2014another digital content channel that can be used by\ncriminals to take advantage of people\u2019s fears about the health emergency for\ntheir own gain.<\/p>\n\n\n\n<p>One of the most common attack vectors we have found in our analysis is the use of apps purporting to track global progression of COVID-19, or provide other information, but which instead incorporate malicious content. In mid-March, CovidLock ransomware was reported. It was distributed through a coronavirus-specific domain name, and threatened to leak users\u2019 social-media information and delete smartphone file storage unless a Bitcoin ransom was paid<sup>[1],[2]<\/sup>. Prior to this, reports emerged of a number of online resources masquerading as legitimate coronavirus trackers, but which actually distribute malware. In one example, a website directed users to open an applet that could infect their device with AZORult, a piece of malware used to steal login credentials and banking information<sup>[3]<\/sup>. An Android app named Corona Live 1.1 also purports to be an official coronavirus tracker that incorporates information from the (legitimate) Johns Hopkins tracker, but actually features malware, allowing attackers to record the victim\u2019s location, and access photos, videos, and the camera on their device<sup>[4]<\/sup>.<\/p>\n\n\n\n<p>In general, mobile apps can be downloaded from two main sources. The first of these is the group of main app stores such as Google Play<sup>TM<\/sup>, iTunes, Amazon<sup>\u00ae<\/sup> Appstore, and Microsoft\u00ae Store, but there are also a huge number of stand-alone app download sites. These are often called APK download sites, in reference to Android package file-format used for the distribution of Android mobile apps. Content on the main app stores tends to undergo a much more rigorous verification process for quality and legitimacy, while the APK sites can be less trustworthy, and may feature app versions that are non-legitimate, associated with malicious content, or are out of date (therefore lacking the most recent security patches). This said, even the main app stores are not immune to dangerous content. It was reported that the Iranian government distributed a piece of spyware in the guise of an Android app purporting to monitor for COVID-19 symptoms; this app was initially made available on the Google Play store, before being removed due to a violation of the marketplace\u2019s terms and conditions<sup>[5],[6]<\/sup>.<\/p>\n\n\n\n<p>Currently, a relatively small number of\ncoronavirus-related apps are on offer across the main app marketplaces,\ncomprising a mixture of information apps, health checkers, and infection\ntrackers. Across the ecosystem of APK sites, however, a much larger range of\nmostly tracker apps is on offer. A simple search engine look-up for \u201ccoronavirus\u201d\nplus \u201cAPK download\u201d returns a significant number of listings. While some of the\napps thus identified may be legitimate, they raise the potential for risk, for\nany of the reasons outlined above.<\/p>\n\n\n\n<p><strong>Figure 1:<\/strong> Examples of listings for coronavirus-related mobile apps on stand-alone APK-download sites<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"243\" src=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/Figure-1-DBS-Covid.jpg\" alt=\"\" class=\"wp-image-8840\" srcset=\"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/04\/Figure-1-DBS-Covid.jpg 650w, https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2020\/04\/Figure-1-DBS-Covid-300x112.jpg 300w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n\n\n<p><strong>How can you mitigate these risks?<\/strong><\/p>\n\n\n\n<p>Mobile app monitoring across all\nmarketplaces and APK sites should form part of any comprehensive brand protection\nservice. CSC\u2019s monitoring system can search for brand terms in the name or\ndescription of mobile apps, or in the developer or seller names. Third-party\napps incorporating branded content are of concern if any of the following apply:<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>The subject matter or app content\nis non-legitimate or malicious<\/li><li>Branding is illegitimately used,\neither as a means of claiming affiliation to add credibility, or to improve the\nlook and feel of the app<\/li><li>Branding is incorporated into\ndownloadable imagery or streamed content to increase the app\u2019s appeal. <\/li><\/ol>\n\n\n\n<p>For infringing apps, it\u2019s often possible\nto take enforcement action to have the listing removed. Enforcement usually\ninvolves completing a web form or submitting an email, detailing the\ninfringement criteria the app meets. As for many areas of brand protection, the\nlikelihood of success is dependent on the level of IP protection held by the\nbrand owner, and specifically on whether trademarks are held in the appropriate\nclasses.<\/p>\n\n\n\n<p>If you\u2019d like to find out more about our\nbrand monitoring solutions\u2014including mobile app monitoring\u2014<a href=\"https:\/\/www.cscdigitalbrand.services\/en\/brand-monitoring-services\">click\nhere<\/a> or <a href=\"https:\/\/www.cscdigitalbrand.services\/en\/request-consultation\/\">fill in\nour online form<\/a> to be contacted by one of our team.<br \/><\/p>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p><a href=\"#_ftnref1\">[1]<\/a> <a href=\"https:\/\/www.businessinsider.com\/coronavirus-fake-app-ransomware-malware-bitcoin-android-demands-ransom-domaintools-2020-3\">businessinsider.com\/coronavirus-fake-app-ransomware-malware-bitcoin-android-demands-ransom-domaintools-2020-3<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref2\">[2]<\/a> <a href=\"https:\/\/www.domaintools.com\/resources\/blog\/covidlock-update-coronavirus-ransomware\">domaintools.com\/resources\/blog\/covidlock-update-coronavirus-ransomware<\/a><\/p>\n\n\n\n<p><a href=\"#_ftnref3\">[3]<\/a> <a href=\"https:\/\/www.businessinsider.com\/hackers-are-using-fake-coronavirus-maps-to-give-people-malware-2020-3\">businessinsider.com\/hackers-are-using-fake-coronavirus-maps-to-give-people-malware-2020-3<\/a>\n<\/p>\n\n\n\n<p><a href=\"#_ftnref4\">[4]<\/a> <a href=\"https:\/\/www.cnet.com\/news\/fake-coronavirus-tracking-apps-are-really-malware-that-stalks-its-users\/\">cnet.com\/news\/fake-coronavirus-tracking-apps-are-really-malware-that-stalks-its-users\/<\/a>\n<\/p>\n\n\n\n<p><a href=\"#_ftnref5\">[5]<\/a> <a href=\"https:\/\/www.recordedfuture.com\/coronavirus-panic-exploit\/\">recordedfuture.com\/coronavirus-panic-exploit\/<\/a>\n<\/p>\n\n\n\n<p><a href=\"#_ftnref6\">[6]<\/a> <a href=\"https:\/\/blog.avast.com\/iranian-coronavirus-app-collecting-sensitive-information-avast\">blog.avast.com\/iranian-coronavirus-app-collecting-sensitive-information-avast<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part three of this series of posts looking at emerging internet content relating to coronavirus, we turn our attention to mobile apps\u2014another digital content channel that can be used by criminals to take advantage of people\u2019s fears about the health emergency for their [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[9,548,521],"tags":[],"class_list":["post-8839","post","type-post","status-publish","format-standard","hentry","category-brands","category-domain-security","category-send-email"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Coronavirus Online Threats Going Viral, Part 3: Mobile Apps | CSC<\/title>\n<meta name=\"description\" content=\"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part three of this series of posts looking at emerging internet content\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Coronavirus Online Threats Going Viral, Part 3: Mobile Apps | CSC\" \/>\n<meta property=\"og:description\" content=\"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part three of this series of posts looking at emerging internet content\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Brand Services Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corporationserviceco\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-09T13:09:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-09T19:29:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/Figure-1-DBS-Covid.jpg\" \/>\n<meta name=\"author\" content=\"Digital Brand Services Marketing\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:site\" content=\"@cscdbs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digital Brand Services Marketing\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/\"},\"author\":{\"name\":\"Digital Brand Services Marketing\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\"},\"headline\":\"Coronavirus Online Threats Going Viral, Part 3: Mobile Apps\",\"datePublished\":\"2020-04-09T13:09:38+00:00\",\"dateModified\":\"2021-11-09T19:29:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/\"},\"wordCount\":743,\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Figure-1-DBS-Covid.jpg\",\"articleSection\":[\"Brand Protection\",\"Domain Security\",\"Send email\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/\",\"name\":\"Coronavirus Online Threats Going Viral, Part 3: Mobile Apps | CSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Figure-1-DBS-Covid.jpg\",\"datePublished\":\"2020-04-09T13:09:38+00:00\",\"dateModified\":\"2021-11-09T19:29:07+00:00\",\"description\":\"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part three of this series of posts looking at emerging internet content\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Figure-1-DBS-Covid.jpg\",\"contentUrl\":\"https:\\\/\\\/www.cscdigitalbrand.services\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/Figure-1-DBS-Covid.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/coronavirus-online-threats-part-3\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Coronavirus Online Threats Going Viral, Part 3: Mobile Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"name\":\"Digital Brand Services Blog\",\"description\":\"Domains, new gTLDs, brand protection, security &amp; trademark news\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#organization\",\"name\":\"CSC Digital Brand Services\",\"url\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"contentUrl\":\"https:\\\/\\\/cscwebcontentstorage.blob.core.windows.net\\\/cscmarketing-cscdbs-media\\\/uploads\\\/2018\\\/06\\\/cropped-dbs_small.gif\",\"width\":200,\"height\":200,\"caption\":\"CSC Digital Brand Services\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corporationserviceco\",\"https:\\\/\\\/x.com\\\/cscdbs\",\"https:\\\/\\\/www.linkedin.com\\\/showcase\\\/csc-digital-brand-services\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/#\\\/schema\\\/person\\\/c8385131857f2e60ca2a58d416f2404d\",\"name\":\"Digital Brand Services Marketing\",\"sameAs\":[\"https:\\\/\\\/www.cscdbs.com\\\/blog\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Coronavirus Online Threats Going Viral, Part 3: Mobile Apps | CSC","description":"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part three of this series of posts looking at emerging internet content","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/","og_locale":"en_US","og_type":"article","og_title":"Coronavirus Online Threats Going Viral, Part 3: Mobile Apps | CSC","og_description":"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part three of this series of posts looking at emerging internet content","og_url":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/","og_site_name":"Digital Brand Services Blog","article_publisher":"https:\/\/www.facebook.com\/corporationserviceco","article_published_time":"2020-04-09T13:09:38+00:00","article_modified_time":"2021-11-09T19:29:07+00:00","og_image":[{"url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/Figure-1-DBS-Covid.jpg","type":"","width":"","height":""}],"author":"Digital Brand Services Marketing","twitter_card":"summary_large_image","twitter_creator":"@cscdbs","twitter_site":"@cscdbs","twitter_misc":{"Written by":"Digital Brand Services Marketing","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/#article","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/"},"author":{"name":"Digital Brand Services Marketing","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d"},"headline":"Coronavirus Online Threats Going Viral, Part 3: Mobile Apps","datePublished":"2020-04-09T13:09:38+00:00","dateModified":"2021-11-09T19:29:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/"},"wordCount":743,"publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/Figure-1-DBS-Covid.jpg","articleSection":["Brand Protection","Domain Security","Send email"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/","url":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/","name":"Coronavirus Online Threats Going Viral, Part 3: Mobile Apps | CSC","isPartOf":{"@id":"https:\/\/www.cscdbs.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/#primaryimage"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/Figure-1-DBS-Covid.jpg","datePublished":"2020-04-09T13:09:38+00:00","dateModified":"2021-11-09T19:29:07+00:00","description":"By Dr. David Barnett,subject matter expert, brand monitoring Share this post In part three of this series of posts looking at emerging internet content","breadcrumb":{"@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/#primaryimage","url":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/Figure-1-DBS-Covid.jpg","contentUrl":"https:\/\/www.cscdigitalbrand.services\/blog\/wp-content\/uploads\/2020\/04\/Figure-1-DBS-Covid.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cscdbs.com\/blog\/coronavirus-online-threats-part-3\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cscdbs.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Coronavirus Online Threats Going Viral, Part 3: Mobile Apps"}]},{"@type":"WebSite","@id":"https:\/\/www.cscdbs.com\/blog\/#website","url":"https:\/\/www.cscdbs.com\/blog\/","name":"Digital Brand Services Blog","description":"Domains, new gTLDs, brand protection, security &amp; trademark news","publisher":{"@id":"https:\/\/www.cscdbs.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cscdbs.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.cscdbs.com\/blog\/#organization","name":"CSC Digital Brand Services","url":"https:\/\/www.cscdbs.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","contentUrl":"https:\/\/cscwebcontentstorage.blob.core.windows.net\/cscmarketing-cscdbs-media\/uploads\/2018\/06\/cropped-dbs_small.gif","width":200,"height":200,"caption":"CSC Digital Brand Services"},"image":{"@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corporationserviceco","https:\/\/x.com\/cscdbs","https:\/\/www.linkedin.com\/showcase\/csc-digital-brand-services\/"]},{"@type":"Person","@id":"https:\/\/www.cscdbs.com\/blog\/#\/schema\/person\/c8385131857f2e60ca2a58d416f2404d","name":"Digital Brand Services Marketing","sameAs":["https:\/\/www.cscdbs.com\/blog\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/comments?post=8839"}],"version-history":[{"count":1,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8839\/revisions"}],"predecessor-version":[{"id":8841,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/posts\/8839\/revisions\/8841"}],"wp:attachment":[{"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/media?parent=8839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/categories?post=8839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cscdbs.com\/blog\/wp-json\/wp\/v2\/tags?post=8839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}