{"id":15287,"date":"2021-10-28T10:30:40","date_gmt":"2021-10-28T08:30:40","guid":{"rendered":"https:\/\/www.m-q.ch\/?p=15287"},"modified":"2021-11-11T15:34:47","modified_gmt":"2021-11-11T14:34:47","slug":"smartphone-six-clues-reveal-a-hacker-attack","status":"publish","type":"post","link":"https:\/\/www.m-q.ch\/en\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/","title":{"rendered":"Smartphone: Six clues reveal a hacker attack"},"content":{"rendered":"<figure id=\"attachment_15288\" aria-describedby=\"caption-attachment-15288\" style=\"width: 400px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-15288 size-full\" src=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\" alt=\"NordVPN\" width=\"400\" height=\"267\" srcset=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg 400w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN-16x12.jpg 16w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN-262x175.jpg 262w, https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN-300x200.jpg 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><figcaption id=\"caption-attachment-15288\" class=\"wp-caption-text\">When hackers tamper with your smartphone, often nothing works. \u00a9 Polina Zimmermann \/ pexels.com<\/figcaption><\/figure>\n<p>The increased number of attacks on smartphones comes as no surprise. After all, sensitive data is stored on mobile phones these days, and hackers can do a lot of damage with it. But how do I find out if my smartphone is affected? The following six signs of a hacked smartphone identified by NordVPN should prompt a thorough security check.<\/p>\n<ol>\n<li>\n<h2><strong> Severe loss of performance<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>The latest smartphones are true high-performance machines. If the performance drops for no reason, there is usually something wrong: apps that start very slowly or run sluggishly, and a battery that quickly drops to its knees can be indications of a hack: malware and surveillance software often work invisibly in the background and consume resources.<\/p>\n<ol start=\"2\">\n<li>\n<h2><strong> Unknown apps<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Regularly downloaded apps, even if they come from trusted sources, can be a gateway for malware. Many free apps make their living by playing out advertisements from external providers. However, through appropriate docking stations that developers implement in the app's code, hackers may also be able to gain access to the phone. If other unknown applications appear after the installation of an app, there could be a security vulnerability. In this case, smartphone owners should check which applications they have downloaded themselves have permission to install further apps. Keeping an eye on your own app catalog is also part of security 101.<\/p>\n<ol start=\"3\">\n<li>\n<h2><strong> Faulty apps<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Not only unknown or invisible apps can make a foreign access to the smartphone obvious. A hacker attack could also be the reason if everything seems normal at first, but then otherwise perfectly functioning apps no longer start or close during use for no apparent reason. Mysterious in-app purchases and messages in messenger programs that do not originate from the user are also possible signs that a vulnerability is being exploited. Security gaps in the system or careless user behavior, such as the careless opening of email attachments, are the usual gateways for cybercriminals.<\/p>\n<ol start=\"4\">\n<li>\n<h2><strong> Increasing data consumption<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Another point that can indicate malware is a larger consumption of data volume. If extremely high numbers of used data transfer cannot be explained, monitoring software could be working in the background. In order to avoid escalating costs in case of doubt, smartphone users should cut the Internet connection until the security vulnerability has been cleaned up.<\/p>\n<ol start=\"5\">\n<li>\n<h2><strong> Inexplicable advertising<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Everyone who is on the Internet knows them: pop-up ads. Unfortunately, this type of advertising is not unknown on smartphones either. Nevertheless, it is rather unusual when a large number of pop-up windows suddenly appear on the screen, even though no browser app is running. Spyware or malware could then be the cause.<\/p>\n<ol start=\"6\">\n<li>\n<h2><strong> Eerie camera phenomena<\/strong><\/h2>\n<\/li>\n<\/ol>\n<p>Probably the most atypical, but at the same time scariest case of hacking activity is directly related to the smartphone camera. Hacked phones sometimes turn up pictures and videos in the local file folders that were demonstrably not shot or filmed by the user. Similarly creepy, and another sign of third-party access, is when the flash constantly turns on and off by itself. Camera software and related hardware in particular consume large amounts of resources. Therefore, it usually comes to inexplicably large heat development of the device.<\/p>\n<p>\"If there is a suspicion of a hacker attack, the most important thing is not to panic,\" emphasizes Joanna Rusin-Rohrig, Country Manager DACH at NordVPN. \"The first step back to security is to change your passwords. After that, it's a good idea to install anti-virus software and run a virus scan. In parallel, mobile phone owners can of course also look out for suspicious and unknown apps on their own and uninstall them. If these measures don't help or don't help enough, the last option is to reset the smartphone to factory settings.\"<\/p>\n<p><em>Source: <a href=\"https:\/\/nordvpn.com\/de\/\">NordVPN<\/a><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Die vermehrten Angriffe auf Smartphones \u00fcberraschen nicht, schliesslich liegen heutzutage besonders auf Handys sensible Daten, mit denen Hacker ziemlichen Schaden anrichten k\u00f6nnen. Doch wie finde ich heraus, ob mein Smartphone betroffen ist? Die folgenden sechs von NordVPN ermittelten Anzeichen f\u00fcr ein gehacktes Smartphone sollten einen gr\u00fcndlichen Sicherheitscheck nach sich ziehen. Starke Leistungseinbussen Gerade neueste Smartphones [&hellip;]<\/p>\n","protected":false},"author":35,"featured_media":15288,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[4],"tags":[5157],"class_list":["post-15287","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-risikomanagement","tag-hackerangriff"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Smartphone: Sechs Hinweise verraten einen Hackerangriff - MQ Management und Qualit\u00e4t<\/title>\n<meta name=\"description\" content=\"NordVPN hat sechs Auff\u00e4lligkeiten ermittelt, die auf einen Hackerangriff aufs Smartphone hinweisen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m-q.ch\/en\/smartphone-six-clues-reveal-a-hacker-attack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Smartphone: Sechs Hinweise verraten einen Hackerangriff - MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"og:description\" content=\"NordVPN hat sechs Auff\u00e4lligkeiten ermittelt, die auf einen Hackerangriff aufs Smartphone hinweisen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m-q.ch\/en\/smartphone-six-clues-reveal-a-hacker-attack\/\" \/>\n<meta property=\"og:site_name\" content=\"MQ Management und Qualit\u00e4t\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ManagementUndQualitaet\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-28T08:30:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-11T14:34:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"267\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Roger Str\u00e4ssle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Str\u00e4ssle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/\"},\"author\":{\"name\":\"Roger Str\u00e4ssle\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\"},\"headline\":\"Smartphone: Sechs Hinweise verraten einen Hackerangriff\",\"datePublished\":\"2021-10-28T08:30:40+00:00\",\"dateModified\":\"2021-11-11T14:34:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/\"},\"wordCount\":633,\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\",\"keywords\":[\"Hackerangriff\"],\"articleSection\":[\"Risikomanagement\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/\",\"url\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/\",\"name\":\"Smartphone: Sechs Hinweise verraten einen Hackerangriff - MQ Management und Qualit\u00e4t\",\"isPartOf\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\",\"datePublished\":\"2021-10-28T08:30:40+00:00\",\"dateModified\":\"2021-11-11T14:34:47+00:00\",\"description\":\"NordVPN hat sechs Auff\u00e4lligkeiten ermittelt, die auf einen Hackerangriff aufs Smartphone hinweisen.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg\",\"width\":400,\"height\":267,\"caption\":\"Wenn Hacker sich am Smartphone zu schaffen machen, geht oft gar nichts mehr. \u00a9 Polina Zimmermann \/ pexels.com\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Risikomanagement\",\"item\":\"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Smartphone: Sechs Hinweise verraten einen Hackerangriff\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#website\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"name\":\"MQ Management und Qualit\u00e4t\",\"description\":\"Plattform f\u00fcr integrierte Managementsysteme.\",\"publisher\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#organization\",\"name\":\"Galledia Fachmedien AG\",\"url\":\"https:\/\/www.m-q.ch\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"contentUrl\":\"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png\",\"width\":512,\"height\":512,\"caption\":\"Galledia Fachmedien AG\"},\"image\":{\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ManagementUndQualitaet\",\"https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7\",\"name\":\"Roger Str\u00e4ssle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g\",\"caption\":\"Roger Str\u00e4ssle\"},\"url\":\"https:\/\/www.m-q.ch\/en\/author\/roger-straessle\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Smartphone: Six clues reveal a hacker attack - MQ Management and Quality","description":"NordVPN has identified six anomalies that indicate a smartphone hacking attack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m-q.ch\/en\/smartphone-six-clues-reveal-a-hacker-attack\/","og_locale":"en_US","og_type":"article","og_title":"Smartphone: Sechs Hinweise verraten einen Hackerangriff - MQ Management und Qualit\u00e4t","og_description":"NordVPN hat sechs Auff\u00e4lligkeiten ermittelt, die auf einen Hackerangriff aufs Smartphone hinweisen.","og_url":"https:\/\/www.m-q.ch\/en\/smartphone-six-clues-reveal-a-hacker-attack\/","og_site_name":"MQ Management und Qualit\u00e4t","article_publisher":"https:\/\/www.facebook.com\/ManagementUndQualitaet","article_published_time":"2021-10-28T08:30:40+00:00","article_modified_time":"2021-11-11T14:34:47+00:00","og_image":[{"width":400,"height":267,"url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg","type":"image\/jpeg"}],"author":"Roger Str\u00e4ssle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Roger Str\u00e4ssle","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#article","isPartOf":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/"},"author":{"name":"Roger Str\u00e4ssle","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7"},"headline":"Smartphone: Sechs Hinweise verraten einen Hackerangriff","datePublished":"2021-10-28T08:30:40+00:00","dateModified":"2021-11-11T14:34:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/"},"wordCount":633,"publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"image":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg","keywords":["Hackerangriff"],"articleSection":["Risikomanagement"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/","url":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/","name":"Smartphone: Six clues reveal a hacker attack - MQ Management and Quality","isPartOf":{"@id":"https:\/\/www.m-q.ch\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage"},"image":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage"},"thumbnailUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg","datePublished":"2021-10-28T08:30:40+00:00","dateModified":"2021-11-11T14:34:47+00:00","description":"NordVPN has identified six anomalies that indicate a smartphone hacking attack.","breadcrumb":{"@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#primaryimage","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2021\/10\/NordVPN.jpg","width":400,"height":267,"caption":"Wenn Hacker sich am Smartphone zu schaffen machen, geht oft gar nichts mehr. \u00a9 Polina Zimmermann \/ pexels.com"},{"@type":"BreadcrumbList","@id":"https:\/\/www.m-q.ch\/smartphone-sechs-hinweise-verraten-einen-hackerangriff\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Risikomanagement","item":"https:\/\/www.m-q.ch\/kategorie\/risikomanagement\/"},{"@type":"ListItem","position":2,"name":"Smartphone: Sechs Hinweise verraten einen Hackerangriff"}]},{"@type":"WebSite","@id":"https:\/\/www.m-q.ch\/fr\/#website","url":"https:\/\/www.m-q.ch\/fr\/","name":"MQ Management and Quality","description":"Platform for integrated management systems.","publisher":{"@id":"https:\/\/www.m-q.ch\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m-q.ch\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m-q.ch\/fr\/#organization","name":"Galledia Trade Media AG","url":"https:\/\/www.m-q.ch\/fr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","contentUrl":"https:\/\/www.m-q.ch\/wp-content\/uploads\/2020\/12\/cropped-logo_small.png","width":512,"height":512,"caption":"Galledia Fachmedien AG"},"image":{"@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ManagementUndQualitaet","https:\/\/www.linkedin.com\/showcase\/17982321\/admin\/"]},{"@type":"Person","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/47d540e081acd98ccbeb69b55df653d7","name":"Roger Str\u00e4ssle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m-q.ch\/fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4dde3046d8a184d2e2d27651a418883?s=96&d=mm&r=g","caption":"Roger Str\u00e4ssle"},"url":"https:\/\/www.m-q.ch\/en\/author\/roger-straessle\/"}]}},"_links":{"self":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/15287","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/users\/35"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/comments?post=15287"}],"version-history":[{"count":1,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/15287\/revisions"}],"predecessor-version":[{"id":15290,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/posts\/15287\/revisions\/15290"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media\/15288"}],"wp:attachment":[{"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/media?parent=15287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/categories?post=15287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m-q.ch\/en\/wp-json\/wp\/v2\/tags?post=15287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}