{"id":7642,"date":"2019-10-12T02:12:23","date_gmt":"2019-10-12T02:12:23","guid":{"rendered":"https:\/\/pishondesigns.org\/Dbase\/?p=7642"},"modified":"2019-10-12T02:12:23","modified_gmt":"2019-10-12T02:12:23","slug":"whatsapp-hack-what-it-is-and-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/","title":{"rendered":"Whatsapp Hack &#8211; What it is and How to Protect yourself."},"content":{"rendered":"<p>Brief Information about how to protect yourself from a Whatsapp Hack.<\/p>\n<p><!--more--><\/p>\n<p>I was lolling about in my house when a message popped on on my phone from one of the few groups I belong to. Unfortunately it looked like spam. We called out the poster, only to find out she&#8217;d been hacked. How? I know that messages and calls on WhatsApp are end-to-end encrypted, which means they are practically invulnerable to being read while in transit, and the <strong>only way<\/strong> an attacker can gain access to the contents of WhatsApp messages and calls is at either end, on the sending or receiving device &#8212; so hence my brief research.<\/p>\n<h2>WhatsApp Hack? How did it start?<\/h2>\n<p>The story begins in 2018 when Oded Vanunu, head of products vulnerability research, Roman Zaikin, a security researcher and another researcher called Dikla Barda &#8211; researchers from Israeli security company Check Point &#8211; managed to reverse engineer WhatsApp web source code and successfully decrypt the WhatsApp traffic.<\/p>\n<p>This was done by exploiting social-engineering tricks to fool end-users and all giving an attacker the weapons required to intercept and manipulate WhatsApp messages.<\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-2177321403470136\" data-ad-slot=\"5058759332\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p>How?<\/p>\n<ul>\n<li>&#8212; The ability to send a private message to another group participant, disguised as a public message, resulting in the &#8220;private&#8221; response from the targeted individual being visible to everyone in the conversation.<\/li>\n<li>&#8212; The use of the &#8220;quote&#8221; function of a group conversation to change the identity of the message sender. A person who may not even be a member of the group in question.<\/li>\n<li>&#8212; A method to enable the text of someone else&#8217;s reply to be altered to say whatever the attacker wants. The ultimate modern-day example of &#8220;putting words in someone\u2019s mouth.&#8221;<\/li>\n<\/ul>\n<p>(Source: <a href=\"https:\/\/www.forbes.com\/sites\/daveywinder\/2019\/08\/07\/whatsapp-hack-attack-changes-your-messages-and-facebook-doesnt-seem-to-care\/#31ec07a72332\" target=\"_blank\" rel=\"noopener noreferrer\">Forbes<\/a> &#8211; )<\/p>\n<p><strong>Watch a demo of how a whatsapp hack is done below<\/strong><br \/>\n<iframe loading=\"lazy\" src=\"https:\/\/www.youtube-nocookie.com\/embed\/Ybr7DdXkGLo?controls=0\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>The WhatsApp news was revealed first by the Financial Times, which says the bug was used in an attempt to access content on the phone of a UK-based human rights lawyer.<\/p>\n<h2>So how do you protect yourself from a WhatsApp hack?<\/h2>\n<p>You are strongly advised to check for updates manually through the Apple App Store on an iPhone, Google Play or similar on an Android device, the Microsoft Store on Windows Phones and the Galaxy app store on Tizen devices.<\/p>\n<p>Failing that, uninstalling WhatsApp from your phone will protect you from the attack.<\/p>\n<p>Zee<\/p>\n<p><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script><br \/>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-2177321403470136\" data-ad-slot=\"5058759332\"><\/ins><br \/>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/p>\n<p><strong>Recommended Links<\/strong><\/p>\n<ul>\n<li><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/pishondesigns.org\/Dbase\/best-iphone-apps-september-2019\/\">Best iPhone Apps September 2019<\/a><\/span><\/li>\n<li><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/pishondesigns.org\/Dbase\/how-to-set-up-a-home-surveillance-system-a-detailed-guide\/\" target=\"_blank\" rel=\"noopener noreferrer\">How to set up a home surveillance system [A detailed guide]<\/a><\/span><\/li>\n<li><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/pishondesigns.org\/Dbase\/10-best-tech-gadgets-on-amazon-for-2019-youll-love-this-list\/\" target=\"_blank\" rel=\"noopener noreferrer\">10 Best Tech Gadgets on Amazon for 2019 (You\u2019ll love this list)<\/a><\/span><\/li>\n<li><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/pishondesigns.org\/Dbase\/gokada-app-the-nigerian-uber-for-motorcycles\/\" target=\"_blank\" rel=\"noopener noreferrer\">Gokada App \u2013 The Nigerian Uber for Motorcycles<\/a><\/span><\/li>\n<li><span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/pishondesigns.org\/Dbase\/9-ways-you-can-make-money-blogging-in-2019\/\" target=\"_blank\" rel=\"noopener noreferrer\">9 ways you can make money blogging in 2019<\/a><\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Brief Information about how to protect yourself from a Whatsapp Hack.<\/p>\n","protected":false},"author":1,"featured_media":7644,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[242],"tags":[852,580,868,869],"class_list":["post-7642","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-interesting-tech-news","tag-cybersecurity","tag-security","tag-whatsapp","tag-whatsapp-hack"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Whatsapp Hack - What it is and How to Protect yourself. &#8226;<\/title>\n<meta name=\"description\" content=\"Whatsapp is End-to-End Enrypted, but it&#039;s still vulnerable. Here&#039;s a brief Information about how to protect yourself from a Whatsapp Hack.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Whatsapp Hack - What it is and How to Protect yourself. &#8226;\" \/>\n<meta property=\"og:description\" content=\"Whatsapp is End-to-End Enrypted, but it&#039;s still vulnerable. Here&#039;s a brief Information about how to protect yourself from a Whatsapp Hack.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"Pishon Design Studio | More than Web Design.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/pishondesigns\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/pishondesigns\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-12T02:12:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2019\/10\/whatsapp-hackk.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"790\" \/>\n\t<meta property=\"og:image:height\" content=\"447\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pishon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/pishonde\" \/>\n<meta name=\"twitter:site\" content=\"@pishonde\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pishon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/\"},\"author\":{\"name\":\"Pishon\",\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/#\/schema\/person\/9522335eeeafcdc47a32dcc0fca0d394\"},\"headline\":\"Whatsapp Hack &#8211; What it is and How to Protect yourself.\",\"datePublished\":\"2019-10-12T02:12:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/\"},\"wordCount\":446,\"publisher\":{\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/#organization\"},\"image\":{\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2019\/10\/whatsapp-hackk.jpg\",\"keywords\":[\"cybersecurity\",\"security\",\"whatsapp\",\"whatsapp hack\"],\"articleSection\":[\"Interesting Tech\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/\",\"url\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/\",\"name\":\"Whatsapp Hack - What it is and How to Protect yourself. &#8226;\",\"isPartOf\":{\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2019\/10\/whatsapp-hackk.jpg\",\"datePublished\":\"2019-10-12T02:12:23+00:00\",\"description\":\"Whatsapp is End-to-End Enrypted, but it's still vulnerable. Here's a brief Information about how to protect yourself from a Whatsapp Hack.\",\"breadcrumb\":{\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#primaryimage\",\"url\":\"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2019\/10\/whatsapp-hackk.jpg\",\"contentUrl\":\"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2019\/10\/whatsapp-hackk.jpg\",\"width\":790,\"height\":447,\"caption\":\"whatsapp hack -\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/pishondesigns.org\/Dbase\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whatsapp Hack &#8211; What it is and How to Protect yourself.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/#website\",\"url\":\"https:\/\/pishondesigns.org\/Dbase\/\",\"name\":\"Web Designer Abuja Pishon Design Studio\",\"description\":\"Your Digital Partner.\",\"publisher\":{\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pishondesigns.org\/Dbase\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/#organization\",\"name\":\"Pishon Design Studio\",\"url\":\"https:\/\/pishondesigns.org\/Dbase\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2020\/04\/p2fav.png\",\"contentUrl\":\"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2020\/04\/p2fav.png\",\"width\":1000,\"height\":1000,\"caption\":\"Pishon Design Studio\"},\"image\":{\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/pishondesigns\",\"https:\/\/x.com\/pishonde\",\"https:\/\/instagram.com\/pishondesignstudio\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/#\/schema\/person\/9522335eeeafcdc47a32dcc0fca0d394\",\"name\":\"Pishon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pishondesigns.org\/Dbase\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/78de55fa131a344cfd6c1ac01726ef22ca20d5989eb466f9e128c60340eccd0c?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/78de55fa131a344cfd6c1ac01726ef22ca20d5989eb466f9e128c60340eccd0c?s=96&r=g\",\"caption\":\"Pishon\"},\"description\":\"Pishon Design Studio is an A-list Web Design &amp; Branding Company. This blog focuses on latest trends in technology &amp; social media. Follow on Instagram!\",\"sameAs\":[\"https:\/\/pishondesigns.org\",\"https:\/\/facebook.com\/pishondesigns\",\"https:\/\/instagram.com\/pishondesignstudio\",\"https:\/\/www.linkedin.com\/company\/35601858\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/pishonde\"],\"url\":\"https:\/\/pishondesigns.org\/Dbase\/author\/zainab\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whatsapp Hack - What it is and How to Protect yourself. &#8226;","description":"Whatsapp is End-to-End Enrypted, but it's still vulnerable. Here's a brief Information about how to protect yourself from a Whatsapp Hack.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/","og_locale":"en_US","og_type":"article","og_title":"Whatsapp Hack - What it is and How to Protect yourself. &#8226;","og_description":"Whatsapp is End-to-End Enrypted, but it's still vulnerable. Here's a brief Information about how to protect yourself from a Whatsapp Hack.","og_url":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/","og_site_name":"Pishon Design Studio | More than Web Design.","article_publisher":"https:\/\/facebook.com\/pishondesigns","article_author":"https:\/\/facebook.com\/pishondesigns","article_published_time":"2019-10-12T02:12:23+00:00","og_image":[{"width":790,"height":447,"url":"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2019\/10\/whatsapp-hackk.jpg","type":"image\/jpeg"}],"author":"Pishon","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/pishonde","twitter_site":"@pishonde","twitter_misc":{"Written by":"Pishon","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#article","isPartOf":{"@id":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/"},"author":{"name":"Pishon","@id":"https:\/\/pishondesigns.org\/Dbase\/#\/schema\/person\/9522335eeeafcdc47a32dcc0fca0d394"},"headline":"Whatsapp Hack &#8211; What it is and How to Protect yourself.","datePublished":"2019-10-12T02:12:23+00:00","mainEntityOfPage":{"@id":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/"},"wordCount":446,"publisher":{"@id":"https:\/\/pishondesigns.org\/Dbase\/#organization"},"image":{"@id":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2019\/10\/whatsapp-hackk.jpg","keywords":["cybersecurity","security","whatsapp","whatsapp hack"],"articleSection":["Interesting Tech"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/","url":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/","name":"Whatsapp Hack - What it is and How to Protect yourself. &#8226;","isPartOf":{"@id":"https:\/\/pishondesigns.org\/Dbase\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2019\/10\/whatsapp-hackk.jpg","datePublished":"2019-10-12T02:12:23+00:00","description":"Whatsapp is End-to-End Enrypted, but it's still vulnerable. Here's a brief Information about how to protect yourself from a Whatsapp Hack.","breadcrumb":{"@id":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#primaryimage","url":"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2019\/10\/whatsapp-hackk.jpg","contentUrl":"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2019\/10\/whatsapp-hackk.jpg","width":790,"height":447,"caption":"whatsapp hack -"},{"@type":"BreadcrumbList","@id":"https:\/\/pishondesigns.org\/Dbase\/whatsapp-hack-what-it-is-and-how-to-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pishondesigns.org\/Dbase\/"},{"@type":"ListItem","position":2,"name":"Whatsapp Hack &#8211; What it is and How to Protect yourself."}]},{"@type":"WebSite","@id":"https:\/\/pishondesigns.org\/Dbase\/#website","url":"https:\/\/pishondesigns.org\/Dbase\/","name":"Web Designer Abuja Pishon Design Studio","description":"Your Digital Partner.","publisher":{"@id":"https:\/\/pishondesigns.org\/Dbase\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pishondesigns.org\/Dbase\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pishondesigns.org\/Dbase\/#organization","name":"Pishon Design Studio","url":"https:\/\/pishondesigns.org\/Dbase\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pishondesigns.org\/Dbase\/#\/schema\/logo\/image\/","url":"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2020\/04\/p2fav.png","contentUrl":"https:\/\/pishondesigns.org\/Dbase\/wp-content\/uploads\/2020\/04\/p2fav.png","width":1000,"height":1000,"caption":"Pishon Design Studio"},"image":{"@id":"https:\/\/pishondesigns.org\/Dbase\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/pishondesigns","https:\/\/x.com\/pishonde","https:\/\/instagram.com\/pishondesignstudio"]},{"@type":"Person","@id":"https:\/\/pishondesigns.org\/Dbase\/#\/schema\/person\/9522335eeeafcdc47a32dcc0fca0d394","name":"Pishon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pishondesigns.org\/Dbase\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/78de55fa131a344cfd6c1ac01726ef22ca20d5989eb466f9e128c60340eccd0c?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78de55fa131a344cfd6c1ac01726ef22ca20d5989eb466f9e128c60340eccd0c?s=96&r=g","caption":"Pishon"},"description":"Pishon Design Studio is an A-list Web Design &amp; Branding Company. This blog focuses on latest trends in technology &amp; social media. Follow on Instagram!","sameAs":["https:\/\/pishondesigns.org","https:\/\/facebook.com\/pishondesigns","https:\/\/instagram.com\/pishondesignstudio","https:\/\/www.linkedin.com\/company\/35601858\/","https:\/\/x.com\/https:\/\/twitter.com\/pishonde"],"url":"https:\/\/pishondesigns.org\/Dbase\/author\/zainab\/"}]}},"_links":{"self":[{"href":"https:\/\/pishondesigns.org\/Dbase\/wp-json\/wp\/v2\/posts\/7642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pishondesigns.org\/Dbase\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pishondesigns.org\/Dbase\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pishondesigns.org\/Dbase\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pishondesigns.org\/Dbase\/wp-json\/wp\/v2\/comments?post=7642"}],"version-history":[{"count":0,"href":"https:\/\/pishondesigns.org\/Dbase\/wp-json\/wp\/v2\/posts\/7642\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pishondesigns.org\/Dbase\/wp-json\/wp\/v2\/media\/7644"}],"wp:attachment":[{"href":"https:\/\/pishondesigns.org\/Dbase\/wp-json\/wp\/v2\/media?parent=7642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pishondesigns.org\/Dbase\/wp-json\/wp\/v2\/categories?post=7642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pishondesigns.org\/Dbase\/wp-json\/wp\/v2\/tags?post=7642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}