{"id":45483,"date":"2024-07-05T17:32:18","date_gmt":"2024-07-05T15:32:18","guid":{"rendered":"https:\/\/www.apfelpatient.de\/?p=45483"},"modified":"2024-07-05T17:36:22","modified_gmt":"2024-07-05T15:36:22","slug":"authy-hacked-millions-of-phone-numbers-affected","status":"publish","type":"post","link":"https:\/\/www.apfelpatient.de\/en\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen","title":{"rendered":"Authy hacked: millions of phone numbers affected"},"content":{"rendered":"<p class=\"has-drop-cap\"><strong>The security of multi-factor authentication apps is of utmost importance to many users. One of the best known of these apps is Authy, developed by the US company Twilio. But now it has been revealed that millions of phone numbers have been intercepted, which is causing concern among many users. Below you will find out what happened, what measures have been taken and how you can protect yourself.<\/strong><\/p>\n\n\n\n<p>Using multi-factor authentication (MFA) is a proven way to better secure your online accounts. Apps like Authy generate time-based one-time passwords (TOTP) that are required in addition to your password to log in. Authy is particularly popular because it is easy to use and increases security with additional safeguards, such as a master password. But no system is completely secure, as the recent incident shows.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-authy-gehackt-was-ist-passiert\">Authy hacked: What happened?<\/h3>\n\n\n\n<p>Twilio, the company behind Authy, has <a href=\"https:\/\/www.twilio.com\/en-us\/changelog\/Security_Alert_Authy_App_Android_iOS\" target=\"_blank\" rel=\"noreferrer noopener\">reported<\/a>that attackers gained access to Authy account data via an unsecured API endpoint. This resulted in the phone numbers of over 33 million users being compromised. Fortunately, there is no indication that other data such as passwords or TOTP codes were compromised. The user accounts themselves do not appear to be directly affected, but the data released includes account IDs, phone numbers, and information on the status of the accounts and the number of registered devices.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-wer-steckt-dahinter\">Who is behind it?<\/h4>\n\n\n\n<p>The group ShinyHunters appears to be behind the attack and has published a CSV file with the stolen data. This group is known for its cyberattacks and data leaks, which it often sells or publishes online. Twilio immediately took action after the incident became known to close the unsecured API endpoint and block unauthenticated requests.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-vorsichtsmassnahmen-und-empfehlungen\">Precautions and Recommendations<\/h4>\n\n\n\n<p>Twilio advises all users to update the Authy app to the latest version. Users should also be particularly vigilant against phishing attempts. Phishing is a method in which attackers try to obtain personal information through fake emails or messages. At the end of 2022, Twilio was already the target of a successful phishing attack in which criminals gained access to internal systems and stole customer data.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\" id=\"h-schutz-vor-zukunftigen-angriffen\">protection against future attacks<\/h4>\n\n\n\n<p>To better protect yourself, you should follow these steps:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>App updates: Make sure your Authy app is always up to date. Updates often contain security-related patches.<\/li>\n\n\n\n<li>Beware of phishing: Be suspicious of emails or messages that ask you to disclose personal information or click on links. Always check the sender&#039;s address and the content of the message.<\/li>\n\n\n\n<li>Additional security measures: If possible, use additional protection measures such as a master password or authentication via another device.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-aktualisierungen-und-vorsicht-dein-schutzschild-online\">Updates and caution: Your protective shield online<\/h3>\n\n\n\n<p>The Authy incident shows once again that even the best security measures are not infallible. It is important that you as a user always remain vigilant and take proactive measures to protect your data. Always keep your apps up to date and be cautious of suspicious messages. This way you can minimize the risk of becoming a victim of a cyber attack. Stay safe and regularly inform yourself about current security risks and measures. This way you are always on the safe side and can protect your digital accounts as best as possible. (Photo by jhphotos \/ Bigstockphoto)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.apfelpatient.de\/en\/tips-tricks\/protect-yourself-from-phishing-attacks-everything-you-need-to-know\">Protect yourself from phishing attacks: everything you need to know<\/a><\/li>\n<\/ul>\n\n\n\n<h6 class=\"wp-block-heading translation-block\" id=\"h-kennt-ihr-schon-unsere-amazon-storefront-dort-findet-ihr-eine-handverlesene-auswahl-von-diversen-produkten-f-r-euer-iphone-und-co-viel-spa-beim-st-bern\"><em>Have you already visited our Amazon Storefront? There you&#039;ll find a hand-picked selection of various products for your iPhone and other devices \u2013 <span class=\"has-inline-color has-vivid-red-color\"><a href=\"https:\/\/www.amazon.de\/shop\/apfelpatientofficial\" class=\"ek-link\" data-wpel-link=\"exclude\" rel=\"follow noopener\" target=\"_self\"><span style=\"text-decoration: underline\" class=\"ek-underline\">enjoy browsing<\/span><\/a> !<\/span><\/em><\/h6>\n\n\n\n<h6 class=\"wp-block-heading translation-block\" id=\"h-der-beitrag-enthalt-partnerlinks\">This post contains <a data-type=\"URL\" data-id=\"https:\/\/www.apfelpatient.de\/partnerprogramm\" href=\"https:\/\/www.apfelpatient.de\/en\/partner-program\" data-wpel-link=\"internal\" target=\"_self\">affiliate links<\/a>.<\/h6>","protected":false},"excerpt":{"rendered":"<p>Authy hacked: Millions of phone numbers stolen. Find out how you can protect yourself and what measures Twilio has taken.<\/p>","protected":false},"author":2,"featured_media":45484,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jnews-multi-image_gallery":[],"jnews_single_post":{"subtitle":"","format":"standard","video":"","gallery":"","source_name":"","source_url":"","via_name":"","via_url":"","override_template":"0","override":[{"template":"4","single_blog_custom":"","parallax":"1","fullscreen":"1","layout":"right-sidebar","sidebar":"default-sidebar","second_sidebar":"default-sidebar","sticky_sidebar":"1","share_position":"top","share_float_style":"share-monocrhome","show_share_counter":"0","show_view_counter":"0","show_featured":"1","show_post_meta":"1","show_post_author":"1","show_post_author_image":"1","show_post_date":"1","post_date_format":"default","post_date_format_custom":"Y\/m\/d","show_post_category":"1","show_post_reading_time":"0","post_reading_time_wpm":"300","post_calculate_word_method":"str_word_count","show_zoom_button":"0","zoom_button_out_step":"2","zoom_button_in_step":"3","show_post_tag":"1","show_prev_next_post":"1","show_popup_post":"1","number_popup_post":"1","show_author_box":"0","show_post_related":"0","show_inline_post_related":"0"}],"override_image_size":"0","image_override":[{"single_post_thumbnail_size":"crop-500","single_post_gallery_size":"crop-500"}],"trending_post":"0","trending_post_position":"meta","trending_post_label":"Trending","sponsored_post":"0","sponsored_post_label":"Sponsored by","sponsored_post_name":"","sponsored_post_url":"","sponsored_post_logo_enable":"0","sponsored_post_logo":"","sponsored_post_desc":"","disable_ad":"0"},"jnews_primary_category":{"id":"9","hide":""},"footnotes":""},"categories":[9],"tags":[13],"class_list":["post-45483","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news","tag-techpatient"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Authy gehackt: Millionen von Telefonnummern betroffen Apfelpatient<\/title>\n<meta name=\"description\" content=\"Authy gehackt: Millionen Telefonnummern abgegriffen. Erfahre, wie du dich sch\u00fctzen kannst und welche Ma\u00dfnahmen Twilio ergriffen hat.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apfelpatient.de\/en\/news\/authy-hacked-millions-of-phone-numbers-affected\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authy gehackt: Millionen von Telefonnummern betroffen\" \/>\n<meta property=\"og:description\" content=\"Authy gehackt: Millionen Telefonnummern abgegriffen. Erfahre, wie du dich sch\u00fctzen kannst und welche Ma\u00dfnahmen Twilio ergriffen hat.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apfelpatient.de\/en\/news\/authy-hacked-millions-of-phone-numbers-affected\" \/>\n<meta property=\"og:site_name\" content=\"Apfelpatient\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apfelpatientOfficial\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/apfelpatientOfficial\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-05T15:32:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-05T15:36:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2024\/07\/bigstock-Hand-on-a-keyboard-6109985.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Milan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:description\" content=\"Authy gehackt: Millionen Telefonnummern abgegriffen. Erfahre, wie du dich sch\u00fctzen kannst und welche Ma\u00dfnahmen Twilio ergriffen hat.\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Milan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen\"},\"author\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"headline\":\"Authy gehackt: Millionen von Telefonnummern betroffen\",\"datePublished\":\"2024-07-05T15:32:18+00:00\",\"dateModified\":\"2024-07-05T15:36:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen\"},\"wordCount\":555,\"publisher\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/bigstock-Hand-on-a-keyboard-6109985.jpg\",\"keywords\":[\"TechPatient\"],\"articleSection\":\"News\",\"inLanguage\":\"en-US\",\"copyrightYear\":\"2024\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen\",\"name\":\"Authy gehackt: Millionen von Telefonnummern betroffen Apfelpatient\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/bigstock-Hand-on-a-keyboard-6109985.jpg\",\"datePublished\":\"2024-07-05T15:32:18+00:00\",\"dateModified\":\"2024-07-05T15:36:22+00:00\",\"description\":\"Authy gehackt: Millionen Telefonnummern abgegriffen. Erfahre, wie du dich sch\u00fctzen kannst und welche Ma\u00dfnahmen Twilio ergriffen hat.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen#primaryimage\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/bigstock-Hand-on-a-keyboard-6109985.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apfelpatient.de\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/bigstock-Hand-on-a-keyboard-6109985.jpg\",\"width\":1600,\"height\":1067,\"caption\":\"Hand on a keyboard with red lighting signifying danger, adult or off limits online use, e.g. hacking, fraud, online scams or hacker activity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/news\\\/authy-gehackt-millionen-von-telefonnummern-betroffen#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.apfelpatient.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authy gehackt: Millionen von Telefonnummern betroffen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#website\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/\",\"name\":\"Apfelpatient\",\"description\":\"Alles rund um Apple!\",\"publisher\":{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/#organization\",\"name\":\"Apfelpatient\",\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/\"},\"alternateName\":\"Apfelpatient\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apfelpatient.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#\\\/schema\\\/person\\\/7dc56ad6c8e9824b76d2c08d4c140e13\",\"name\":\"Milan\",\"logo\":{\"@id\":\"https:\\\/\\\/www.apfelpatient.de\\\/#\\\/schema\\\/person\\\/image\\\/\"},\"description\":\"Hallo und herzlich willkommen auf meinem Technik-Blog! Als gro\u00dfer Apple-Fan berichte ich hier \u00fcber alles, was mit Apple zu tun hat: von den neuesten News und spannenden Ger\u00fcchten \u00fcber hilfreiche Tipps und Tricks bis hin zu ausf\u00fchrlichen Produkttests. Wenn du genauso technikbegeistert bist wie ich, bist du hier genau richtig!\",\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apfelpatientOfficial\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/milan-jovicic-42aa0231b\"],\"url\":\"https:\\\/\\\/www.apfelpatient.de\\\/en\\\/author\\\/apfeladmin\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Authy hacked: millions of phone numbers affected Apfelpatient","description":"Authy hacked: Millions of phone numbers stolen. Find out how you can protect yourself and what measures Twilio has taken.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apfelpatient.de\/en\/news\/authy-hacked-millions-of-phone-numbers-affected","og_locale":"en_US","og_type":"article","og_title":"Authy gehackt: Millionen von Telefonnummern betroffen","og_description":"Authy gehackt: Millionen Telefonnummern abgegriffen. Erfahre, wie du dich sch\u00fctzen kannst und welche Ma\u00dfnahmen Twilio ergriffen hat.","og_url":"https:\/\/www.apfelpatient.de\/en\/news\/authy-hacked-millions-of-phone-numbers-affected","og_site_name":"Apfelpatient","article_publisher":"https:\/\/www.facebook.com\/apfelpatientOfficial","article_author":"https:\/\/www.facebook.com\/apfelpatientOfficial","article_published_time":"2024-07-05T15:32:18+00:00","article_modified_time":"2024-07-05T15:36:22+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2024\/07\/bigstock-Hand-on-a-keyboard-6109985.jpg","type":"image\/jpeg"}],"author":"Milan","twitter_card":"summary_large_image","twitter_description":"Authy gehackt: Millionen Telefonnummern abgegriffen. Erfahre, wie du dich sch\u00fctzen kannst und welche Ma\u00dfnahmen Twilio ergriffen hat.","twitter_misc":{"Written by":"Milan","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen#article","isPartOf":{"@id":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen"},"author":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"headline":"Authy gehackt: Millionen von Telefonnummern betroffen","datePublished":"2024-07-05T15:32:18+00:00","dateModified":"2024-07-05T15:36:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen"},"wordCount":555,"publisher":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"image":{"@id":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen#primaryimage"},"thumbnailUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2024\/07\/bigstock-Hand-on-a-keyboard-6109985.jpg","keywords":["TechPatient"],"articleSection":"News","inLanguage":"en-US","copyrightYear":"2024","copyrightHolder":{"@id":"https:\/\/www.apfelpatient.de\/en\/#organization"}},{"@type":"WebPage","@id":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen","url":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen","name":"Authy hacked: millions of phone numbers affected Apfelpatient","isPartOf":{"@id":"https:\/\/www.apfelpatient.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen#primaryimage"},"image":{"@id":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen#primaryimage"},"thumbnailUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2024\/07\/bigstock-Hand-on-a-keyboard-6109985.jpg","datePublished":"2024-07-05T15:32:18+00:00","dateModified":"2024-07-05T15:36:22+00:00","description":"Authy hacked: Millions of phone numbers stolen. Find out how you can protect yourself and what measures Twilio has taken.","breadcrumb":{"@id":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen#primaryimage","url":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2024\/07\/bigstock-Hand-on-a-keyboard-6109985.jpg","contentUrl":"https:\/\/www.apfelpatient.de\/wp-content\/uploads\/2024\/07\/bigstock-Hand-on-a-keyboard-6109985.jpg","width":1600,"height":1067,"caption":"Hand on a keyboard with red lighting signifying danger, adult or off limits online use, e.g. hacking, fraud, online scams or hacker activity"},{"@type":"BreadcrumbList","@id":"https:\/\/www.apfelpatient.de\/news\/authy-gehackt-millionen-von-telefonnummern-betroffen#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.apfelpatient.de\/"},{"@type":"ListItem","position":2,"name":"Authy gehackt: Millionen von Telefonnummern betroffen"}]},{"@type":"WebSite","@id":"https:\/\/www.apfelpatient.de\/#website","url":"https:\/\/www.apfelpatient.de\/","name":"apple patient","description":"Everything about Apple!","publisher":{"@type":"Organization","@id":"https:\/\/www.apfelpatient.de\/en\/#organization","name":"Apfelpatient","url":"https:\/\/www.apfelpatient.de\/en\/"},"alternateName":"Apfelpatient","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apfelpatient.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.apfelpatient.de\/#\/schema\/person\/7dc56ad6c8e9824b76d2c08d4c140e13","name":"Milan","logo":{"@id":"https:\/\/www.apfelpatient.de\/#\/schema\/person\/image\/"},"description":"Hello and welcome to my technology blog! As a big Apple fan, I report on everything to do with Apple: from the latest news and exciting rumors to helpful tips and tricks and detailed product tests. If you are as enthusiastic about technology as I am, you have come to the right place!","sameAs":["https:\/\/www.facebook.com\/apfelpatientOfficial","https:\/\/www.linkedin.com\/in\/milan-jovicic-42aa0231b"],"url":"https:\/\/www.apfelpatient.de\/en\/author\/apfeladmin"}]}},"_links":{"self":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/45483","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/comments?post=45483"}],"version-history":[{"count":0,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/posts\/45483\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/media\/45484"}],"wp:attachment":[{"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/media?parent=45483"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/categories?post=45483"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apfelpatient.de\/en\/wp-json\/wp\/v2\/tags?post=45483"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}