
 

{"id":851,"date":"2022-11-26T04:12:38","date_gmt":"2022-11-26T04:12:38","guid":{"rendered":"https:\/\/pinetech.in\/blog\/?p=851"},"modified":"2022-11-26T06:28:32","modified_gmt":"2022-11-26T06:28:32","slug":"mobile-app-security-learn-effective-ways-to-secure-your-app","status":"publish","type":"post","link":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/","title":{"rendered":"Mobile App Security: Learn Effective Ways to Secure Your App"},"content":{"rendered":"<div class=\"webtraffic-intro\">Today, mobile devices have transformed nearly everything online and can be used from anywhere, at any time. Our banking, tracking our fitness, controlling Internet of Things devices in our homes, shop, working remotely everything has been easy since then. These mobile productivity are steered by a multitude of mobile apps\u2014software that connect to APIs and servers around the world to deliver data, services, and, ultimately, value and convenience to users.<br \/>\nThis surely has to happen under a well-engineered security or companies might risk their apps, their own system, their customers\u2019 information, and their reputations. Because hackers aren\u2019t far behind.<br \/>\nMobile devices and apps are big targets for malicious activity. Security has always been an important matter for businesses. And this matter is even greater when it comes to mobile apps.\n<\/div>\n<h5 style=\"text-align:left;\">What is Mobile app security?<\/h5>\n<p>Mobile app security is the method to find and test the mobile apps and make sure it is protected from many attacks. It is the process to secure mobile applications from external threats preventing the ability of hackers to get highly sensitive user data. Businesses must ensure that they are not an easy target to the hackers and providently work following the mobile app security standards.<\/p>\n<h5 style=\"text-align:left\">What do Hackers Do?<\/h5>\n<p>They may do many unauthorized things like, interfere with the application code, develop a hoax app containing malware, doing identity theft with the user data, grabbing passcodes, storing keystrokes, stealing intellectual properties, stealing business assets, accessing your IP and launching harmful attacks. While architecting secure mobile apps, they should inject and meet the security standards to beat the malicious intention of the hackers.<\/p>\n<h5 style=\"text-align:left; margin:30px 0;\">Tips for better mobile application security<\/h5>\n<div class=\"web-busi-points\">\n<h6>Encrypt Mobile Communications<\/h6>\n<p>With risks like snooping and man-in-the-middle attacks over cellular networks and WiFi, it should ensure that all communications between mobile apps and app servers are encrypted.<\/p>\n<p>Powerful encryption that leverages 4096-bit SSL keys and session-based key exchanges can stop even the most wishful hackers from decrypting communications.<\/p>\n<p>Other than encrypting traffic, it should confirm that data at rest\u2014the sensitive data stored on users&#8217; phones\u2014is also encrypted. For ultra-sensitive data, it might want to stop data from ever being downloaded to the end user device at all.<\/p>\n<hr>\n<\/div>\n<div class=\"web-busi-points\">\n<h6>Protect from Device Theft<\/h6>\n<p>Millions of mobile devices are lost or stolen every year. To make sure sensitive data does not end up in the wrong hands, it must provide a way to remotely wipe sensitive data or ensure data is never stored on mobile devices in the first place.<\/p>\n<p>It should lock or wipe corporate information while leaving personal apps and files intact for employee-owned devices. While the device is found or replaced, it must be able to quickly restore users\u2019 apps and data.<\/p>\n<hr>\n<\/div>\n<div class=\"web-busi-points\">\n<h6>Not Saving Passwords<\/h6>\n<p>A lot of apps request users to save passwords as to avoid them from continuously entering the login credentials. While taking the case of mobile theft, these passwords can be harvested to attain access to personal information. Likewise, if the password is saved in an unencrypted format, the probablity of them being harvested are more. To avoid this from happening, developers should refrain from saving passwords on mobile devices. Other than that, they should be saved on the app server, so that the affected users can change them by logging on to the server even if the mobile device is missing.<\/p>\n<hr>\n<\/div>\n<div class=\"web-busi-points\">\n<h6>Minimal Application Permissions<\/h6>\n<p>Permissions give applications the power and freedom to operate more productively. But, even so, they make apps vulnerable to hackers\u2019 attacks. No application must search for permission requests beyond its functional area. Developers must stop recycling their existing libraries but develop new ones that selectively seek permission.<\/p>\n<hr>\n<\/div>\n<div class=\"web-busi-points\">\n<h6>Try Writing a Secure Code<\/h6>\n<p>Bugs and vulnerabilities in a code are the beginning where most of the attackers use to break into an application. They will attempt to reverse engineer your code and interfere with it, and all they require is a public copy of your app for it. Research depicts that malicious code is affecting over 11.6 million mobile devices at any given time.<\/p>\n<p>Maintain the security of your code in mind from the day one and harden your code, making it difficult to break through. Obfuscate and minify your code so it will not be able to reverse engineered. Test thoroughly and fix bugs as and when they are exposed. Design your code so it gets simple to update and patch. Ensure you keep your code agile so it can be updated at the user end post a breach. Utilise code hardening and code signing.<\/p>\n<hr>\n<\/div>\n<div class=\"web-busi-points\">\n<h6>Make use of the Best Cryptography Tools and Techniques<\/h6>\n<p>Key management is very important if your encryption efforts have to pay off. Try to Never hard code your keys as that makes it smooth for the attackers to steal them. Keep keys in secure containers and never ever store them locally on the device. Some widely recognized cryptographic protocols like MD5 and SHA1 have confirmed insufficient by modern security standards. Look forward to the latest, most trusted APIs, like 256-bit AES encryption with SHA-256 for hashing.<\/p>\n<hr>\n<\/div>\n<div class=\"web-busi-points\">\n<h6>Repeatedly Test<\/h6>\n<p>Securing your app is a never ending process. More and more threats emerge and new solutions are required for these threats. To continuously test your apps for vulnerabilities invest in penetration testing, threat modeling, and emulators. Fix them with every update and issue patches when needed.<\/p>\n<p>The future ahead will see everyone from organizations to consumers taking security more seriously than ever. Security will become a bigger differentiator in the success of apps than usability and aesthetic appeal.<\/p>\n<p><P>This article will help you keep your app security tight and keep your clients and users happy.<\/p>\n<hr>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Today, mobile devices have transformed nearly everything online and can be used from anywhere, at any time. Our banking, tracking our fitness, controlling Internet of Things devices in our homes, shop, working remotely everything has been easy since then. These mobile productivity are steered by a multitude of mobile apps\u2014software that connect to APIs and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":867,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,18],"tags":[],"class_list":["post-851","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-app","category-mobile-app-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile App Security: Learn Effective Ways to Secure Your App - Pinetech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile App Security: Learn Effective Ways to Secure Your App - Pinetech\" \/>\n<meta property=\"og:description\" content=\"Today, mobile devices have transformed nearly everything online and can be used from anywhere, at any time. Our banking, tracking our fitness, controlling Internet of Things devices in our homes, shop, working remotely everything has been easy since then. These mobile productivity are steered by a multitude of mobile apps\u2014software that connect to APIs and [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/\" \/>\n<meta property=\"og:site_name\" content=\"Pinetech\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-26T04:12:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-26T06:28:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/11\/mobileapp_security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1369\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"pinetech\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"pinetech\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/\"},\"author\":{\"name\":\"pinetech\",\"@id\":\"https:\/\/pinetech.in\/blog\/#\/schema\/person\/4fa443202c22d5bbd9c9dda3b3da93fc\"},\"headline\":\"Mobile App Security: Learn Effective Ways to Secure Your App\",\"datePublished\":\"2022-11-26T04:12:38+00:00\",\"dateModified\":\"2022-11-26T06:28:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/\"},\"wordCount\":946,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/pinetech.in\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/11\/mobileapp_security.jpg\",\"articleSection\":[\"Mobile App\",\"Mobile App development\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/\",\"url\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/\",\"name\":\"Mobile App Security: Learn Effective Ways to Secure Your App - Pinetech\",\"isPartOf\":{\"@id\":\"https:\/\/pinetech.in\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/11\/mobileapp_security.jpg\",\"datePublished\":\"2022-11-26T04:12:38+00:00\",\"dateModified\":\"2022-11-26T06:28:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#primaryimage\",\"url\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/11\/mobileapp_security.jpg\",\"contentUrl\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/11\/mobileapp_security.jpg\",\"width\":1369,\"height\":500},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/pinetech.in\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile App Security: Learn Effective Ways to Secure Your App\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/pinetech.in\/blog\/#website\",\"url\":\"https:\/\/pinetech.in\/blog\/\",\"name\":\"Pinetech\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/pinetech.in\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/pinetech.in\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/pinetech.in\/blog\/#organization\",\"name\":\"Pinetech\",\"url\":\"https:\/\/pinetech.in\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pinetech.in\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/logo-2.png\",\"contentUrl\":\"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/logo-2.png\",\"width\":180,\"height\":44,\"caption\":\"Pinetech\"},\"image\":{\"@id\":\"https:\/\/pinetech.in\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/pinetech.in\/blog\/#\/schema\/person\/4fa443202c22d5bbd9c9dda3b3da93fc\",\"name\":\"pinetech\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/pinetech.in\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/63d19600b04f7e0dc7da36999b7eb7c9fe45932662dcd1e94e422c9550e038bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/63d19600b04f7e0dc7da36999b7eb7c9fe45932662dcd1e94e422c9550e038bc?s=96&d=mm&r=g\",\"caption\":\"pinetech\"},\"url\":\"https:\/\/pinetech.in\/blog\/author\/pinetech\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile App Security: Learn Effective Ways to Secure Your App - Pinetech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/","og_locale":"en_US","og_type":"article","og_title":"Mobile App Security: Learn Effective Ways to Secure Your App - Pinetech","og_description":"Today, mobile devices have transformed nearly everything online and can be used from anywhere, at any time. Our banking, tracking our fitness, controlling Internet of Things devices in our homes, shop, working remotely everything has been easy since then. These mobile productivity are steered by a multitude of mobile apps\u2014software that connect to APIs and [&hellip;]","og_url":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/","og_site_name":"Pinetech","article_published_time":"2022-11-26T04:12:38+00:00","article_modified_time":"2022-11-26T06:28:32+00:00","og_image":[{"width":1369,"height":500,"url":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/11\/mobileapp_security.jpg","type":"image\/jpeg"}],"author":"pinetech","twitter_card":"summary_large_image","twitter_misc":{"Written by":"pinetech","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#article","isPartOf":{"@id":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/"},"author":{"name":"pinetech","@id":"https:\/\/pinetech.in\/blog\/#\/schema\/person\/4fa443202c22d5bbd9c9dda3b3da93fc"},"headline":"Mobile App Security: Learn Effective Ways to Secure Your App","datePublished":"2022-11-26T04:12:38+00:00","dateModified":"2022-11-26T06:28:32+00:00","mainEntityOfPage":{"@id":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/"},"wordCount":946,"commentCount":0,"publisher":{"@id":"https:\/\/pinetech.in\/blog\/#organization"},"image":{"@id":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#primaryimage"},"thumbnailUrl":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/11\/mobileapp_security.jpg","articleSection":["Mobile App","Mobile App development"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/","url":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/","name":"Mobile App Security: Learn Effective Ways to Secure Your App - Pinetech","isPartOf":{"@id":"https:\/\/pinetech.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#primaryimage"},"image":{"@id":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#primaryimage"},"thumbnailUrl":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/11\/mobileapp_security.jpg","datePublished":"2022-11-26T04:12:38+00:00","dateModified":"2022-11-26T06:28:32+00:00","breadcrumb":{"@id":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#primaryimage","url":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/11\/mobileapp_security.jpg","contentUrl":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/11\/mobileapp_security.jpg","width":1369,"height":500},{"@type":"BreadcrumbList","@id":"https:\/\/pinetech.in\/blog\/mobile-app-security-learn-effective-ways-to-secure-your-app\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/pinetech.in\/blog\/"},{"@type":"ListItem","position":2,"name":"Mobile App Security: Learn Effective Ways to Secure Your App"}]},{"@type":"WebSite","@id":"https:\/\/pinetech.in\/blog\/#website","url":"https:\/\/pinetech.in\/blog\/","name":"Pinetech","description":"","publisher":{"@id":"https:\/\/pinetech.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/pinetech.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/pinetech.in\/blog\/#organization","name":"Pinetech","url":"https:\/\/pinetech.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pinetech.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/logo-2.png","contentUrl":"https:\/\/pinetech.in\/blog\/wp-content\/uploads\/2022\/06\/logo-2.png","width":180,"height":44,"caption":"Pinetech"},"image":{"@id":"https:\/\/pinetech.in\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/pinetech.in\/blog\/#\/schema\/person\/4fa443202c22d5bbd9c9dda3b3da93fc","name":"pinetech","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/pinetech.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/63d19600b04f7e0dc7da36999b7eb7c9fe45932662dcd1e94e422c9550e038bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/63d19600b04f7e0dc7da36999b7eb7c9fe45932662dcd1e94e422c9550e038bc?s=96&d=mm&r=g","caption":"pinetech"},"url":"https:\/\/pinetech.in\/blog\/author\/pinetech\/"}]}},"_links":{"self":[{"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/posts\/851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/comments?post=851"}],"version-history":[{"count":9,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/posts\/851\/revisions"}],"predecessor-version":[{"id":860,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/posts\/851\/revisions\/860"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/media\/867"}],"wp:attachment":[{"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/media?parent=851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/categories?post=851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/pinetech.in\/blog\/wp-json\/wp\/v2\/tags?post=851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}