{"id":3979,"date":"2020-09-14T16:58:41","date_gmt":"2020-09-14T16:58:41","guid":{"rendered":"https:\/\/www.hostnic.id\/blog\/?p=3979"},"modified":"2020-09-22T17:16:12","modified_gmt":"2020-09-22T17:16:12","slug":"mobile-malware","status":"publish","type":"post","link":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/","title":{"rendered":"Mobile Malware"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3980\" data-permalink=\"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/attachment\/skull-of-death-on-smartphone-screen\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&amp;ssl=1?v=1600794115\" data-orig-size=\"1200,799\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;14&quot;,&quot;credit&quot;:&quot;Getty Images\/iStockphoto&quot;,&quot;camera&quot;:&quot;Canon EOS 5D Mark II&quot;,&quot;caption&quot;:&quot;Skull of death symbol on the screen of smartphone on laptop computer. There is data flowing background. Selective focus on screen of the phone.&quot;,&quot;created_timestamp&quot;:&quot;1476717226&quot;,&quot;copyright&quot;:&quot;Ali Kerem Y\\u00fccel&quot;,&quot;focal_length&quot;:&quot;100&quot;,&quot;iso&quot;:&quot;200&quot;,&quot;shutter_speed&quot;:&quot;0.00625&quot;,&quot;title&quot;:&quot;skull of death on smartphone screen&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"skull of death on smartphone screen\" data-image-description=\"\" data-image-caption=\"&lt;p&gt;Skull of death symbol on the screen of smartphone on laptop computer. There is data flowing background. Selective focus on screen of the phone.&lt;\/p&gt;\n\" data-large-file=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1024%2C682&amp;ssl=1?v=1600794115\" class=\"wp-image-3980 aligncenter\" src=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?resize=368%2C245&#038;ssl=1\" alt=\"\" width=\"368\" height=\"245\" srcset=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?resize=768%2C511&amp;ssl=1 768w\" sizes=\"auto, (max-width: 368px) 100vw, 368px\" \/><\/p>\n<p>Mobile Malware atau Mobile Malicious Software merupakan perangkat lunak berbahaya yang menyerang perangkat mobile Anda seperti smartphone maupun tablet dengan tujuan untuk merusak sistem operasi atau aplikasi dan\/atau mencuri data pribadi maupun data perbankan anda.<br \/>\nDemi keamanan transaksi perbankan dengan perangkat mobile Anda, pastikan :<\/p>\n<p>Melakukan instalasi anti-virus\/anti-malware yang handal pada perangkat anda (jika perangkat anda belum dilengkapi anti-virus\/anti-malware) dan mengkinikan secara reguler antivirus\/antimalware maupun perangkat lunak mobile endpoint protection lainnya;<br \/>\nHanya melakukan instalasi perangkat lunak mobile dari apps store resmi;<br \/>\nTidak melakukan instalasi perangkat lunak yang mencurigakan dan meminta izin akses yang berlebihan;<br \/>\nTidak melakukan jailbreaking* atau rooting* pada perangkat mobile Anda.<br \/>\n* Jailbreaking atau Rooting adalah suatu modifikasi pada sistem operasi perangkat mobile iOS (Jailbreaking) atau Android (Rooting) yang bertujuan untuk memperoleh akses penuh terhadap sistem operasi, dimana hal ini dapat menyebabkan perangkat mobile menjadi lebih rentan dari bahaya Mobile Malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile Malware atau Mobile Malicious Software merupakan perangkat lunak berbahaya yang menyerang perangkat mobile Anda seperti smartphone maupun tablet dengan tujuan untuk merusak sistem operasi atau aplikasi dan\/atau mencuri data pribadi maupun data perbankan anda. Demi keamanan transaksi perbankan dengan perangkat mobile Anda, pastikan : Melakukan instalasi anti-virus\/anti-malware yang handal pada perangkat anda (jika perangkat [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3980,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[85,8,82],"tags":[],"class_list":["post-3979","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-berita","category-tips","category-website"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Malware - Hostnic.id<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Malware - Hostnic.id\" \/>\n<meta property=\"og:description\" content=\"Mobile Malware atau Mobile Malicious Software merupakan perangkat lunak berbahaya yang menyerang perangkat mobile Anda seperti smartphone maupun tablet dengan tujuan untuk merusak sistem operasi atau aplikasi dan\/atau mencuri data pribadi maupun data perbankan anda. Demi keamanan transaksi perbankan dengan perangkat mobile Anda, pastikan : Melakukan instalasi anti-virus\/anti-malware yang handal pada perangkat anda (jika perangkat [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Hostnic.id\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-14T16:58:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-22T17:16:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?v=1600794115\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"799\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Nanda Anubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nanda Anubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/\"},\"author\":{\"name\":\"Nanda Anubis\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"headline\":\"Mobile Malware\",\"datePublished\":\"2020-09-14T16:58:41+00:00\",\"dateModified\":\"2020-09-22T17:16:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/\"},\"wordCount\":147,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1?v=1600794115\",\"articleSection\":[\"Berita\",\"Tips\",\"Website\"],\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/\",\"name\":\"Mobile Malware - Hostnic.id\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1?v=1600794115\",\"datePublished\":\"2020-09-14T16:58:41+00:00\",\"dateModified\":\"2020-09-22T17:16:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1?v=1600794115\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1?v=1600794115\",\"width\":1200,\"height\":799,\"caption\":\"Skull of death symbol on the screen of smartphone on laptop computer. There is data flowing background. Selective focus on screen of the phone.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/berita\\\/mobile-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\",\"name\":\"hostnic.id\",\"description\":\"Info, Tips dan Tutorial Seputar Layanan Hostnic\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\",\"name\":\"Nanda Anubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"caption\":\"Nanda Anubis\"},\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/author\\\/nanda\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Malware - Hostnic.id","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/","og_locale":"id_ID","og_type":"article","og_title":"Mobile Malware - Hostnic.id","og_description":"Mobile Malware atau Mobile Malicious Software merupakan perangkat lunak berbahaya yang menyerang perangkat mobile Anda seperti smartphone maupun tablet dengan tujuan untuk merusak sistem operasi atau aplikasi dan\/atau mencuri data pribadi maupun data perbankan anda. Demi keamanan transaksi perbankan dengan perangkat mobile Anda, pastikan : Melakukan instalasi anti-virus\/anti-malware yang handal pada perangkat anda (jika perangkat [&hellip;]","og_url":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/","og_site_name":"Hostnic.id","article_published_time":"2020-09-14T16:58:41+00:00","article_modified_time":"2020-09-22T17:16:12+00:00","og_image":[{"width":1200,"height":799,"url":"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?v=1600794115","type":"image\/jpeg"}],"author":"Nanda Anubis","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"Nanda Anubis","Estimasi waktu membaca":"1 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/#article","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/"},"author":{"name":"Nanda Anubis","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"headline":"Mobile Malware","datePublished":"2020-09-14T16:58:41+00:00","dateModified":"2020-09-22T17:16:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/"},"wordCount":147,"commentCount":0,"image":{"@id":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1?v=1600794115","articleSection":["Berita","Tips","Website"],"inLanguage":"id","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/","url":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/","name":"Mobile Malware - Hostnic.id","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1?v=1600794115","datePublished":"2020-09-14T16:58:41+00:00","dateModified":"2020-09-22T17:16:12+00:00","author":{"@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"breadcrumb":{"@id":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/#primaryimage","url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1?v=1600794115","contentUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1?v=1600794115","width":1200,"height":799,"caption":"Skull of death symbol on the screen of smartphone on laptop computer. There is data flowing background. Selective focus on screen of the phone."},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostnic.id\/blog\/berita\/mobile-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostnic.id\/blog\/"},{"@type":"ListItem","position":2,"name":"Mobile Malware"}]},{"@type":"WebSite","@id":"https:\/\/www.hostnic.id\/blog\/#website","url":"https:\/\/www.hostnic.id\/blog\/","name":"hostnic.id","description":"Info, Tips dan Tutorial Seputar Layanan Hostnic","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostnic.id\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89","name":"Nanda Anubis","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","caption":"Nanda Anubis"},"url":"https:\/\/www.hostnic.id\/blog\/author\/nanda\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/v5NcezMXsm.jpg?fit=1200%2C799&ssl=1?v=1600794115","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8D2mv-12b","jetpack-related-posts":[{"id":3984,"url":"https:\/\/www.hostnic.id\/blog\/berita\/apakah-malicious-software-berbahaya\/","url_meta":{"origin":3979,"position":0},"title":"Apakah Malicious Software Berbahaya?","author":"Nanda Anubis","date":"2020-09-15","format":false,"excerpt":"Sebagian orang beranggapan bahwa anti virus, digunakan untuk memproteksi komputer dari serangan virus. Sangat benar, tapi selain virus terdapat juga hal lain (perangkat lunak) yang sama bahayanya dengan virus, bahkan lebih berbahaya dari virus. Dalam dunia keamanan komputer, virus dikategorikan sebagai malware (malicious software) yang artinya perangkat lunak yang berbahaya.\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1%3Fv%3D1600961610&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1%3Fv%3D1600961610&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/malware.png?fit=640%2C489&ssl=1%3Fv%3D1600961610&resize=525%2C300 1.5x"},"classes":[]},{"id":6725,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/penyebab-malware-mengenal-ancaman-dan-cara-mengatasinya\/","url_meta":{"origin":3979,"position":1},"title":"Penyebab Malware: Mengenal Ancaman Dan Cara Mengatasinya!","author":"Monic","date":"2023-08-29","format":false,"excerpt":"Hostnic.id -\u00a0Hello, readers! How are you? Welcome to this insightful article that aims to shed light on the causes of malware and how to effectively combat this threat. In today's interconnected world, the presence of malware poses a significant risk to individuals and organizations alike. By understanding the origins and\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"Penyebab Malware: Mengenal Ancaman Dan Cara Mengatasinya!","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/M.png?fit=586%2C291&ssl=1%3Fv%3D1693294734&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/M.png?fit=586%2C291&ssl=1%3Fv%3D1693294734&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/M.png?fit=586%2C291&ssl=1%3Fv%3D1693294734&resize=525%2C300 1.5x"},"classes":[]},{"id":6456,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/peran-penting-komputasi-mobile-dalam-era-digital\/","url_meta":{"origin":3979,"position":2},"title":"Peran Penting Komputasi Mobile Dalam Era Digital","author":"Monic","date":"2023-08-18","format":false,"excerpt":"Hostnic.id\u00a0\u2013\u00a0Halo pembaca yang terhormat, bagaimana kabar kalian? Semoga selalu sehat dan sukses dalam menjalani aktivitas sehari-hari. Pada era digital saat ini, komputasi mobile memainkan peran penting dalam memfasilitasi berbagai aktivitas kehidupan manusia. Indonesia sebagai salah satu negara dengan pertumbuhan teknologi yang pesat, semakin membutuhkan peran penting dari komputasi mobile. Dalam\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Peran Penting Komputasi Mobile Dalam Era Digital","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/MB.jpeg?fit=1194%2C625&ssl=1%3Fv%3D1692338968&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/MB.jpeg?fit=1194%2C625&ssl=1%3Fv%3D1692338968&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/MB.jpeg?fit=1194%2C625&ssl=1%3Fv%3D1692338968&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/MB.jpeg?fit=1194%2C625&ssl=1%3Fv%3D1692338968&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/08\/MB.jpeg?fit=1194%2C625&ssl=1%3Fv%3D1692338968&resize=1050%2C600 3x"},"classes":[]},{"id":8830,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/solusi-terbaik-untuk-mengoptimalkan-domain-institusi-pendidikan-anda\/","url_meta":{"origin":3979,"position":3},"title":"Solusi Terbaik untuk Mengoptimalkan Domain Institusi Pendidikan Anda","author":"Monic","date":"2023-10-26","format":false,"excerpt":"Hostnic.id -\u00a0Di era digital saat ini, institusi pendidikan di seluruh dunia semakin menyadari pentingnya kehadiran online yang kuat. Salah satu aspek penting dari kehadiran online adalah memiliki domain yang dioptimalkan dengan baik. Domain institusi pendidikan adalah alamat website yang menjadi identitas online bagi lembaga tersebut. Dalam artikel ini, kita akan\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Solusi Terbaik untuk Mengoptimalkan Domain Institusi Pendidikan Anda","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/6-3.png?fit=794%2C488&ssl=1%3Fv%3D1698305886&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/6-3.png?fit=794%2C488&ssl=1%3Fv%3D1698305886&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/6-3.png?fit=794%2C488&ssl=1%3Fv%3D1698305886&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/10\/6-3.png?fit=794%2C488&ssl=1%3Fv%3D1698305886&resize=700%2C400 2x"},"classes":[]},{"id":6102,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/ketahui-ini-alat-yang-bisa-dikatakan-sebagai-mobile-computing\/","url_meta":{"origin":3979,"position":4},"title":"Ketahui, Ini Alat Yang Bisa Dikatakan Sebagai Mobile Computing","author":"Monic","date":"2023-07-29","format":false,"excerpt":"Hostnic.id\u00a0\u2013\u00a0Alat yang dapat dikatakan sebagai mobile computing adalah perangkat elektronik yang memungkinkan pengguna untuk melakukan komputasi dan akses informasi secara mobile, yaitu ketika sedang bergerak atau tidak terikat pada satu lokasi tertentu. Beberapa contoh perangkat mobile computing yang umum digunakan adalah smartphone, tablet, laptop, dan perangkat wearable seperti smartwatch. Dengan\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Ketahui, Ini Alat Yang Bisa Dikatakan Sebagai Mobile Computing","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/MC-1.png?fit=1146%2C591&ssl=1%3Fv%3D1690642887&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/MC-1.png?fit=1146%2C591&ssl=1%3Fv%3D1690642887&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/MC-1.png?fit=1146%2C591&ssl=1%3Fv%3D1690642887&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/MC-1.png?fit=1146%2C591&ssl=1%3Fv%3D1690642887&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/MC-1.png?fit=1146%2C591&ssl=1%3Fv%3D1690642887&resize=1050%2C600 3x"},"classes":[]},{"id":3950,"url":"https:\/\/www.hostnic.id\/blog\/berita\/waspada-terhadap-malware-corona\/","url_meta":{"origin":3979,"position":5},"title":"Waspada Terhadap Malware Corona","author":"Nanda Anubis","date":"2020-09-10","format":false,"excerpt":"Para ahli telah menemukan malware yang dapat mencuri serta menghapus data dari perangkat suatu pengguna. Malware ini menerpa Master Boot Record (MBR) serta mencegah sistem untuk beroperasi secara normal. Pada tahap pertama, malware akan menampilkan jendela yang tidak dapat ditutup, dikarenakan telah menonaktifkan task manager windows milik pengguna. Sementara pengguna\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/corona.jpg?fit=750%2C500&ssl=1%3Fv%3D1599756248&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/corona.jpg?fit=750%2C500&ssl=1%3Fv%3D1599756248&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/corona.jpg?fit=750%2C500&ssl=1%3Fv%3D1599756248&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/corona.jpg?fit=750%2C500&ssl=1%3Fv%3D1599756248&resize=700%2C400 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/3979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/comments?post=3979"}],"version-history":[{"count":2,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/3979\/revisions"}],"predecessor-version":[{"id":3982,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/3979\/revisions\/3982"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media\/3980"}],"wp:attachment":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media?parent=3979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/categories?post=3979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/tags?post=3979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}