{"id":16111,"date":"2025-05-22T07:40:46","date_gmt":"2025-05-22T07:40:46","guid":{"rendered":"https:\/\/bezpecnenanete.eset.com\/sk\/?p=16111"},"modified":"2025-05-22T07:40:46","modified_gmt":"2025-05-22T07:40:46","slug":"ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek","status":"publish","type":"post","link":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/","title":{"rendered":"Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa vzostup spolo\u010dnosti DeepSeek"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-1024x536.jpg\" alt=\"Deepseek podvody n\u00e1h\u013eadov\u00fd obr\u00e1zok ESET\" class=\"wp-image-16113\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-1024x536.jpg 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-300x157.jpg 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-768x402.jpg 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-370x194.jpg 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-760x398.jpg 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-32fe3ba34f209d78b939ba70c62a8a86\">Stalo sa u\u017e takmer kli\u0161\u00e9, \u017ee kyberzlo\u010dinci sa pozoruhodne r\u00fdchlo chytaj\u00fa najnov\u0161\u00edch trendov a\u00a0technol\u00f3gi\u00ed, ktor\u00e9 vyu\u017e\u00edvaj\u00fa na\u00a0svoje nekal\u00e9 ciele. Rozruch okolo spolo\u010dnosti DeepSeek a\u00a0jej najmodernej\u0161\u00edch modelov umelej inteligencie nie je v\u00fdnimkou. Posledn\u00e9 obdobie n\u00e1m toti\u017e v\u00fdrazne ukazuje, \u017ee hoci sa <strong>svet technol\u00f3gi\u00ed vyv\u00edja z\u00e1vratnou r\u00fdchlos\u0165ou, taktiky online podvodn\u00edkov zost\u00e1vaj\u00fa \u010dasto n\u00e1padne rovnak\u00e9<\/strong>.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-1cfda8ac6c89dc458ae05c8baaf1b796\">Bezpe\u010dnostn\u00ed v\u00fdskumn\u00edci u\u017e zaznamenali nieko\u013eko pokusov o\u00a0podvod, ktor\u00fdch cie\u013eom bolo vyu\u017ei\u0165 prudk\u00fd n\u00e1rast popularity tohto modelu. Okrem toho bola spolo\u010dnos\u0165 DeepSeek podroben\u00e1 <strong>pr\u00edsnej kontrole, pokia\u013e ide o\u00a0jej postupy v\u00a0oblasti ochrany s\u00fakromia <\/strong>a\u00a0bezpe\u010dnosti, ktor\u00e1 svetu odhalila viacer\u00e9 rizik\u00e1 spojen\u00e9 s\u00a0modelmi umelej inteligencie (nie nevyhnutne len spolo\u010dnosti DeepSeek).<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-4b460b53e7f68c2720535b07d5c837a8\">V\u00a0tomto \u010dl\u00e1nku prin\u00e1\u0161ame preh\u013ead toho, ako podvodn\u00edci vyu\u017e\u00edvaj\u00fa DeepSeek ako n\u00e1vnadu pri r\u00f4znych podvodoch a\u00a0\u0161\u00edren\u00ed malv\u00e9ru, ako aj kr\u00e1tke zhrnutie niektor\u00fdch k\u013e\u00fa\u010dov\u00fdch probl\u00e9mov t\u00fdkaj\u00facich sa ochrany s\u00fakromia a\u00a0bezpe\u010dnosti.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-ba5504b1155fceef3dde865c1050164d\">Podvody a&nbsp;malv\u00e9r<\/h2>\n\n\n\n<p>Na&nbsp;jeden z&nbsp;pr\u00edpadov upozornil pou\u017e\u00edvate\u013e na&nbsp;sieti&nbsp;X, ktor\u00fd zverejnil podrobnosti o&nbsp;webovej str\u00e1nke napodob\u0148uj\u00facej <a href=\"https:\/\/www.deepseek.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ofici\u00e1lny web<\/a> a&nbsp;vyz\u00fdvaj\u00facej n\u00e1v\u0161tevn\u00edkov, aby si stiahli model DeepSeek. Namiesto toho sa v\u0161ak po&nbsp;kliknut\u00ed na&nbsp;odkaz spust\u00ed s\u0165ahovanie \u0161kodliv\u00e9ho spustite\u013en\u00e9ho s\u00faboru, ktor\u00fd produkty ESET deteguj\u00fa ako Win32\/Packed.NSIS.A.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Fake <a href=\"https:\/\/twitter.com\/deepseek_ai?ref_src=twsrc%5Etfw\">@deepseek_ai<\/a> download page<br><br>\/deepseek-6phm9gg3zoacooy.app-tools.info<br><br>Delivering signed malware &quot;<a href=\"https:\/\/t.co\/Q9OztUG2pI\">https:\/\/t.co\/Q9OztUG2pI<\/a> TRADING TRANSPORT COMPANY LIMITED&quot; <a href=\"https:\/\/twitter.com\/SquiblydooBlog?ref_src=twsrc%5Etfw\">@SquiblydooBlog<\/a> <br><br>RUN: <a href=\"https:\/\/t.co\/Kb7EZ4YImp\">https:\/\/t.co\/Kb7EZ4YImp<\/a><br>Sample: <a href=\"https:\/\/t.co\/jKTV2HvZzV\">https:\/\/t.co\/jKTV2HvZzV<\/a><br><br>Nodejs, idk what is this but steals\ud83d\ude05 <a href=\"https:\/\/t.co\/83XHaizdDp\">pic.twitter.com\/83XHaizdDp<\/a><\/p>&mdash; Who said what? (@g0njxa) <a href=\"https:\/\/twitter.com\/g0njxa\/status\/1884368749316227321?ref_src=twsrc%5Etfw\">January 28, 2025<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>\n<\/div><\/figure>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-ac379b7b81d32aebb1e52c44c3ade36a\">Hoci webov\u00e1 str\u00e1nka do\u00a0zna\u010dnej miery vyzer\u00e1 ako prav\u00e1, pozorn\u00e9 oko si okrem samotnej URL\u00a0adresy v\u0161imne e\u0161te minim\u00e1lne jeden znak sved\u010diaci o\u00a0podvode: na\u00a0rozdiel od\u00a0tla\u010didla \u201eStart now\u201c (Spusti\u0165), ktor\u00e9 n\u00e1jdeme na\u00a0<a href=\"https:\/\/www.deepseek.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">ofici\u00e1lnej webovej str\u00e1nke<\/a>, je na\u00a0tej falo\u0161nej uveden\u00e9 \u201eDownload now\u201c (Stiahnu\u0165). (Spolo\u010dnos\u0165 DeepSeek <a href=\"https:\/\/www.cnbc.com\/2025\/01\/27\/chinas-deepseek-ai-tops-chatgpt-app-store-what-you-should-know.html\" target=\"_blank\" rel=\"noreferrer noopener\">s\u00a0ve\u013ek\u00fdm \u00faspechom<\/a> predstavila svetu mobiln\u00e9 aplik\u00e1cie pre iOS aj Android, ale jej model umelej inteligencie m\u00f4\u017eete pou\u017e\u00edva\u0165 aj priamo v\u00a0prehliada\u010di po\u010d\u00edta\u010da bez toho, aby ste si museli \u010doko\u013evek stiahnu\u0165.) \u0160ance na\u00a0\u00faspech podvodnej str\u00e1nky e\u0161te zvy\u0161uje fakt, \u017ee malv\u00e9r je digit\u00e1lne podp\u00edsan\u00fd spolo\u010dnos\u0165ou \u201eK.MY TRADING TRANSPORT COMPANY LIMITED\u201c.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-3d02bcd8de09c4b33ac309e2fd0258ea\">In\u00ed zase <a href=\"https:\/\/x.com\/AlvieriD\/status\/1883450009523282280\" target=\"_blank\" rel=\"noreferrer noopener\">objavili<\/a> mno\u017estvo novovytvoren\u00fdch <a href=\"https:\/\/www.linkedin.com\/posts\/huzeyfe_it-seems-that-threat-actorsbad-guys-are-activity-7289990824115724289-HvNj\" target=\"_blank\" rel=\"noreferrer noopener\">podobn\u00fdch dom\u00e9n<\/a>, ktor\u00fdch cie\u013eom je oklama\u0165 \u013eud\u00ed, aby si mysleli, \u017ee narazili na\u00a0ofici\u00e1lny web, ale v\u00a0skuto\u010dnosti z nich chc\u00fa vym\u00e1mi\u0165 \u00fadaje alebo \u0165a\u017eko zaroben\u00e9 peniaze, napr\u00edklad predajom (neexistuj\u00facich) <a href=\"https:\/\/cyble.com\/blog\/deepseeks-growing-influence-sparks-a-surge-in-frauds-and-phishing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">akci\u00ed spolo\u010dnosti DeepSeek v\u00a0r\u00e1mci prim\u00e1rnej ponuky akci\u00ed (IPO)<\/a>.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-4ce23fcba433ea796be3ee3ff442fbbb\">\u010eal\u0161ie riziko s\u00favis\u00ed s\u00a0falo\u0161n\u00fdmi <a href=\"https:\/\/cointelegraph.com\/news\/scam-tokens-surge-deepseek-ai-viral\" target=\"_blank\" rel=\"noreferrer noopener\">kryptomenami DeepSeek<\/a>, ktor\u00e9 sa roz\u0161\u00edrili na\u00a0viacer\u00fdch blockchainov\u00fdch sie\u0165ach, pri\u010dom niektor\u00e9 z\u00a0nich v\u00a0kr\u00e1tkom \u010dase dosiahli trhov\u00fa kapitaliz\u00e1ciu v\u00a0mili\u00f3noch dol\u00e1rov. Spolo\u010dnos\u0165 za\u010diatkom janu\u00e1ra <a href=\"https:\/\/x.com\/deepseek_ai\/status\/1877663619464478983\" target=\"_blank\" rel=\"noreferrer noopener\">na\u00a0sieti\u00a0X vyhl\u00e1sila<\/a>, \u017ee nevydala \u017eiadnu kryptomenu.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"185\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2024\/10\/image-11.png\" alt=\"\" class=\"wp-image-15141\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h3 class=\"wp-block-heading has-text-link-color has-text-color has-link-color has-medium-font-size wp-elements-61785827a68dd0762b70b460b4642ecd\">Komplexn\u00e1 ochrana v\u00e1\u0161ho digit\u00e1lneho \u017eivota<\/h3>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color has-small-font-size wp-elements-8bb3dfd2a4acde7440c20734007bce42\">Komplexn\u00e1 ochrana v\u00e1\u0161ho digit\u00e1lneho \u017eivota. Vyberte si \u00farove\u0148 pod\u013ea svojich potrieb.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fdcfc74e wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50 has-custom-font-size width-300 has-small-font-size\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.eset.com\/sk\/internetova-ochrana-domacnosti\/urovne-ochrany\/\" target=\"_blank\" rel=\"noreferrer noopener\">VYBERTE SI OCHRANU<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-31c59bc7607992623d2a3154598efb6d\">Obavy t\u00fdkaj\u00face sa ochrany s\u00fakromia a&nbsp;bezpe\u010dnosti v&nbsp;s\u00favislosti so&nbsp;slu\u017ebou DeepSeek<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-ca67a6b7d321bda481cf6a4bc0376bf0\">Hne\u010f po\u00a0svojom r\u00fdchlom vzostupe spolo\u010dnos\u0165 DeepSeek priznala, \u017ee sa sama stala ter\u010dom \u201erozsiahleho kybernetick\u00e9ho \u00fatoku\u201c, ktor\u00fd sp\u00f4sobil, \u017ee musela <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/deepseek-halts-new-signups-amid-large-scale-cyberattack\/\" target=\"_blank\" rel=\"noreferrer noopener\">pozastavi\u0165 registr\u00e1ciu nov\u00fdch pou\u017e\u00edvate\u013eov<\/a>.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-3d39d72ff076572aa9470f8e66744b03\">Spolo\u010dnos\u0165 Wiz, ktor\u00e1 sa zaober\u00e1 kybernetickou bezpe\u010dnos\u0165ou v\u00a0cloude, medzit\u00fdm <a href=\"https:\/\/www.wiz.io\/blog\/wiz-research-uncovers-exposed-deepseek-database-leak\" target=\"_blank\" rel=\"noreferrer noopener\">objavila datab\u00e1zu patriacu spolo\u010dnosti DeepSeek<\/a>, ktor\u00e1 nedopatren\u00edm vystavila k\u013e\u00fa\u010de API, syst\u00e9mov\u00e9 protokoly, v\u00fdzvy na\u00a0chatovanie pou\u017e\u00edvate\u013eov a\u00a0\u010fal\u0161ie citliv\u00e9 inform\u00e1cie na\u00a0otvorenom internete. Spolo\u010dnos\u0165 DeepSeek datab\u00e1zu n\u00e1sledne zablokovala.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-b5573376d2b3fb8708440f487a2745de\">Spolo\u010dnosti zaoberaj\u00face sa kybernetickou bezpe\u010dnos\u0165ou <a href=\"https:\/\/www.kelacyber.com\/blog\/deepseek-r1-security-flaws\/\" target=\"_blank\" rel=\"noreferrer noopener\">KELA<\/a> a\u00a0<a href=\"https:\/\/unit42.paloaltonetworks.com\/jailbreaking-deepseek-three-techniques\/\" target=\"_blank\" rel=\"noreferrer noopener\">Palo Alto Networks<\/a> zistili, \u017ee modely umelej inteligencie spolo\u010dnosti DeepSeek s\u00fa n\u00e1chyln\u00e9 na\u00a0takzvan\u00e9 jailbreakov\u00e9 \u00fatoky a\u00a0ich bezpe\u010dnostn\u00e9 mechanizmy mo\u017eno ob\u00eds\u0165 tak, aby <a href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/untrustworthy-ai-data-poisoning\/\" target=\"_blank\" rel=\"noreferrer noopener\">generovali \u0161kodliv\u00e9 v\u00fdstupy<\/a> vr\u00e1tane ransomv\u00e9ru \u010di vytv\u00e1rali nebezpe\u010dn\u00fd obsah, napr\u00edklad podrobn\u00e9 n\u00e1vody na\u00a0v\u00fdrobu tox\u00ednov a\u00a0v\u00fdbu\u0161n\u00edn.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-5c19ec3d83b9cb6c049cb8d2e3fbce96\"><a href=\"https:\/\/www.welivesecurity.com\/2023\/03\/24\/what-tiktok-knows-you-should-know-tiktok\/\" target=\"_blank\" rel=\"noreferrer noopener\">Podobne ako v\u00a0pr\u00edpade TikToku<\/a> a\u00a0\u010fal\u0161\u00edch \u010d\u00ednskych online slu\u017eieb, aj <a href=\"https:\/\/platform.deepseek.com\/downloads\/DeepSeek%20Privacy%20Policy.html\" target=\"_blank\" rel=\"noreferrer noopener\">postupy spolo\u010dnosti DeepSeek pri zhroma\u017e\u010fovan\u00ed \u00fadajov<\/a> si takmer okam\u017eite <a href=\"https:\/\/iapp.org\/news\/a\/deepseek-s-ascension-catches-the-eye-of-international-regulators\/\" target=\"_blank\" rel=\"noreferrer noopener\">vysl\u00fa\u017eili pozornos\u0165<\/a> regula\u010dn\u00fdch org\u00e1nov v\u00a0Spojen\u00fdch \u0161t\u00e1toch, \u00cdrsku, Taliansku a\u00a0Franc\u00fazsku.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-2338516b831c5920b41c19ae6de887a3\">Bezpe\u010dnostn\u00e9 opatrenia<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-d4133db0f70ea1ebf3a1c734e586a29c\">\u010ci u\u017e ide o&nbsp;nov\u00fa vir\u00e1lnu aplik\u00e1ciu, obrovsk\u00fa platformu soci\u00e1lnych m\u00e9di\u00ed alebo dokonca najnov\u0161\u00ed rozruch okolo n\u00e1strojov umelej inteligencie, kyberzlo\u010dinci pri svojich \u00faskokoch ve\u013emi zru\u010dne vyu\u017e\u00edvaj\u00fa najnov\u0161ie m\u00f3dne trendy, v\u010faka \u010domu s\u00fa ich triky v&nbsp;kone\u010dnom d\u00f4sledku presved\u010divej\u0161ie a&nbsp;\u0165a\u017e\u0161ie odhalite\u013en\u00e9.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-97b7b296f22e07b6a2b00fdd4e8f5d24\">Ak sa chcete chr\u00e1ni\u0165 pred podvodmi zneu\u017e\u00edvaj\u00facimi slu\u017ebu DeepSeek, d\u00e1vajte si<strong> pozor na\u00a0v\u0161etky e\u2011mailov\u00e9 spr\u00e1vy alebo spr\u00e1vy v\u00a0soci\u00e1lnych m\u00e9di\u00e1ch<\/strong>, ktor\u00e9 sa sna\u017eia \u0165a\u017ei\u0165 z\u00a0jej popularity a\u00a0prin\u00fati\u0165 v\u00e1s klikn\u00fa\u0165 na\u00a0podozriv\u00e9 odkazy.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-9fb2d6471a932065d975f7bfb14b1b0d\">Ke\u010f\u017ee n\u00e1stroje umelej inteligencie m\u00f4\u017eu posl\u00fa\u017ei\u0165 aj na\u00a0vytv\u00e1ranie ve\u013emi presved\u010div\u00fdch phishingov\u00fdch kampan\u00ed a\u00a0in\u00fdch \u00fatokov soci\u00e1lneho in\u017einierstva, bu\u010fte <strong>skeptick\u00ed vo\u010di spr\u00e1vam, ktor\u00e9 sa z\u00a0ni\u010doho ni\u010d objavia vo\u00a0va\u0161ej schr\u00e1nke<\/strong>, najm\u00e4 ak pon\u00fakaj\u00fa nie\u010do pr\u00edli\u0161 dobr\u00e9 na\u00a0to, aby to bola pravda (napr\u00edklad <a href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/crypto-soaring-threats-how-keep-wallet-safe\/\" target=\"_blank\" rel=\"noreferrer noopener\">investi\u010dn\u00e9 pr\u00edle\u017eitosti<\/a>), alebo vzbudzuj\u00fa dojem naliehavosti. Rad\u0161ej kontaktujte spolo\u010dnos\u0165 alebo osobu uveden\u00fa v\u00a0spr\u00e1vach priamo prostredn\u00edctvom overen\u00fdch kan\u00e1lov a\u00a0na\u00a0ofici\u00e1lnu webov\u00fa str\u00e1nku prejdite zadan\u00edm jej adresy do\u00a0webov\u00e9ho prehliada\u010da.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-582ba4b03d30e62d80f7c79cc525f600\">V\u0161ade, kde je to mo\u017en\u00e9, <strong>posilnite ochranu svojich online \u00fa\u010dtov pomocou dvojfaktorovej autentifik\u00e1cie<\/strong>, aby sa do nich kyberzlo\u010dinci tak \u013eahko nedostali, aj ke\u010f sa im podar\u00ed z\u00edska\u0165 va\u0161e prihlasovacie \u00fadaje. Netreba dod\u00e1va\u0165, aby ste vo\u00a0v\u0161etk\u00fdch zariadeniach pou\u017e\u00edvali viacvrstvov\u00fd bezpe\u010dnostn\u00fd softv\u00e9r.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-5282e5b9fd1ee35311a6730394671dd3\">Pri pou\u017e\u00edvan\u00ed slu\u017eby DeepSeek alebo <a href=\"https:\/\/www.welivesecurity.com\/en\/business-security\/security-privacy-challenges-large-language-models\/\" target=\"_blank\" rel=\"noreferrer noopener\">ak\u00e9hoko\u013evek in\u00e9ho modelu umelej inteligencie<\/a> si d\u00e1vajte pozor na\u00a0\u00fadaje, ktor\u00e9 do\u00a0nich zad\u00e1vate, vr\u00e1tane mien, e\u2011mailov\u00fdch adries a\u00a0citliv\u00fdch osobn\u00fdch inform\u00e1ci\u00ed. To ist\u00e9 plat\u00ed aj pre <a href=\"https:\/\/www.welivesecurity.com\/2023\/05\/17\/meet-ai-new-colleague-work-company-data\/\" target=\"_blank\" rel=\"noreferrer noopener\">firemn\u00e9 a\u00a0in\u00e9 citliv\u00e9 \u00fadaje<\/a>; napr\u00edklad <a href=\"https:\/\/time.com\/7210875\/deepseek-national-security-threat-tiktok\/\" target=\"_blank\" rel=\"noreferrer noopener\">americk\u00e9 n\u00e1morn\u00edctvo<\/a> u\u017e zak\u00e1zalo pou\u017e\u00edvanie umelej inteligencie DeepSeek vo\u00a0svojich radoch.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-4dde281956c8d1be8b2bb8bd5dc95116\">Spracoval: t\u00edm ESET<br>Zdroj: Welivesecurity.com &#8211; Tom\u00e1\u0161 Folt\u00fdn: <a href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/scammers-exploiting-deepseek-hype\/\" target=\"_blank\" rel=\"noreferrer noopener\">How scammers are exploiting DeepSeek&#8217;s rise<\/a><\/p>\n\n\n\n<div class=\"wp-block-columns has-text-dark-color has-bd-color-background-color has-text-color has-background has-link-color wp-elements-f7b2725856d4aee97606cb48d137f263 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"631\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-1024x631.png\" alt=\"Bajtovci kapela Teleskop banner ESET\" class=\"wp-image-15663\" style=\"width:329px;height:auto\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-1024x631.png 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-300x185.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-768x473.png 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-370x228.png 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-760x468.png 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela.png 1136w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"671\" height=\"142\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-logo-1.png\" alt=\"\" class=\"wp-image-15698\" style=\"width:310px;height:auto\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-logo-1.png 671w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-logo-1-300x63.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-logo-1-370x78.png 370w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Objavte svet Bajtovcov, kde sa digit\u00e1lny svet prel\u00edna s ka\u017edodenn\u00fdmi dobrodru\u017estvami. Pou\u010dn\u00e9 epiz\u00f3dy, ne\u010dakan\u00e9 v\u00fdzvy a st\u00e1le viac z\u00e1had na obzore! Pozrite si v\u0161etky epiz\u00f3dy.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button width-200\"><a class=\"wp-block-button__link has-small-font-size has-custom-font-size wp-element-button\" href=\"http:\/\/www.bajtovci.sk\" target=\"_blank\" rel=\"noreferrer noopener\">SLEDOVA\u0164<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kyberzlo\u010dinci u\u017e tradi\u010dne nestr\u00e1caj\u00fa \u010das a p\u00fa\u0161\u0165aj\u00fa sa do \u00fatokov, ktor\u00fdch cie\u013eom je vyu\u017ei\u0165 senz\u00e1ciu okolo n\u00e1strojov umelej inteligencie.<\/p>\n","protected":false},"author":5,"featured_media":16114,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[274,165],"tags":[],"class_list":["post-16111","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-aktuality","category-cybernews"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa Deepseek | ESET Slovensko<\/title>\n<meta name=\"description\" content=\"Kyberzlo\u010dinci u\u017e tradi\u010dne nestr\u00e1caj\u00fa \u010das a p\u00fa\u0161\u0165aj\u00fa sa do \u00fatokov, ktor\u00fdch cie\u013eom je vyu\u017ei\u0165 senz\u00e1ciu okolo n\u00e1stroja Deepseek.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa Deepseek | ESET Slovensko\" \/>\n<meta property=\"og:description\" content=\"Kyberzlo\u010dinci u\u017e tradi\u010dne nestr\u00e1caj\u00fa \u010das a p\u00fa\u0161\u0165aj\u00fa sa do \u00fatokov, ktor\u00fdch cie\u013eom je vyu\u017ei\u0165 senz\u00e1ciu okolo n\u00e1stroja Deepseek.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne na nete | ESET\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESETnaSlovensku\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-22T07:40:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET User\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET User\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/\"},\"author\":{\"name\":\"ESET User\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\"},\"headline\":\"Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa vzostup spolo\u010dnosti DeepSeek\",\"datePublished\":\"2025-05-22T07:40:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/\"},\"wordCount\":1105,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/hlavny-banner-1200x628_2025_47-1.jpg\",\"articleSection\":[\"Aktuality\",\"Cybernews\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/\",\"name\":\"Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa Deepseek | ESET Slovensko\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/hlavny-banner-1200x628_2025_47-1.jpg\",\"datePublished\":\"2025-05-22T07:40:46+00:00\",\"description\":\"Kyberzlo\u010dinci u\u017e tradi\u010dne nestr\u00e1caj\u00fa \u010das a p\u00fa\u0161\u0165aj\u00fa sa do \u00fatokov, ktor\u00fdch cie\u013eom je vyu\u017ei\u0165 senz\u00e1ciu okolo n\u00e1stroja Deepseek.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/hlavny-banner-1200x628_2025_47-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/hlavny-banner-1200x628_2025_47-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"Deepseek podvody ilustra\u010dn\u00fd obr\u00e1zok ESET\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa vzostup spolo\u010dnosti DeepSeek\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"description\":\"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"caption\":\"Bezpe\u010dne na nete | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ESETnaSlovensku\\\/\",\"https:\\\/\\\/www.instagram.com\\\/eset_slovensko\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/eset\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCtuph4SwEvitc5T-0cE1FuA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\",\"name\":\"ESET User\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"caption\":\"ESET User\"},\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/author\\\/esetuser\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa Deepseek | ESET Slovensko","description":"Kyberzlo\u010dinci u\u017e tradi\u010dne nestr\u00e1caj\u00fa \u010das a p\u00fa\u0161\u0165aj\u00fa sa do \u00fatokov, ktor\u00fdch cie\u013eom je vyu\u017ei\u0165 senz\u00e1ciu okolo n\u00e1stroja Deepseek.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/","og_locale":"sk_SK","og_type":"article","og_title":"Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa Deepseek | ESET Slovensko","og_description":"Kyberzlo\u010dinci u\u017e tradi\u010dne nestr\u00e1caj\u00fa \u010das a p\u00fa\u0161\u0165aj\u00fa sa do \u00fatokov, ktor\u00fdch cie\u013eom je vyu\u017ei\u0165 senz\u00e1ciu okolo n\u00e1stroja Deepseek.","og_url":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/","og_site_name":"Bezpe\u010dne na nete | ESET","article_publisher":"https:\/\/www.facebook.com\/ESETnaSlovensku\/","article_published_time":"2025-05-22T07:40:46+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-1.jpg","type":"image\/jpeg"}],"author":"ESET User","twitter_card":"summary_large_image","twitter_misc":{"Autor":"ESET User","Predpokladan\u00fd \u010das \u010d\u00edtania":"14 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/#article","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/"},"author":{"name":"ESET User","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e"},"headline":"Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa vzostup spolo\u010dnosti DeepSeek","datePublished":"2025-05-22T07:40:46+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/"},"wordCount":1105,"publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-1.jpg","articleSection":["Aktuality","Cybernews"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/","name":"Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa Deepseek | ESET Slovensko","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-1.jpg","datePublished":"2025-05-22T07:40:46+00:00","description":"Kyberzlo\u010dinci u\u017e tradi\u010dne nestr\u00e1caj\u00fa \u010das a p\u00fa\u0161\u0165aj\u00fa sa do \u00fatokov, ktor\u00fdch cie\u013eom je vyu\u017ei\u0165 senz\u00e1ciu okolo n\u00e1stroja Deepseek.","breadcrumb":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/#primaryimage","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-1.jpg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/05\/hlavny-banner-1200x628_2025_47-1.jpg","width":1200,"height":628,"caption":"Deepseek podvody ilustra\u010dn\u00fd obr\u00e1zok ESET"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ako-podvodnici-zneuzivaju-vzostup-spolocnosti-deepseek\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnenanete.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Ako podvodn\u00edci zneu\u017e\u00edvaj\u00fa vzostup spolo\u010dnosti DeepSeek"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","name":"Bezpe\u010dne na nete | ESET","description":"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.","publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnenanete.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization","name":"Bezpe\u010dne na nete | ESET","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","caption":"Bezpe\u010dne na nete | ESET"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ESETnaSlovensku\/","https:\/\/www.instagram.com\/eset_slovensko\/","https:\/\/www.linkedin.com\/company\/eset","https:\/\/www.youtube.com\/channel\/UCtuph4SwEvitc5T-0cE1FuA"]},{"@type":"Person","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e","name":"ESET User","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","caption":"ESET User"},"url":"https:\/\/bezpecnenanete.eset.com\/sk\/author\/esetuser\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/16111","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=16111"}],"version-history":[{"count":2,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/16111\/revisions"}],"predecessor-version":[{"id":16115,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/16111\/revisions\/16115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media\/16114"}],"wp:attachment":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=16111"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=16111"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=16111"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}