{"id":16326,"date":"2025-08-15T05:56:33","date_gmt":"2025-08-15T05:56:33","guid":{"rendered":"https:\/\/bezpecnenanete.eset.com\/sk\/?p=16326"},"modified":"2025-08-15T05:56:33","modified_gmt":"2025-08-15T05:56:33","slug":"ai-podvody-s-identitou-ked-technologie-sposobuju-spust","status":"publish","type":"post","link":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/","title":{"rendered":"AI podvody s\u00a0identitou: ke\u010f technol\u00f3gie sp\u00f4sobuj\u00fa sp\u00fa\u0161\u0165"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-1024x536.jpg\" alt=\"\" class=\"wp-image-16327\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-1024x536.jpg 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-300x157.jpg 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-768x402.jpg 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-370x194.jpg 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-760x398.jpg 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-141a1207104c650dd5386572599d1b80\">Umel\u00e1 inteligencia (AI) men\u00ed n\u00e1\u0161 svet o\u010dak\u00e1van\u00fdm, ale aj nepredv\u00eddan\u00fdm sp\u00f4sobom. Pre spotrebite\u013eov t\u00e1to technol\u00f3gia znamen\u00e1 presnej\u0161ie prisp\u00f4soben\u00fd digit\u00e1lny obsah, lep\u0161iu diagnostiku v\u00a0zdravotn\u00edctve, preklad jazyka v\u00a0re\u00e1lnom \u010dase (napr\u00edklad na\u00a0dovolenke) a\u00a0generat\u00edvnych AI\u00a0asistentov na\u00a0zv\u00fd\u0161enie produktivity v\u00a0pr\u00e1ci. V\u010faka umelej inteligencii s\u00fa produkt\u00edvnej\u0161\u00ed aj <a href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/cybersecurity-ai-what-2025-have-store\/\" target=\"_blank\" rel=\"noreferrer noopener\">kyberzlo\u010dinci<\/a>, najm\u00e4 pokia\u013e ide o\u00a0podvody s\u00a0identitou, ktor\u00e9 s\u00fa <a href=\"https:\/\/www.cifas.org.uk\/insight\/reports-trends\" target=\"_blank\" rel=\"noreferrer noopener\">v\u00a0s\u00fa\u010dasnosti naj\u010dastej\u0161\u00edm typom podvodov<\/a>.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-b41cd985402a2c177dfaab7a60c92d12\">Viac ako tretina l\u00eddrov p\u00f4sobiacich v\u00a0oblasti bankov\u00fdch riz\u00edk a\u00a0inov\u00e1ci\u00ed v\u00a0Spojenom kr\u00e1\u013eovstve, \u0160panielsku a\u00a0USA <a href=\"https:\/\/investors.miteksystems.com\/news-releases\/news-release-details\/soaring-scam-and-fraud-sophistication-remains-top-challenge\" target=\"_blank\" rel=\"noreferrer noopener\">pova\u017euje za\u00a0najv\u00e4\u010d\u0161iu v\u00fdzvu s\u00fa\u010dasnosti<\/a> n\u00e1rast podvodov a\u00a0deepfakov generovan\u00fdch umelou inteligenciou. Ako AI podvody funguj\u00fa a\u00a0\u010do m\u00f4\u017eete urobi\u0165, aby ste zostali v\u00a0bezpe\u010d\u00ed?<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-d7243bb843991fbfd29801fa402aacfa\">Ako funguje AI podvod s&nbsp;identitou?<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-5efcf66ffceeedca860b1b04ce4750da\">Podvod s\u00a0identitou znamen\u00e1 zneu\u017eitie va\u0161ich inform\u00e1ci\u00ed o\u00a0toto\u017enosti na\u00a0sp\u00e1chanie trestn\u00e9ho \u010dinu, napr\u00edklad na\u00a0vytvorenie dlhu na\u00a0kreditnej karte vo\u00a0va\u0161om mene alebo na\u00a0pr\u00edstup k\u00a0bankov\u00e9mu \u010di in\u00e9mu \u00fa\u010dtu. Pod\u013ea <a href=\"https:\/\/www.signicat.com\/the-battle-against-ai-driven-identity-fraud\" target=\"_blank\" rel=\"noreferrer noopener\">jedn\u00e9ho odhadu<\/a> AI\u00a0podvody v\u00a0s\u00fa\u010dasnosti predstavuj\u00fa viac ako dve p\u00e4tiny (43\u00a0%) v\u0161etk\u00fdch pokusov o\u00a0podvod zaznamenan\u00fdch vo\u00a0finan\u010dnom a\u00a0v\u00a0platobnom sektore. Takmer tretina (29\u00a0%) t\u00fdchto pokusov je \u00faspe\u0161n\u00e1. Ako umel\u00e1 inteligencia pom\u00e1ha kyberzlo\u010dincom?<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-1f24c67ce3719709c9edd4ef1808cc69\">Existuje nieko\u013eko r\u00f4znych takt\u00edk:<\/h3>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox has-text-dark-color has-text-color has-link-color wp-elements-210bfbcf469416e8c8a4298245a2b3ca\">\n<li><strong>Prevzatie kontroly nad \u00fa\u010dtami a\u00a0ich vytv\u00e1ranie pomocou technol\u00f3gie deepfake:<\/strong> Podvodn\u00edci pou\u017e\u00edvaj\u00fa deepfake zvukov\u00e9 a\u00a0obrazov\u00e9 podobizne legit\u00edmnych pou\u017e\u00edvate\u013eov, aby obi\u0161li kontroly zalo\u017een\u00e9 na\u00a0princ\u00edpe \u201epoznaj svojho klienta\u201c (Know Your Customer; KYC), ktor\u00fd poskytovatelia finan\u010dn\u00fdch slu\u017eieb uplat\u0148uj\u00fa s\u00a0cie\u013eom overi\u0165 toto\u017enos\u0165 z\u00e1kazn\u00edkov. Obr\u00e1zok alebo video s\u00a0va\u0161ou podobiz\u0148ou z\u00edskaj\u00fa podvodn\u00edci z\u00a0webu a\u00a0nahraj\u00fa do\u00a0n\u00e1stroja na\u00a0tvorbu deepfakov alebo do\u00a0n\u00e1stroja generat\u00edvnej umelej inteligencie. V\u00fdsledn\u00fa podobize\u0148 vlo\u017eia do\u00a0d\u00e1tov\u00e9ho toku medzi pou\u017e\u00edvate\u013eom a\u00a0poskytovate\u013eom slu\u017eieb v\u00a0r\u00e1mci tzv. injek\u010dn\u00fdch \u00fatokov (\u00fatoky vo\u00a0forme vlo\u017eenia k\u00f3du), ktor\u00fdch cie\u013eom je oklama\u0165 overovacie syst\u00e9my. <a href=\"https:\/\/www.infosecurity-magazine.com\/news\/deepfake-identity-attack-every\/\" target=\"_blank\" rel=\"noreferrer noopener\">Pod\u013ea jednej spr\u00e1vy<\/a> sa deepfaky v\u00a0s\u00fa\u010dasnosti vyu\u017e\u00edvaj\u00fa pri \u0161tvrtine (24\u00a0%) podvodn\u00fdch pokusov o\u00a0biometrick\u00e9 overenie zalo\u017een\u00e9 na\u00a0pohybe a\u00a0pri 5\u00a0% statick\u00fdch overen\u00ed zalo\u017een\u00fdch na\u00a0selfie.<\/li>\n\n\n\n<li><strong>Fal\u0161ovanie dokumentov:<\/strong> Podvodn\u00edci kedysi na\u00a0otvorenie nov\u00fdch bankov\u00fdch \u00fa\u010dtov na\u00a0men\u00e1 ni\u010d netu\u0161iacich obet\u00ed pou\u017e\u00edvali falzifik\u00e1ty fyzick\u00fdch dokladov, napr\u00edklad sfal\u0161ovan\u00e9 cestovn\u00e9 pasy. V\u00a0s\u00fa\u010dasnosti \u010dastej\u0161ie volia digit\u00e1lnu cestu. <a href=\"https:\/\/www.entrust.com\/sites\/default\/files\/documentation\/executive-summaries\/2025-fraud-identity-exec-summary.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">V\u00a0jednej spr\u00e1ve sa uv\u00e1dza<\/a>, \u017ee digit\u00e1lne falzifik\u00e1ty sa pou\u017e\u00edvaj\u00fa pri viac ako 57\u00a0% v\u0161etk\u00fdch podvodov s\u00a0dokumentmi, \u010do predstavuje 244\u00a0% ro\u010dn\u00fd n\u00e1rast. Podvodn\u00edci zvy\u010dajne z\u00edskaj\u00fa \u0161abl\u00f3ny dokumentov online alebo si stiahnu obr\u00e1zky dokladov odcudzen\u00fdch pri \u00fanikoch \u00fadajov a\u00a0potom ich upravia vo\u00a0Photoshope. N\u00e1stroje generat\u00edvnej umelej inteligencie im t\u00fato pr\u00e1cu ur\u00fdch\u013euj\u00fa a\u00a0umo\u017e\u0148uj\u00fa robi\u0165 vo\u00a0ve\u013ekom.<\/li>\n\n\n\n<li><strong>Syntetick\u00fd podvod<\/strong>: V\u00a0tomto pr\u00edpade podvodn\u00edci vytvoria nov\u00fa, tzv. syntetick\u00fa identitu bu\u010f kombin\u00e1ciou skuto\u010dn\u00fdch (ukradnut\u00fdch) a\u00a0vymyslen\u00fdch inform\u00e1ci\u00ed o\u00a0toto\u017enosti, alebo len pomocou vymyslen\u00fdch \u00fadajov. T\u00fato identitu potom pou\u017eij\u00fa napr\u00edklad na\u00a0otvorenie nov\u00fdch bankov\u00fdch \u00fa\u010dtov a\u00a0z\u00edskanie kreditn\u00fdch kariet. M\u00f4\u017eu pritom vyu\u017ei\u0165 aj falzifik\u00e1ty dokumentov a\u00a0deepfaky, \u010d\u00edm sa zvy\u0161uj\u00fa ich \u0161ance na\u00a0\u00faspech. Pod\u013ea<a href=\"https:\/\/www.deduce.com\/resource\/wakefield-research-report\/\" target=\"_blank\" rel=\"noreferrer noopener\"> jednej spr\u00e1vy<\/a> si 76\u00a0% americk\u00fdch odborn\u00edkov na\u00a0podvody a\u00a0rizik\u00e1 mysl\u00ed, \u017ee ich organiz\u00e1cia m\u00e1 syntetick\u00fdch z\u00e1kazn\u00edkov. Odhaduje sa, \u017ee po\u010det podvodov tohto typu sa ka\u017edoro\u010dne zv\u00fd\u0161i o\u00a017\u00a0%.<\/li>\n\n\n\n<li><strong>Deepfaky, ktor\u00e9 oklam\u00fa priate\u013eov aj rodinu:<\/strong> Niekedy m\u00f4\u017eu podvodn\u00edci pou\u017ei\u0165 falo\u0161n\u00e9 video alebo zvukov\u00fa nahr\u00e1vku, ktor\u00e9 dok\u00e1\u017eu oklama\u0165 aj va\u0161ich najbli\u017e\u0161\u00edch. Jednou z\u00a0takt\u00edk je <a href=\"https:\/\/www.welivesecurity.com\/en\/scams\/virtual-kidnapping-see-through-scam\/\" target=\"_blank\" rel=\"noreferrer noopener\">virtu\u00e1lny \u00fanos<\/a>, ke\u010f podvodn\u00edk zavol\u00e1 va\u0161im pr\u00edbuzn\u00fdm a\u00a0tvrd\u00ed im, \u017ee v\u00e1s uniesol. Ako d\u00f4kaz im prehr\u00e1 falo\u0161n\u00fa nahr\u00e1vku v\u00e1\u0161ho hlasu a\u00a0potom po\u017eaduje v\u00fdkupn\u00e9. Podvodn\u00edci m\u00f4\u017eu takto vyu\u017ei\u0165 generat\u00edvnu umel\u00fa inteligenciu aj pri h\u013eadan\u00ed mo\u017enej obete. Glob\u00e1lny bezpe\u010dnostn\u00fd poradca spolo\u010dnosti ESET <a href=\"https:\/\/www.welivesecurity.com\/en\/our-experts\/jake-moore\/\" target=\"_blank\" rel=\"noreferrer noopener\">Jake Moore<\/a> predstavil, \u010do v\u0161etko je v\u00a0s\u00fa\u010dasnosti mo\u017en\u00e9, <a href=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/aktuality\/zneuzitie-hlasu-eset-experta-ako-dokaze-umela-inteligencia-vykonat-virtualny-unos\/\" target=\"_blank\" rel=\"noreferrer noopener\">tu<\/a> a\u00a0<a href=\"https:\/\/www.welivesecurity.com\/en\/cybersecurity\/eset-world-2024-big-prevention-bigger-ai\/\" target=\"_blank\" rel=\"noreferrer noopener\">tu<\/a>.<\/li>\n\n\n\n<li><strong>Credential stuffing (na\u00a0prevzatie kontroly nad \u00fa\u010dtami):<\/strong> Pri \u00fatokoch typu credential stuffing sa ukradnut\u00e9 prihlasovacie \u00fadaje pou\u017eij\u00fa pri automatizovan\u00fdch pokusoch o\u00a0pr\u00edstup k\u00a0in\u00fdm \u00fa\u010dtom, pre ktor\u00e9 ste si mohli nastavi\u0165 rovnak\u00e9 prihlasovacie meno a\u00a0heslo. N\u00e1stroje vyu\u017e\u00edvaj\u00face umel\u00fa inteligenciu by dok\u00e1zali r\u00fdchlo generova\u0165 zoznamy prihlasovac\u00edch \u00fadajov z\u00a0viacer\u00fdch zdrojov, \u010do by kyberzlo\u010dincom pomohlo vykon\u00e1va\u0165 \u00fatoky v\u00e4\u010d\u0161ieho rozsahu. A\u00a0mohli by ich pou\u017ei\u0165 aj na\u00a0presn\u00e9 napodobnenie \u013eudsk\u00e9ho spr\u00e1vania po\u010das prihlasovania s\u00a0cie\u013eom oklama\u0165 ochrann\u00e9 filtre.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-columns has-text-dark-color has-bd-color-background-color has-text-color has-background has-link-color wp-elements-f7b2725856d4aee97606cb48d137f263 is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"631\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-1024x631.png\" alt=\"Bajtovci kapela Teleskop banner ESET\" class=\"wp-image-15663\" style=\"width:329px;height:auto\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-1024x631.png 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-300x185.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-768x473.png 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-370x228.png 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela-760x468.png 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-spolu-kapela.png 1136w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"671\" height=\"142\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-logo-1.png\" alt=\"\" class=\"wp-image-15698\" style=\"width:310px;height:auto\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-logo-1.png 671w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-logo-1-300x63.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/02\/bajtovci_web_bajtovci-logo-1-370x78.png 370w\" sizes=\"auto, (max-width: 671px) 100vw, 671px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Objavte svet Bajtovcov, kde sa digit\u00e1lny svet prel\u00edna s ka\u017edodenn\u00fdmi dobrodru\u017estvami. Pou\u010dn\u00e9 epiz\u00f3dy, ne\u010dakan\u00e9 v\u00fdzvy a st\u00e1le viac z\u00e1had na obzore! Pozrite si v\u0161etky epiz\u00f3dy.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button width-200\"><a class=\"wp-block-button__link has-small-font-size has-custom-font-size wp-element-button\" href=\"http:\/\/www.bajtovci.sk\" target=\"_blank\" rel=\"noreferrer noopener\">SLEDOVA\u0164<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-a6052682c0652c543e96f8184038e1f2\">Ak\u00fd dosah maj\u00fa AI&nbsp;podvody?<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-29181175b46599d1dabdb3921cdba63c\">Podvod nemo\u017eno pova\u017eova\u0165 za ne\u0161kodn\u00fd \u010din, jeho d\u00f4sledky zasahuj\u00fa re\u00e1lnych \u013eud\u00ed. Podvod vyu\u017e\u00edvaj\u00faci umel\u00fa inteligenciu m\u00f4\u017ee:<\/p>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox has-text-dark-color has-text-color has-link-color wp-elements-6228cb508101e87dc29a340a71430864\">\n<li>sp\u00f4sobi\u0165 podvedenej osobe ve\u013ek\u00e9 emocion\u00e1lne utrpenie (v\u00a0<a href=\"https:\/\/www.idtheftcenter.org\/publication\/2023-consumer-impact-report\/\" target=\"_blank\" rel=\"noreferrer noopener\">jednej spr\u00e1ve<\/a> sa uv\u00e1dza, \u017ee 16\u00a0% obet\u00ed trestn\u00e9ho \u010dinu zneu\u017eitia identity uva\u017eovalo o\u00a0samovra\u017ede),<\/li>\n\n\n\n<li>by\u0165 s\u00a0v\u00e4\u010d\u0161ou pravdepodobnos\u0165ou \u00faspe\u0161n\u00fd a\u00a0zn\u00ed\u017ei\u0165 zisky spolo\u010dnost\u00ed, \u010do ich n\u00e1sledne n\u00fati zvy\u0161ova\u0165 ceny pre v\u0161etk\u00fdch,<\/li>\n\n\n\n<li>ovplyvni\u0165 n\u00e1rodn\u00e9 hospod\u00e1rstvo (ni\u017e\u0161ie zisky spolo\u010dnost\u00ed znamenaj\u00fa ni\u017e\u0161ie pr\u00edjmy z\u00a0dan\u00ed, \u010do zase znamen\u00e1 menej pe\u0148az\u00ed na\u00a0verejn\u00e9 slu\u017eby),<\/li>\n\n\n\n<li>podkop\u00e1va\u0165 d\u00f4veru verejnosti v\u00a0pr\u00e1vny \u0161t\u00e1t a\u00a0dokonca aj v\u00a0demokraciu,<\/li>\n\n\n\n<li>podkop\u00e1va\u0165 d\u00f4veru firiem, \u010do by mohlo vies\u0165 k\u00a0ni\u017e\u0161\u00edm invest\u00edci\u00e1m do\u00a0krajiny.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"256\" height=\"185\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2024\/10\/image-11.png\" alt=\"\" class=\"wp-image-15141\"\/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<h3 class=\"wp-block-heading has-text-link-color has-text-color has-link-color has-medium-font-size wp-elements-61785827a68dd0762b70b460b4642ecd\">Komplexn\u00e1 ochrana v\u00e1\u0161ho digit\u00e1lneho \u017eivota<\/h3>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color has-small-font-size wp-elements-8bb3dfd2a4acde7440c20734007bce42\">Komplexn\u00e1 ochrana v\u00e1\u0161ho digit\u00e1lneho \u017eivota. Vyberte si \u00farove\u0148 pod\u013ea svojich potrieb.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-left is-layout-flex wp-container-core-buttons-is-layout-fdcfc74e wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button has-custom-width wp-block-button__width-50 has-custom-font-size width-300 has-small-font-size\"><a class=\"wp-block-button__link wp-element-button\" href=\"https:\/\/www.eset.com\/sk\/internetova-ochrana-domacnosti\/urovne-ochrany\/\" target=\"_blank\" rel=\"noreferrer noopener\">VYBERTE SI OCHRANU<\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-dark-color has-text-color has-link-color wp-elements-b4d31d9cb8304ab87c00672d0ed430ae\">Ako ochr\u00e1ni\u0165 svoju identitu pred AI&nbsp;podvodmi<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-38178f4660d9771d22f8266b5f397087\">V&nbsp;boji proti zneu\u017e\u00edvaniu umelej inteligencie na&nbsp;kybernetick\u00e9 \u00fatoky organiz\u00e1cie \u010doraz viac siahaj\u00fa po&nbsp;obrann\u00fdch AI&nbsp;n\u00e1strojoch, ktor\u00e9 im pom\u00f4\u017eu rozpozna\u0165 varovn\u00e9 sign\u00e1ly podvodu. \u010co m\u00f4\u017eete urobi\u0165? Pravdepodobne naj\u00fa\u010dinnej\u0161ou strat\u00e9giou je minimalizova\u0165 pr\u00edle\u017eitosti \u00fato\u010dn\u00edkov na&nbsp;z\u00edskanie va\u0161ich inform\u00e1ci\u00ed o&nbsp;toto\u017enosti a&nbsp;\u00fadajov v&nbsp;podobe zvukov\u00fdch nahr\u00e1vok a&nbsp;videa. To znamen\u00e1 nasledovn\u00e9:<\/p>\n\n\n\n<ul class=\"wp-block-list is-style-checkbox has-text-dark-color has-text-color has-link-color wp-elements-afb795f45e707542c9d98e38c2096162\">\n<li><a href=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/10-veci-ktore-sa-neodporuca-zverejnovat-na-socialnych-sietach-a-preco\/\" target=\"_blank\" rel=\"noreferrer noopener\">Nezverej\u0148ujte na\u00a0soci\u00e1lnych sie\u0165ach pr\u00edli\u0161 ve\u013ea inform\u00e1ci\u00ed<\/a> a\u00a0spr\u00edsnite nastavenia ochrany s\u00fakromia.<\/li>\n\n\n\n<li>D\u00e1vajte si pozor na\u00a0phishing: kontrolujte dom\u00e9ny odosielate\u013eov, v\u0161\u00edmajte si preklepy a\u00a0gramatick\u00e9 chyby a\u00a0nikdy neklikajte na\u00a0odkazy ani neotv\u00e1rajte pr\u00edlohy v\u00a0nevy\u017eiadan\u00fdch e\u2011mailoch.<\/li>\n\n\n\n<li>Zapnite si dvojfaktorov\u00fa autentifik\u00e1ciu pre v\u0161etky \u00fa\u010dty.<\/li>\n\n\n\n<li>V\u017edy pou\u017e\u00edvajte siln\u00e9 a\u00a0jedine\u010dn\u00e9 hesl\u00e1 ulo\u017een\u00e9 v\u00a0<a href=\"https:\/\/www.welivesecurity.com\/2023\/04\/11\/10-things-look-buying-password-manager\/\" target=\"_blank\" rel=\"noreferrer noopener\">n\u00e1stroji na\u00a0spr\u00e1vu hesiel<\/a>.<\/li>\n\n\n\n<li>Pravidelne aktualizujte softv\u00e9r vo\u00a0v\u0161etk\u00fdch notebookoch a\u00a0mobiln\u00fdch zariadeniach.<\/li>\n\n\n\n<li>Pozorne sledujte pohyby na\u00a0bankov\u00fdch \u00fa\u010dtoch a\u00a0platobn\u00fdch kart\u00e1ch, pravidelne kontrolujte, \u010di nedo\u0161lo k\u00a0podozriv\u00fdm aktivit\u00e1m, a\u00a0ak sa v\u00e1m nie\u010do nepozd\u00e1va, okam\u017eite zmrazte \u00fa\u010dty.<\/li>\n\n\n\n<li>Na\u00a0v\u0161etky zariadenia si nain\u0161talujte viacvrstvov\u00fd bezpe\u010dnostn\u00fd softv\u00e9r od\u00a0renomovan\u00e9ho dod\u00e1vate\u013ea.<\/li>\n<\/ul>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-3b6712d4234fea6bb6c1458282f07fde\">Takisto by bolo dobr\u00e9 ma\u0165 preh\u013ead o&nbsp;najnov\u0161\u00edch podvodn\u00fdch taktik\u00e1ch vyu\u017e\u00edvaj\u00facich umel\u00fa inteligenciu a&nbsp;informova\u0165 o&nbsp;deepfakoch a&nbsp;podobn\u00fdch typoch podvodov svojich priate\u013eov a&nbsp;rodinu.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color has-link-color wp-elements-3770aaf791277ebabcf1e849d76a1988\">Podvody vyu\u017e\u00edvaj\u00face umel\u00fa inteligenciu bud\u00fa st\u00e1le prib\u00fada\u0165, preto\u017ee t\u00e1to technol\u00f3gia je \u010doraz lacnej\u0161ia a&nbsp;\u00fa\u010dinnej\u0161ia. A&nbsp;ke\u010f\u017ee sa tieto nov\u00e9 preteky v&nbsp;kybernetickom zbrojen\u00ed odohr\u00e1vaj\u00fa medzi ochrancami firemn\u00fdch siet\u00ed a&nbsp;ich protivn\u00edkmi, spotrebitelia sa ocitn\u00fa uprostred. Postarajte sa o&nbsp;to, aby ste sa nestali \u010fal\u0161ou obe\u0165ou v&nbsp;porad\u00ed.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Deepfaky, syntetick\u00e9 identity a podvody vyu\u017e\u00edvaj\u00face umel\u00fa inteligenciu s\u0165a\u017euj\u00fa odha\u013eovanie a prevenciu kr\u00e1de\u017e\u00ed identity.<\/p>\n","protected":false},"author":5,"featured_media":16328,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[168,165],"tags":[],"class_list":["post-16326","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ako-na-to","category-cybernews"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>AI podvody s\u00a0identitou | ESET Slovensko<\/title>\n<meta name=\"description\" content=\"Deepfaky, syntetick\u00e9 identity a podvody vyu\u017e\u00edvaj\u00face umel\u00fa inteligenciu s\u0165a\u017euj\u00fa odha\u013eovanie a prevenciu kr\u00e1de\u017e\u00ed identity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"AI podvody s\u00a0identitou | ESET Slovensko\" \/>\n<meta property=\"og:description\" content=\"Deepfaky, syntetick\u00e9 identity a podvody vyu\u017e\u00edvaj\u00face umel\u00fa inteligenciu s\u0165a\u017euj\u00fa odha\u013eovanie a prevenciu kr\u00e1de\u017e\u00ed identity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne na nete | ESET\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESETnaSlovensku\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-15T05:56:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET User\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET User\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/\"},\"author\":{\"name\":\"ESET User\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\"},\"headline\":\"AI podvody s\u00a0identitou: ke\u010f technol\u00f3gie sp\u00f4sobuj\u00fa sp\u00fa\u0161\u0165\",\"datePublished\":\"2025-08-15T05:56:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/\"},\"wordCount\":1352,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/hlavny-banner-1200x628_2025_59-1.jpg\",\"articleSection\":[\"Ako na to\",\"Cybernews\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/\",\"name\":\"AI podvody s\u00a0identitou | ESET Slovensko\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/hlavny-banner-1200x628_2025_59-1.jpg\",\"datePublished\":\"2025-08-15T05:56:33+00:00\",\"description\":\"Deepfaky, syntetick\u00e9 identity a podvody vyu\u017e\u00edvaj\u00face umel\u00fa inteligenciu s\u0165a\u017euj\u00fa odha\u013eovanie a prevenciu kr\u00e1de\u017e\u00ed identity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/hlavny-banner-1200x628_2025_59-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2025\\\/08\\\/hlavny-banner-1200x628_2025_59-1.jpg\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/cybernews\\\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"AI podvody s\u00a0identitou: ke\u010f technol\u00f3gie sp\u00f4sobuj\u00fa sp\u00fa\u0161\u0165\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"description\":\"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"caption\":\"Bezpe\u010dne na nete | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ESETnaSlovensku\\\/\",\"https:\\\/\\\/www.instagram.com\\\/eset_slovensko\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/eset\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCtuph4SwEvitc5T-0cE1FuA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\",\"name\":\"ESET User\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"caption\":\"ESET User\"},\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/author\\\/esetuser\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"AI podvody s\u00a0identitou | ESET Slovensko","description":"Deepfaky, syntetick\u00e9 identity a podvody vyu\u017e\u00edvaj\u00face umel\u00fa inteligenciu s\u0165a\u017euj\u00fa odha\u013eovanie a prevenciu kr\u00e1de\u017e\u00ed identity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/","og_locale":"sk_SK","og_type":"article","og_title":"AI podvody s\u00a0identitou | ESET Slovensko","og_description":"Deepfaky, syntetick\u00e9 identity a podvody vyu\u017e\u00edvaj\u00face umel\u00fa inteligenciu s\u0165a\u017euj\u00fa odha\u013eovanie a prevenciu kr\u00e1de\u017e\u00ed identity.","og_url":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/","og_site_name":"Bezpe\u010dne na nete | ESET","article_publisher":"https:\/\/www.facebook.com\/ESETnaSlovensku\/","article_published_time":"2025-08-15T05:56:33+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-1.jpg","type":"image\/jpeg"}],"author":"ESET User","twitter_card":"summary_large_image","twitter_misc":{"Autor":"ESET User","Predpokladan\u00fd \u010das \u010d\u00edtania":"7 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/#article","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/"},"author":{"name":"ESET User","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e"},"headline":"AI podvody s\u00a0identitou: ke\u010f technol\u00f3gie sp\u00f4sobuj\u00fa sp\u00fa\u0161\u0165","datePublished":"2025-08-15T05:56:33+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/"},"wordCount":1352,"publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-1.jpg","articleSection":["Ako na to","Cybernews"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/","name":"AI podvody s\u00a0identitou | ESET Slovensko","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-1.jpg","datePublished":"2025-08-15T05:56:33+00:00","description":"Deepfaky, syntetick\u00e9 identity a podvody vyu\u017e\u00edvaj\u00face umel\u00fa inteligenciu s\u0165a\u017euj\u00fa odha\u013eovanie a prevenciu kr\u00e1de\u017e\u00ed identity.","breadcrumb":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/#primaryimage","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-1.jpg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2025\/08\/hlavny-banner-1200x628_2025_59-1.jpg","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/cybernews\/ai-podvody-s-identitou-ked-technologie-sposobuju-spust\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnenanete.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"AI podvody s\u00a0identitou: ke\u010f technol\u00f3gie sp\u00f4sobuj\u00fa sp\u00fa\u0161\u0165"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","name":"Bezpe\u010dne na nete | ESET","description":"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.","publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnenanete.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization","name":"Bezpe\u010dne na nete | ESET","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","caption":"Bezpe\u010dne na nete | ESET"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ESETnaSlovensku\/","https:\/\/www.instagram.com\/eset_slovensko\/","https:\/\/www.linkedin.com\/company\/eset","https:\/\/www.youtube.com\/channel\/UCtuph4SwEvitc5T-0cE1FuA"]},{"@type":"Person","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e","name":"ESET User","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","caption":"ESET User"},"url":"https:\/\/bezpecnenanete.eset.com\/sk\/author\/esetuser\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/16326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=16326"}],"version-history":[{"count":1,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/16326\/revisions"}],"predecessor-version":[{"id":16329,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/16326\/revisions\/16329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media\/16328"}],"wp:attachment":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=16326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=16326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=16326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}