{"id":8091,"date":"2021-10-14T14:00:00","date_gmt":"2021-10-14T14:00:00","guid":{"rendered":"https:\/\/bezpecnenanete.eset.com\/sk\/?p=8091"},"modified":"2021-10-20T12:03:21","modified_gmt":"2021-10-20T12:03:21","slug":"ako-vyzeraju-utoky-bezneho-malveru","status":"publish","type":"post","link":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/","title":{"rendered":"Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-1024x536.jpg\" alt=\"\u00fatoky malv\u00e9ru ESET\" class=\"wp-image-8092\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-1024x536.jpg 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-300x157.jpg 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-768x402.jpg 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-370x194.jpg 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-760x398.jpg 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-bg-color-color has-text-link-background-color has-text-color has-background\">Tento \u010dl\u00e1nok je s\u00fa\u010das\u0165ou&nbsp;<strong>Pr\u00edru\u010dky o digit\u00e1lnej bezpe\u010dnosti pre u\u010dite\u013eov 1. a 2. stup\u0148a z\u00e1kladn\u00fdch \u0161k\u00f4l.&nbsp;<\/strong><\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Malv\u00e9r m\u00f4\u017ee ma\u0165 <strong>r\u00f4zne podoby. <\/strong>Do tejto skupiny sa radia v\u00edrusy, \u010dervy, ale aj tr\u00f3jske kone, \u010di \u010fal\u0161ie typy \u0161kodliv\u00e9ho k\u00f3du. Ni\u017e\u0161ie si povieme viac o niektor\u00fdch skupin\u00e1ch malv\u00e9ru, s ktor\u00fdmi sa dne\u0161n\u00fd pou\u017e\u00edvate\u013e stretne asi naj\u010dastej\u0161ie:<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong><span class=\"has-inline-color has-text-link-color\">Tr\u00f3jsky k\u00f4\u0148 (alebo Trojan)<\/span><\/strong><br>Funguje na podobnom princ\u00edpe ako p\u00f4vodn\u00fd tr\u00f3jsky k\u00f4\u0148. Navonok predstiera legit\u00edmnu funkciu (napr\u00edklad prehr\u00e1va\u010d videa, \u010detovacia aplik\u00e1cia) alebo sa vyd\u00e1va za ne\u0161kodn\u00fd s\u00fabor (dokument, aktualiz\u00e1cia), no v skuto\u010dnosti m\u00e1 za cie\u013e \u0161kodi\u0165. Niektor\u00e9 tr\u00f3jske kone pritom naozaj poskytuj\u00fa pou\u017e\u00edvate\u013eovi \u010das\u0165 s\u013e\u00faben\u00fdch funkci\u00ed \u010di slu\u017eieb, no ich hlavn\u00fdm cie\u013eom je najm\u00e4 zbiera\u0165 d\u00e1ta, \u0161kodi\u0165, okradn\u00fa\u0165 a pod.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong><span class=\"has-inline-color has-text-link-color\">Ransomv\u00e9r<\/span><\/strong><br>Po infekcii bu\u010f zablokuje obrazovku zariadenia, alebo za\u0161ifruje jeho d\u00e1ta. Za odblokovanie\/od\u0161ifrovanie od obete n\u00e1sledne \u017eiada v\u00fdkupn\u00e9. Najzn\u00e1mej\u0161ie pr\u00edklady boli WannaCry (2017) alebo CryptoLocker (2013). Ransomv\u00e9r (Not)Petya (2017) bol aj s\u00fa\u010das\u0165ou najni\u010divej\u0161ieho kyber\u00fatoku v hist\u00f3rii, ktor\u00fd nap\u00e1chal \u0161kody za minim\u00e1lne 10 mili\u00e1rd dol\u00e1rov.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong><span class=\"has-inline-color has-text-link-color\">Spyv\u00e9r<\/span><\/strong><br>\u0160kodliv\u00fd k\u00f3d, ktor\u00fd \u0161pehuje infikovan\u00e9 zariadenie obete. Cie\u013eom je zozbiera\u0165 \u010do najviac inform\u00e1ci\u00ed o jej spr\u00e1van\u00ed, ale tie\u017e hesiel, pr\u00edstupov\u00fdch k\u00f3dov \u010di in\u00fdch citliv\u00fdch d\u00e1t, ktor\u00e9 sa n\u00e1sledne odosielaj\u00fa na server \u00fato\u010dn\u00edkov. T\u00ed zozbieran\u00e9 \u00fadaje spe\u0148a\u017eia prostredn\u00edctvom \u201edark webu\u201c10 alebo vyu\u017eij\u00fa na \u010fal\u0161iu \u0161kodliv\u00fa \u010dinnos\u0165. Touto cestou sa citliv\u00e9 d\u00e1ta pou\u017e\u00edvate\u013ea m\u00f4\u017eu dosta\u0165 do r\u00fak zlo\u010dincov, ktor\u00ed ich dok\u00e1\u017eu zneu\u017ei\u0165 na po\u0161kodenie obet\u00ed, napr\u00edklad \u010fal\u0161ou kr\u00e1de\u017eou d\u00e1t, pe\u0148az\u00ed \u010di kr\u00e1de\u017e ich identity.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong><span class=\"has-inline-color has-text-link-color\">Bankov\u00fd malv\u00e9r<\/span><\/strong><br>Zameriava sa v\u00fdhradne na kr\u00e1de\u017e finan\u010dn\u00fdch inform\u00e1ci\u00ed obete, ako s\u00fa \u010d\u00edsla kreditn\u00fdch kariet, pr\u00edstupy do bankov\u00fdch \u00fa\u010dtov, kryptope\u0148a\u017eeniek \u010di in\u00fdch slu\u017eieb spojen\u00fdch s peniazmi alebo kryptomenami.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong><span class=\"has-inline-color has-text-link-color\">Downloader\/Dropper<\/span><\/strong><br>Tento \u0161kodliv\u00fd k\u00f3d sa po in\u0161tal\u00e1cii pripoj\u00ed na vybran\u00fa webov\u00fa str\u00e1nku \u010di server a stiahne do zariadenia obete \u010fal\u0161\u00ed \u0161kodliv\u00fd k\u00f3d pod\u013ea v\u00fdberu \u00fato\u010dn\u00edka.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong><span class=\"has-inline-color has-text-link-color\">Password Stealer<\/span><\/strong><br>Password stealer je typovo ve\u013emi podobn\u00fd spyv\u00e9ru a bankov\u00e9mu malv\u00e9ru, no zameriava sa na s\u00fabory \u010di programy, ktor\u00e9 by mohli obsahova\u0165 hesl\u00e1. Mnoh\u00e9 sa napr\u00edklad sna\u017eia kradn\u00fa\u0165 hesl\u00e1 ulo\u017een\u00e9 v prehliada\u010doch \u010di zranite\u013en\u00fdch mana\u017e\u00e9roch hesiel.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong><span class=\"has-inline-color has-text-link-color\">Keylogger<\/span><\/strong><br>Tento k\u00f3d sleduje naozaj ka\u017ed\u00fd krok pou\u017e\u00edvate\u013ea alebo presnej\u0161ie ka\u017ed\u00e9 jeho \u201e\u0165uknutie\u201c do kl\u00e1vesnice alebo pohyb my\u0161i. T\u00fdmto sp\u00f4sobom dok\u00e1\u017ee detailne zachyt\u00e1va\u0165 (mapova\u0165) \u010dinnos\u0165 obete a m\u00f4\u017ee ukradn\u00fa\u0165 aj d\u00e1ta, ktor\u00e9 obe\u0165 nem\u00e1 nikde ulo\u017een\u00e9 a len ich pr\u00edle\u017eitostne zad\u00e1va do niektorej slu\u017eby \u010di programu.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong><span class=\"has-inline-color has-text-link-color\">Backdoor<\/span><\/strong><br>Aj tento n\u00e1zov je ve\u013emi v\u00fdsti\u017en\u00fd. Backdoor predstavuje \u201ezadn\u00e9 vr\u00e1tka\u201c, ktor\u00e9 \u00fato\u010dn\u00edk dok\u00e1\u017ee zneu\u017ei\u0165 na pr\u00edstup do syst\u00e9mu obete, jej sledovanie \u010di in\u0161talovanie \u010fal\u0161ieho malv\u00e9ru. Backdoor je \u010dasto z\u00e1kladn\u00fdm n\u00e1strojom a v\u00fdchodiskom vyspel\u00fdch \u00fato\u010dn\u00edkov (APT), o ktor\u00fdch podrobnej\u0161ie p\u00ed\u0161eme ni\u017e\u0161ie.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong><span class=\"has-inline-color has-text-link-color\">Adv\u00e9r (adware)<\/span><\/strong><br>Ak je zariadenie infikovan\u00e9 adv\u00e9rom, zobrazuje sa mu neprimeran\u00e9 mno\u017estvo rekl\u00e1m a to aj v \u010dase, ke\u010f by to neo\u010dak\u00e1val \u2013 napr\u00edklad ke\u010f m\u00e1 vypnut\u00fd prehliada\u010d. Ak sa v\u00e1m adv\u00e9r nezd\u00e1 pr\u00edli\u0161 nebezpe\u010dn\u00fd, m\u00f4\u017eete sa m\u00fdli\u0165. Okrem toho, \u017ee ob\u0165a\u017euje pou\u017e\u00edvate\u013ea, pou\u017e\u00edva aj niektor\u00e9 agres\u00edvne techniky, ktor\u00e9 s\u00fa charakteristick\u00e9 pre malv\u00e9r. M\u00f4\u017ee tak bez vedomia obete napr\u00edklad manipulova\u0165 nastavenia zariadenia \u010di in\u0161talova\u0165 alebo odin\u0161talova\u0165 \u010fal\u0161\u00ed softv\u00e9r. Pr\u00e1ve tieto kroky pritom m\u00f4\u017eu znamena\u0165 riziko \u010fal\u0161ej, ove\u013ea v\u00e1\u017enej\u0161ej infekcie.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Samozrejme, funkcie \u0161kodliv\u00e9ho k\u00f3du m\u00f4\u017eu by\u0165 r\u00f4zne a m\u00f4\u017eu sa zameriava\u0165 napr\u00edklad aj na sie\u0165ov\u00fa komunik\u00e1ciu, zbiera\u0165 citliv\u00e9 d\u00e1ta z pam\u00e4te zariadenia, \u010di dokonca \u00fato\u010di\u0165 e\u0161te predt\u00fdm, ne\u017e sa v\u00f4bec na\u0161tartuje opera\u010dn\u00fd syst\u00e9m. V\u00fdnimkou nie s\u00fa ani r\u00f4zne kombin\u00e1cie u\u017e uveden\u00fdch funkci\u00ed alebo malv\u00e9r, ktor\u00fd m\u00e1 viacero \u00farovn\u00ed \u010di modulov s podobnou funkciou (downloader + ransomv\u00e9r, downloader + bankov\u00fd malv\u00e9r + keylogger at\u010f.)<\/p>\n\n\n\n<h2 class=\"has-text-dark-color has-text-color wp-block-heading\" id=\"h-o-dok-e-vyspel-malv-r-ur-en-na-cielen-toky-apt11\">\u010co dok\u00e1\u017ee vyspel\u00fd malv\u00e9r ur\u010den\u00fd na cielen\u00e9 \u00fatoky (APT11)?<\/h2>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Zlo\u010dinci, ktor\u00ed stoja za t\u00fdmto malv\u00e9rom, s\u00fa vo v\u00e4\u010d\u0161ine pr\u00edpadov mimoriadne sk\u00fasen\u00ed v\u00fdvoj\u00e1ri, ktor\u00ed maj\u00fa za sebou roky pr\u00e1ce so \u0161kodliv\u00fdm k\u00f3dom. Ich \u201eprodukty\u201c s\u00fa v\u00e4\u010d\u0161inou modul\u00e1rne \u2013 teda skladaj\u00fa sa z viacer\u00fdch \u010dast\u00ed, ktor\u00e9 sa daj\u00fa \u013eahko prida\u0165 alebo ubra\u0165 \u2013 <strong>vyu\u017e\u00edvaj\u00fa verejne nezn\u00e1me zranite\u013enosti v softv\u00e9ri <\/strong>\u010di ve\u013emi prepracovan\u00e9 manipula\u010dn\u00e9 techniky, aby sa dostali do syst\u00e9mov obete. Je pravdepodobn\u00e9, \u017ee na v\u00fdvoj malv\u00e9ru maj\u00fa dostatok \u010dasu a pe\u0148az\u00ed, tak\u017ee zisk nie je ich hlavnou motiv\u00e1ciou a zameriavaj\u00fa sa sk\u00f4r na \u0161pion\u00e1\u017e \u010di v\u00fdsledn\u00fd ni\u010div\u00fd efekt svojej pr\u00e1ce.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Zlo\u010dinci, ktor\u00ed stoja za t\u00fdmto malv\u00e9rom, s\u00fa vo v\u00e4\u010d\u0161ine pr\u00edpadov<strong> mimoriadne sk\u00fasen\u00ed v\u00fdvoj\u00e1ri, <\/strong>ktor\u00ed maj\u00fa za sebou roky pr\u00e1ce so \u0161kodliv\u00fdm k\u00f3dom. Ich \u201eprodukty\u201c s\u00fa v\u00e4\u010d\u0161inou modul\u00e1rne \u2013 teda skladaj\u00fa sa z viacer\u00fdch \u010dast\u00ed, ktor\u00e9 sa daj\u00fa \u013eahko prida\u0165 alebo ubra\u0165 \u2013 vyu\u017e\u00edvaj\u00fa verejne nezn\u00e1me zranite\u013enosti v softv\u00e9ri \u010di ve\u013emi prepracovan\u00e9 manipula\u010dn\u00e9 techniky, aby sa dostali do syst\u00e9mov obete. Je pravdepodobn\u00e9, \u017ee na v\u00fdvoj malv\u00e9ru maj\u00fa dostatok \u010dasu a pe\u0148az\u00ed, tak\u017ee zisk nie je ich hlavnou motiv\u00e1ciou a zameriavaj\u00fa sa sk\u00f4r na \u0161pion\u00e1\u017e \u010di v\u00fdsledn\u00fd ni\u010div\u00fd efekt svojej pr\u00e1ce.<\/p>\n\n\n\n<h3 class=\"has-text-dark-color has-text-color wp-block-heading\" id=\"h-pre-o-sa-u-nehovor-o-v-rusoch-a-ervoch\">Pre\u010do sa u\u017e nehovor\u00ed o v\u00edrusoch a \u010dervoch?<\/h3>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Obe tieto kateg\u00f3rie \u0161kodliv\u00e9ho k\u00f3du boli roz\u0161\u00edren\u00e9 v minulosti \u2013 presnej\u0161ie v 80. a 90. rokoch. Dnes je \u0161k\u00e1la malv\u00e9ru ove\u013ea \u0161ir\u0161ia a <strong>v\u00edrusy ani \u010dervy nepatria k najdominantnej\u0161\u00edm typom,<\/strong> najm\u00e4 ak sa porovnaj\u00fa s PUA, tr\u00f3jskymi ko\u0148mi, adv\u00e9rom \u010di ransomv\u00e9rom.<\/p>\n\n\n\n<ul class=\"is-style-checkbox has-text-dark-color has-text-color wp-block-list\"><li><strong><span class=\"has-inline-color has-text-link-color\">V\u00edrusy<\/span><\/strong> fungovali podobne ako chr\u00edpka \u010di in\u00e9 v\u00edrusov\u00e9 ochorenie. Potrebovali hostite\u013ea, teda zranite\u013en\u00e9 programy a aplik\u00e1cie, ktor\u00e9 mohli nainfikova\u0165, a prostredn\u00edctvom ktor\u00fdch sa \u010falej \u0161\u00edrili.<\/li><\/ul>\n\n\n\n<ul class=\"is-style-checkbox has-text-dark-color has-text-color wp-block-list\"><li><strong><span class=\"has-inline-color has-text-link-color\">\u010cervy<\/span><\/strong> na \u0161\u00edrenie nepotrebovali \u010fal\u0161\u00ed program ako v\u00edrusy. Dok\u00e1zali sa replikova\u0165 (mno\u017ei\u0165) samotn\u00e9 a \u0161\u00edri\u0165 sa prostredn\u00edctvom siete, e-mailov, \u010detov\u00fdch aplik\u00e1ci\u00ed \u010di prenosn\u00fdch m\u00e9di\u00ed (napr. USB k\u013e\u00fa\u010dov). Tak\u00e9to spr\u00e1vanie sa objavuje aj v s\u00fa\u010dasnosti v spojitosti s tr\u00f3jskymi ko\u0148mi, tie v\u0161ak na tento \u00fa\u010del vyu\u017e\u00edvaj\u00fa r\u00f4zne \u2013 \u010dasto aj legit\u00edmne \u2013 n\u00e1stroje \u010di aplik\u00e1cie.<\/li><\/ul>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns has-bd-color-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-1024x1024.png\" alt=\"\" class=\"wp-image-8142\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-1024x1024.png 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-300x300.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-150x150.png 150w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-768x768.png 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-370x370.png 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-90x90.png 90w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-760x760.png 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:63%\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Kompletn\u00fa verziu <strong><span class=\"has-inline-color has-text-link-color\">Pr\u00edru\u010dku o digit\u00e1lnej bezpe\u010dnosti pre u\u010dite\u013eov 1. a 2. stup\u0148a z\u00e1kladn\u00fdch \u0161k\u00f4l <\/span><\/strong>si m\u00f4\u017eete stiahnu\u0165 vo form\u00e1te pdf. na tomto odkaze. <\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button width-200 is-style-fill\"><a class=\"wp-block-button__link has-bg-color-color has-text-link-background-color has-text-color has-background\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/materialy-pre-ucitelov-na-stiahnutie?utm_source=website&amp;utm_medium=\u010dl\u00e1nok&amp;utm_campaign=pre-ucitelov&amp;utm_content=button-banner\" target=\"_blank\" rel=\"noreferrer noopener\">Stiahnu\u0165 <\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tento \u010dl\u00e1nok je s\u00fa\u010das\u0165ou&nbsp;Pr\u00edru\u010dky o digit\u00e1lnej bezpe\u010dnosti pre u\u010dite\u013eov 1. a 2. stup\u0148a z\u00e1kladn\u00fdch \u0161k\u00f4l.&nbsp; Malv\u00e9r m\u00f4\u017ee ma\u0165 r\u00f4zne podoby. Do tejto skupiny sa radia v\u00edrusy, \u010dervy, ale aj tr\u00f3jske kone, \u010di \u010fal\u0161ie typy \u0161kodliv\u00e9ho k\u00f3du. Ni\u017e\u0161ie si povieme viac o niektor\u00fdch skupin\u00e1ch malv\u00e9ru, s ktor\u00fdmi sa dne\u0161n\u00fd pou\u017e\u00edvate\u013e stretne asi naj\u010dastej\u0161ie: Tr\u00f3jsky k\u00f4\u0148 (alebo Trojan)Funguje na podobnom princ\u00edpe ako p\u00f4vodn\u00fd tr\u00f3jsky&hellip;<\/p>\n","protected":false},"author":5,"featured_media":8096,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[158,150],"tags":[],"class_list":["post-8091","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malver-pre-ucitelov","category-pre-ucitelov"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru? | ESET<\/title>\n<meta name=\"description\" content=\"Pre\u010d\u00edtajte si zoznam najbe\u017enej\u0161\u00edch druhov malv\u00e9ru.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru? | ESET\" \/>\n<meta property=\"og:description\" content=\"Pre\u010d\u00edtajte si zoznam najbe\u017enej\u0161\u00edch druhov malv\u00e9ru.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne na nete | ESET\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESETnaSlovensku\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-14T14:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-20T12:03:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET User\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET User\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/\"},\"author\":{\"name\":\"ESET User\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\"},\"headline\":\"Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru?\",\"datePublished\":\"2021-10-14T14:00:00+00:00\",\"dateModified\":\"2021-10-20T12:03:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/\"},\"wordCount\":1207,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/hlavny-banner-1200x628_ucitelia27-1.jpg\",\"articleSection\":[\"Malv\u00e9r\",\"Pre u\u010dite\u013eov\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/\",\"name\":\"Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru? | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/hlavny-banner-1200x628_ucitelia27-1.jpg\",\"datePublished\":\"2021-10-14T14:00:00+00:00\",\"dateModified\":\"2021-10-20T12:03:21+00:00\",\"description\":\"Pre\u010d\u00edtajte si zoznam najbe\u017enej\u0161\u00edch druhov malv\u00e9ru.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/hlavny-banner-1200x628_ucitelia27-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/hlavny-banner-1200x628_ucitelia27-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"malv\u00e9r n\u00e1hladov\u00fd obr\u00e1zok ESET\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ako-vyzeraju-utoky-bezneho-malveru\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"description\":\"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"caption\":\"Bezpe\u010dne na nete | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ESETnaSlovensku\\\/\",\"https:\\\/\\\/www.instagram.com\\\/eset_slovensko\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/eset\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCtuph4SwEvitc5T-0cE1FuA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\",\"name\":\"ESET User\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"caption\":\"ESET User\"},\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/author\\\/esetuser\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru? | ESET","description":"Pre\u010d\u00edtajte si zoznam najbe\u017enej\u0161\u00edch druhov malv\u00e9ru.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/","og_locale":"sk_SK","og_type":"article","og_title":"Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru? | ESET","og_description":"Pre\u010d\u00edtajte si zoznam najbe\u017enej\u0161\u00edch druhov malv\u00e9ru.","og_url":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/","og_site_name":"Bezpe\u010dne na nete | ESET","article_publisher":"https:\/\/www.facebook.com\/ESETnaSlovensku\/","article_published_time":"2021-10-14T14:00:00+00:00","article_modified_time":"2021-10-20T12:03:21+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-1.jpg","type":"image\/jpeg"}],"author":"ESET User","twitter_card":"summary_large_image","twitter_misc":{"Autor":"ESET User","Predpokladan\u00fd \u010das \u010d\u00edtania":"4 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/#article","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/"},"author":{"name":"ESET User","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e"},"headline":"Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru?","datePublished":"2021-10-14T14:00:00+00:00","dateModified":"2021-10-20T12:03:21+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/"},"wordCount":1207,"publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-1.jpg","articleSection":["Malv\u00e9r","Pre u\u010dite\u013eov"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/","name":"Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru? | ESET","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-1.jpg","datePublished":"2021-10-14T14:00:00+00:00","dateModified":"2021-10-20T12:03:21+00:00","description":"Pre\u010d\u00edtajte si zoznam najbe\u017enej\u0161\u00edch druhov malv\u00e9ru.","breadcrumb":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/#primaryimage","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-1.jpg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia27-1.jpg","width":1200,"height":628,"caption":"malv\u00e9r n\u00e1hladov\u00fd obr\u00e1zok ESET"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ako-vyzeraju-utoky-bezneho-malveru\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnenanete.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Ako vyzeraj\u00fa \u00fatoky be\u017en\u00e9ho malv\u00e9ru?"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","name":"Bezpe\u010dne na nete | ESET","description":"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.","publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnenanete.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization","name":"Bezpe\u010dne na nete | ESET","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","caption":"Bezpe\u010dne na nete | ESET"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ESETnaSlovensku\/","https:\/\/www.instagram.com\/eset_slovensko\/","https:\/\/www.linkedin.com\/company\/eset","https:\/\/www.youtube.com\/channel\/UCtuph4SwEvitc5T-0cE1FuA"]},{"@type":"Person","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e","name":"ESET User","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","caption":"ESET User"},"url":"https:\/\/bezpecnenanete.eset.com\/sk\/author\/esetuser\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/8091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=8091"}],"version-history":[{"count":5,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/8091\/revisions"}],"predecessor-version":[{"id":8712,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/8091\/revisions\/8712"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media\/8096"}],"wp:attachment":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=8091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=8091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=8091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}