{"id":8098,"date":"2021-10-14T13:00:00","date_gmt":"2021-10-14T13:00:00","guid":{"rendered":"https:\/\/bezpecnenanete.eset.com\/sk\/?p=8098"},"modified":"2021-10-20T12:03:33","modified_gmt":"2021-10-20T12:03:33","slug":"ktore-dalsie-formy-kybernetickych-utokov-pozname","status":"publish","type":"post","link":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/","title":{"rendered":"Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me?"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"536\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-1024x536.jpg\" alt=\"in\u00e9 formy kybernetick\u00fdch \u00fatokov ESET\" class=\"wp-image-8099\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-1024x536.jpg 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-300x157.jpg 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-768x402.jpg 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-370x194.jpg 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-760x398.jpg 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28.jpg 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-bg-color-color has-text-link-background-color has-text-color has-background\">Tento \u010dl\u00e1nok je s\u00fa\u010das\u0165ou&nbsp;<strong>Pr\u00edru\u010dky o digit\u00e1lnej bezpe\u010dnosti pre u\u010dite\u013eov 1. a 2. stup\u0148a z\u00e1kladn\u00fdch \u0161k\u00f4l.&nbsp;<\/strong><\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Na to, aby \u00fato\u010dn\u00edk mohol nie\u010do z\u00edska\u0165, potrebuje, aby obe\u0165 aspo\u0148 \u010diasto\u010dne spolupracovala. Keby toti\u017e vytvoril sledovac\u00ed \u0161kodliv\u00fd k\u00f3d, ktor\u00fd nem\u00e1 pr\u00edstup k disku s dokumentmi, fotoapar\u00e1tu, mikrof\u00f3nu \u010di in\u00fdm \u010dastiam syst\u00e9mu, ve\u013ea by nez\u00edskal.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">\u00dato\u010dn\u00edci preto \u010dasto pou\u017e\u00edvaj\u00fa<strong> tzv. soci\u00e1lne in\u017einierstvo, <\/strong>teda prepracovan\u00e9 techniky, ktor\u00fdmi manipuluj\u00fa pou\u017e\u00edvate\u013ea, aby im nevedome dal s\u00fahlas na z\u00e1sahy do zariadenia. Viac o tejto forme \u00fatoku n\u00e1jdete ni\u017e\u0161ie.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Vyspelej\u0161\u00ed \u00fato\u010dn\u00edci maj\u00fa aj \u010fal\u0161ie n\u00e1stroje, ako sa m\u00f4\u017eu dosta\u0165 do zariadenia. Niektor\u00ed h\u013eadaj\u00fa a vyu\u017e\u00edvaj\u00fa doposia\u013e nezn\u00e1me<strong> zero-day zranite\u013enosti <\/strong>v softv\u00e9ri12, pr\u00edpadne maj\u00fa \u0161pecializovan\u00e9 n\u00e1stroje na ich h\u013eadanie (tzv. exploit kity). V in\u00fdch pr\u00edpadoch si zase \u00fato\u010dn\u00edci vytipuj\u00fa legit\u00edmny softv\u00e9r, ktor\u00fd \u201enakazia\u201c (niektor\u00fa z jeho verzi\u00ed) \u0161kodliv\u00fdm k\u00f3dom. P\u00f4vodn\u00ed tvorcovia legit\u00edmneho softv\u00e9ru o tom v\u0161ak nevedia a pou\u017e\u00edvate\u013e, ktor\u00fd si infikovan\u00fa verziu nain\u0161taluje, sa nevedome nainfikuje \u0161kodliv\u00fdm k\u00f3dom.<\/p>\n\n\n\n<p class=\"has-bg-color-color has-text-link-background-color has-text-color has-background\">Zero-day zranite\u013enos\u0165 je zranite\u013enos\u0165, o ktorej tvorca softv\u00e9ru nevie a \u00fato\u010dn\u00edk ju zneu\u017e\u00edva bez toho, aby o nej niekto vedel. Naj\u010dastej\u0161ie sa \u00fato\u010dn\u00edci s\u00fastredia na zn\u00e1me a zdokumentovan\u00e9 zranite\u013enosti, ktor\u00e9 u\u017e boli zverejnen\u00e9 online, nako\u013eko ide o lacnej\u0161iu a \u013eah\u0161iu alternat\u00edvu.<\/p>\n\n\n\n<h3 class=\"has-text-dark-color has-text-color wp-block-heading\" id=\"h-ktor-al-ie-formy-tokov-pozn-me\">Ktor\u00e9 \u010fal\u0161ie formy \u00fatokov pozn\u00e1me?<\/h3>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Kybernetick\u00e9 \u00fatoky maj\u00fa r\u00f4zne podoby a \u0161kodliv\u00fd k\u00f3d nemus\u00ed by\u0165 jedin\u00fdm alebo v\u00fdsledn\u00fdm n\u00e1strojom, ktor\u00fd \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00fa. <\/p>\n\n\n\n<p class=\"has-text-link-color has-text-color\"><strong>\u010eal\u0161\u00edmi pr\u00edkladmi s\u00fa:<\/strong><\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong>Botnet<\/strong> je sie\u0165 infikovan\u00fdch zariaden\u00ed (\u201ebotov\u201c), ktor\u00fa na dia\u013eku ovl\u00e1da \u00fato\u010dn\u00edk prostredn\u00edctvom servera alebo pr\u00edkazmi, ktor\u00e9 si zariadenia odovzd\u00e1vaj\u00fa medzi sebou. Botnet m\u00f4\u017ee \u0161\u00edri\u0165 spam alebo \u0161kodliv\u00fd k\u00f3d, sl\u00fa\u017ei\u0165 ako krytie pre \u00fato\u010dn\u00edka, d\u00e1 sa pou\u017e\u00edva\u0165 na DDoS \u00fatoky (defin\u00edcia ni\u017e\u0161ie). Existuj\u00faci botnet m\u00f4\u017ee \u00fato\u010dn\u00edk dokonca aj prenaj\u00edma\u0165 prostredn\u00edctvom dark webu \u010fal\u0161\u00edm \u00fato\u010dn\u00edkom na in\u00e9 \u00fa\u010dely. Botnet m\u00f4\u017eu tvori\u0165 aj mili\u00f3ny zariaden\u00ed, aktu\u00e1lne sa \u00fato\u010dn\u00edci s\u00fastredia najm\u00e4 na internet vec\u00ed (smart zariadenia alebo IoT), ktor\u00fd je zn\u00e1my hor\u0161\u00edm zabezpe\u010den\u00edm.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong>Distributed Denial of Service (DDoS) \u00fatok<\/strong> m\u00e1 za cie\u013e znefunk\u010dni\u0165 str\u00e1nku alebo online slu\u017ebu, pri\u010dom na to vyu\u017e\u00edva sie\u0165ov\u00fa prev\u00e1dzku (traffic) vytvoren\u00fa botnetom. Ve\u013ek\u00e1 sie\u0165 infikovan\u00fdch zariaden\u00ed toti\u017e dok\u00e1\u017ee robi\u0165 obrovsk\u00e9 mno\u017estvo pr\u00edstupov na ur\u010den\u00fa str\u00e1nku, \u010d\u00edm pre\u0165a\u017e\u00ed servery, na ktor\u00fdch be\u017e\u00ed. Jedny z najv\u00e4\u010d\u0161\u00edch \u00fatokov tohto druhu sa odohrali e\u0161te na jese\u0148 2016, ke\u010f vyradili z prev\u00e1dzky ve\u013ek\u00e9 \u010dasti internetu v USA, no najv\u00e4\u010d\u0161\u00ed \u00fatok sa zatia\u013e odohral v marci 2018.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong>Exploit<\/strong> je anglick\u00e9 slovo, ktor\u00e9ho v\u00fdznam (\u201evyu\u017ei\u0165 nie\u010do vo svoj prospech\u201c) sa v negat\u00edvnom zmysle preniesol aj do oblasti digit\u00e1lnej bezpe\u010dnosti. Ide toti\u017e o program, kus k\u00f3du alebo postup, ktor\u00fd \u00fato\u010dn\u00edci vytvorili tak, aby zneu\u017e\u00edval zranite\u013enosti a chyby v softv\u00e9ri alebo hardv\u00e9ri obete s cie\u013eom ich ovl\u00e1dnu\u0165.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong>Phishing<\/strong> je snaha \u00fato\u010dn\u00edkov zbiera\u0165 citliv\u00e9 \u00fadaje a d\u00e1ta o obeti, pri\u010dom \u00fato\u010dn\u00edci sa vyd\u00e1vaj\u00fa za d\u00f4veryhodn\u00fa organiz\u00e1ciu, slu\u017ebu alebo osobu. Zaslan\u00fd falo\u0161n\u00fd odkaz pou\u017e\u00edvate\u013ea zavedie na str\u00e1nku, ktor\u00e1 sa n\u00e1padne podob\u00e1 napr\u00edklad na str\u00e1nky soci\u00e1lnej siete, e-mailovej slu\u017eby, internetbankingu. Na phishingov\u00e9 linky m\u00f4\u017ee pou\u017e\u00edvate\u013e \u010dasto narazi\u0165 v spamov\u00fdch e-mailoch, \u0161\u00edria sa v\u0161ak aj cez \u010det, soci\u00e1lne siete \u010di SMS. Mnoh\u00e9 z nich dok\u00e1\u017ee odchyti\u0165 bezpe\u010dnostn\u00fd softv\u00e9r, st\u00e1le v\u0161ak plat\u00ed pou\u017e\u00edvate\u013esk\u00e9 pravidlo dvakr\u00e1t meraj a raz klikaj.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong>Soci\u00e1lne in\u017einierstvo<\/strong> je snaha \u00fato\u010dn\u00edka zmanipulova\u0165 obe\u0165, aby nav\u0161t\u00edvila nebezpe\u010dn\u00fa \u010di falo\u0161n\u00fa str\u00e1nku, kde z nej m\u00f4\u017ee \u00fato\u010dn\u00edk vyl\u00e1ka\u0165 citliv\u00e9 \u00fadaje. Ide tie\u017e o techniky, ktor\u00e9 sa sna\u017eia obe\u0165 vystra\u0161i\u0165 \u010di in\u00fdm sp\u00f4sobom prin\u00fati\u0165, aby vykonala aktivitu, ktor\u00fa po\u017eaduje \u00fato\u010dn\u00edk, napr\u00edklad si nain\u0161talovala nechcen\u00fa\/nebezpe\u010dn\u00fa aplik\u00e1ciu alebo \u0161kodliv\u00fd softv\u00e9r. Pr\u00edkladmi tak\u00fdchto postupov je phishing \u010di scam.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong>Spam<\/strong> je ak\u00e1ko\u013evek nevy\u017eiadan\u00e1 elektronick\u00e1 po\u0161ta, ktor\u00e1 m\u00f4\u017ee ma\u0165 podobu e-mailu, SMS spr\u00e1vy alebo spr\u00e1vy v \u010detovej aplik\u00e1cii.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong>Scam<\/strong> je typ soci\u00e1lneho in\u017einierstva, v ktorom ide o snahu \u00fato\u010dn\u00edka oklama\u0165 obe\u0165 alebo skupinu obet\u00ed a z\u00edska\u0165 ich d\u00f4veru, ktor\u00fa n\u00e1sledne m\u00f4\u017ee \u00fato\u010dn\u00edk vyu\u017ei\u0165 vo svoj prospech. Tieto premyslen\u00e9 klamstv\u00e1 naj\u010dastej\u0161ie zneu\u017e\u00edvaj\u00fa \u013eudsk\u00e9 vlastnosti, ako s\u00fa naivita, s\u00facit, nezodpovednos\u0165 \u010di chamtivos\u0165. Pr\u00edkladmi scamu s\u00fa falo\u0161n\u00e9 e-shopy s lacn\u00fdmi zna\u010dkov\u00fdmi okuliarmi \u010di s\u00fa\u0165a\u017ee, pri ktor\u00fdch \u00fato\u010dn\u00edci s\u013eubuj\u00fa napr\u00edklad nov\u00fd iPhone zadarmo. Obete v\u0161ak nakoniec len pripravia o d\u00e1ta alebo peniaze.<\/p>\n\n\n\n<p class=\"has-text-dark-color has-text-color\"><strong>Skimming<\/strong> patr\u00ed do kateg\u00f3rie \u00fatokov spojen\u00fdch s bankovn\u00edctvom. Skimmer je nen\u00e1padn\u00e9 hardv\u00e9rov\u00e9 zariadenie, ktor\u00e9 \u00fato\u010dn\u00edci nain\u0161taluj\u00fa na bankomat, aby skenovalo \u00fadaje o vlo\u017een\u00fdch kart\u00e1ch. Tieto cenn\u00e9 \u00fadaje sa n\u00e1sledne ulo\u017eia na disk alebo odo\u0161l\u00fa \u00fato\u010dn\u00edkovi, ktor\u00fd ich m\u00f4\u017ee \u010falej spe\u0148a\u017ei\u0165 alebo vyu\u017ei\u0165 na n\u00e1kupy v mene obete. Podobn\u00e9 \u00fatoky sa pritom dej\u00fa aj v digit\u00e1lnom prostred\u00ed, kde \u00fato\u010dn\u00edci kusom \u0161kodliv\u00e9ho k\u00f3du nainfikuj\u00fa platobn\u00fa br\u00e1nu legit\u00edmneho e-shopu.<\/p>\n\n\n\n<div style=\"height:40px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-columns has-bd-color-background-color has-background is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-1024x1024.png\" alt=\"\" class=\"wp-image-8142\" srcset=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-1024x1024.png 1024w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-300x300.png 300w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-150x150.png 150w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-768x768.png 768w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-370x370.png 370w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-90x90.png 90w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup-760x760.png 760w, https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/BNN_pre_ucitelov_brozura_mockup.png 1200w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:63%\">\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p class=\"has-text-dark-color has-text-color\">Kompletn\u00fa verziu <strong><span class=\"has-inline-color has-text-link-color\">Pr\u00edru\u010dku o digit\u00e1lnej bezpe\u010dnosti pre u\u010dite\u013eov 1. a 2. stup\u0148a z\u00e1kladn\u00fdch \u0161k\u00f4l <\/span><\/strong>si m\u00f4\u017eete stiahnu\u0165 vo form\u00e1te pdf. na tomto odkaze. <\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button width-200 is-style-fill\"><a class=\"wp-block-button__link has-bg-color-color has-text-link-background-color has-text-color has-background\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/materialy-pre-ucitelov-na-stiahnutie?utm_source=website&amp;utm_medium=\u010dl\u00e1nok&amp;utm_campaign=pre-ucitelov&amp;utm_content=button-banner\" target=\"_blank\" rel=\"noreferrer noopener\">Stiahnu\u0165 <\/a><\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tento \u010dl\u00e1nok je s\u00fa\u010das\u0165ou&nbsp;Pr\u00edru\u010dky o digit\u00e1lnej bezpe\u010dnosti pre u\u010dite\u013eov 1. a 2. stup\u0148a z\u00e1kladn\u00fdch \u0161k\u00f4l.&nbsp; Na to, aby \u00fato\u010dn\u00edk mohol nie\u010do z\u00edska\u0165, potrebuje, aby obe\u0165 aspo\u0148 \u010diasto\u010dne spolupracovala. Keby toti\u017e vytvoril sledovac\u00ed \u0161kodliv\u00fd k\u00f3d, ktor\u00fd nem\u00e1 pr\u00edstup k disku s dokumentmi, fotoapar\u00e1tu, mikrof\u00f3nu \u010di in\u00fdm \u010dastiam syst\u00e9mu, ve\u013ea by nez\u00edskal. \u00dato\u010dn\u00edci preto \u010dasto pou\u017e\u00edvaj\u00fa tzv. soci\u00e1lne in\u017einierstvo, teda prepracovan\u00e9 techniky, ktor\u00fdmi manipuluj\u00fa&hellip;<\/p>\n","protected":false},"author":5,"featured_media":8102,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[158,150],"tags":[],"class_list":["post-8098","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malver-pre-ucitelov","category-pre-ucitelov"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me? | ESET<\/title>\n<meta name=\"description\" content=\"Kybernetick\u00e9 \u00fatoky maj\u00fa r\u00f4zne podoby a \u0161kodliv\u00fd k\u00f3d nemus\u00ed by\u0165 jedin\u00fdm alebo v\u00fdsledn\u00fdm n\u00e1strojom, ktor\u00fd \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00fa.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me? | ESET\" \/>\n<meta property=\"og:description\" content=\"Kybernetick\u00e9 \u00fatoky maj\u00fa r\u00f4zne podoby a \u0161kodliv\u00fd k\u00f3d nemus\u00ed by\u0165 jedin\u00fdm alebo v\u00fdsledn\u00fdm n\u00e1strojom, ktor\u00fd \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00fa.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne na nete | ESET\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESETnaSlovensku\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-14T13:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-20T12:03:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET User\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET User\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/\"},\"author\":{\"name\":\"ESET User\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\"},\"headline\":\"Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me?\",\"datePublished\":\"2021-10-14T13:00:00+00:00\",\"dateModified\":\"2021-10-20T12:03:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/\"},\"wordCount\":1000,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/hlavny-banner-1200x628_ucitelia28-1.jpg\",\"articleSection\":[\"Malv\u00e9r\",\"Pre u\u010dite\u013eov\"],\"inLanguage\":\"sk-SK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/\",\"name\":\"Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me? | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/hlavny-banner-1200x628_ucitelia28-1.jpg\",\"datePublished\":\"2021-10-14T13:00:00+00:00\",\"dateModified\":\"2021-10-20T12:03:33+00:00\",\"description\":\"Kybernetick\u00e9 \u00fatoky maj\u00fa r\u00f4zne podoby a \u0161kodliv\u00fd k\u00f3d nemus\u00ed by\u0165 jedin\u00fdm alebo v\u00fdsledn\u00fdm n\u00e1strojom, ktor\u00fd \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00fa.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/hlavny-banner-1200x628_ucitelia28-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/hlavny-banner-1200x628_ucitelia28-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"kyberneitck= \u00fatoky n\u00e1hladov\u00fd obr\u00e1zok ESET\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/pre-ucitelov\\\/ktore-dalsie-formy-kybernetickych-utokov-pozname\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"description\":\"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne na nete | ESET\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/bnn.svg\",\"caption\":\"Bezpe\u010dne na nete | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ESETnaSlovensku\\\/\",\"https:\\\/\\\/www.instagram.com\\\/eset_slovensko\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/eset\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCtuph4SwEvitc5T-0cE1FuA\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/#\\\/schema\\\/person\\\/dea8a7aed2893ceadc39b5e354c5b05e\",\"name\":\"ESET User\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g\",\"caption\":\"ESET User\"},\"url\":\"https:\\\/\\\/bezpecnenanete.eset.com\\\/sk\\\/author\\\/esetuser\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me? | ESET","description":"Kybernetick\u00e9 \u00fatoky maj\u00fa r\u00f4zne podoby a \u0161kodliv\u00fd k\u00f3d nemus\u00ed by\u0165 jedin\u00fdm alebo v\u00fdsledn\u00fdm n\u00e1strojom, ktor\u00fd \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00fa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/","og_locale":"sk_SK","og_type":"article","og_title":"Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me? | ESET","og_description":"Kybernetick\u00e9 \u00fatoky maj\u00fa r\u00f4zne podoby a \u0161kodliv\u00fd k\u00f3d nemus\u00ed by\u0165 jedin\u00fdm alebo v\u00fdsledn\u00fdm n\u00e1strojom, ktor\u00fd \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00fa.","og_url":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/","og_site_name":"Bezpe\u010dne na nete | ESET","article_publisher":"https:\/\/www.facebook.com\/ESETnaSlovensku\/","article_published_time":"2021-10-14T13:00:00+00:00","article_modified_time":"2021-10-20T12:03:33+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-1.jpg","type":"image\/jpeg"}],"author":"ESET User","twitter_card":"summary_large_image","twitter_misc":{"Autor":"ESET User","Predpokladan\u00fd \u010das \u010d\u00edtania":"4 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/#article","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/"},"author":{"name":"ESET User","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e"},"headline":"Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me?","datePublished":"2021-10-14T13:00:00+00:00","dateModified":"2021-10-20T12:03:33+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/"},"wordCount":1000,"publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-1.jpg","articleSection":["Malv\u00e9r","Pre u\u010dite\u013eov"],"inLanguage":"sk-SK"},{"@type":"WebPage","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/","name":"Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me? | ESET","isPartOf":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-1.jpg","datePublished":"2021-10-14T13:00:00+00:00","dateModified":"2021-10-20T12:03:33+00:00","description":"Kybernetick\u00e9 \u00fatoky maj\u00fa r\u00f4zne podoby a \u0161kodliv\u00fd k\u00f3d nemus\u00ed by\u0165 jedin\u00fdm alebo v\u00fdsledn\u00fdm n\u00e1strojom, ktor\u00fd \u00fato\u010dn\u00edci vyu\u017e\u00edvaj\u00fa.","breadcrumb":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/#primaryimage","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-1.jpg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2021\/08\/hlavny-banner-1200x628_ucitelia28-1.jpg","width":1200,"height":628,"caption":"kyberneitck= \u00fatoky n\u00e1hladov\u00fd obr\u00e1zok ESET"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/pre-ucitelov\/ktore-dalsie-formy-kybernetickych-utokov-pozname\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnenanete.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Ktor\u00e9 \u010fal\u0161ie formy kybernetick\u00fdch \u00fatokov pozn\u00e1me?"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#website","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","name":"Bezpe\u010dne na nete | ESET","description":"Praktick\u00e9 rady, ako rozpozna\u0165 digit\u00e1lne hrozby.","publisher":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnenanete.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#organization","name":"Bezpe\u010dne na nete | ESET","url":"https:\/\/bezpecnenanete.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","contentUrl":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-content\/uploads\/2022\/10\/bnn.svg","caption":"Bezpe\u010dne na nete | ESET"},"image":{"@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ESETnaSlovensku\/","https:\/\/www.instagram.com\/eset_slovensko\/","https:\/\/www.linkedin.com\/company\/eset","https:\/\/www.youtube.com\/channel\/UCtuph4SwEvitc5T-0cE1FuA"]},{"@type":"Person","@id":"https:\/\/bezpecnenanete.eset.com\/sk\/#\/schema\/person\/dea8a7aed2893ceadc39b5e354c5b05e","name":"ESET User","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/29915b098f8f9677cc5796ee2dd2358dd215824ff925345fe845a1eaf50bbb0d?s=96&d=mm&r=g","caption":"ESET User"},"url":"https:\/\/bezpecnenanete.eset.com\/sk\/author\/esetuser\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/8098","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=8098"}],"version-history":[{"count":5,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/8098\/revisions"}],"predecessor-version":[{"id":8713,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/posts\/8098\/revisions\/8713"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media\/8102"}],"wp:attachment":[{"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=8098"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=8098"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnenanete.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=8098"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}