{"id":4661,"date":"2022-09-16T14:59:16","date_gmt":"2022-09-16T12:59:16","guid":{"rendered":"https:\/\/dev.bezpecnevofirme.eset.com\/sk\/?p=4661"},"modified":"2022-10-18T13:36:22","modified_gmt":"2022-10-18T11:36:22","slug":"ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie","status":"publish","type":"post","link":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/","title":{"rendered":"Ransomv\u00e9r: zlo\u010dineck\u00e9 umenie \u0161kodliv\u00e9ho k\u00f3du, n\u00e1tlaku a manipul\u00e1cie"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d.jpg\" alt=\"Ransomver prirucka nahladovy obrazok\" class=\"wp-image-4718\" srcset=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d.jpg 1200w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-300x157.jpg 300w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-1024x536.jpg 1024w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-768x402.jpg 768w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-370x194.jpg 370w, https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-760x398.jpg 760w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Ransomv\u00e9r patr\u00ed k najz\u00e1va\u017enej\u0161\u00edm kybernetick\u00fdm hrozb\u00e1m, ktor\u00fdm m\u00f4\u017ee va\u0161a organiz\u00e1cia \u010deli\u0165. Pre\u010do? Preto\u017ee zlo\u010dineck\u00e9 gangy, ktor\u00e9 vytv\u00e1raj\u00fa tento typ malv\u00e9ru a poskytuj\u00fa ransomv\u00e9r ako slu\u017ebu, volia v posledn\u00fdch rokoch in\u00fd, cielenej\u0161\u00ed pr\u00edstup k t\u00fdmto druhom \u00fatokov, pri ktorom je ove\u013ea \u0165a\u017e\u0161ie z\u00edska\u0165 metriky.<\/p>\n\n\n\n<p>Kybernetick\u00ed zlo\u010dinci takisto neust\u00e1le prich\u00e1dzaj\u00fa s nov\u00fdmi sp\u00f4sobmi, ako zabezpe\u010di\u0165, aby dostali po\u017eadovan\u00fa sumu, zvy\u010dajne tak, \u017ee zvy\u0161uj\u00fa n\u00e1tlak na obe\u0165. V roku 2019 sa za\u010dali spolieha\u0165 na dvojit\u00e9 vydieranie, ktor\u00e9 kombinuje \u201ebe\u017en\u00e9\u201c \u0161ifrovanie \u00fadajov s ich exfiltr\u00e1ciou. T\u00fdmto sp\u00f4sobom nielen\u017ee obeti zabr\u00e1nili v pr\u00edstupe k hodnotn\u00fdm, d\u00f4le\u017eit\u00fdm alebo inak citliv\u00fdm s\u00faborom, ale mohli ich tie\u017e zverejni\u0165 alebo preda\u0165 in\u00fdm \u0161kodliv\u00fdm akt\u00e9rom.<\/p>\n\n\n\n<p>Cie\u013eom tohto dokumentu je uk\u00e1za\u0165, ak\u00e9 nebezpe\u010dn\u00e9 rozmery ransomv\u00e9r nabral, op\u00edsa\u0165 najnov\u0161ie techniky pou\u017e\u00edvan\u00e9 ransomv\u00e9rov\u00fdmi gangmi a navrhn\u00fa\u0165, ako m\u00f4\u017ee va\u0161a organiz\u00e1cia zn\u00ed\u017ei\u0165 mieru vystavenia ransomv\u00e9rov\u00fdm \u00fatokom a sp\u00f4soben\u00e9 \u0161kody. Venujeme sa v \u0148om trom vektorom \u00fatoku ransomv\u00e9rom v tomto porad\u00ed: vzdialen\u00fd pr\u00edstup, e\u2011mail a dod\u00e1vate\u013esk\u00fd re\u0165azec.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button\"><a class=\"wp-block-button__link\" href=\"https:\/\/www.eset.com\/fileadmin\/ESET\/SK\/Landing\/2022\/progress_protected\/ESET_Ransomver.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Stiahnu\u0165 pr\u00edru\u010dku<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p> \u017diadne odvetvie nie je im\u00fanne proti cielen\u00e9mu ransomv\u00e9ru, a hoci<br \/>\nnejde o technicky najkomplexnej\u0161iu hrozbu, ochrana pred \u0148ou by mala by\u0165 stredobodom z\u00e1ujmu bezpe\u010dnostn\u00fdch t\u00edmov.<\/p>\n","protected":false},"author":9,"featured_media":4719,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[138,144],"tags":[],"class_list":["post-4661","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-expertne-publikacie","category-vzdelavacie-publikacie"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ako sa br\u00e1ni\u0165 proti ransomv\u00e9rov\u00fdm \u00fatokom? | ESET<\/title>\n<meta name=\"description\" content=\"Najnov\u0161ie trendy z oblasti ransomv\u00e9rov\u00fdch \u00fatokov spolu s radami, ako sa br\u00e1ni\u0165, n\u00e1jdete v pr\u00edru\u010dke, ktor\u00fa pripravili experti spolo\u010dnosti ESET.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ako sa br\u00e1ni\u0165 proti ransomv\u00e9rov\u00fdm \u00fatokom? | ESET\" \/>\n<meta property=\"og:description\" content=\"Najnov\u0161ie trendy z oblasti ransomv\u00e9rov\u00fdch \u00fatokov spolu s radami, ako sa br\u00e1ni\u0165, n\u00e1jdete v pr\u00edru\u010dke, ktor\u00fa pripravili experti spolo\u010dnosti ESET.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/\" \/>\n<meta property=\"og:site_name\" content=\"Bezpe\u010dne vo firme | ESET\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-16T12:59:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-18T11:36:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 min\u00faty\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Ransomv\u00e9r: zlo\u010dineck\u00e9 umenie \u0161kodliv\u00e9ho k\u00f3du, n\u00e1tlaku a manipul\u00e1cie\",\"datePublished\":\"2022-09-16T12:59:16+00:00\",\"dateModified\":\"2022-10-18T11:36:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/\"},\"wordCount\":241,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/09\\\/hlavny-banner-BVF-1200x628_2022d-1.jpg\",\"articleSection\":[\"Expertn\u00e9 publik\u00e1cie\",\"Vzdel\u00e1vacie publik\u00e1cie\"],\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/\",\"name\":\"Ako sa br\u00e1ni\u0165 proti ransomv\u00e9rov\u00fdm \u00fatokom? | ESET\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/09\\\/hlavny-banner-BVF-1200x628_2022d-1.jpg\",\"datePublished\":\"2022-09-16T12:59:16+00:00\",\"dateModified\":\"2022-10-18T11:36:22+00:00\",\"description\":\"Najnov\u0161ie trendy z oblasti ransomv\u00e9rov\u00fdch \u00fatokov spolu s radami, ako sa br\u00e1ni\u0165, n\u00e1jdete v pr\u00edru\u010dke, ktor\u00fa pripravili experti spolo\u010dnosti ESET.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/#primaryimage\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/09\\\/hlavny-banner-BVF-1200x628_2022d-1.jpg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/09\\\/hlavny-banner-BVF-1200x628_2022d-1.jpg\",\"width\":1200,\"height\":628,\"caption\":\"ransomver prirucka ilustracny obrazok\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/expertne-publikacie\\\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Domovsk\u00e1 str\u00e1nka\",\"item\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomv\u00e9r: zlo\u010dineck\u00e9 umenie \u0161kodliv\u00e9ho k\u00f3du, n\u00e1tlaku a manipul\u00e1cie\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#website\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#organization\",\"name\":\"Bezpe\u010dne vo firme | ESET\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"contentUrl\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2022\\\/08\\\/BVF_logo_svg_new.svg\",\"caption\":\"Bezpe\u010dne vo firme | ESET\"},\"image\":{\"@id\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"\",\"url\":\"https:\\\/\\\/bezpecnevofirme.eset.com\\\/sk\\\/author\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ako sa br\u00e1ni\u0165 proti ransomv\u00e9rov\u00fdm \u00fatokom? | ESET","description":"Najnov\u0161ie trendy z oblasti ransomv\u00e9rov\u00fdch \u00fatokov spolu s radami, ako sa br\u00e1ni\u0165, n\u00e1jdete v pr\u00edru\u010dke, ktor\u00fa pripravili experti spolo\u010dnosti ESET.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/","og_locale":"sk_SK","og_type":"article","og_title":"Ako sa br\u00e1ni\u0165 proti ransomv\u00e9rov\u00fdm \u00fatokom? | ESET","og_description":"Najnov\u0161ie trendy z oblasti ransomv\u00e9rov\u00fdch \u00fatokov spolu s radami, ako sa br\u00e1ni\u0165, n\u00e1jdete v pr\u00edru\u010dke, ktor\u00fa pripravili experti spolo\u010dnosti ESET.","og_url":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/","og_site_name":"Bezpe\u010dne vo firme | ESET","article_published_time":"2022-09-16T12:59:16+00:00","article_modified_time":"2022-10-18T11:36:22+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Autor":"","Predpokladan\u00fd \u010das \u010d\u00edtania":"2 min\u00faty"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/#article","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/"},"author":{"name":"","@id":""},"headline":"Ransomv\u00e9r: zlo\u010dineck\u00e9 umenie \u0161kodliv\u00e9ho k\u00f3du, n\u00e1tlaku a manipul\u00e1cie","datePublished":"2022-09-16T12:59:16+00:00","dateModified":"2022-10-18T11:36:22+00:00","mainEntityOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/"},"wordCount":241,"commentCount":0,"publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-1.jpg","articleSection":["Expertn\u00e9 publik\u00e1cie","Vzdel\u00e1vacie publik\u00e1cie"],"inLanguage":"sk-SK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/","name":"Ako sa br\u00e1ni\u0165 proti ransomv\u00e9rov\u00fdm \u00fatokom? | ESET","isPartOf":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/#primaryimage"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/#primaryimage"},"thumbnailUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-1.jpg","datePublished":"2022-09-16T12:59:16+00:00","dateModified":"2022-10-18T11:36:22+00:00","description":"Najnov\u0161ie trendy z oblasti ransomv\u00e9rov\u00fdch \u00fatokov spolu s radami, ako sa br\u00e1ni\u0165, n\u00e1jdete v pr\u00edru\u010dke, ktor\u00fa pripravili experti spolo\u010dnosti ESET.","breadcrumb":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/"]}]},{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/#primaryimage","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-1.jpg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/09\/hlavny-banner-BVF-1200x628_2022d-1.jpg","width":1200,"height":628,"caption":"ransomver prirucka ilustracny obrazok"},{"@type":"BreadcrumbList","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/expertne-publikacie\/ransomver-zlocinecke-umenie-skodliveho-kodu-natlaku-a-manipulacie\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Domovsk\u00e1 str\u00e1nka","item":"https:\/\/bezpecnevofirme.eset.com\/sk\/"},{"@type":"ListItem","position":2,"name":"Ransomv\u00e9r: zlo\u010dineck\u00e9 umenie \u0161kodliv\u00e9ho k\u00f3du, n\u00e1tlaku a manipul\u00e1cie"}]},{"@type":"WebSite","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#website","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","name":"Bezpe\u010dne vo firme | ESET","description":"","publisher":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/bezpecnevofirme.eset.com\/sk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Organization","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#organization","name":"Bezpe\u010dne vo firme | ESET","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/","logo":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","contentUrl":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-content\/uploads\/sites\/2\/2022\/08\/BVF_logo_svg_new.svg","caption":"Bezpe\u010dne vo firme | ESET"},"image":{"@id":"https:\/\/bezpecnevofirme.eset.com\/sk\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"","url":"https:\/\/bezpecnevofirme.eset.com\/sk\/author\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/4661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/comments?post=4661"}],"version-history":[{"count":3,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/4661\/revisions"}],"predecessor-version":[{"id":4898,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/posts\/4661\/revisions\/4898"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media\/4719"}],"wp:attachment":[{"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/media?parent=4661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/categories?post=4661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bezpecnevofirme.eset.com\/sk\/wp-json\/wp\/v2\/tags?post=4661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}