{"id":8594,"date":"2021-10-19T16:07:00","date_gmt":"2021-10-19T13:07:00","guid":{"rendered":"https:\/\/programmingpool.com\/everything-you-need-to-know-about-phishing\/"},"modified":"2026-04-07T11:57:43","modified_gmt":"2026-04-07T08:57:43","slug":"everything-you-need-to-know-about-phishing","status":"publish","type":"post","link":"https:\/\/programmingpool.com\/ro\/everything-you-need-to-know-about-phishing\/","title":{"rendered":"Tot ce trebuie s\u0103 \u0219tii despre phishing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"8594\" class=\"elementor elementor-8594 elementor-6764\" data-elementor-settings=\"{&quot;page_masthead_image_height&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:900,&quot;sizes&quot;:[]},&quot;page_masthead_image_height_tablet&quot;:{&quot;unit&quot;:&quot;vh&quot;,&quot;size&quot;:70,&quot;sizes&quot;:[]},&quot;page_masthead_image_height_mobile&quot;:{&quot;unit&quot;:&quot;vh&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;page_masthead_background_position_x&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;page_masthead_background_position_x_tablet&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;page_masthead_background_position_x_mobile&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;page_masthead_background_position_y&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;page_masthead_background_position_y_tablet&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;page_masthead_background_position_y_mobile&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;rhye_hide_title_disabled&quot;:&quot;yes&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a46907a e-con-full e-flex e-con e-parent\" data-id=\"a46907a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ccb419e elementor-widget elementor-widget-rhye-widget-content-block\" data-id=\"ccb419e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"rhye-widget-content-block.default\">\n\t\t\t\t\t\n\t\t<div class=\"section section-content clearfix  \" data-arts-os-animation=\"true\">\n\t\t\t\t\t\t<div class=\"section-content__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"section-content__wrapper-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"w-100\"><\/div>\n\t\t\t\t\t\t\t<div class=\"section-content__text split-text js-split-text\" data-split-text-type=\"lines\" data-split-text-set=\"lines\"><h3>Ai fost tentat s\u0103 dai click, nu-i a\u0219a? Nu ar trebui s\u0103 te sim\u021bi vinovat, deoarece multe persoane cad \u00een astfel de capcane. <\/h3><p>\u021ai-am oferit ceva valoros, gratuit, dar pentru o perioad\u0103 limitat\u0103. Infractorii cibernetici \u0219tiu c\u0103 este mai u\u0219or s\u0103 p\u0103c\u0103leasc\u0103 oamenii dec\u00e2t s\u0103 p\u0103trund\u0103 prin tehnologiile de securitate. <\/p><p><a href=\"https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf\" target=\"_blank\" rel=\"noopener\">Conform FBI<\/a>, phishing-ul a fost cel mai frecvent tip de infrac\u021biune cibernetic\u0103 \u00een 2020, iar incidentele de phishing aproape s-au dublat ca frecven\u021b\u0103, de la 114.702 victime \u00een 2019 la 241.324 victime \u00een 2020.<\/p><h3>Deci, ce este phishing-ul?<\/h3><p>Phishing-ul reprezint\u0103 \u00eencercarea de a colecta informa\u021bii personale folosind e-mailuri sau site-uri \u00een\u0219el\u0103toare. Ce face ca datele tale s\u0103 fie at\u00e2t de valoroase? Datele tale sunt considerate o resurs\u0103 \u2014 o resurs\u0103 care \u00eei ajut\u0103 s\u0103 \u00ee\u021bi fure banii \u0219i s\u0103 \u00ee\u021bi v\u00e2nd\u0103 informa\u021biile c\u0103tre advertiseri. A\u0219a cum se \u00eent\u00e2mpl\u0103 \u00een pescuit, \u201epe\u0219tele\u201d va fi prins dac\u0103 pescarul are o momeal\u0103 bun\u0103. Exist\u0103 mai multe tipuri de phishing: vishing (echivalentul phishing-ului prin telefon), whaling (o metod\u0103 de a viza direct persoane influente dintr-o organiza\u021bie), smishing (prin mesaje text sau SMS), pop-up phishing \u0219i altele.     <\/p><h3>De ce dau oamenii click?<\/h3><p>Oamenii cred c\u0103 expeditorul este legitim, astfel c\u0103 eroarea uman\u0103 duce la succesul atacurilor cibernetice. Distragerea aten\u021biei este unul dintre principalele motive pentru care oamenii cad \u00een capcanele phishing-ului. Imagineaz\u0103-\u021bi! Ai un deadline, e\u0219ti stresat s\u0103 finalizezi sarcina, iar \u00een acela\u0219i timp un coleg \u00ee\u021bi scrie \u0219i \u00ee\u021bi cere ajutorul. Dou\u0103 minute mai t\u00e2rziu, prime\u0219ti un e-mail: \u201eAm actualizat politica de autentificare; te rug\u0103m s\u0103 \u00ee\u021bi confirmi contul acces\u00e2nd Google Docs.\u201d Dai click rapid, nu pierzi timpul \u0219i \u00ee\u021bi introduci parola. \u0218i gata, ai fost prins \ud83d\ude00 Distragerea aten\u021biei este un fenomen destul de frecvent \u00een r\u00e2ndul celor care lucreaz\u0103 de la distan\u021b\u0103. Mai mult de jum\u0103tate dintre angaja\u021bii care lucreaz\u0103 remote recunosc c\u0103 sunt mai distra\u0219i atunci c\u00e2nd lucreaz\u0103 de acas\u0103.       <\/p><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a89f41a e-con-full pt-small pb-small e-flex e-con e-parent\" data-id=\"a89f41a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b24416b elementor-widget elementor-widget-heading\" data-id=\"b24416b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cum putem evita aceste atacuri?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-602647b e-con-full pb-medium e-flex e-con e-parent\" data-id=\"602647b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57b5a11 elementor-widget elementor-widget-rhye-widget-content-block\" data-id=\"57b5a11\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"rhye-widget-content-block.default\">\n\t\t\t\t\t\n\t\t<div class=\"section section-content clearfix  \" data-arts-os-animation=\"true\">\n\t\t\t\t\t\t<div class=\"section-content__inner\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"section-content__wrapper-content\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"w-100\"><\/div>\n\t\t\t\t\t\t\t<div class=\"section-content__text split-text js-split-text\" data-split-text-type=\"lines\" data-split-text-set=\"lines\"><h4>Fii la curent cu noile tehnici.<\/h4><p>Noi escrocherii de tip phishing sunt dezvoltate \u00een mod constant. Cea mai bun\u0103 protec\u021bie \u00eempotriva phishing-ului este s\u0103 \u0219tii cum s\u0103 \u00eel recuno\u0219ti de la bun \u00eenceput. Aici po\u021bi g\u0103si c\u00e2teva dintre cele mai recente tendin\u021be.  <\/p><h4>Verific\u0103 expeditorul<\/h4><p>Verific\u0103 \u00eentotdeauna expeditorul \u0219i asigur\u0103-te c\u0103 solicitarea este legitim\u0103 \u00eenainte de a ac\u021biona. Nu deschide ata\u0219amente, nu da click pe linkuri \u0219i a\u0219a mai departe. Nicio organiza\u021bie legitim\u0103 nu va trimite e-mailuri de pe o adres\u0103 care se termin\u0103 \u00een \u201e@gmail.com\u201d. Majoritatea organiza\u021biilor, cu excep\u021bia celor foarte mici, au propriul domeniu de e-mail \u0219i conturi de companie. Dac\u0103 numele domeniului (partea de dup\u0103 simbolul @) corespunde expeditorului aparent al e-mailului, mesajul este, cel mai probabil, legitim.    <\/p><h4>Verific\u0103 linkurile<\/h4><p>Un e-mail de phishing poate pretinde c\u0103 provine de la o companie legitim\u0103, iar atunci c\u00e2nd dai click pe link c\u0103tre site, acesta poate ar\u0103ta exact ca site-ul real. Nu da niciodat\u0103 click pe niciun link f\u0103r\u0103 s\u0103 \u00eel verifici. Po\u021bi trece cursorul peste linkuri pentru a vedea dac\u0103 sunt corecte. Fii atent la diferen\u021be \u00een ortografie, caractere suspecte sau ad\u0103ugarea de numere. De asemenea, po\u021bi verifica linkurile aici: virustotal.com.    <\/p><h4>Opre\u0219te-te \u0219i g\u00e2nde\u0219te de dou\u0103 ori \u00eenainte s\u0103 dai click!<\/h4><p>Dac\u0103 e-mailul este urgent sau \u00eencearc\u0103 s\u0103 te fac\u0103 s\u0103 ac\u021bionezi rapid, opre\u0219te-te \u0219i g\u00e2nde\u0219te-te: cine sunt \u0219i ce vor de la tine. Majoritatea e-mailurilor de phishing \u00eencep cu \u201eDear Customer\u201d, a\u0219a c\u0103 ar trebui s\u0103 fii atent atunci c\u00e2nd prime\u0219ti astfel de mesaje.  <\/p><h4>Folose\u0219te antivirus \u0219i firewall-uri<\/h4><p>Antivirusurile scaneaz\u0103 fi\u0219ierele care ajung pe computerul t\u0103u prin internet. Acestea ajut\u0103 la prevenirea deterior\u0103rii sistemului, fie c\u0103 este vorba despre un PC sau un telefon. Trebuie s\u0103 fii atent \u0219i atunci c\u00e2nd faci tranzac\u021bii sau deschizi e-mailuri de pe telefon. Firewall-urile te protejeaz\u0103 \u00eempotriva atacatorilor cibernetici externi, protej\u00e2nd computerul sau re\u021beaua de trafic de re\u021bea mali\u021bios sau inutil.   <\/p><h4>Nu oferi niciodat\u0103 informa\u021biile tale personale.<\/h4><p>Nu ar trebui s\u0103 trimitem date personale, cum ar fi o fotografie a cardului de credit sau a c\u0103r\u021bii de identitate. Ar trebui s\u0103 facem acest lucru doar dac\u0103 am verificat punctele de mai sus \u0219i suntem 100% siguri c\u0103 este \u00een regul\u0103 \u0219i necesar. <\/p><p>Nu te l\u0103sa influen\u021bat doar pentru c\u0103 un corespondent pare s\u0103 \u0219tie multe despre tine. Aceste a\u0219a-numite atacuri \u201espear-phishing\u201d reprezint\u0103 o practic\u0103 frauduloas\u0103 de a trimite e-mailuri aparent de la un expeditor cunoscut sau de \u00eencredere, pentru a determina persoanele vizate s\u0103 dezv\u0103luie informa\u021bii confiden\u021biale. <\/p><p>Nu trebuie s\u0103 a\u0219tep\u021bi s\u0103 fii atacat. Te po\u021bi antrena particip\u00e2nd la acest quiz sau la unul similar. <\/p><\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a1cc0d elementor-widget elementor-widget-heading\" data-id=\"5a1cc0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">R\u0103m\u00e2i \u00een siguran\u021b\u0103!<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00cenva\u021b\u0103 cum s\u0103 identifici escrocheriile de tip phishing, cum s\u0103 evi\u021bi capcanele \u0219i cum s\u0103 \u00ee\u021bi protejezi datele personale online.<\/p>\n","protected":false},"author":9,"featured_media":8595,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[136,229,230],"tags":[314,315,316,317],"class_list":["post-8594","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-perspective","category-resurse","category-tips-tricks","tag-online-payments","tag-phising","tag-security-web","tag-visa"],"acf":[],"_links":{"self":[{"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/posts\/8594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/comments?post=8594"}],"version-history":[{"count":9,"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/posts\/8594\/revisions"}],"predecessor-version":[{"id":10122,"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/posts\/8594\/revisions\/10122"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/media\/8595"}],"wp:attachment":[{"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/media?parent=8594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/categories?post=8594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/programmingpool.com\/ro\/wp-json\/wp\/v2\/tags?post=8594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}