{"id":38883,"date":"2021-01-08T14:39:56","date_gmt":"2021-01-08T13:39:56","guid":{"rendered":"https:\/\/www.soitron.com\/social-hacking-v-primem-prenosu\/"},"modified":"2022-06-07T13:08:27","modified_gmt":"2022-06-07T12:08:27","slug":"social-hacking-v-primem-prenosu","status":"publish","type":"post","link":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/","title":{"rendered":"Social hacking v p\u0159\u00edm\u00e9m p\u0159enosu"},"content":{"rendered":"\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Pod\u011bl\u00edm se s v\u00e1mi o re\u00e1lnou zku\u0161enost. Z vlastn\u00ed iniciativy jsem se rozhodl podstoupit mal\u00fd experiment, i kdy\u017e mi od za\u010d\u00e1tku bylo jasn\u00e9, \u017ee jde o \u0159\u00edzen\u00fd \u201e<a href=\"https:\/\/en.wikipedia.org\/wiki\/Social_hacking\" target=\"_blank\" rel=\"noreferrer noopener\">social hacking<\/a>\u201c. Snad tyto \u0159\u00e1dky poslou\u017e\u00ed b\u011b\u017en\u00fdm u\u017eivatel\u016fm jako rada, aby neud\u011blali neuv\u00e1\u017een\u00fd krok.<\/strong><\/p>\n\n\n\n<p>V posledn\u00ed dob\u011b jsem m\u011bl n\u011bkolik telefon\u00e1t\u016f z r\u016fzn\u00fdch nezn\u00e1m\u00fdch \u010d\u00edsel ze Slovenska, USA a naposledy z N\u011bmecka. Kdy\u017e jsem telefon zvednul, poka\u017ed\u00e9 na m\u011b promluvila anglicky mluv\u00edc\u00ed Indka, pr\u00fd pracovnice Microsoftu. Upozornila m\u011b na probl\u00e9m s m\u00fdm po\u010d\u00edta\u010dem, kter\u00fd se jim objevil v support centru. Prvn\u00ed telefon\u00e1ty jsem odbyl, ale p\u0159i \u010dtvrt\u00e9m jsem si \u0159ekl, \u017ee nech\u00e1m v\u011bcem voln\u00fd pr\u016fb\u011bh. Od za\u010d\u00e1tku mi bylo jasn\u00e9, \u017ee je to cel\u00e9 podvod, ale cht\u011bl jsem zjistit, kam a\u017e to zajde&#8230;<\/p>\n\n\n\n<p>Dov\u011bd\u011bl jsem se, \u017ee m\u016fj po\u010d\u00edta\u010d napadli hacke\u0159i, m\u016f\u017eou mi smazat data a \u201eMicrosoft&#8221; m\u011b zachr\u00e1n\u00ed. Na ot\u00e1zku, pro\u010d m\u011b kontaktuj\u00ed pr\u00e1v\u011b t\u00edmhle zp\u016fsobem, jsem se dov\u011bd\u011bl, \u017ee e-maily, kter\u00e9 mi pos\u00edlali, mi hacke\u0159i v po\u010d\u00edta\u010di vymazali. Hodn\u011bkr\u00e1t se sna\u017eili zjistit, jestli jde o m\u016fj soukrom\u00fd nebo firemn\u00ed po\u010d\u00edta\u010d<em> (tvrdil jsem, \u017ee soukrom\u00fd)<\/em>. Pro\u0161el jsem \u201er\u016fzn\u00e1 odd\u011blen\u00ed\u201c, a\u017e jsem skon\u010dil u mu\u017ee, kter\u00fd m\u011bl b\u00fdt \u201especialista\u201c. Ten m\u011b p\u0159es telefon navedl, abych si otev\u0159el Event Viewer, kde jsem se s\u00e1m m\u011bl p\u0159esv\u011bd\u010dit o tom, \u017ee m\u011b opravdu ovl\u00e1daj\u00ed hacke\u0159i<em> (v logu je hodn\u011b warning\u016f a sem tam n\u011bjak\u00fd ten error, co\u017e je u opera\u010dn\u00edho syst\u00e9mu Windows \u00fapln\u011b norm\u00e1ln\u00ed)<\/em>. Na argument, \u017ee jsou to jen ne\u0161kodn\u00e9 hl\u00e1\u0161ky, jsem dostal odpov\u011b\u010f, \u017ee to \u201ehacke\u0159i pr\u00e1v\u011b takhle maskuj\u00ed\u201c. To byl okam\u017eik, kdy u\u017e jsem m\u011bl b\u00fdt dostate\u010dn\u011b p\u0159esv\u011bd\u010den\u00fd, \u017ee se m\u016fj po\u010d\u00edta\u010d opravdu stal ter\u010dem \u00fatoku. Chlap\u00edk \u201em\u011b dostal\u201c tam, kam cht\u011bl, a \u0161el rovnou na v\u011bc&#8230;<\/p>\n\n\n\n<p>P\u0159es webov\u00fd prohl\u00ed\u017ee\u010d m\u011b navedl k tomu, abych si st\u00e1hl nap\u0159. UltraVNC a TeamViewer <em>(program, kter\u00fd mu umo\u017en\u00ed p\u0159ipojit se na d\u00e1lku k m\u00e9mu po\u010d\u00edta\u010di)<\/em>. Na ot\u00e1zku, jestli se ke mn\u011b chce p\u0159ipojit, odpov\u011bd\u011bl, \u017ee ne. M\u00e1 pr\u00fd j\u00edt o speci\u00e1ln\u00ed software, p\u0159es kter\u00fd mi um\u00ed \u0161kody sp\u00e1chan\u00e9 hackery odstranit z po\u010d\u00edta\u010de. Po\u0159\u00e1d m\u011b p\u0159esv\u011bd\u010doval, \u017ee jsem jen oby\u010dejn\u00fd u\u017eivatel, tak\u017ee tomu nem\u016f\u017eu rozum\u011bt, a \u017ee pr\u00e1v\u011b on m\u011b \u201ezachr\u00e1n\u00ed\u201c. Kdy\u017e jsem mu vysv\u011btlil, \u017ee \u201et\u011bmhle v\u011bcem rozum\u00edm\u201c a v\u00edm, co d\u011bl\u00e1, telefon\u00e1t velmi rychle ukon\u010dil.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">O \u010cEM TO CEL\u00c9 BYLO?<\/h2>\n\n\n\n<p>Jde o skute\u010dn\u00fd p\u0159\u00edklad <strong>social hackingu<\/strong>, kdy <strong>se \u00fato\u010dn\u00edk sna\u017e\u00ed p\u0159esv\u011bd\u010dit nic netu\u0161\u00edc\u00edho u\u017eivatele, aby ho \u201epustil\u201c do sv\u00e9ho po\u010d\u00edta\u010de<\/strong>. \u00dato\u010dn\u00edk by t\u00edm p\u0159evzal kontrolu nad po\u010d\u00edta\u010dem, daty, \u00fa\u010dty a dal\u0161\u00edmi citliv\u00fdmi \u00fadaji u\u017eivatele.<\/p>\n\n\n\n<p>Je pot\u0159eba v\u011bd\u011bt, \u017ee dne\u0161n\u00ed po\u010d\u00edta\u010de jsou relativn\u011b dob\u0159e zabezpe\u010den\u00e9, pokud se jejich opera\u010dn\u00ed syst\u00e9my pravideln\u011b aktualizuj\u00ed. <strong>Nejv\u011bt\u0161\u00edm bezpe\u010dnostn\u00edm rizikem b\u00fdv\u00e1 \u010dlov\u011bk za kl\u00e1vesnic\u00ed<\/strong>, kter\u00fd klik\u00e1n\u00edm na podvodn\u00e9 odkazy, instalov\u00e1n\u00edm neov\u011b\u0159en\u00fdch program\u016f, p\u0159ed\u00e1v\u00e1n\u00edm vlastn\u00edch hesel a dal\u0161\u00edmi neuv\u00e1\u017een\u00fdmi kroky otev\u00edr\u00e1 \u00fato\u010dn\u00edk\u016fm dve\u0159e do sv\u00e9ho po\u010d\u00edta\u010de. Jin\u00fdmi slovy \u2013 nejlep\u0161\u00ed antivir m\u016f\u017ee b\u00fdt v\u017edycky s\u00e1m u\u017eivatel. Jenom pot\u0159ebuje pou\u017e\u00edvat onu pov\u011bstnou \u0161petku zdrav\u00e9ho rozumu.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Pod\u011bl\u00edm se s v\u00e1mi o re\u00e1lnou zku\u0161enost. Z vlastn\u00ed iniciativy jsem se rozhodl podstoupit mal\u00fd experiment, i kdy\u017e mi od za\u010d\u00e1tku bylo jasn\u00e9, \u017ee jde o \u0159\u00edzen\u00fd \u201esocial hacking\u201c. Snad tyto \u0159\u00e1dky poslou\u017e\u00ed b\u011b\u017en\u00fdm u\u017eivatel\u016fm jako rada, aby neud\u011blali neuv\u00e1\u017een\u00fd krok. V posledn\u00ed dob\u011b jsem m\u011bl n\u011bkolik telefon\u00e1t\u016f z r\u016fzn\u00fdch nezn\u00e1m\u00fdch \u010d\u00edsel ze Slovenska, USA [&hellip;]<\/p>\n","protected":false},"author":28,"featured_media":38713,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[144],"tags":[313],"news_categories":[371],"class_list":["post-38883","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-clanky-cs","tag-kyberneticka-bezpecnost-cs","news_categories-bezpecnost-cs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social hacking v p\u0159\u00edm\u00e9m p\u0159enosu - Soitron<\/title>\n<meta name=\"description\" content=\"N\u00e1\u0161 kolega se rozhodl podstoupit mal\u00fd experiment, kdy na sob\u011b nechal odzkou\u0161et \u0159\u00edzen\u00fd \u201esocial hacking\u201c. Zjist\u011bte, jak neud\u011blat neuv\u00e1\u017een\u00fd krok.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"cs_CZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social hacking v p\u0159\u00edm\u00e9m p\u0159enosu - Soitron\" \/>\n<meta property=\"og:description\" content=\"N\u00e1\u0161 kolega se rozhodl podstoupit mal\u00fd experiment, kdy na sob\u011b nechal odzkou\u0161et \u0159\u00edzen\u00fd \u201esocial hacking\u201c. Zjist\u011bte, jak neud\u011blat neuv\u00e1\u017een\u00fd krok.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/\" \/>\n<meta property=\"og:site_name\" content=\"Soitron\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-08T13:39:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-07T12:08:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788-1051x788.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1051\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jana Skalska\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jana Skalska\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social hacking v p\u0159\u00edm\u00e9m p\u0159enosu - Soitron","description":"N\u00e1\u0161 kolega se rozhodl podstoupit mal\u00fd experiment, kdy na sob\u011b nechal odzkou\u0161et \u0159\u00edzen\u00fd \u201esocial hacking\u201c. Zjist\u011bte, jak neud\u011blat neuv\u00e1\u017een\u00fd krok.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"cs_CZ","og_type":"article","og_title":"Social hacking v p\u0159\u00edm\u00e9m p\u0159enosu - Soitron","og_description":"N\u00e1\u0161 kolega se rozhodl podstoupit mal\u00fd experiment, kdy na sob\u011b nechal odzkou\u0161et \u0159\u00edzen\u00fd \u201esocial hacking\u201c. Zjist\u011bte, jak neud\u011blat neuv\u00e1\u017een\u00fd krok.","og_url":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/","og_site_name":"Soitron","article_published_time":"2021-01-08T13:39:56+00:00","article_modified_time":"2022-06-07T12:08:27+00:00","og_image":[{"width":1051,"height":788,"url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788-1051x788.jpg","type":"image\/jpeg"}],"author":"Jana Skalska","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jana Skalska","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/#article","isPartOf":{"@id":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/"},"author":{"name":"Jana Skalska","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/70724a93c7b9106bcdf018c2b66c2b0b"},"headline":"Social hacking v p\u0159\u00edm\u00e9m p\u0159enosu","datePublished":"2021-01-08T13:39:56+00:00","dateModified":"2022-06-07T12:08:27+00:00","mainEntityOfPage":{"@id":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/"},"wordCount":673,"publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"image":{"@id":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788-1051x788.jpg","keywords":["Kybernetick\u00e1 bezpe\u010dnost"],"articleSection":["\u010dl\u00e1nky"],"inLanguage":"cs-CZ"},{"@type":"WebPage","@id":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/","url":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/","name":"Social hacking v p\u0159\u00edm\u00e9m p\u0159enosu - Soitron","isPartOf":{"@id":"https:\/\/new.soitron.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/#primaryimage"},"image":{"@id":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/#primaryimage"},"thumbnailUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788-1051x788.jpg","datePublished":"2021-01-08T13:39:56+00:00","dateModified":"2022-06-07T12:08:27+00:00","description":"N\u00e1\u0161 kolega se rozhodl podstoupit mal\u00fd experiment, kdy na sob\u011b nechal odzkou\u0161et \u0159\u00edzen\u00fd \u201esocial hacking\u201c. Zjist\u011bte, jak neud\u011blat neuv\u00e1\u017een\u00fd krok.","breadcrumb":{"@id":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/#breadcrumb"},"inLanguage":"cs-CZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/"]}]},{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/#primaryimage","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788-1051x788.jpg","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/social-hacking-1051x788-1051x788.jpg","width":1051,"height":788,"caption":"anonymous person in the hood sitting in front of computer working with laptop and mobile phone"},{"@type":"BreadcrumbList","@id":"https:\/\/new.soitron.com\/cs\/social-hacking-v-primem-prenosu\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/new.soitron.com\/"},{"@type":"ListItem","position":2,"name":"Social hacking v p\u0159\u00edm\u00e9m p\u0159enosu"}]},{"@type":"WebSite","@id":"https:\/\/new.soitron.com\/#website","url":"https:\/\/new.soitron.com\/","name":"Soitron","description":"Soitron je IT firma s 30letou tradici.","publisher":{"@id":"https:\/\/new.soitron.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/new.soitron.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"cs-CZ"},{"@type":"Organization","@id":"https:\/\/new.soitron.com\/#organization","name":"Soitron","url":"https:\/\/new.soitron.com\/","logo":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/","url":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","contentUrl":"https:\/\/new.soitron.com\/wp-content\/uploads\/2016\/10\/Soitron_logo.png","width":224,"height":56,"caption":"Soitron"},"image":{"@id":"https:\/\/new.soitron.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/70724a93c7b9106bcdf018c2b66c2b0b","name":"Jana Skalska","image":{"@type":"ImageObject","inLanguage":"cs-CZ","@id":"https:\/\/new.soitron.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/47ab9fce582b442842aa803334d9c66d8790ee1a9fe8d33044a172f9a1b2716b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47ab9fce582b442842aa803334d9c66d8790ee1a9fe8d33044a172f9a1b2716b?s=96&d=mm&r=g","caption":"Jana Skalska"},"sameAs":["https:\/\/www.soitron.com"],"url":"https:\/\/new.soitron.com\/cs\/author\/skalska\/"}]}},"_links":{"self":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/38883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/users\/28"}],"replies":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/comments?post=38883"}],"version-history":[{"count":0,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/posts\/38883\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media\/38713"}],"wp:attachment":[{"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/media?parent=38883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/categories?post=38883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/tags?post=38883"},{"taxonomy":"news_categories","embeddable":true,"href":"https:\/\/new.soitron.com\/cs\/wp-json\/wp\/v2\/news_categories?post=38883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}