{"id":611,"date":"2022-09-15T18:13:39","date_gmt":"2022-09-15T18:13:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=611"},"modified":"2022-09-15T18:13:39","modified_gmt":"2022-09-15T18:13:39","slug":"fjernangreb","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/da\/cyberangreb\/fjernangreb\/","title":{"rendered":"Fjernangreb"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"what-is-a-remote-attack\"><strong>Hvad er et fjernangreb?<\/strong><\/h2>\n\n\n<p>N\u00e5r en tyv stj\u00e6ler materielle ting fra et hus, risikerer han at efterlade DNA-beviser eller fingeraftryk, som kan f\u00f8re til, at han bliver anholdt. Men hackere, der beg\u00e5r cyberkriminalitet, kan g\u00f8re det uden nogensinde at v\u00e6re i n\u00e6rheden af deres offer og har derfor langt mindre sandsynlighed for at blive fanget. Desuden kan erfarne hackere give uskyldige skylden ved at placere falske beviser online, som peger tilbage p\u00e5 de uskyldiges digitale enheder eller konti.<\/p>\n\n\n\n<p>Da erfarne hackere er dygtige til at finde svagheder i eksisterende systemer, kan ingen af de forebyggende v\u00e6rkt\u00f8jer eller metoder stoppe dem. Desv\u00e6rre ser det ikke ud til, at de, der er ansvarlige for at udvikle juridiske foranstaltninger til at beskytte mennesker og virksomheder mod hacking, selv har den forn\u00f8dne viden eller er bekymrede over det.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-remote-attacks\"><strong>Typer af fjernangreb<\/strong><\/h2>\n\n\n<p>Angribere kan tage kontrol over eksterne systemer p\u00e5 forskellige m\u00e5der:<\/p>\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"dns-poisoning\">DNS-forgiftning<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-619\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg\" alt=\"Infografik over DNS-forgiftningsangreb \" width=\"823\" height=\"566\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg 800w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 823px) 100vw, 823px\" \/><\/figure>\n\n\n\n<p>Hver enhed og server har et s\u00e6t tal, der kaldes en IP-adresse (internetprotokol), som bruges til at identificere den i kommunikationen. Hvert websted har et dom\u00e6nenavn, som hj\u00e6lper folk med at finde de \u00f8nskede websteder (f.eks. www.domain.com). Dom\u00e6nenavnesystemet (<a href=\"https:\/\/www.javatpoint.com\/computer-network-dns\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DNS<\/a>) konverterer det brugerspecificerede dom\u00e6nenavn til den korrekte IP-adresse ved hj\u00e6lp af DNS-servere for at dirigere trafikken korrekt. Alt dette styres via DNS-servere.<\/p>\n\n\n\n<p>DNS-forgiftning er, n\u00e5r en angriber omdirigerer trafik fra det tilsigtede websted til et falsk websted ved at \u00e6ndre DNS-poster. Hvis du f.eks. pr\u00f8ver at logge ind p\u00e5 din netbank, men i stedet bliver omdirigeret til en side, der ser identisk ud med bankens login-side, har angriberen udf\u00f8rt et DNS-forgiftningsangreb. Hvis du indtaster f\u00f8lsomme oplysninger p\u00e5 denne falske hjemmeside, kan angriberen stj\u00e6le dine oplysninger til egen fordel.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"port-scanning\">Scanning af port<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"820\" height=\"564\" class=\"wp-image-626\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg\" alt=\"Infografik om TCP IP-hijacking\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><\/figure>\n\n\n\n<p>Portscanning er en m\u00e5de at finde ud af, hvilke porte p\u00e5 et netv\u00e6rk der er \u00e5bne. Det g\u00f8res ved at fors\u00f8ge at sende og modtage data gennem hver port, ligesom n\u00e5r man banker p\u00e5 d\u00f8ren for at se, om der er nogen hjemme. Hvis nogen svarer, ved man, at porten er \u00e5ben. De k\u00f8rer en portscanning mod et netv\u00e6rk eller en server for at vise, hvilke porte der er \u00e5bne og lytter (modtager information), og om der findes sikkerhedsenheder som firewalls mellem kilden og m\u00e5let. Portscanning kan ogs\u00e5 bruges til at s\u00e6tte fingeraftryk p\u00e5 en enhed ved at se p\u00e5 aktiviteten i de enkelte porte.<\/p>\n\n\n\n<p>Dette program bruges ikke kun af sikkerhedsadministratorer til at overv\u00e5ge deres netv\u00e6rk for eventuelle s\u00e5rbarheder, men det bruges ogs\u00e5 ofte af hackere som en del af deres rekognoscering, n\u00e5r de leder efter svage punkter, de kan udnytte.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"dos-attacks\">DoS-angreb<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-628\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg\" alt=\"Dos Attack infografik \" width=\"825\" height=\"568\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--768x528.jpg 768w\" sizes=\"auto, (max-width: 825px) 100vw, 825px\" \/><\/figure>\n\n\n\n<p>M\u00e5let med et DoS-angreb er at forhindre folk, der har tilladelse til at bruge en maskine eller et netv\u00e6rk, i at bruge det. Det g\u00f8res ved at oversv\u00f8mme m\u00e5let med sp\u00f8rgsm\u00e5l og data, som f\u00e5r systemet til at g\u00e5 ned. Medarbejdere, medlemmer og forbrugere kan ikke bruge systemet, fordi deres legitime foresp\u00f8rgsler bliver overv\u00e6ldet af angriberens ulovlige aktiviteter.<\/p>\n\n\n\n<p><a href=\"https:\/\/securitybriefing.net\/da\/ddos\/hvad-er-et-ddos-angreb\/\">DDoS-angreb<\/a> kan v\u00e6re meget dyre for de ber\u00f8rte. Angrebene kan handle om tyveri af data eller aktiver. Virksomheder som banker, butikker, medievirksomheder og statslige institutioner er ofte m\u00e5l for deres webservere i disse angreb.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"tcp-ip-hijacking\">TCP \/IP-hijacking<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-624\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg\" alt=\"Infografik om TCP IP-hijacking\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>Denne type angreb er, n\u00e5r en hacker overtager en session mellem to enheder, der allerede kommunikerer med hinanden. Angriberen skal v\u00e6re p\u00e5 samme netv\u00e6rk som offeret for at udf\u00f8re dette angreb.<\/p>\n\n\n\n<p>N\u00e5r angriberen overtager sessionen, kan de aflytte samtalen og \u00e6ndre de data, der udveksles. Dette angreb spr\u00f8jter ofte malware ind i et system eller stj\u00e6ler f\u00f8lsomme oplysninger.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"smb-relay-attack\">SMB-rel\u00e6-angreb<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-620\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg\" alt=\"Infografik om SMB-rel\u00e6angreb\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>Server Message Block (SMB) Relay-angreb er desv\u00e6rre almindelige i virksomheder, der stadig bruger NTLM Version 2-godkendelse. Cyberkriminelle kan i al hemmelighed videresende f\u00f8lsomme data til andre servere uden at blive opdaget ved i al hemmelighed at lytte til netv\u00e6rkstrafikken.<\/p>\n\n\n\n<p>T\u00e6nk p\u00e5 dette problem ud fra en eksemplarisk brugers og en ondskabsfuld hackers perspektiv. Det ideelle scenarie er, n\u00e5r den faktiske person fors\u00f8ger at logge ind og autentificere sig selv. N\u00e5r en hacker i stedet for en gyldig bruger fors\u00f8ger at bruge stj\u00e5lne legitimationsoplysninger ved at overv\u00e5ge netv\u00e6rkstrafikken for at f\u00e5 adgang - s\u00e5 er der ikke brug for en adgangskode.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recent-advancements-in-hacking-technology\"><strong>Nylige fremskridt inden for hacking-teknologi<\/strong><\/h2>\n\n\n<p>Hackere finder hele tiden nye m\u00e5der at f\u00e5 adgang til begr\u00e6nsede oplysninger p\u00e5, hvilket g\u00f8r det indlysende, at loven om computerbedrageri og -misbrug skal opdateres. Denne lov blev skabt i 1980'erne, men er ikke blevet \u00e6ndret siden 2011, hvilket betyder, at den ikke reagerer p\u00e5 de seneste teknologiske fremskridt. CFAA skal v\u00e6re p\u00e5 forkant med hackere ved at blive opdateret regelm\u00e6ssigt.<\/p>\n\n\n\n<p>At lyve p\u00e5 en datingprofil virker m\u00e5ske ikke vigtigt, men hvis hjemmesidens brugsbetingelser overtr\u00e6des, kan du blive anklaget for hacking i henhold til <a href=\"https:\/\/www.nacdl.org\/Landing\/ComputerFraudandAbuseAct\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CFAA<\/a>. Denne mindre forseelse giver et \u00e5rs f\u00e6ngsel eller en b\u00f8de p\u00e5 $100.000.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"bypassing-captcha-test\">Omg\u00e5else af CAPTCHA-test<\/h3>\n\n\n<p>CAPTCHA-testen afg\u00f8r, om en bruger er et menneske eller en robot. Den bruges ofte til sikkerhedsform\u00e5l, f.eks. til at logge ind p\u00e5 din bankkonto. Hvis du bliver taget i at fors\u00f8ge at omg\u00e5 CAPTCHA, kan du blive anklaget for hacking og risikere op til 8 \u00e5rs f\u00e6ngsel.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.captcha.net\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CAPTCHA <\/a>er et websites sikkerhedsforanstaltning for at forhindre bots i at f\u00e5 adgang til dem. Den viser et billede, der er sv\u00e6rt at tyde, og for at f\u00e5 adgang skal man indtaste de bogstaver og tal, der vises i en boks under billedet. Hackere blev dog s\u00e5 dygtige til at hacke den, at CAPTCHA m\u00e5tte blive mere kompleks, hvilket resulterede i, at de blev l\u00f8st oftere end mennesker. For at bek\u00e6mpe dette, <strong><a href=\"https:\/\/cloud.google.com\/recaptcha-enterprise\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reCAPTCHA <\/a><\/strong>blev udviklet og gik ud p\u00e5 at se p\u00e5 sm\u00e5 firkanter og markere dem med en brandhane, en bus eller en fodg\u00e6ngerovergang.<\/p>\n\n\n\n<p>Indtil videre, <strong>reCAPTCHA<\/strong> er stadig aktiv. Det vil dog ikke vare l\u00e6nge, f\u00f8r der kan findes automatiserede maskinl\u00e6ringsteknikker til at omg\u00e5 den.<\/p>\n\n\n\n<p>B\u00e5de reCAPTCHA og CAPTCHA blev udviklet ud fra tanken om, at det er muligt at identificere mennesker fra computere online p\u00e5 en billig, brugervenlig og hurtig m\u00e5de. Disse sp\u00f8rgsm\u00e5l tvinger os til at overveje, hvad der g\u00f8r os til mennesker, og om maskiner kan kopiere det aspekt. Det indlysende svar er, at vi ikke ved det, fordi vi nu er hoppet ud i den dybe ende af den filosofiske dam.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"so-how-do-you-stay-ahead-of-the-curve-and-ensure-your-business-or-website-is-not-hacked\"><strong>S\u00e5 hvordan holder du dig p\u00e5 forkant med udviklingen og sikrer, at din virksomhed eller hjemmeside ikke bliver hacket?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"keep-your-software-up-to-date\">Hold din software opdateret<\/h3>\n\n\n<p>Det vigtigste er at holde din software opdateret. Det omfatter operativsystemet, alle applikationer og plugins. For\u00e6ldet software er en af de mest almindelige m\u00e5der, hvorp\u00e5 hackere f\u00e5r adgang til et system.<\/p>\n\n\n\n<p>En anden m\u00e5de at beskytte sig selv p\u00e5 er at \u00e6ndre sit standardbrugernavn og -adgangskode til alle enheder og konti. Mange mennesker er ikke klar over, at standardbrugernavn og -adgangskode er nemme at finde online. Hackere ved det og pr\u00f8ver disse oplysninger, f\u00f8r de g\u00e5r videre til mere komplekse metoder.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-twofactor-authentication\">Brug to-faktor-autentificering<\/h3>\n\n\n<p>To-faktor-autentificering (2FA) er en af de bedste m\u00e5der at beskytte dine konti mod at blive hacket. 2FA tilf\u00f8jer et ekstra lag af sikkerhed ved at kr\u00e6ve, at du indtaster b\u00e5de en adgangskode og en kode, der sendes til din telefon. Det g\u00f8r det meget sv\u00e6rere for hackere at f\u00e5 adgang til din konto, selv om de har din adgangskode.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"disable-anonymous-system-access\">Deaktiver anonym systemadgang<\/h3>\n\n\n<p>Angreb p\u00e5 fjernadgang er stigende, og det er vigtigt at tage skridt til at beskytte sig selv. Cyberkriminelle bliver mere og mere sofistikerede, s\u00e5 det er vigtigt at v\u00e6re p\u00e5 forkant med udviklingen. At holde sin software opdateret, bruge to-faktor-godkendelse og deaktivere anonym adgang er alle effektive m\u00e5der at beskytte sig p\u00e5. Efterh\u00e5nden som teknologien udvikler sig, bliver vi n\u00f8dt til at udvikle nye m\u00e5der at holde os foran hackerne p\u00e5 i denne katten-efter-musen-leg.<\/p>","protected":false},"excerpt":{"rendered":"<p>Hvad er et fjernangreb? N\u00e5r en tyv stj\u00e6ler materielle ting fra et hus, risikerer han at efterlade DNA-beviser eller fingeraftryk, som kan f\u00f8re til, at han bliver anholdt. Men hackere, der... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/da\/cyberangreb\/fjernangreb\/\">Read more <span class=\"screen-reader-text\">Fjernangreb<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":650,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Remote Attack | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/da\/cyberangreb\/fjernangreb\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote Attack | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; L\u00e6s mere Remote Attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/da\/cyberangreb\/fjernangreb\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T18:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Remote Attack\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"wordCount\":1260,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"name\":\"Remote Attack | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"width\":558,\"height\":500,\"caption\":\"What is a Remote Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/da\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fjernangreb | Sikkerhedsbriefing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/da\/cyberangreb\/fjernangreb\/","og_locale":"da_DK","og_type":"article","og_title":"Remote Attack | Security Briefing","og_description":"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; L\u00e6s mere Remote Attack","og_url":"https:\/\/securitybriefing.net\/da\/cyberangreb\/fjernangreb\/","og_site_name":"Security Briefing","article_published_time":"2022-09-15T18:13:39+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","type":"image\/png"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"security","Estimeret l\u00e6setid":"6 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Remote Attack","datePublished":"2022-09-15T18:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"wordCount":1260,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","articleSection":["Cyber Attacks"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","name":"Fjernangreb | Sikkerhedsbriefing","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","datePublished":"2022-09-15T18:13:39+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","width":558,"height":500,"caption":"What is a Remote Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Remote Attack"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sikkerhedsbriefing","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sikkerhedsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"sikkerhed","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin er seniorskribent for Government Technology. Hun har tidligere skrevet for PYMNTS og The Bay State Banner og har en BA i kreativ skrivning fra Carnegie Mellon. Hun bor uden for Boston.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/da\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/comments?post=611"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/posts\/611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media\/650"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/media?parent=611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/categories?post=611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/da\/wp-json\/wp\/v2\/tags?post=611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}