{"id":1378,"date":"2023-02-13T21:43:54","date_gmt":"2023-02-13T21:43:54","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1378"},"modified":"2023-02-13T21:43:54","modified_gmt":"2023-02-13T21:43:54","slug":"technikai-tamogatasi-csalasok","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/csalasok\/technikai-tamogatasi-csalasok\/","title":{"rendered":"Technikai t\u00e1mogat\u00e1si csal\u00e1sok"},"content":{"rendered":"<p>Nem titok, hogy az internet vesz\u00e9lyes hely lehet. Ahhoz, hogy megv\u00e9dd magad, tudnod kell, mi van odakint, \u00e9s hogyan c\u00e9lozhat meg t\u00e9ged; a technikai t\u00e1mogat\u00e1si csal\u00e1sok csak egyek ezek k\u00f6z\u00fcl a kock\u00e1zatok k\u00f6z\u00fcl. Ebben a blogbejegyz\u00e9sben gyakorlati tan\u00e1csokat adunk arra vonatkoz\u00f3an, hogyan ker\u00fclheted el, hogy \u00e1ldozatt\u00e1 v\u00e1lj, valamint tippeket adunk az online biztons\u00e1g meg\u0151rz\u00e9s\u00e9hez, hogy semmi se \u00e9rjen meglepet\u00e9sk\u00e9nt. Ezekkel az er\u0151forr\u00e1sokkal a rendelkez\u00e9sedre, ne v\u00e1lj a n\u00f6vekv\u0151 sz\u00e1m\u00edt\u00f3g\u00e9pes b\u0171n\u00f6z\u00e9s j\u00e1rv\u00e1ny\u00e1nak \u00fajabb statisztik\u00e1j\u00e1v\u00e1!<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"whatnbsparenbsptechnbspsupportnbspscams\"><strong>Mik azok a technikai t\u00e1mogat\u00e1si csal\u00e1sok?<\/strong><\/h2>\n\n\n<p>A technikai t\u00e1mogat\u00e1si csal\u00e1sok egy olyan t\u00edpus\u00fa sz\u00e1m\u00edt\u00f3g\u00e9pes b\u0171n\u00f6z\u00e9s, ahol az emberek \u00fagy tesznek, mintha technikai t\u00e1mogat\u00e1st ny\u00fajtan\u00e1nak, hogy szem\u00e9lyes inform\u00e1ci\u00f3kat vagy p\u00e9nzt lopjanak el azokt\u00f3l, akik nem tudj\u00e1k, mi t\u00f6rt\u00e9nik. Ezek a csal\u00f3k k\u00fcl\u00f6nf\u00e9le taktik\u00e1kat alkalmaznak, p\u00e9ld\u00e1ul hidegh\u00edv\u00e1sokat, adathal\u00e1sz e-maileket, vagy a s\u00e9rtett eszk\u00f6z\u00e9nek rosszindulat\u00fa szoftverrel val\u00f3 megfert\u0151z\u00e9s\u00e9t. A v\u00e9gs\u0151 c\u00e9l az, hogy \u00e9rz\u00e9keny inform\u00e1ci\u00f3kat vagy p\u00e9nz\u00fcgyi forr\u00e1sokat szerezzenek meg c\u00e9lpontjaikt\u00f3l. Fontos, hogy tiszt\u00e1ban legy\u00fcnk ezekkel a csal\u00e1sokkal, \u00e9s megv\u00e9dj\u00fck szem\u00e9lyes adatainkat \u00e9s p\u00e9nz\u00fcgyi eszk\u00f6zeinket.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"commonnbsptacticsnbspusednbspbynbspscammers\"><strong>A csal\u00f3k \u00e1ltal haszn\u00e1lt gyakori taktik\u00e1k<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/tech-support-scams-Common-tactics-used-by-scammers-1.jpg\" alt=\"A csal\u00f3k \u00e1ltal haszn\u00e1lt gyakori taktik\u00e1k\" class=\"wp-image-1407\"\/><\/figure>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>A technikai t\u00e1mogat\u00e1si csal\u00e1sok egyre gyakoribbak, gyakran szoci\u00e1lis m\u00e9rn\u00f6ki technik\u00e1k, p\u00e9ld\u00e1ul hidegh\u00edv\u00e1sok \u00e9s adathal\u00e1sz e-mailek \u00fatj\u00e1n hajtj\u00e1k v\u00e9gre \u0151ket. Ezek a csal\u00e1sok ijesztget\u00e9si taktik\u00e1kat is alkalmazhatnak, p\u00e9ld\u00e1ul hamisan \u00e1ll\u00edtj\u00e1k, hogy az \u00e1ldozat sz\u00e1m\u00edt\u00f3g\u00e9pe vesz\u00e9lyben van, majd felaj\u00e1nlj\u00e1k \u201cseg\u00edts\u00e9g\u00fcket\u201d egy bizonyos \u00f6sszeg\u00e9rt.<\/p>\n\n\n\n<p>Az al\u00e1bbiak a leggyakoribb technikai t\u00e1mogat\u00e1si strat\u00e9gi\u00e1k:<\/p>\n\n\n\n<p><strong>Hidegh\u00edv\u00e1s: <\/strong>Az egyik leggyakoribb taktika, amelyet a technikai t\u00e1mogat\u00e1si csal\u00f3k haszn\u00e1lnak, a hidegh\u00edv\u00e1s.<\/p>\n\n\n\n<p>Ezt \u00fagy teszik, hogy v\u00e9letlenszer\u0171en felh\u00edvnak embereket, gyakran azt \u00e1ll\u00edtva, hogy egy val\u00f3di technol\u00f3giai c\u00e9g vagy szolg\u00e1ltat\u00f3 k\u00e9pvisel\u0151i, \u00e9s megpr\u00f3b\u00e1lj\u00e1k meggy\u0151zni \u0151ket arr\u00f3l, hogy rosszindulat\u00fa vagy m\u00e1s k\u00e1ros szoftver van a sz\u00e1m\u00edt\u00f3g\u00e9p\u00fck\u00f6n.<\/p>\n\n\n\n<p>Ezut\u00e1n felaj\u00e1nlj\u00e1k, hogy d\u00edj ellen\u00e9ben megoldj\u00e1k a probl\u00e9m\u00e1t.<\/p>\n\n\n\n<p><strong>Felugr\u00f3 hirdet\u00e9sek: <\/strong>Egy m\u00e1sik taktika, amelyet a technikai t\u00e1mogat\u00e1si csal\u00f3k alkalmaznak, a hirdet\u00e9sek felugr\u00e1sa weboldalakon vagy alkalmaz\u00e1sokon bel\u00fcl.<\/p>\n\n\n\n<p>Ezek a hirdet\u00e9sek hamis biztons\u00e1gi figyelmeztet\u00e9seknek vagy \u00e9rtes\u00edt\u00e9seknek t\u0171nhetnek, amelyek szerint v\u00edrusok vannak a sz\u00e1m\u00edt\u00f3g\u00e9peden. Azt mondj\u00e1k, hogy h\u00edvd fel a hirdet\u00e9sben megadott sz\u00e1mot, hogy seg\u00edts\u00e9get kapj a v\u00edrusok elt\u00e1vol\u00edt\u00e1s\u00e1ban.<\/p>\n\n\n\n<p><strong>Adathal\u00e1sz e-mailek:<\/strong>Az adathal\u00e1sz e-mailek egy m\u00e1sik m\u00f3dja annak, hogy a technikai t\u00e1mogat\u00e1si csal\u00f3k megpr\u00f3b\u00e1lj\u00e1k megszerezni a gyan\u00fatlan \u00e1ldozatok szem\u00e9lyes adatait \u00e9s p\u00e9nz\u00e9t.<\/p>\n\n\n\n<p>Az ilyen e-mailekben tal\u00e1lhat\u00f3 linkek \u00e1ltal\u00e1ban rosszindulat\u00fa weboldalakra vezetnek, ahol \u00e9rz\u00e9keny inform\u00e1ci\u00f3kat, p\u00e9ld\u00e1ul hitelk\u00e1rtyasz\u00e1mokat vagy jelszavakat k\u00e9rnek.<\/p>\n\n\n\n<p><strong>Hamis biztons\u00e1gi szoftver: <\/strong>A technikai t\u00e1mogat\u00e1si csal\u00f3k azt is megpr\u00f3b\u00e1lhatj\u00e1k el\u00e9rni, hogy az emberek hamis biztons\u00e1gi szoftvert t\u00f6ltsenek le, azt \u00e1ll\u00edtva, hogy sz\u00e1m\u00edt\u00f3g\u00e9peik rosszindulat\u00fa szoftverekkel fert\u0151z\u00f6ttek, \u00e9s tov\u00e1bbi fenyeget\u00e9sekt\u0151l kell \u0151ket megv\u00e9deni.<\/p>\n\n\n\n<p>Maga a szoftver rosszindulat\u00fa k\u00f3dot is tartalmazhat, amely m\u00e9g tov\u00e1bb k\u00e1ros\u00edthatja a rendszert. <\/p>\n\n\n\n<p><strong>Szoci\u00e1lis m\u00e9rn\u00f6ki t\u00e1mad\u00e1sok: <\/strong>A szoci\u00e1lis m\u00e9rn\u00f6ki t\u00e1mad\u00e1sok pszichol\u00f3giai manipul\u00e1ci\u00f3s technik\u00e1kat alkalmaznak, p\u00e9ld\u00e1ul f\u00e9lelem vagy s\u00fcrg\u0151ss\u00e9g kelt\u00e9s\u00e9t, hogy r\u00e1vegyenek valakit bizalmas inform\u00e1ci\u00f3k \u00e1tad\u00e1s\u00e1ra vagy bizonyos cselekv\u00e9sek (p\u00e9ld\u00e1ul p\u00e9nz fizet\u00e9se) megt\u00e9tel\u00e9re.<\/p>\n\n\n\n<p>P\u00e9ld\u00e1ul egy csal\u00f3 azt \u00e1ll\u00edthatja, hogy a sz\u00e1m\u00edt\u00f3g\u00e9ped s\u00fcrg\u0151s jav\u00edt\u00e1sra szorul egy v\u00edrusfert\u0151z\u00e9s miatt, de a munk\u00e1t csak el\u0151zetes fizet\u00e9s ut\u00e1n kezdhetik el. <\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"protecting-yourself-from-tech-support-scams\"><strong>V\u00e9dekez\u00e9s a technikai t\u00e1mogat\u00e1si csal\u00e1sok ellen<\/strong><\/h2>\n\n\n<p>A technikai t\u00e1mogat\u00e1si csal\u00e1sok egyre nagyobb probl\u00e9m\u00e1t jelentenek a digit\u00e1lis korban, \u00e9s fontos, hogy tiszt\u00e1ban legy\u00fcnk ezekkel a csal\u00e1sokkal, \u00e9s tegy\u00fcnk l\u00e9p\u00e9seket a v\u00e9delem \u00e9rdek\u00e9ben. \u00cdme n\u00e9h\u00e1ny tipp a technikai t\u00e1mogat\u00e1si csal\u00e1sok elker\u00fcl\u00e9s\u00e9hez:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ne add ki szem\u00e9lyes adataidat, \u00e9s ne engedj hozz\u00e1f\u00e9r\u00e9st a sz\u00e1m\u00edt\u00f3g\u00e9pedhez an\u00e9lk\u00fcl, hogy el\u0151sz\u00f6r ellen\u0151rizn\u00e9d a kapcsolatba l\u00e9p\u0151 szem\u00e9lyazonoss\u00e1g\u00e1t.<\/li>\n\n\n\n<li>L\u00e9gy \u00f3vatos a k\u00e9retlen e-mailekkel, telefonh\u00edv\u00e1sokkal vagy sz\u00f6veges \u00fczenetekkel szemben, amelyek azt \u00e1ll\u00edtj\u00e1k, hogy probl\u00e9ma van az eszk\u00f6z\u00f6ddel vagy fi\u00f3koddal.<\/li>\n\n\n\n<li>Ne kattints gyan\u00fas e-mailekben tal\u00e1lhat\u00f3 linkekre, \u00e9s ne t\u00f6lts le mell\u00e9kleteket, hacsak nem vagy biztos benne, hogy azok val\u00f3diak.<\/li>\n\n\n\n<li>Ha valaki azt \u00e1ll\u00edtja, hogy egy neves c\u00e9gt\u0151l, p\u00e9ld\u00e1ul a Microsoftt\u00f3l, az Apple-t\u0151l, a Google-t\u0151l stb. van, tedd le a telefont, \u00e9s k\u00f6zvetlen\u00fcl a c\u00e9g hivatalos \u00fcgyf\u00e9lszolg\u00e1lati sz\u00e1m\u00e1n keresd meg \u0151ket, amely a weboldalukon tal\u00e1lhat\u00f3, ahelyett, hogy a h\u00edv\u00f3 \u00e1ltal megadott sz\u00e1mokat haszn\u00e1ln\u00e1d.<\/li>\n\n\n\n<li>K\u00e9rdezz r\u00e1, kinek dolgoznak, miel\u0151tt b\u00e1rmilyen inform\u00e1ci\u00f3t adn\u00e1l magadr\u00f3l, vagy enged\u00e9lyezn\u00e9d a t\u00e1voli hozz\u00e1f\u00e9r\u00e9st a sz\u00e1m\u00edt\u00f3g\u00e9pes rendszeredhez.<\/li>\n\n\n\n<li>B\u00edzz az \u00f6szt\u00f6neidben, \u00e9s ne adj meg szem\u00e9lyes adatokat, am\u00edg nem ellen\u0151rizted a szem\u00e9lyazonoss\u00e1gukat.<\/li>\n\n\n\n<li>Azonnal tedd le a telefont, ha valaki nyom\u00e1st gyakorol r\u00e1d, hogy \u00e9rz\u00e9keny adatokat, p\u00e9ld\u00e1ul jelszavakat vagy hitelk\u00e1rtyasz\u00e1mokat adj meg telefonon kereszt\u00fcl an\u00e9lk\u00fcl, hogy el\u0151sz\u00f6r meggy\u0151z\u0151dn\u00e9l arr\u00f3l, ki \u0151.<\/li>\n\n\n\n<li>Ismerd fel a gyan\u00fas e-maileket \u00e9s telefonh\u00edv\u00e1sokat az olyan v\u00f6r\u00f6s z\u00e1szl\u00f3k alapj\u00e1n, mint a k\u00e9retlen kapcsolatfelv\u00e9tel, s\u00fcrg\u0151s szem\u00e9lyes adatk\u00e9r\u00e9sek, ingyenes szolg\u00e1ltat\u00e1sok vagy term\u00e9kek \u00edg\u00e9rete el\u0151zetes fizet\u00e9s ellen\u00e9ben, valamint jogi l\u00e9p\u00e9sek fenyeget\u00e9se, ha a fizet\u00e9s nem t\u00f6rt\u00e9nik meg gyorsan. <\/li>\n\n\n\n<li>Figyelj a helyes\u00edr\u00e1si hib\u00e1kra \u00e9s nyelvtani hib\u00e1kra, amelyek arra utalhatnak, hogy az e-mail nem val\u00f3di.<\/li>\n<\/ul>\n\n\n\n<p>Ezeknek a l\u00e9p\u00e9seknek a megt\u00e9tel\u00e9vel elker\u00fclheted, hogy a technikai t\u00e1mogat\u00e1si csal\u00e1sok \u00e1ldozat\u00e1v\u00e1 v\u00e1lj, \u00e9s megv\u00e9dheted magad a csal\u00e1sokt\u00f3l.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"reporting-tech-support-scams\"><strong>Technikai t\u00e1mogat\u00e1si csal\u00e1sok bejelent\u00e9se<\/strong><\/h2>\n\n\n<p>Ha v\u00e9letlen\u00fcl tal\u00e1lkozol egy technikai t\u00e1mogat\u00e1si csal\u00e1ssal, fontos, hogy \u00e9ber maradj, \u00e9s tegy\u00e9l l\u00e9p\u00e9seket annak \u00e9rdek\u00e9ben, hogy m\u00e1sok ne v\u00e1ljanak ennek a b\u0171ncselekm\u00e9nynek az \u00e1ldozat\u00e1v\u00e1. Sajnos n\u00e9h\u00e1ny ember minden megtakar\u00edt\u00e1s\u00e1t elvesztette ennek a sz\u00f6rny\u0171 csal\u00e1snak az eredm\u00e9nyek\u00e9nt. A probl\u00e9ma lek\u00fczd\u00e9se \u00e9rdek\u00e9ben elengedhetetlen, hogy jelentsd a tal\u00e1lkozott technikai t\u00e1mogat\u00e1si csal\u00e1sokat. \u00cdme n\u00e9h\u00e1ny l\u00e9p\u00e9s, amelyet megtehetsz egy technikai t\u00e1mogat\u00e1si csal\u00e1s bejelent\u00e9s\u00e9hez:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Online csal\u00e1sok \u00e9s adathal\u00e1sz k\u00eds\u00e9rletek bejelent\u00e9se<\/strong>: Ha gyan\u00edtod, hogy egy e-mail vagy weboldal r\u00e9sze egy technikai t\u00e1mogat\u00e1si csal\u00e1snak, jelentsd azt a helyi b\u0171n\u00fcld\u00f6z\u0151 hat\u00f3s\u00e1gnak vagy a Sz\u00f6vets\u00e9gi Kereskedelmi Bizotts\u00e1gnak (<a href=\"https:\/\/www.ftc.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">FTC<\/a>). (Az FTC azonos\u00edt\u00f3 lop\u00e1s \u00e1ldozatainak is ny\u00fajt forr\u00e1sokat a weboldal\u00e1n).<\/li>\n\n\n\n<li><strong>Telefonh\u00edv\u00e1sok \u00e9s sz\u00f6veges \u00fczenetek bejelent\u00e9se<\/strong>: Ha telefonh\u00edv\u00e1st vagy sz\u00f6veges \u00fczenetet kapsz valakit\u0151l, aki azt \u00e1ll\u00edtja, hogy technikai t\u00e1mogat\u00e1st ny\u00fajt, azonnal tedd le a telefont, \u00e9s l\u00e9pj kapcsolatba a mobilszolg\u00e1ltat\u00f3ddal.<\/li>\n\n\n\n<li><strong>Jogosulatlan terhel\u00e9sek bejelent\u00e9se<\/strong>: Ha jogosulatlan terhel\u00e9seket tal\u00e1lsz a hitelk\u00e1rtya-kimutat\u00e1sodon vagy banksz\u00e1ml\u00e1don egy technikai t\u00e1mogat\u00e1si csal\u00e1s miatt, azonnal l\u00e9pj kapcsolatba a p\u00e9nzint\u00e9zeteddel. Pr\u00f3b\u00e1lj meg beszerezni v\u00e1s\u00e1rl\u00e1si bizonylatot, p\u00e9ld\u00e1ul sz\u00e1mlasz\u00e1mot, hogy seg\u00edtsd a nyomoz\u00e1st.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"staying-safe-online\"><strong>Online biztons\u00e1g meg\u0151rz\u00e9se <\/strong><\/h2>\n\n\n<p>A technikai t\u00e1mogat\u00e1si csal\u00e1sokhoz hasonl\u00f3 sz\u00e1m\u00edt\u00f3g\u00e9pes fenyeget\u00e9sek jelent\u0151s kock\u00e1zatot jelentenek, ez\u00e9rt kritikus fontoss\u00e1g\u00fa az eszk\u00f6z\u00f6k \u00e9s fi\u00f3kok v\u00e9delme. \u00cdme n\u00e9h\u00e1ny legjobb gyakorlat az online biztons\u00e1g meg\u0151rz\u00e9s\u00e9hez:<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"securing-devices-and-accounts\">Eszk\u00f6z\u00f6k \u00e9s fi\u00f3kok v\u00e9delme<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Tartsd naprak\u00e9szen az \u00f6sszes internetkapcsolattal rendelkez\u0151 eszk\u00f6zt, p\u00e9ld\u00e1ul sz\u00e1m\u00edt\u00f3g\u00e9peket, telefonokat \u00e9s t\u00e1blag\u00e9peket a leg\u00fajabb biztons\u00e1gi jav\u00edt\u00e1sokkal.<\/li>\n\n\n\n<li>Telep\u00edts megb\u00edzhat\u00f3 antiv\u00edrus programot \u00e9s t\u0171zfalat minden eszk\u00f6zre, hogy megv\u00e9dje a rosszindulat\u00fa szoftverekt\u0151l.<\/li>\n\n\n\n<li>Enged\u00e9lyezd a k\u00e9tfaktoros hiteles\u00edt\u00e9st, amikor csak lehets\u00e9ges, a fokozott v\u00e9delem \u00e9rdek\u00e9ben.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"creating-strong-passwords\">Er\u0151s jelszavak l\u00e9trehoz\u00e1sa<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Jelszavak l\u00e9trehoz\u00e1sakor gy\u0151z\u0151dj meg r\u00f3la, hogy er\u0151sek \u00e9s nem k\u00f6nnyen kital\u00e1lhat\u00f3ak.<\/li>\n\n\n\n<li>Haszn\u00e1lj nagybet\u0171k, kisbet\u0171k, sz\u00e1mok \u00e9s szimb\u00f3lumok kombin\u00e1ci\u00f3j\u00e1t egyedi jelszavak l\u00e9trehoz\u00e1s\u00e1hoz.<\/li>\n\n\n\n<li>Fontold meg egy jelsz\u00f3kezel\u0151 haszn\u00e1lat\u00e1t, hogy v\u00e9letlenszer\u0171 jelszavakat gener\u00e1lj \u00e9s biztons\u00e1gosan t\u00e1rolj.<\/li>\n<\/ul>\n\n\n\n<p>Maradj t\u00e1j\u00e9kozott \u00e9s tudatos a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, hogy biztos\u00edtsd adataid biztons\u00e1g\u00e1t. Haszn\u00e1ld ki a rendelkez\u00e9sre \u00e1ll\u00f3 forr\u00e1sokat, hogy t\u00f6bbet tanulj a kiberbiztons\u00e1gr\u00f3l.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"resources-for-learning-more-about-cybersecurity-and-safety-online\"><strong>Forr\u00e1sok a kiberbiztons\u00e1gr\u00f3l \u00e9s az online biztons\u00e1gr\u00f3l val\u00f3 tanul\u00e1shoz<\/strong><\/h2>\n\n\n<p>Az Egyes\u00fclt \u00c1llamok korm\u00e1nya sz\u00e1mos forr\u00e1st biztos\u00edt, hogy seg\u00edtse az egy\u00e9neket a kiberbiztons\u00e1gr\u00f3l \u00e9s az online biztons\u00e1gr\u00f3l val\u00f3 tanul\u00e1sban. A Belbiztons\u00e1gi Miniszt\u00e9rium k\u00edn\u00e1lja a <a href=\"https:\/\/www.stopthinkconnect.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">StopGondolkodjCsatlakozz<\/a> kamp\u00e1nyt, amely a sz\u00e1m\u00edt\u00f3g\u00e9pes fenyeget\u00e9sekkel kapcsolatos k\u00f6zv\u00e9lem\u00e9ny figyelm\u00e9t h\u00edvja fel, \u00e9s tippeket ad a biztons\u00e1gr\u00f3l. Az <a href=\"https:\/\/www.cisa.gov\/cybersecurity-awareness-month#:~:text=Since%202004%2C%20the%20President%20of,confidential%20data%20become%20more%20commonplace.\" target=\"_blank\" rel=\"noreferrer noopener\">Orsz\u00e1gos Kiberbiztons\u00e1gi Tudatoss\u00e1g H\u00f3napja<\/a> kezdem\u00e9nyez\u00e9st minden okt\u00f3berben tartj\u00e1k, \u00e9s a polg\u00e1rokat oktatj\u00e1k arr\u00f3l, hogyan v\u00e9dhetik meg magukat a sz\u00e1m\u00edt\u00f3g\u00e9pes t\u00e1mad\u00e1sokt\u00f3l.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"professional-organizations-dedicated-to-cybersecurity-education-and-research\">Kiberbiztons\u00e1gi oktat\u00e1sra \u00e9s kutat\u00e1sra szakosodott szakmai szervezetek<\/h3>\n\n\n<p>Az Inform\u00e1ci\u00f3s Rendszerek Audit &amp; Control Association (<a href=\"https:\/\/www.isaca.org\/\">ISACA<\/a>) egy glob\u00e1lis non-profit szervezet, amely \u00fatmutat\u00e1st ny\u00fajt az inform\u00e1ci\u00f3biztons\u00e1g kezel\u00e9s\u00e9nek legjobb gyakorlatair\u00f3l, kock\u00e1zat\u00e9rt\u00e9kel\u00e9si, audit technik\u00e1kr\u00f3l, megfelel\u0151s\u00e9gi szabv\u00e1nyokr\u00f3l, adatv\u00e9delmi int\u00e9zked\u00e9sekr\u0151l \u00e9s adat-elemz\u00e9si eszk\u00f6z\u00f6kr\u0151l. Publik\u00e1ci\u00f3ikon \u00e9s a Certified Information Systems Auditor tan\u00fas\u00edt\u00e1si programon kereszt\u00fcl incidensv\u00e1lasz strat\u00e9gi\u00e1kat is biztos\u00edtanak.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>K\u00f6vetkeztet\u00e9s<\/strong><\/h2>\n\n\n<p>A technikai t\u00e1mogat\u00e1si csal\u00e1sok vesz\u00e9lyeztetik digit\u00e1lis inform\u00e1ci\u00f3ink biztons\u00e1g\u00e1t. Ahhoz, hogy megv\u00e9dj\u00fck magunkat, tiszt\u00e1ban kell lenn\u00fcnk a kiberbiztons\u00e1ggal, beruh\u00e1zni antiv\u00edrus szoftverbe, \u00e9s naprak\u00e9szen kell tartanunk sz\u00e1m\u00edt\u00f3g\u00e9peinket. Ezeknek az elj\u00e1r\u00e1soknak a betart\u00e1s\u00e1val megv\u00e9dhetj\u00fck adatainkat a technikai t\u00e1mogat\u00e1si csal\u00e1sokt\u00f3l \u00e9s fenntarthatjuk az internetbiztons\u00e1got. Vedd kezedbe a kiberbiztons\u00e1godat azonnal, \u00e9s kezdd el megv\u00e9deni magad.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"faqs\"><strong>GYIK<\/strong><\/h2>\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1676323085725\"><strong class=\"schema-faq-question\">Hogyan m\u0171k\u00f6dnek a technikai t\u00e1mogat\u00e1si csal\u00e1sok?<\/strong> <p class=\"schema-faq-answer\">A technikai t\u00e1mogat\u00e1si csal\u00f3k j\u00f3l ismert c\u00e9gek, p\u00e9ld\u00e1ul a Microsoft vagy az Apple k\u00e9pvisel\u0151inek adj\u00e1k ki magukat, \u00e9s megpr\u00f3b\u00e1lnak hozz\u00e1f\u00e9r\u00e9st szerezni az \u00e1ldozat sz\u00e1m\u00edt\u00f3g\u00e9p\u00e9hez. Fizet\u00e9st k\u00e9rhetnek, vagy rosszindulat\u00fa szoftvert telep\u00edthetnek, miut\u00e1n hozz\u00e1f\u00e9r\u00e9st szereztek.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323342074\"><strong class=\"schema-faq-question\">Hogyan v\u00e9dhetem meg magam a technikai t\u00e1mogat\u00e1si csal\u00e1sokt\u00f3l?<\/strong> <p class=\"schema-faq-answer\">A technikai t\u00e1mogat\u00e1si csal\u00e1sok elleni v\u00e9dekez\u00e9s \u00e9rdek\u00e9ben soha ne add meg szem\u00e9lyes adataidat vagy fizet\u00e9si adataidat telefonon vagy online. Ne kattints gyan\u00fas e-mailekb\u0151l vagy weboldalakr\u00f3l sz\u00e1rmaz\u00f3 linkekre. Ha \u00fagy gondolod, hogy a sz\u00e1m\u00edt\u00f3g\u00e9ped megfert\u0151z\u0151d\u00f6tt, futtass le egy rosszindulat\u00fa program elleni vizsg\u00e1latot, \u00e9s t\u00f6r\u00f6ld a tal\u00e1lt rosszindulat\u00fa f\u00e1jlokat. Tartsd naprak\u00e9szen az \u00f6sszes szoftvert, hogy jobban \u00e9szlelhesd \u00e9s elt\u00e1vol\u00edthasd a fenyeget\u00e9seket.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323372090\"><strong class=\"schema-faq-question\">Mik a gyakori technikai t\u00e1mogat\u00e1si csal\u00e1sok?<\/strong> <p class=\"schema-faq-answer\">A gyakori technikai t\u00e1mogat\u00e1si csal\u00e1sok sor\u00e1n b\u0171n\u00f6z\u0151k legitim technikai t\u00e1mogat\u00e1si k\u00e9pvisel\u0151nek adj\u00e1k ki magukat, \u00e9s olyan taktik\u00e1kat alkalmaznak, mint a hidegh\u00edv\u00e1sok, felugr\u00f3 \u00fczenetek \u00e9s hamis weboldalak, hogy hozz\u00e1f\u00e9rjenek szem\u00e9lyes adatokhoz vagy p\u00e9nzhez.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323467317\"><strong class=\"schema-faq-question\">Honnan sz\u00e1rmaznak a technikai t\u00e1mogat\u00e1si csal\u00e1sok?<\/strong> <p class=\"schema-faq-answer\">A technikai t\u00e1mogat\u00e1si csal\u00e1sok rosszindulat\u00fa weboldalakr\u00f3l, adathal\u00e1sz e-mailekb\u0151l \u00e9s hidegh\u00edv\u00e1sokb\u00f3l sz\u00e1rmaznak. A csal\u00f3k hamis weboldalakat hozhatnak l\u00e9tre, t\u00f6meges e-maileket k\u00fcldhetnek, vagy k\u00f6zvetlen\u00fcl felh\u00edvhatj\u00e1k a gyan\u00fatlan felhaszn\u00e1l\u00f3kat, azt \u00e1ll\u00edtva, hogy a sz\u00e1m\u00edt\u00f3g\u00e9p\u00fck fert\u0151z\u00f6tt rosszindulat\u00fa szoftverrel.<\/p> <\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>Nem titok, hogy az internet vesz\u00e9lyes hely lehet. Hogy megv\u00e9dje mag\u00e1t, tudnia kell, mi van odakint, \u00e9s hogyan c\u00e9lozhatja meg \u00d6nt; technikai t\u00e1mogat\u00e1si csal\u00e1sok\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/csalasok\/technikai-tamogatasi-csalasok\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Technikai t\u00e1mogat\u00e1si csal\u00e1sok<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1380,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-1378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scams","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Yourself From Tech Support Scams - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/csalasok\/technikai-tamogatasi-csalasok\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Yourself From Tech Support Scams - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/csalasok\/technikai-tamogatasi-csalasok\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-13T21:43:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Tech support scams\",\"datePublished\":\"2023-02-13T21:43:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"},\"wordCount\":1537,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"articleSection\":[\"scams\"],\"inLanguage\":\"hu\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\",\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\",\"name\":\"Protect Yourself From Tech Support Scams - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"datePublished\":\"2023-02-13T21:43:54+00:00\",\"description\":\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\"}],\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Tech support scams\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tech support scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\",\"position\":1,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\",\"name\":\"How do tech support scams work?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"ech support scammers pose as representatives from well-known companies, such as Microsoft or Apple, and attempt to gain access to the victim's computer. They may ask for payment or install malicious software once they have access.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\",\"position\":2,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\",\"name\":\"How do I protect myself from tech support scams?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"To protect yourself from tech support scams, never give out personal information or payment details over the phone or online. Don't click on links from suspicious emails or websites. If you think your computer has been infected, run an anti-malware scan and delete any malicious files found. Keep all software up-to-date to better detect and remove threats.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\",\"position\":3,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\",\"name\":\"What are common tech support scams?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Common tech support scams involve criminals posing as legitimate tech support representatives and using tactics like cold calls, pop-up messages, and fake websites to gain access to personal information or money.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\",\"position\":4,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\",\"name\":\"Where do tech support scams come from?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Tech support scams come from malicious websites, phishing emails, and cold calls. The scammers may create fake websites, send mass emails, or call unsuspecting users directly, claiming that their computer is infected with malware.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"V\u00e9dd meg magad a technikai t\u00e1mogat\u00e1si csal\u00e1sokt\u00f3l - Securitybriefing.net","description":"Maradj biztons\u00e1gban online, \u00e9s v\u00e9dd meg magad a technikai t\u00e1mogat\u00e1si csal\u00e1sokt\u00f3l ezzel az \u00e1tfog\u00f3 kiberbiztons\u00e1gi \u00fatmutat\u00f3val.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/csalasok\/technikai-tamogatasi-csalasok\/","og_locale":"hu_HU","og_type":"article","og_title":"Protect Yourself From Tech Support Scams - Securitybriefing.net","og_description":"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.","og_url":"https:\/\/securitybriefing.net\/hu\/csalasok\/technikai-tamogatasi-csalasok\/","og_site_name":"Security Briefing","article_published_time":"2023-02-13T21:43:54+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"8 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Tech support scams","datePublished":"2023-02-13T21:43:54+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"},"wordCount":1537,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","articleSection":["scams"],"inLanguage":"hu"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/","url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/","name":"V\u00e9dd meg magad a technikai t\u00e1mogat\u00e1si csal\u00e1sokt\u00f3l - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","datePublished":"2023-02-13T21:43:54+00:00","description":"Maradj biztons\u00e1gban online, \u00e9s v\u00e9dd meg magad a technikai t\u00e1mogat\u00e1si csal\u00e1sokt\u00f3l ezzel az \u00e1tfog\u00f3 kiberbiztons\u00e1gi \u00fatmutat\u00f3val.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317"}],"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","width":662,"height":327,"caption":"Tech support scams"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Tech support scams"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725","position":1,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725","name":"Hogyan m\u0171k\u00f6dnek a technikai t\u00e1mogat\u00e1si csal\u00e1sok?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"ech support scammers pose as representatives from well-known companies, such as Microsoft or Apple, and attempt to gain access to the victim's computer. They may ask for payment or install malicious software once they have access.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074","position":2,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074","name":"Hogyan v\u00e9dhetem meg magam a technikai t\u00e1mogat\u00e1si csal\u00e1sokt\u00f3l?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To protect yourself from tech support scams, never give out personal information or payment details over the phone or online. Don't click on links from suspicious emails or websites. If you think your computer has been infected, run an anti-malware scan and delete any malicious files found. Keep all software up-to-date to better detect and remove threats.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090","position":3,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090","name":"Mik a gyakori technikai t\u00e1mogat\u00e1si csal\u00e1sok?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Common tech support scams involve criminals posing as legitimate tech support representatives and using tactics like cold calls, pop-up messages, and fake websites to gain access to personal information or money.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317","position":4,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317","name":"Honnan sz\u00e1rmaznak a technikai t\u00e1mogat\u00e1si csal\u00e1sok?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Tech support scams come from malicious websites, phishing emails, and cold calls. The scammers may create fake websites, send mass emails, or call unsuspecting users directly, claiming that their computer is infected with malware.","inLanguage":"hu"},"inLanguage":"hu"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1378"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1378\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1380"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}