{"id":1504,"date":"2023-02-25T14:46:21","date_gmt":"2023-02-25T14:46:21","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1504"},"modified":"2023-02-25T14:46:21","modified_gmt":"2023-02-25T14:46:21","slug":"kiberbunozes-wifi-n-keresztul-amit-tudnod-kell","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/technologia\/kiberbunozes-wifi-n-keresztul-amit-tudnod-kell\/","title":{"rendered":"Kibert\u00e1mad\u00e1s WiFi-n Kereszt\u00fcl: Amit Tudnia Kell"},"content":{"rendered":"<p>A kiberbiztons\u00e1got a v\u00e1llalatok \u00e9s c\u00e9gek priorit\u00e1snak tekintik, \u00e9s jelent\u0151s beruh\u00e1z\u00e1sokat hajtanak v\u00e9gre olyan t\u0171zfalakba, amelyek lehet\u0151v\u00e9 teszik, hogy rendszereik t\u00e9nylegesen megk\u00f6zel\u00edthetetlenek legyenek. Azonban sok ilyen v\u00e1llalat nincs tiszt\u00e1ban azzal a kiberb\u0171n\u00f6z\u00e9snek val\u00f3 kitetts\u00e9ggel, amelyet a WIFI h\u00e1l\u00f3zatuk gener\u00e1l.<\/p>\n\n\n\n<p>A hib\u00e1s WIFI, p\u00e1rosulva a kiberfenyeget\u00e9sek nyilv\u00e1nval\u00f3 jeleinek el\u00e9gtelen meg\u00e9rt\u00e9s\u00e9vel, akaratlanul is hozz\u00e1f\u00e9r\u00e9st adhat a kiberb\u0171n\u00f6z\u0151knek \u00e9rz\u00e9keny bels\u0151 \u00fczleti inform\u00e1ci\u00f3khoz. Emellett az alkalmazottakat is kiteszi az identit\u00e1slop\u00e1s, adathal\u00e1szat \u00e9s m\u00e1s kiber-csal\u00e1sok katasztrof\u00e1lis kock\u00e1zat\u00e1nak. Amit sokan nem vesznek \u00e9szre, az az, hogy a WIFI-j\u00fck \u00e9rv\u00e9nytelen\u00edtheti az eszk\u00f6z\u00f6k v\u00e9delm\u00e9re tett k\u00eds\u00e9rleteiket. Tudat\u00e1ban kell lenn\u00fcnk annak, hogy ki vagyunk t\u00e9ve a \u201c<a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/man-in-the-middle-attack-MitM\" target=\"_blank\" rel=\"noreferrer noopener\">k\u00f6z\u00e9pen l\u00e9v\u0151 ember\u201d (MITM) t\u00e1mad\u00e1s\u00e1nak.<\/a> Azonban a megfelel\u0151 szervezeti tud\u00e1ssal \u00e9s egyszer\u0171 technol\u00f3gi\u00e1val k\u00f6nnyen megel\u0151zhet\u0151.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"cyber-attack-mode-through-wifi\">Kiber t\u00e1mad\u00e1si m\u00f3d WIFI-n kereszt\u00fcl<\/h2>\n\n\n<p>A kiberb\u0171n\u00f6z\u00e9s nem pihen, \u00e9s a kiberb\u0171n\u00f6z\u0151k folyamatosan fejl\u0151dnek, szervezeteket c\u00e9loznak meg, \u00e9s az egy\u00e9ni felhaszn\u00e1l\u00f3kra \u00f6sszpontos\u00edtj\u00e1k figyelm\u00fcket. A digit\u00e1lis vil\u00e1gban, ahol a kapcsol\u00f3d\u00e1s \u00e9s a vezet\u00e9k n\u00e9lk\u00fcli hozz\u00e1f\u00e9r\u00e9s sz\u00fcks\u00e9gszer\u0171s\u00e9g, az online opportunist\u00e1k igyekeznek kihaszn\u00e1lni a helyzetet.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"rogue-access-points\">Gonosz hozz\u00e1f\u00e9r\u00e9si pontok<\/h3>\n\n\n<p>A kiberb\u0171n\u00f6z\u0151k elfogj\u00e1k az adatokat, amelyek a vezet\u00e9k n\u00e9lk\u00fcli hozz\u00e1f\u00e9r\u00e9si pontokon kereszt\u00fcl futnak, \u00e9s ezeket az adatokat b\u0171n\u00f6s haszonszerz\u00e9sre haszn\u00e1lj\u00e1k fel. Az elj\u00e1r\u00e1s olcs\u00f3 technol\u00f3gi\u00e1t haszn\u00e1l, amely lehet\u0151v\u00e9 teszi a kiberb\u0171n\u00f6z\u0151k sz\u00e1m\u00e1ra, hogy \u201chamis\u201d hozz\u00e1f\u00e9r\u00e9si pontokat vagy gonosz h\u00e1l\u00f3zatokat \u00e1ll\u00edtsanak fel, amelyek legitim WIFI hozz\u00e1f\u00e9r\u00e9si pontoknak \u00e1lc\u00e1zz\u00e1k magukat ismer\u0151s c\u00edmmel. Ezut\u00e1n megfigyelik a billenty\u0171le\u00fct\u00e9seket, \u00e9s illeg\u00e1lisan megszerzik a szem\u00e9lyes adatokat, \u00e9s a legt\u00f6bb esetben bizalmas inform\u00e1ci\u00f3kat b\u00e1rkit\u0151l, aki csatlakozik a h\u00e1l\u00f3zathoz. Mivel ezek a gonosz hozz\u00e1f\u00e9r\u00e9si pontok nem titkos\u00edtottak, minden tev\u00e9kenys\u00e9g, amely rajtuk kereszt\u00fcl fut, teljesen nyitott \u00e9s l\u00e1that\u00f3 b\u00e1rki sz\u00e1m\u00e1ra, aki hajland\u00f3 keresni.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"interception-of-data\">Adatok elfog\u00e1sa<\/h3>\n\n\n<p>Az olyan adatok elfog\u00e1sa, mint a jelszavak \u00e9s felhaszn\u00e1l\u00f3nevek, lehet\u0151v\u00e9 teheti az illeg\u00e1lis hozz\u00e1f\u00e9r\u00e9st \u00e9rz\u00e9keny inform\u00e1ci\u00f3khoz, bele\u00e9rtve az online banki adatokat, hitelk\u00e1rtya-inform\u00e1ci\u00f3kat \u00e9s v\u00e1llalati enged\u00e9lyeket. Egy kiberb\u0171n\u00f6z\u0151 lehet, hogy nem haszn\u00e1lja fel az inform\u00e1ci\u00f3t azonnal, de b\u00e1rmikor megs\u00e9rtheti ezeket a fi\u00f3kokat \u00e9s az azokban tal\u00e1lhat\u00f3 inform\u00e1ci\u00f3kat.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"lateral-movement\">Oldals\u00f3 mozg\u00e1s<\/h3>\n\n\n<p>A legt\u00f6bb felhaszn\u00e1l\u00f3 aggodalma abb\u00f3l fakad, hogy mag\u00e1n \u00e9s n\u00e9ha bizalmas dokumentumokat tartanak eszk\u00f6zeiken, de a kiberb\u0171n\u00f6z\u0151ket ritk\u00e1n \u00e9rdekli ez a dokumentumt\u00edpus. \u0150ket ink\u00e1bb egy gyan\u00fatlan \u00e1ldozat e-mail fi\u00f3kj\u00e1nak oldals\u00f3 mozg\u00e1sa \u00e9rdekli. P\u00e9ld\u00e1ul, ha egy hacker hozz\u00e1f\u00e9r az e-mail fi\u00f3kodhoz, lehet\u0151s\u00e9get ad neki, hogy bekapcsolja a jelsz\u00f3\u00e9rtes\u00edt\u00e9seket olyan oldalakr\u00f3l, mint a PayPal, \u00e9s figyelje a billenty\u0171le\u00fct\u00e9seket, mik\u00f6zben \u00faj bejelentkez\u00e9si adatokat \u00e1ll\u00edtasz be.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"public-vs-corporate-wifi\">Nyilv\u00e1nos vs. v\u00e1llalati WIFI<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Public-vs.-corporate-WIFI-2-1.jpg\" alt=\"Public vs. corporate WIFI 2 1\" class=\"wp-image-1510\"\/><\/figure>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>A WIFI k\u00e9mked\u00e9si esetek vil\u00e1gszerte n\u00f6vekv\u0151ben vannak. A kiberb\u0171n\u00f6z\u0151k sz\u00e1mos magas rang\u00fa \u00e1ldozatot fogtak el, bet\u00f6rve olyan h\u00e1ztart\u00e1si m\u00e1rk\u00e1k vezet\u00e9k n\u00e9lk\u00fcli h\u00e1l\u00f3zataiba, mint a Starbucks, az American Airlines \u00e9s a TalkTalk. A l\u00e9p\u00e9s m\u00e9g <a href=\"https:\/\/routersecurity.org\/RouterNews.php\" target=\"_blank\" rel=\"noreferrer noopener\">az FBI-t is arra k\u00e9sztette, hogy figyelmeztesse a felhaszn\u00e1l\u00f3kat<\/a> a k\u00f6rnyezet\u00fck el\u00e9r\u00e9s\u00e9re, miel\u0151tt csatlakozn\u00e1nak egy h\u00e1l\u00f3zathoz.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"false-sense-of-security\">Hamis biztons\u00e1g\u00e9rzet<\/h3>\n\n\n<p>Ez n\u00f6velte azt a t\u00e9vhitet, hogy a lehallgat\u00e1s csak a nyilv\u00e1nos WIFI-re korl\u00e1toz\u00f3dik, hozz\u00e1j\u00e1rulva a hamis biztons\u00e1g\u00e9rzethez, hogy az irodai h\u00e1l\u00f3zatok nem ellen\u00e1ll\u00f3ak a t\u00e1mad\u00e1sokkal szemben, \u00e9s ez helytelen. Egy WIFI h\u00e1l\u00f3zat ugyanolyan val\u00f3sz\u00edn\u0171s\u00e9ggel kompromitt\u00e1lhat\u00f3 egy irodai k\u00f6rnyezetben, mint egy bev\u00e1s\u00e1rl\u00f3k\u00f6zpontban, sz\u00e1llodai el\u0151csarnokban vagy ak\u00e1r egy rep\u00fcl\u0151t\u00e9ren.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"cybercriminal-tactics\">Kiberb\u0171n\u00f6z\u0151i taktik\u00e1k<\/h3>\n\n\n<p>Egy kiberb\u0171n\u00f6z\u0151 a megfelel\u0151 technol\u00f3gi\u00e1val \u00fclhet a fal m\u00e1sik oldal\u00e1n, az iroda el\u0151tti parkol\u00f3ban, vagy ak\u00e1r a szomsz\u00e9dos \u00e9p\u00fcletben. Biztosan nem tesznek k\u00fcl\u00f6nbs\u00e9get a nyilv\u00e1nos vagy v\u00e1llalati WIFI h\u00e1l\u00f3zat k\u00f6z\u00f6tt. C\u00e9ljuk egyszer\u0171en az, hogy gyan\u00fatlan felhaszn\u00e1l\u00f3kat cs\u00e1b\u00edtsanak h\u00e1l\u00f3zataikba \u00e9s gonosz hozz\u00e1f\u00e9r\u00e9si pontjaikba, \u00e9s onnan ind\u00edts\u00e1k el kiber t\u00e1mad\u00e1saikat.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-can-we-protect-ourselves\">Hogyan v\u00e9dhetj\u00fck meg magunkat?<\/h2>\n\n\n<p>A WIFI kiber t\u00e1mad\u00e1sok n\u00f6veked\u00e9se ellen\u00e9re csak kev\u00e9s v\u00e1llalat vezette be a megfelel\u0151 k\u00e9pz\u00e9st \u00e9s elj\u00e1r\u00e1sokat a WIFI lehallgat\u00e1s fenyeget\u00e9s\u00e9nek kezel\u00e9s\u00e9re. Sokan m\u00e9g azt is hiszik, hogy a jelsz\u00f3 titkos\u00edt\u00e1sa \u00f6nmag\u00e1ban elegend\u0151 v\u00e9delmet ny\u00fajt, de sajnos ez nem \u00edgy van. A titkos\u00edt\u00e1s csak akkor alkalmazhat\u00f3, ha a felhaszn\u00e1l\u00f3 tudatosan v\u00e1laszt egy legitim h\u00e1l\u00f3zatot. Ha egy gonosz hozz\u00e1f\u00e9r\u00e9si pontot v\u00e1lasztasz, a vezet\u00e9k n\u00e9lk\u00fcli kulcs, amely v\u00e9di a h\u00e1l\u00f3zatodat, eleve nem sz\u00fcks\u00e9ges.<\/p>\n\n\n\n<p>A szervezetek jogilag felel\u0151sek a h\u00e1l\u00f3zatukon \u00e1thalad\u00f3 forgalom\u00e9rt \u00e9s inform\u00e1ci\u00f3k\u00e9rt. Az alkalmazottak k\u00f6teless\u00e9ge gondoskodni alkalmazottaikr\u00f3l, \u00e9s mindent meg kell tenni\u00fck annak \u00e9rdek\u00e9ben, hogy h\u00e1l\u00f3zataik biztons\u00e1gosak legyenek. Azonban, tekintettel az akad\u00e1lyokra, hogyan cs\u00f6kkenthetik a MITM t\u00e1mad\u00e1sok kock\u00e1zat\u00e1t? T\u00f6bbr\u00e9teg\u0171 technik\u00e1ra van sz\u00fcks\u00e9g, amely \u00f6tv\u00f6zi a technol\u00f3gi\u00e1t \u00e9s az oktat\u00e1st.<\/p>\n\n\n\n<p>Fontos szempontok.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"points-to-consider\">Nagyobb hangs\u00falyt kell fektetni arra, hogy a felhaszn\u00e1l\u00f3k meg\u00e9rts\u00e9k a vesz\u00e9lyeket \u00e9s \u00e9rz\u00e9kelj\u00e9k a rendellenes viselked\u00e9st. B\u00e1r a kiberb\u0171n\u00f6z\u0151k egyre kifinomultabbak, m\u00f3dszer\u00fck gyakran ismer\u0151s mint\u00e1kat k\u00f6vet, amelyek, ha az emberek \u00e9berek, esetleg riaszt\u00e1st kelthetnek. \u00cdme n\u00e9h\u00e1ny szempont, amit figyelembe kell venni:<\/h3>\n\n\n<p>Ismerd meg a c\u00e9ged WIFI-j\u00e9t<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>: Egy ismeretlen hotspothoz val\u00f3 csatlakoz\u00e1s gyakran szokatlan viselked\u00e9st ig\u00e9nyel. A kiberb\u0171n\u00f6z\u0151k \u00e1ltal\u00e1ban egy rosszindulat\u00fa \u00e9s biztons\u00e1gtalan weboldalra ir\u00e1ny\u00edtanak \u00e1t, amely egy legitim bejelentkez\u00e9si oldalt ut\u00e1noz. Ezek az oldalak nem titkos\u00edtottak, \u00edgy ha bejelentkezel, minden tranzakci\u00f3d \u00e9s adatod l\u00e1that\u00f3v\u00e1 v\u00e1lik. Teh\u00e1t ismerd meg a c\u00e9ged WIFI SOP-jait; tudd, mi t\u00f6rt\u00e9nik, \u00e9s azonnal \u00e1llj le, ha valami furcs\u00e1nak t\u0171nik. Ha egy port\u00e1lra ir\u00e1ny\u00edtanak \u00e1t, k\u00fcl\u00f6n\u00f6sen egy munkahelyi k\u00f6rnyezetben, az \u00e1ltal\u00e1ban v\u00f6r\u00f6s z\u00e1szl\u00f3.<\/strong>Keresd a lakatot.<\/li>\n\n\n\n<li><strong>: Ha t\u00e1volr\u00f3l dolgozol \u00e9s csatlakozol nyilv\u00e1nos WIFI-hez, nem ritka, hogy egy port\u00e1lra ir\u00e1ny\u00edtanak \u00e1t, \u00e9s a legt\u00f6bb nem rosszindulat\u00fa. Kereshetsz egy lakat ikont a c\u00edmsorban, mivel ez \u00e1ltal\u00e1ban egy legitim oldal jele.<\/strong>Ismerd meg a h\u00e1l\u00f3zatodat.<\/li>\n\n\n\n<li><strong>: Az eszk\u00f6z\u00f6d folyamatosan keresni fogja azokat a felismerhet\u0151 WIFI h\u00e1l\u00f3zatokat, amelyekhez kor\u00e1bban csatlakozott. A kiberb\u0171n\u00f6z\u0151k ut\u00e1nozni fogj\u00e1k \u0151ket, be\u00e1ll\u00edtva<\/strong>gonosz hozz\u00e1f\u00e9r\u00e9si pontokat <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/wireless-mobility\/wlan-security\/68139-rogue-detection.html\" target=\"_blank\" rel=\"noreferrer noopener\">ugyanazzal a c\u00edmmel, abban a rem\u00e9nyben, hogy automatikusan csatlakozol, \u00edgy l\u00e9gy \u00e9ber. Ha a McDonald's-n\u00e1l b\u00f6ng\u00e9szel az interneten, \u00e9s felk\u00e9rnek, hogy csatlakozz a v\u00e1llalati WIFI-j\u00fckh\u00f6z, az val\u00f3sz\u00edn\u0171leg egy \u00e1tver\u00e9s.<\/a> A kiberbiztons\u00e1g n\u00f6vel\u00e9se a WIFI h\u00e1l\u00f3zatban.<\/li>\n<\/ol>\n\n\n<h3 class=\"wp-block-heading\" id=\"increasing-cybersecurity-in-the-wifi-network\">A technol\u00f3gia v\u00e9delmet ny\u00fajthat a MITM t\u00e1mad\u00e1sok ellen. A gonosz hozz\u00e1f\u00e9r\u00e9si pont \u00e9szlel\u00e9si eszk\u00f6z\u00f6k seg\u00edthetnek felismerni, k\u00f6r\u00fclhat\u00e1rolni \u00e9s elt\u00e1vol\u00edtani a gonosz hozz\u00e1f\u00e9r\u00e9si pontokat. A legitim hozz\u00e1f\u00e9r\u00e9si pontokr\u00f3l futva ezek a megold\u00e1sok r\u00f6gz\u00edtik \u00e9s ellen\u0151rzik a WIFI h\u00e1l\u00f3zatodon kereszt\u00fcl fut\u00f3 tev\u00e9kenys\u00e9geket, \u00e9s b\u00e1rmilyen gyan\u00fas viselked\u00e9st jelezhetnek, mivel l\u00e1that\u00f3s\u00e1got \u00e9s biztons\u00e1got ny\u00fajtanak.<\/h3>\n\n\n<p>Emellett n\u00e9h\u00e1ny v\u00e1llalat bevezetett olyan szab\u00e1lyzatokat, amelyek biztos\u00edtj\u00e1k, hogy az \u00fcgyfelek eszk\u00f6zei \u00e9s g\u00e9pei csak bizonyos WIFI vagy megb\u00edzhat\u00f3 h\u00e1l\u00f3zatokhoz csatlakozhatnak, kik\u00fcsz\u00f6b\u00f6lve az enged\u00e9ly n\u00e9lk\u00fcli WIFI kock\u00e1zat\u00e1t. A legproakt\u00edvabbak a.<\/p>\n\n\n\n<p>tan\u00fas\u00edtv\u00e1ny alap\u00fa hiteles\u00edt\u00e9shez <a href=\"https:\/\/www.globalsign.com\/en\/blog\/the-differences-between-certificate-based-and-pre-shared-key-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">is fordultak, hogy biztos\u00edts\u00e1k a felhaszn\u00e1l\u00f3kat arr\u00f3l, hogy biztons\u00e1guk folyamatosan v\u00e9dett. J\u00f3 p\u00e9ld\u00e1k erre a helyi f\u0151utc\u00e1n l\u00e1that\u00f3k, ahol a kiskeresked\u0151k biztos\u00edtj\u00e1k az \u00fcgyfeleket arr\u00f3l, hogy \u201eWiFi Bar\u00e1t\u201d tan\u00fas\u00edtv\u00e1nnyal rendelkeznek. Ez egy p\u00e9lda, amelyet a v\u00e1llalati szervezeteknek k\u00f6vetni\u00fck kellene.<\/a> Legjobb gyakorlatok a v\u00e9delem \u00e9rdek\u00e9ben.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"best-practices-to-protect-yourself\">Egy vil\u00e1gban, ahol a mobilit\u00e1s \u00e9s a kapcsol\u00f3d\u00e1s is elengedhetetlenn\u00e9 v\u00e1lt a glob\u00e1lis kommunik\u00e1ci\u00f3hoz, a WIFI a digit\u00e1lis munkahely l\u00e9tfontoss\u00e1g\u00fa eleme, \u00e9s a felhaszn\u00e1l\u00f3k most elv\u00e1rj\u00e1k. De azt is elv\u00e1rj\u00e1k, hogy online kommunik\u00e1ci\u00f3juk \u00e9s adataik biztons\u00e1gban legyenek a kiber t\u00e1mad\u00e1sok fenyeget\u00e9s\u00e9t\u0151l.<\/h3>\n\n\n<p>\u00cdme n\u00e9h\u00e1ny legjobb gyakorlat, hogy megv\u00e9dd magad a WIFI kiberb\u0171n\u00f6z\u00e9st\u0151l:.<\/p>\n\n\n\n<p>Ker\u00fcld a gyan\u00fas weboldalakat \u00e9s \u00fczeneteket.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Hozz l\u00e9tre er\u0151s jelszavakat, amelyek hossz\u00faak, \u00f6sszetettek \u00e9s egyediek.<\/li>\n\n\n\n<li>Haszn\u00e1lj jelsz\u00f3kezel\u0151t egy megb\u00edzhat\u00f3 szolg\u00e1ltat\u00f3t\u00f3l.<\/li>\n\n\n\n<li>Enged\u00e9lyezd a k\u00e9tfaktoros hiteles\u00edt\u00e9st, amikor csak lehets\u00e9ges.<\/li>\n\n\n\n<li>Soha ne haszn\u00e1ld \u00fajra a jelszavakat t\u00f6bb fi\u00f3khoz vagy szolg\u00e1ltat\u00e1shoz. Ha a jelszavadat ellopj\u00e1k egy t\u00e1mad\u00e1s sor\u00e1n, a k\u00e1r megsokszoroz\u00f3dik, mivel hozz\u00e1f\u00e9rhetnek k\u00fcl\u00f6nb\u00f6z\u0151 fi\u00f3kokhoz.<\/li>\n\n\n\n<li>Rendszeresen figyeld banki \u00e9s hitelsz\u00e1ml\u00e1idat gyan\u00fas tev\u00e9kenys\u00e9gek\u00e9rt. Ez seg\u00edthet \u00e9szrevenni egy t\u00e1mad\u00e1st, miel\u0151tt s\u00falyos k\u00e1rokat okozna a p\u00e9nz\u00fcgyeidben vagy h\u00edrnevedben. Emellett \u00e1ll\u00edts be tranzakci\u00f3s korl\u00e1tokat, hogy megakad\u00e1lyozd a p\u00e9nzed vissza\u00e9l\u00e9s\u00e9t.<\/li>\n\n\n\n<li>L\u00e9gy \u00f3vatos a bizalmas inform\u00e1ci\u00f3iddal. Ha meg akarsz szabadulni olyan dokumentumokt\u00f3l, amelyek \u00e9rz\u00e9keny szem\u00e9lyes inform\u00e1ci\u00f3kat tartalmaznak, gy\u0151z\u0151dj meg r\u00f3la, hogy biztons\u00e1gos m\u00f3don teszed, megsemmis\u00edtve \u0151ket, hogy ne legyenek visszanyerhet\u0151k. Alkalmazd ugyanezt a j\u00f3zan \u00e9szt az eszk\u00f6zeidre is: amikor eladod vagy eldobod \u0151ket, gy\u0151z\u0151dj meg r\u00f3la, hogy nem hagysz nyomot az \u00e9rz\u00e9keny inform\u00e1ci\u00f3idr\u00f3l.<\/li>\n\n\n\n<li>Ne ossz meg t\u00fal sokat. Ker\u00fcld a szem\u00e9lyes \u00e9leted r\u00e9szleteinek k\u00f6zz\u00e9t\u00e9tel\u00e9t, amelyeket a b\u0171n\u00f6z\u0151k vissza\u00e9lhetnek, hogy a nevedben cselekedjenek.<\/li>\n\n\n\n<li>Fontos az is, hogy naprak\u00e9sz maradj a leg\u00fajabb kiberfenyeget\u00e9sekkel \u00e9s trendekkel. A kiberb\u0171n\u00f6z\u0151k folyamatosan fejl\u0151dnek, \u00e9s neked is \u00edgy kell tenned a tud\u00e1soddal, hogy hogyan v\u00e9dd meg magad \u00e9s szervezeted. Vegy\u00e9l r\u00e9szt.<\/li>\n<\/ul>\n\n\n\n<p>kiberbiztons\u00e1gi k\u00e9pz\u00e9si programokban <a href=\"https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/resources\/cybersecurity-workforce-development\" target=\"_blank\" rel=\"noreferrer noopener\">\u00e9s maradj t\u00e1j\u00e9kozott a leg\u00fajabb taktik\u00e1kr\u00f3l \u00e9s technol\u00f3gi\u00e1kr\u00f3l, amelyek hossz\u00fa utat jelenthetnek a t\u00e1mad\u00e1sok megel\u0151z\u00e9s\u00e9ben.<\/a> , a WIFI h\u00e1l\u00f3zatok k\u00e9nyelmes \u00e9s elengedhetetlen r\u00e9szei a modern \u00e9letnek, de jelent\u0151s kock\u00e1zatot is jelentenek a kiberb\u0171n\u00f6z\u00e9s szempontj\u00e1b\u00f3l. Fontos, hogy tiszt\u00e1ban legy\u00fcnk ezekkel a kock\u00e1zatokkal, \u00e9s tegy\u00fcnk l\u00e9p\u00e9seket magunk \u00e9s szervezet\u00fcnk v\u00e9delm\u00e9re. A megfelel\u0151 biztons\u00e1gi int\u00e9zked\u00e9sek bevezet\u00e9s\u00e9vel, \u00e9bers\u00e9ggel \u00e9s \u00f6nmagunk \u00e9s m\u00e1sok oktat\u00e1s\u00e1val cs\u00f6kkenthetj\u00fck annak val\u00f3sz\u00edn\u0171s\u00e9g\u00e9t, hogy a WIFI kiberb\u0171n\u00f6z\u00e9s \u00e1ldozat\u00e1v\u00e1 v\u00e1ljunk.<\/p>\n\n\n\n<p><strong>\u00d6sszefoglalva<\/strong>, WIFI networks are a convenient and essential part of modern life, but they also pose significant risks for cybercrime. It\u2019s crucial to be aware of these risks and take steps to protect yourself and your organization. By implementing the right security measures, being vigilant, and educating yourself and others, you can reduce the likelihood of becoming a victim of WIFI cybercrime.<\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is considered a priority by corporations and companies, and they are making significant investments in firewalls that allow their systems to be effectively inaccessible. However, many of these companies\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/technologia\/kiberbunozes-wifi-n-keresztul-amit-tudnod-kell\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Kibert\u00e1mad\u00e1s WiFi-n Kereszt\u00fcl: Amit Tudnia Kell<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1514,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"tags":[],"class_list":["post-1504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting Yourself from Cybercrime through WIFI<\/title>\n<meta name=\"description\" content=\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/technologia\/kiberbunozes-wifi-n-keresztul-amit-tudnod-kell\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Yourself from Cybercrime through WIFI\" \/>\n<meta property=\"og:description\" content=\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/technologia\/kiberbunozes-wifi-n-keresztul-amit-tudnod-kell\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-25T14:46:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"388\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Cybercrime Through WiFi: What You Need to Know\",\"datePublished\":\"2023-02-25T14:46:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"},\"wordCount\":1468,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\",\"name\":\"Protecting Yourself from Cybercrime through WIFI\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"datePublished\":\"2023-02-25T14:46:21+00:00\",\"description\":\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"width\":760,\"height\":388,\"caption\":\"Cybercrime Through WiFi What You Need To Know\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime Through WiFi: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"V\u00e9dekez\u00e9s a kiberb\u0171n\u00f6z\u00e9s ellen WIFI-n kereszt\u00fcl","description":"V\u00e9dje meg mag\u00e1t \u00e9s szervezet\u00e9t a WIFI kiberb\u0171n\u00f6z\u00e9st\u0151l. Tanulja meg, hogyan maradhat biztons\u00e1gban a MITM t\u00e1mad\u00e1sokt\u00f3l szak\u00e9rt\u0151i tippjeink seg\u00edts\u00e9g\u00e9vel.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/technologia\/kiberbunozes-wifi-n-keresztul-amit-tudnod-kell\/","og_locale":"hu_HU","og_type":"article","og_title":"Protecting Yourself from Cybercrime through WIFI","og_description":"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.","og_url":"https:\/\/securitybriefing.net\/hu\/technologia\/kiberbunozes-wifi-n-keresztul-amit-tudnod-kell\/","og_site_name":"Security Briefing","article_published_time":"2023-02-25T14:46:21+00:00","og_image":[{"width":760,"height":388,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"7 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Cybercrime Through WiFi: What You Need to Know","datePublished":"2023-02-25T14:46:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"},"wordCount":1468,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","articleSection":["Technology"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/","name":"V\u00e9dekez\u00e9s a kiberb\u0171n\u00f6z\u00e9s ellen WIFI-n kereszt\u00fcl","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","datePublished":"2023-02-25T14:46:21+00:00","description":"V\u00e9dje meg mag\u00e1t \u00e9s szervezet\u00e9t a WIFI kiberb\u0171n\u00f6z\u00e9st\u0151l. Tanulja meg, hogyan maradhat biztons\u00e1gban a MITM t\u00e1mad\u00e1sokt\u00f3l szak\u00e9rt\u0151i tippjeink seg\u00edts\u00e9g\u00e9vel.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","width":760,"height":388,"caption":"Cybercrime Through WiFi What You Need To Know"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Cybercrime Through WiFi: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1504"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1504\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1514"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}