{"id":336,"date":"2022-07-07T20:08:20","date_gmt":"2022-07-07T20:08:20","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=336"},"modified":"2022-07-07T20:08:20","modified_gmt":"2022-07-07T20:08:20","slug":"kartevo-101","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/kartevo-101\/","title":{"rendered":"Malware 101: Mi a malware, hogyan lehet megel\u0151zni a t\u00e1mad\u00e1sokat, \u00e9s hogyan lehet elt\u00e1vol\u00edtani a malware-t a sz\u00e1m\u00edt\u00f3g\u00e9pr\u0151l"},"content":{"rendered":"<p><span data-preserver-spaces=\"true\">A k\u00e1rtev\u0151 (malware) egy olyan kifejez\u00e9s, amely mindenf\u00e9le rosszindulat\u00fa szoftvert \u00edr le, amely megfert\u0151zheti a sz\u00e1m\u00edt\u00f3g\u00e9pedet \u00e9s k\u00fcl\u00f6nf\u00e9le k\u00e1rokat okozhat. Megbesz\u00e9lj\u00fck, mi is az a k\u00e1rtev\u0151, hogyan lehet megel\u0151zni a k\u00e1rtev\u0151 t\u00e1mad\u00e1sokat, \u00e9s hogyan lehet elt\u00e1vol\u00edtani a k\u00e1rtev\u0151t a sz\u00e1m\u00edt\u00f3g\u00e9pedr\u0151l. Tov\u00e1bb\u00e1 tippeket adunk az online biztons\u00e1g meg\u0151rz\u00e9s\u00e9hez \u00e9s a sz\u00e1m\u00edt\u00f3g\u00e9ped v\u00e9delm\u00e9hez ezekkel a k\u00e1ros programokkal szemben.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">Mi az a k\u00e1rtev\u0151?<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">A k\u00e1rtev\u0151vel fert\u0151z\u00f6tt sz\u00e1m\u00edt\u00f3g\u00e9pet k\u00e1rtev\u0151 fert\u0151z\u00e9snek nevezik.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A k\u00e1rtev\u0151 fert\u0151z\u00e9s egy olyan program vagy k\u00f3d, amely t\u00e1mad, felfedez, lop, vagy b\u00e1rmilyen m\u00e1s feladatot v\u00e9gez, amit a t\u00e1mad\u00f3 k\u00edv\u00e1n. A k\u00e1rtev\u0151k sokf\u00e9le form\u00e1ja miatt sz\u00e1mos lehet\u0151s\u00e9get k\u00edn\u00e1lnak a sz\u00e1m\u00edt\u00f3g\u00e9pek megfert\u0151z\u00e9s\u00e9re.<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Lehet\u0151v\u00e9 teszi a t\u00e1mad\u00f3nak, hogy egy kompromitt\u00e1lt g\u00e9pet t\u00e1vir\u00e1ny\u00edt\u00f3 platformk\u00e9nt haszn\u00e1ljon.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Spam k\u00fcld\u00e9se a fert\u0151z\u00f6tt sz\u00e1m\u00edt\u00f3g\u00e9pr\u0151l a h\u00e1l\u00f3zat tagjainak, akik nem tudnak a fert\u0151z\u00e9sr\u0151l.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Vizsg\u00e1lja meg a felhaszn\u00e1l\u00f3 helyi h\u00e1l\u00f3zat\u00e1t kritikus adatok ut\u00e1n.<\/span><\/li>\n<\/ul>\n<h2><strong><span data-preserver-spaces=\"true\">A k\u00e1rtev\u0151k t\u00edpusai<\/span><\/strong><\/h2>\n<h3><strong><span data-preserver-spaces=\"true\">Hirdet\u0151programok (Adware)<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A hirdet\u0151programok olyan k\u00e1rtev\u0151k, amelyek enged\u00e9lyed n\u00e9lk\u00fcl t\u00f6ltenek be hirdet\u00e9seket a sz\u00e1m\u00edt\u00f3g\u00e9pedre. B\u00e1r nem k\u00fcl\u00f6n\u00f6sebben \u00e1rtalmasak, zavar\u00f3ak lehetnek, mivel a \u201cspam\u201d hirdet\u00e9sek folyamatosan felugranak munka k\u00f6zben, jelent\u0151sen lass\u00edtva a PC teljes\u00edtm\u00e9ny\u00e9t. Tov\u00e1bb\u00e1 ezek a rekl\u00e1mok akaratlanul is arra \u00f6szt\u00f6n\u00f6zhetik a felhaszn\u00e1l\u00f3kat, hogy tov\u00e1bbi vesz\u00e9lyes k\u00e1rtev\u0151 t\u00edpusokat t\u00f6ltsenek le.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A sz\u00e1m\u00edt\u00f3g\u00e9ped v\u00e9delme \u00e9rdek\u00e9ben a hirdet\u0151programokkal szemben:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Folyamatosan friss\u00edtsd az oper\u00e1ci\u00f3s rendszert \u00e9s a szoftvereket rendszeresen, hogy elker\u00fcld a hirdet\u0151program fert\u0151z\u00e9seket.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Telep\u00edts egy megb\u00edzhat\u00f3 k\u00e1rtev\u0151ellenes programot, \u00e9s futtass rendszeres vizsg\u00e1latokat.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Legy\u00e9l \u00f3vatos, amikor ingyenes programokat t\u00f6ltesz le, mivel ezek hirdet\u0151programokkal is egy\u00fctt j\u00e1rhatnak.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Soha ne kattints felugr\u00f3 hirdet\u00e9sekre.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">V\u00edrusok<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A v\u00edrus egy olyan k\u00e1rtev\u0151, amely k\u00e9pes \u00f6nmag\u00e1t sokszoros\u00edtani \u00e9s m\u00e1s sz\u00e1m\u00edt\u00f3g\u00e9pekre terjedni. T\u00f6r\u00f6lhet f\u00e1jlokat, megv\u00e1ltoztathat be\u00e1ll\u00edt\u00e1sokat, vagy megrong\u00e1lhat adatokat a sz\u00e1m\u00edt\u00f3g\u00e9peden. Bizonyos esetekben a v\u00edrus hamis figyelmeztet\u00e9seket vagy hirdet\u00e9seket is megjelen\u00edthet, hogy r\u00e1vegyen tov\u00e1bbi k\u00e1rtev\u0151k telep\u00edt\u00e9s\u00e9re.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A v\u00edrusok gyakran e-mail mell\u00e9kleteken kereszt\u00fcl vagy fert\u0151z\u00f6tt f\u00e1jlok let\u00f6lt\u00e9s\u00e9vel terjednek az internetr\u0151l.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A sz\u00e1m\u00edt\u00f3g\u00e9ped v\u00e9delme \u00e9rdek\u00e9ben a v\u00edrusokkal szemben:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Soha ne t\u00f6lts le f\u00e1jlokat megb\u00edzhatatlan weboldalakr\u00f3l.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Ker\u00fcld az ismeretlen felad\u00f3kt\u00f3l \u00e9rkez\u0151 e-mail mell\u00e9kleteket.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Telep\u00edts egy megb\u00edzhat\u00f3 v\u00edrusirt\u00f3 programot, \u00e9s futtass rendszeres vizsg\u00e1latokat.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Friss\u00edtsd rendszeresen az oper\u00e1ci\u00f3s rendszert \u00e9s a szoftvereket.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Legy\u00e9l \u00f3vatos, amikor ingyenes programokat t\u00f6ltesz le, mivel ezek v\u00edrusokkal is egy\u00fctt j\u00e1rhatnak.\u00a0<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">F\u00e1jl n\u00e9lk\u00fcli k\u00e1rtev\u0151k<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A f\u00e1jl n\u00e9lk\u00fcli k\u00e1rtev\u0151 egy olyan t\u00edpus\u00fa k\u00e1rtev\u0151, amely nem t\u00e1maszkodik f\u00e1jlokra a sz\u00e1m\u00edt\u00f3g\u00e9ped megfert\u0151z\u00e9s\u00e9hez. Ehelyett a sz\u00e1m\u00edt\u00f3g\u00e9pedre telep\u00edtett legitim programokat haszn\u00e1lja fel a piszkos munk\u00e1j\u00e1hoz. Mivel a f\u00e1jl n\u00e9lk\u00fcli k\u00e1rtev\u0151k nem haszn\u00e1lnak f\u00e1jlokat, neh\u00e9z lehet \u0151ket \u00e9szlelni \u00e9s elt\u00e1vol\u00edtani.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A f\u00e1jl n\u00e9lk\u00fcli k\u00e1rtev\u0151k ellen neh\u00e9z lehet v\u00e9dekezni a v\u00edrusirt\u00f3 szoftverekkel, mert nincs futtathat\u00f3 f\u00e1jlja. De seg\u00edthetsz megv\u00e9deni a sz\u00e1m\u00edt\u00f3g\u00e9pedet azzal, hogy biztos\u00edtod, hogy a felhaszn\u00e1l\u00f3k csak azokat a jogokat kapj\u00e1k meg, amelyekre a munk\u00e1jukhoz sz\u00fcks\u00e9g\u00fck van. Ez megakad\u00e1lyozza, hogy a kiberb\u0171n\u00f6z\u0151k f\u00e1jl n\u00e9lk\u00fcli k\u00e1rtev\u0151ket haszn\u00e1ljanak az alkalmazottak hiteles\u00edt\u0151 adatainak megszerz\u00e9s\u00e9re \u00e9s a korl\u00e1tozott adatok el\u00e9r\u00e9s\u00e9re.<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">F\u00e9rgek<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A f\u00e9rgek olyan k\u00e1rtev\u0151k, amelyek felhaszn\u00e1l\u00f3i beavatkoz\u00e1s n\u00e9lk\u00fcl is k\u00e9pesek terjedni. A f\u00e9rgek sok k\u00e1rt okozhatnak, mert gyorsan elterjedhetnek egy teljes h\u00e1l\u00f3zaton, megfert\u0151zve az \u00f6sszes sz\u00e1m\u00edt\u00f3g\u00e9pet azon a h\u00e1l\u00f3zaton. Amint egy f\u00e9reg megfert\u0151z egy sz\u00e1m\u00edt\u00f3g\u00e9pet, \u00e1tvizsg\u00e1lja a h\u00e1l\u00f3zatot m\u00e1s sebezhet\u0151 sz\u00e1m\u00edt\u00f3g\u00e9pek ut\u00e1n, \u00e9s elosztja azokat ezekre a rendszerekre.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A f\u00e9rgek gyakran e-mail mell\u00e9kleteken kereszt\u00fcl vagy fert\u0151z\u00f6tt f\u00e1jlok let\u00f6lt\u00e9s\u00e9vel terjednek az internetr\u0151l.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A sz\u00e1m\u00edt\u00f3g\u00e9ped v\u00e9delme \u00e9rdek\u00e9ben a f\u00e9rgekkel szemben ker\u00fcld az ismeretlen felad\u00f3kt\u00f3l \u00e9rkez\u0151 e-mail mell\u00e9kleteket.<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Soha ne t\u00f6lts le f\u00e1jlokat megb\u00edzhatatlan weboldalakr\u00f3l.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Telep\u00edts egy megb\u00edzhat\u00f3 v\u00edrusirt\u00f3 programot, \u00e9s futtass rendszeres vizsg\u00e1latokat.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Friss\u00edtsd rendszeresen az oper\u00e1ci\u00f3s rendszert \u00e9s a szoftvereket.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Legy\u00e9l \u00f3vatos, amikor ingyenes programokat t\u00f6ltesz le, mivel ezek f\u00e9rgekkel is egy\u00fctt j\u00e1rhatnak.<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">https:\/\/www.youtube.com\/watch?v=QozdEbyMK5E<\/span><\/p>\n<h3><strong><span data-preserver-spaces=\"true\">Tr\u00f3jai programok<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A tr\u00f3jai programok hamis programok, amelyek valami m\u00e1snak adj\u00e1k ki magukat. Nem v\u00edrusok vagy f\u00e9rgek, de m\u00e9gis sok k\u00e1rt okozhatnak. A tr\u00f3jai programok \u00e1ltal\u00e1ban e-mailen vagy hamis weboldalakra vezet\u0151 linkeken kereszt\u00fcl jutnak be a sz\u00e1m\u00edt\u00f3g\u00e9pedre. Mivel a felhaszn\u00e1l\u00f3k megt\u00e9veszt\u00e9s\u00e9re \u00e9s let\u00f6lt\u00e9s\u00e9re t\u00e1maszkodnak, nehezebb lehet ellen\u00fck v\u00e9dekezni, mint a hagyom\u00e1nyos v\u00edrusok \u00e9s f\u00e9rgek ellen.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A legegyszer\u0171bb m\u00f3dja a sz\u00e1m\u00edt\u00f3g\u00e9ped v\u00e9delm\u00e9nek a tr\u00f3jai programokkal szemben, ha \u00f3vatos vagy az e-mailek megnyit\u00e1sakor \u00e9s a weboldalak l\u00e1togat\u00e1sakor.<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Telep\u00edts egy megb\u00edzhat\u00f3 v\u00edrusirt\u00f3 programot, \u00e9s futtass rendszeres vizsg\u00e1latokat.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Friss\u00edtsd rendszeresen az oper\u00e1ci\u00f3s rendszert \u00e9s a szoftvereket.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Legy\u00e9l \u00f3vatos, amikor ingyenes programokat t\u00f6ltesz le, mivel ezek tr\u00f3jai programokkal is egy\u00fctt j\u00e1rhatnak.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Zsarol\u00f3programok<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A zsarol\u00f3programok olyan k\u00e1rtev\u0151k, amelyek titkos\u00edtj\u00e1k a f\u00e1jljaidat, \u00e9s t\u00faszul ejtik \u0151ket, am\u00edg nem fizetsz v\u00e1lts\u00e1gd\u00edjat. A v\u00e1lts\u00e1gd\u00edj kifizet\u00e9se nem garant\u00e1lja, hogy visszakapod a f\u00e1jljaidat, \u00e9s t\u00e1mogatja a zsarol\u00f3programokat l\u00e9trehoz\u00f3 kiberb\u0171n\u00f6z\u0151ket.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Miut\u00e1n a f\u00e1jljaid titkos\u00edtva vannak, nem tudod el\u00e9rni vagy haszn\u00e1lni \u0151ket. A zsarol\u00f3programok \u00e1ltal\u00e1ban e-mail mell\u00e9kleteken kereszt\u00fcl vagy fert\u0151z\u00f6tt f\u00e1jlok let\u00f6lt\u00e9s\u00e9vel terjednek az internetr\u0151l.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A zsarol\u00f3programok gyakran e-mail mell\u00e9kleteken kereszt\u00fcl vagy fert\u0151z\u00f6tt f\u00e1jlok let\u00f6lt\u00e9s\u00e9vel terjednek az internetr\u0151l.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A sz\u00e1m\u00edt\u00f3g\u00e9ped v\u00e9delme \u00e9rdek\u00e9ben a zsarol\u00f3programokkal szemben ker\u00fcld az ismeretlen felad\u00f3kt\u00f3l \u00e9rkez\u0151 e-mail mell\u00e9kleteket.<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Soha ne t\u00f6lts le f\u00e1jlokat megb\u00edzhatatlan weboldalakr\u00f3l.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Telep\u00edts egy megb\u00edzhat\u00f3 v\u00edrusirt\u00f3 programot, \u00e9s futtass rendszeres vizsg\u00e1latokat. Friss\u00edtsd rendszeresen az oper\u00e1ci\u00f3s rendszert \u00e9s a szoftvereket.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Legy\u00e9l \u00f3vatos, amikor ingyenes programokat t\u00f6ltesz le, mivel ezek zsarol\u00f3programokkal is egy\u00fctt j\u00e1rhatnak.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Botok<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A bot egy olyan szoftverprogram, amely automatiz\u00e1lt feladatokat futtat az interneten. A fejleszt\u0151k j\u00f3 vagy rossz c\u00e9lokra is haszn\u00e1lhatj\u00e1k a botokat. P\u00e9ld\u00e1ul egy id\u0151j\u00e1r\u00e1s bot automatikusan k\u00fcldhet neked egy tweetet, amikor esni fog a k\u00f6rny\u00e9keden. De a hackerek is haszn\u00e1lhatnak botot spam vagy k\u00e1rtev\u0151k terjeszt\u00e9s\u00e9re.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">Egy botnet \u00e1ltal v\u00e9grehajtott szolg\u00e1ltat\u00e1smegtagad\u00e1si t\u00e1mad\u00e1s 2018-ban le\u00e1ll\u00edtotta a Twittert, a Netflixet \u00e9s m\u00e1s n\u00e9pszer\u0171 weboldalakat.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A legjobb m\u00f3dja a sz\u00e1m\u00edt\u00f3g\u00e9ped v\u00e9delm\u00e9nek a botokkal szemben:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Telep\u00edts egy megb\u00edzhat\u00f3 v\u00edrusirt\u00f3 programot, \u00e9s futtass rendszeres vizsg\u00e1latokat.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Friss\u00edtsd rendszeresen az oper\u00e1ci\u00f3s rendszert \u00e9s a szoftvereket.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Adj hozz\u00e1 CAPTCHA-kat a weboldalad \u0171rlapjaihoz, hogy nehezebb legyen a botoknak az \u0171rlapok bek\u00fcld\u00e9se.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">K\u00e9mprogramok<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A k\u00e9mprogramok olyan k\u00e1rtev\u0151k, amelyek lehet\u0151v\u00e9 teszik a kiberb\u0171n\u00f6z\u0151k sz\u00e1m\u00e1ra, hogy inform\u00e1ci\u00f3kat gy\u0171jtsenek r\u00f3lad a tudtod n\u00e9lk\u00fcl. Nyomon k\u00f6vethetik a megl\u00e1togatott weboldalakat, a v\u00e9gzett keres\u00e9seket \u00e9s a let\u00f6lt\u00f6tt f\u00e1jlokat. A k\u00e9mprogramok \u00e9rz\u00e9keny inform\u00e1ci\u00f3kat is gy\u0171jthetnek, p\u00e9ld\u00e1ul a jelszavaidat \u00e9s a hitelk\u00e1rtyasz\u00e1maidat.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A k\u00e9mprogramokat \u00e1ltal\u00e1ban a tudtod n\u00e9lk\u00fcl telep\u00edtik a sz\u00e1m\u00edt\u00f3g\u00e9pedre, e-mail mell\u00e9kleteken kereszt\u00fcl vagy fert\u0151z\u00f6tt f\u00e1jlok let\u00f6lt\u00e9s\u00e9vel az internetr\u0151l.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A sz\u00e1m\u00edt\u00f3g\u00e9ped v\u00e9delme \u00e9rdek\u00e9ben a k\u00e9mprogramokkal szemben:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Ker\u00fcld az ismeretlen felad\u00f3kt\u00f3l \u00e9rkez\u0151 e-mail mell\u00e9kleteket.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Soha ne t\u00f6lts le f\u00e1jlokat megb\u00edzhatatlan weboldalakr\u00f3l.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Telep\u00edts egy megb\u00edzhat\u00f3 v\u00edrusirt\u00f3 programot, \u00e9s futtass rendszeres vizsg\u00e1latokat. Friss\u00edtsd rendszeresen az oper\u00e1ci\u00f3s rendszert \u00e9s a szoftvereket.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Legy\u00e9l \u00f3vatos, amikor ingyenes programokat t\u00f6ltesz le, mivel ezek k\u00e9mprogramokkal is egy\u00fctt j\u00e1rhatnak.<\/span><\/li>\n<\/ul>\n<h3><strong><span data-preserver-spaces=\"true\">Rootkitek\u00a0<\/span><\/strong><\/h3>\n<p><span data-preserver-spaces=\"true\">A rootkitek olyan k\u00e1rtev\u0151k, amelyek lehet\u0151v\u00e9 teszik a kiberb\u0171n\u00f6z\u0151k sz\u00e1m\u00e1ra, hogy hozz\u00e1f\u00e9rjenek a sz\u00e1m\u00edt\u00f3g\u00e9pedhez \u00e9s annak \u00e9rz\u00e9keny inform\u00e1ci\u00f3ihoz a tudtod n\u00e9lk\u00fcl. A rootkitek \u00e1ltal\u00e1ban a tudtod n\u00e9lk\u00fcl telep\u00edtik a sz\u00e1m\u00edt\u00f3g\u00e9pedre, e-mail mell\u00e9kleteken kereszt\u00fcl vagy fert\u0151z\u00f6tt f\u00e1jlok let\u00f6lt\u00e9s\u00e9vel az internetr\u0151l. A kiberb\u0171n\u00f6z\u0151k felhaszn\u00e1lhatj\u00e1k \u0151ket inform\u00e1ci\u00f3k gy\u0171jt\u00e9s\u00e9re r\u00f3lad, a megl\u00e1togatott weboldalak nyomon k\u00f6vet\u00e9s\u00e9re, s\u0151t a sz\u00e1m\u00edt\u00f3g\u00e9ped t\u00e1voli ir\u00e1ny\u00edt\u00e1s\u00e1ra is.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A sz\u00e1m\u00edt\u00f3g\u00e9ped v\u00e9delme \u00e9rdek\u00e9ben a rootkitekkel szemben:<\/span><\/p>\n<ul>\n<li><span data-preserver-spaces=\"true\">Ker\u00fcld az ismeretlen felad\u00f3kt\u00f3l \u00e9rkez\u0151 e-mail mell\u00e9kleteket.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Soha ne t\u00f6lts le f\u00e1jlokat megb\u00edzhatatlan weboldalakr\u00f3l.<\/span><\/li>\n<li><span data-preserver-spaces=\"true\">Telep\u00edts egy megb\u00edzhat\u00f3 v\u00edrusirt\u00f3 programot, \u00e9s futtass rendszeres vizsg\u00e1latokat. Friss\u00edtsd rendszeresen az oper\u00e1ci\u00f3s rendszert \u00e9s a szoftvereket.<\/span><\/li>\n<\/ul>\n<p><span data-preserver-spaces=\"true\">Legy\u00e9l \u00f3vatos, amikor ingyenes programokat t\u00f6ltesz le, mivel ezek rootkitekkel is egy\u00fctt j\u00e1rhatnak.<\/span><\/p>\n<h2><span data-preserver-spaces=\"true\">A k\u00e1rtev\u0151 t\u00e1mad\u00e1si m\u00f3dszerek t\u00edpusai<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">K\u00fcl\u00f6nb\u00f6z\u0151 m\u00f3dok vannak arra, hogy a k\u00e1rtev\u0151k m\u00e1s sz\u00e1m\u00edt\u00f3g\u00e9pes rendszerekre terjedjenek. A k\u00e1rtev\u0151 t\u00e1mad\u00e1sok meghat\u00e1roz\u00e1sai a k\u00f6vetkez\u0151ket tartalmazhatj\u00e1k:<\/span><\/p>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">Egyenrang\u00fa felek k\u00f6z\u00f6tti (P2P)<\/span><\/strong><span data-preserver-spaces=\"true\">: A f\u00e1jlmegoszt\u00e1s n\u00e9ha vesz\u00e9lybe sodorhatja a sz\u00e1m\u00edt\u00f3g\u00e9pedet. P\u00e9ld\u00e1ul, amikor zen\u00e9t vagy k\u00e9peket osztasz meg, ezek \u00e1rtalmatlannak t\u0171nhetnek. De n\u00e9h\u00e1ny f\u00e1jl k\u00e1rtev\u0151t tartalmazhat. Amint megnyitod ezeket a f\u00e1jlokat, a k\u00e1rtev\u0151 megfert\u0151zheti a sz\u00e1m\u00edt\u00f3g\u00e9pedet.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">Drive-by let\u00f6lt\u00e9s<\/span><\/strong><span data-preserver-spaces=\"true\">: A k\u00e1rtev\u0151 a tudtod n\u00e9lk\u00fcl is telep\u00fclhet a sz\u00e1m\u00edt\u00f3g\u00e9pedre, ha megl\u00e1togatsz egy fert\u0151z\u00f6tt weboldalt. A rosszindulat\u00fa k\u00f3d kihaszn\u00e1lhatja a webb\u00f6ng\u00e9sz\u0151d vagy a b\u0151v\u00edtm\u00e9nyeid sebezhet\u0151s\u00e9geit, hogy telep\u00edtse a k\u00e1rtev\u0151t a sz\u00e1m\u00edt\u00f3g\u00e9pedre.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">E-mail mell\u00e9kletek:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0A hackerek e-mail mell\u00e9kleteken kereszt\u00fcl terjeszthetnek k\u00e1rtev\u0151ket. Ezek olyan f\u00e1jlok, amelyeket egy e-mail \u00fczenethez csatolnak. A felad\u00f3 megb\u00edzhat\u00f3nak t\u0171nhet, de a mell\u00e9klet fert\u0151z\u00f6tt lehet. Amikor megnyitod a f\u00e1jlt, a k\u00e1rtev\u0151 megfert\u0151zheti a sz\u00e1m\u00edt\u00f3g\u00e9pedet.<\/span><\/li>\n<\/ul>\n<h2><span data-preserver-spaces=\"true\">Hogyan lehet megel\u0151zni a k\u00e1rtev\u0151ket<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Sz\u00e1mos m\u00f3dja van a k\u00e1rtev\u0151k megel\u0151z\u00e9s\u00e9nek, bele\u00e9rtve a t\u0171zfalakat, a v\u00edrusirt\u00f3 szoftvereket \u00e9s az e-mail sz\u0171r\u00e9st.<\/span><\/p>\n<ul>\n<li><strong><span data-preserver-spaces=\"true\">T\u0171zfalak<\/span><\/strong><span data-preserver-spaces=\"true\">: A t\u0171zfal egy olyan rendszer, amely seg\u00edt megv\u00e9deni a sz\u00e1m\u00edt\u00f3g\u00e9pedet az illet\u00e9ktelen hozz\u00e1f\u00e9r\u00e9st\u0151l. Lehet hardver vagy szoftver. A hardveres t\u0171zfal egy fizikai eszk\u00f6z a sz\u00e1m\u00edt\u00f3g\u00e9ped \u00e9s az internet k\u00f6z\u00f6tt. A szoftveres t\u0171zfal egy program, amely a sz\u00e1m\u00edt\u00f3g\u00e9peden fut.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">V\u00edrusirt\u00f3 szoftver:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0A v\u00edrusirt\u00f3 szoftver egy olyan program, amely seg\u00edt megv\u00e9deni a sz\u00e1m\u00edt\u00f3g\u00e9pedet a v\u00edrusokt\u00f3l \u00e9s m\u00e1s k\u00e1rtev\u0151kt\u0151l. K\u00e9pes \u00e1tvizsg\u00e1lni a sz\u00e1m\u00edt\u00f3g\u00e9pedet k\u00e1rtev\u0151k ut\u00e1n, \u00e9s elt\u00e1vol\u00edtani azokat.<\/span><\/li>\n<li><strong><span data-preserver-spaces=\"true\">E-mail sz\u0171r\u00e9s:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0Az e-mail sz\u0171r\u00e9s egy folyamat, amely azonos\u00edtja \u00e9s blokkolja a spam vagy k\u00e1rtev\u0151t tartalmaz\u00f3 e-mail \u00fczeneteket.<\/span><\/li>\n<\/ul>\n<h2><span data-preserver-spaces=\"true\">Hogyan lehet elt\u00e1vol\u00edtani a k\u00e1rtev\u0151ket<\/span><\/h2>\n<p><span data-preserver-spaces=\"true\">Ha \u00fagy gondolod, hogy kiberb\u0171n\u00f6z\u0151k megfert\u0151zt\u00e9k a sz\u00e1m\u00edt\u00f3g\u00e9pedet k\u00e1rtev\u0151kkel, van n\u00e9h\u00e1ny l\u00e9p\u00e9s, amit megtehetsz az elt\u00e1vol\u00edt\u00e1suk \u00e9rdek\u00e9ben.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">V\u00edrusirt\u00f3 szoftver let\u00f6lt\u00e9se:\u00a0<\/span><\/strong><span data-preserver-spaces=\"true\">K\u00e9t sz\u00e9les k\u00f6r\u0171 v\u00edrusirt\u00f3 szoftver l\u00e9tezik. A val\u00f3s idej\u0171 k\u00e1rtev\u0151keres\u0151k felfedezik a v\u00edrusokat munka k\u00f6zben, m\u00edg az ig\u00e9ny szerinti keres\u0151k, mint p\u00e9ld\u00e1ul a Microsoft Defender, manu\u00e1lisan aktiv\u00e1lhat\u00f3k, amikor sz\u00fcks\u00e9ges.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">K\u00e1rtev\u0151k keres\u00e9se:\u00a0<\/span><\/strong><span data-preserver-spaces=\"true\">Miut\u00e1n telep\u00edtetted a v\u00edrusirt\u00f3 szoftvert, futtass egy teljes vizsg\u00e1latot a sz\u00e1m\u00edt\u00f3g\u00e9peden, hogy megtal\u00e1ld \u00e9s elt\u00e1vol\u00edtsd az esetlegesen jelen l\u00e9v\u0151 k\u00e1rtev\u0151ket.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Friss\u00edtsd az oper\u00e1ci\u00f3s rendszert \u00e9s a szoftvereket:<\/span><\/strong><span data-preserver-spaces=\"true\">\u00a0A k\u00e1rtev\u0151k kihaszn\u00e1lhatj\u00e1k a rendszered vagy a szoftvereid sebezhet\u0151s\u00e9geit. Ha naprak\u00e9szen tartod \u0151ket, seg\u00edthetsz bez\u00e1rni ezeket a sebezhet\u0151s\u00e9geket, \u00e9s megnehez\u00edtheted a k\u00e1rtev\u0151k sz\u00e1m\u00e1ra a sz\u00e1m\u00edt\u00f3g\u00e9ped megfert\u0151z\u00e9s\u00e9t.<\/span><\/p>\n<p><strong><span data-preserver-spaces=\"true\">Vissza\u00e1ll\u00edt\u00e1s biztons\u00e1gi m\u00e1solatb\u00f3l:\u00a0<\/span><\/strong><span data-preserver-spaces=\"true\">Ha van egy friss biztons\u00e1gi m\u00e1solatod a sz\u00e1m\u00edt\u00f3g\u00e9pedr\u0151l, vissza\u00e1ll\u00edthatod egy kor\u00e1bbi \u00e1llapotba, hogy elt\u00e1vol\u00edtsd az esetlegesen jelen l\u00e9v\u0151 k\u00e1rtev\u0151ket.<\/span><\/p>\n<p><span data-preserver-spaces=\"true\">A k\u00e1rtev\u0151k komoly fenyeget\u00e9st jelentenek a sz\u00e1m\u00edt\u00f3g\u00e9pedre \u00e9s annak biztons\u00e1g\u00e1ra. A k\u00e1rtev\u0151 fert\u0151z\u00e9sek megel\u0151z\u00e9s\u00e9vel \u00e9s a k\u00e1rtev\u0151k elt\u00e1vol\u00edt\u00e1s\u00e1nak ismeret\u00e9vel seg\u00edthetsz megv\u00e9deni a sz\u00e1m\u00edt\u00f3g\u00e9pedet ezekt\u0151l a rosszindulat\u00fa programokt\u00f3l.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>A rosszindulat\u00fa szoftver kifejez\u00e9s mindenf\u00e9le rosszindulat\u00fa szoftvert \u00edr le, amely megfert\u0151zheti a sz\u00e1m\u00edt\u00f3g\u00e9pedet, \u00e9s mindenf\u00e9le k\u00e1rt okozhat. Megbesz\u00e9lj\u00fck, mi is az a rosszindulat\u00fa szoftver, hogyan\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/kartevo-101\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Malware 101: Mi a malware, hogyan lehet megel\u0151zni a t\u00e1mad\u00e1sokat, \u00e9s hogyan lehet elt\u00e1vol\u00edtani a malware-t a sz\u00e1m\u00edt\u00f3g\u00e9pr\u0151l<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":338,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-336","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer | Security Briefing<\/title>\n<meta name=\"description\" content=\"Find about more about what malware is, how to prevent malware attacks, and how to remove malware from your computer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/kartevo-101\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Find about more about what malware is, how to prevent malware attacks, and how to remove malware from your computer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/kartevo-101\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-07T20:08:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer\",\"datePublished\":\"2022-07-07T20:08:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/\"},\"wordCount\":1620,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg\",\"articleSection\":[\"Malware\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/\",\"url\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/\",\"name\":\"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg\",\"datePublished\":\"2022-07-07T20:08:20+00:00\",\"description\":\"Find about more about what malware is, how to prevent malware attacks, and how to remove malware from your computer.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/malware\/malware-101\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg\",\"width\":800,\"height\":533,\"caption\":\"Malware 101 What is Malware, How to Prevent Malware Attacks, and How to Remove Malware from Your Computer\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/malware\/malware-101\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Malware 101: Mi az a malware, hogyan lehet megel\u0151zni a t\u00e1mad\u00e1sokat, \u00e9s hogyan lehet elt\u00e1vol\u00edtani a malware-t a sz\u00e1m\u00edt\u00f3g\u00e9pr\u0151l | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Tudjon meg t\u00f6bbet arr\u00f3l, hogy mi a rosszindulat\u00fa szoftver, hogyan lehet megel\u0151zni a rosszindulat\u00fa szoftverek t\u00e1mad\u00e1sait, \u00e9s hogyan lehet elt\u00e1vol\u00edtani a rosszindulat\u00fa szoftvereket a sz\u00e1m\u00edt\u00f3g\u00e9p\u00e9r\u0151l.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/kartevo-101\/","og_locale":"hu_HU","og_type":"article","og_title":"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer | Security Briefing","og_description":"Find about more about what malware is, how to prevent malware attacks, and how to remove malware from your computer.","og_url":"https:\/\/securitybriefing.net\/hu\/rosszindulatu-szoftver\/kartevo-101\/","og_site_name":"Security Briefing","article_published_time":"2022-07-07T20:08:20+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"8 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer","datePublished":"2022-07-07T20:08:20+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/"},"wordCount":1620,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg","articleSection":["Malware"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/","url":"https:\/\/securitybriefing.net\/malware\/malware-101\/","name":"Malware 101: Mi az a malware, hogyan lehet megel\u0151zni a t\u00e1mad\u00e1sokat, \u00e9s hogyan lehet elt\u00e1vol\u00edtani a malware-t a sz\u00e1m\u00edt\u00f3g\u00e9pr\u0151l | Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg","datePublished":"2022-07-07T20:08:20+00:00","description":"Tudjon meg t\u00f6bbet arr\u00f3l, hogy mi a rosszindulat\u00fa szoftver, hogyan lehet megel\u0151zni a rosszindulat\u00fa szoftverek t\u00e1mad\u00e1sait, \u00e9s hogyan lehet elt\u00e1vol\u00edtani a rosszindulat\u00fa szoftvereket a sz\u00e1m\u00edt\u00f3g\u00e9p\u00e9r\u0151l.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/malware\/malware-101\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/07\/Malware-101-What-is-Malware-How-to-Prevent-Malware-Attacks-and-How-to-Remove-Malware-from-Your-Computer.jpg","width":800,"height":533,"caption":"Malware 101 What is Malware, How to Prevent Malware Attacks, and How to Remove Malware from Your Computer"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/malware\/malware-101\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Malware 101: What is Malware, How to Prevent Attacks, and How to Remove Malware from Your Computer"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/336","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=336"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/336\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/338"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=336"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=336"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}