{"id":488,"date":"2022-08-01T20:28:11","date_gmt":"2022-08-01T20:28:11","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=488"},"modified":"2022-08-01T20:28:11","modified_gmt":"2022-08-01T20:28:11","slug":"mi-az-a-kemprogram","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kemprogram\/mi-az-a-kemprogram\/","title":{"rendered":"K\u00e9mprogramok: Mik azok \u00e9s hogyan v\u00e9dheted meg magad"},"content":{"rendered":"<p>Tudod, mi az a k\u00e9mprogram? Val\u00f3sz\u00edn\u0171, hogy online \u00e9leted sor\u00e1n m\u00e1r megfert\u0151z\u0151dt\u00e9l vele. A k\u00e9mprogram olyan rosszindulat\u00fa szoftver, amely a felhaszn\u00e1l\u00f3 tudta n\u00e9lk\u00fcl telep\u00fcl az eszk\u00f6z\u00f6kre, \u00e9s \u00e9rz\u00e9keny inform\u00e1ci\u00f3kat, p\u00e9ld\u00e1ul jelszavakat, hitelk\u00e1rtyasz\u00e1mokat \u00e9s internetes haszn\u00e1lati adatokat lophat el. Arra is haszn\u00e1lhat\u00f3, hogy nyomon k\u00f6vesse online tev\u00e9kenys\u00e9gedet rekl\u00e1mc\u00e9lokra. Ha nem vagy \u00f3vatos, a k\u00e9mprogramok nagy k\u00e1rt okozhatnak a sz\u00e1m\u00edt\u00f3g\u00e9pedben \u00e9s a mag\u00e1n\u00e9letedben. Ez a cikk mindent elmond, amit a k\u00e9mprogramokr\u00f3l tudnod kell, \u00e9s arr\u00f3l, hogyan v\u00e9dheted meg magad t\u0151l\u00fck.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-spyware\"><strong>Mi az a k\u00e9mprogram?<\/strong><\/h2>\n\n\n<p>A k\u00e9mprogram olyan szoftver, amely illeg\u00e1lisan gy\u0171jt szem\u00e9lyes vagy v\u00e1llalati inform\u00e1ci\u00f3kat. Ezt a felhaszn\u00e1l\u00f3 beleegyez\u00e9se n\u00e9lk\u00fcl teszi, titokban futva a sz\u00e1m\u00edt\u00f3g\u00e9p\u00e9n. A k\u00e9mprogramok gyakran v\u00e9geznek olyan tev\u00e9kenys\u00e9geket, mint a rekl\u00e1moz\u00e1s, a szem\u00e9lyes adatok gy\u0171jt\u00e9se \u00e9s a sz\u00e1m\u00edt\u00f3g\u00e9p be\u00e1ll\u00edt\u00e1sainak megv\u00e1ltoztat\u00e1sa a tudtod n\u00e9lk\u00fcl.<\/p>\n\n\n\n<p>K\u00fcl\u00f6nb\u00f6z\u0151 t\u00edpus\u00fa k\u00e9mprogramok l\u00e9teznek. A leggyakoribb t\u00edpusok az adware, a k\u00f6vet\u00e9si s\u00fctik, a rendszerfigyel\u0151k \u00e9s a tr\u00f3jai programok. A legrosszabb eset az, amikor egy sz\u00e1m\u00edt\u00f3g\u00e9p m\u00e1r eleve k\u00e9mprogramokkal van felszerelve. Egy m\u00e1sik lehet\u0151s\u00e9g, hogy egy program, amelyet let\u00f6ltesz az internetr\u0151l, megfert\u0151z\u0151dhet, miut\u00e1n elmented a merevlemezedre.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-does-spyware-do\"><strong>Mit csin\u00e1l a k\u00e9mprogram?<\/strong><\/h2>\n\n\n<p>A k\u00e9mprogramokat a felhaszn\u00e1l\u00f3i eszk\u00f6z\u00f6kre telep\u00edtik, hogy nyomon k\u00f6vess\u00e9k azok tev\u00e9kenys\u00e9geit \u00e9s a megl\u00e1togatott weboldalakat. Ez az\u00e9rt t\u00f6rt\u00e9nik, hogy nyomon k\u00f6vess\u00e9k a felhaszn\u00e1l\u00f3i tev\u00e9kenys\u00e9get, begy\u0171jts\u00e9k a bejelentkez\u00e9si \u00e9s jelsz\u00f3inform\u00e1ci\u00f3kat, valamint \u00e9rz\u00e9keny adatokat keressenek. N\u00e9h\u00e1ny k\u00e9mprogram tov\u00e1bbi szoftvereket is telep\u00edthet a felhaszn\u00e1l\u00f3 eszk\u00f6z\u00e9re, hogy a t\u00e1mad\u00f3 v\u00e1ltoztat\u00e1sokat hajthasson v\u00e9gre. A k\u00e9mprogramok \u00e1ltal\u00e1ban h\u00e1rom szakaszban m\u0171k\u00f6dnek, a telep\u00edt\u00e9st\u0151l a lopott inform\u00e1ci\u00f3k elad\u00e1s\u00e1ig vagy tov\u00e1bb\u00edt\u00e1s\u00e1ig:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Behatol\u00e1s<\/strong>: A k\u00e9mprogramnak el\u0151sz\u00f6r el kell jutnia az eszk\u00f6z\u00f6dre. Ezt \u00fagy teheti meg, hogy m\u00e1s let\u00f6lt\u00f6tt szoftverekkel egy\u00fctt csomagolva \u00e9rkezik, vagy egy harmadik f\u00e9lt\u0151l sz\u00e1rmaz\u00f3 alkalmaz\u00e1s telep\u00edti.<\/li>\n<li><strong>Inform\u00e1ci\u00f3 lop\u00e1sa:<\/strong> A k\u00e9mprogram begy\u0171jti a szem\u00e9lyes adatokat, p\u00e9ld\u00e1ul jelszavakat, bejelentkez\u00e9si inform\u00e1ci\u00f3kat, hitelk\u00e1rtyasz\u00e1mokat \u00e9s internetes haszn\u00e1lati adatokat.<\/li>\n<li><strong>R\u00f6gz\u00edt\u00e9s<\/strong>: Miut\u00e1n a k\u00e9mprogram megszerezte az \u00f6sszes sz\u00fcks\u00e9ges inform\u00e1ci\u00f3t, egy t\u00e1voli szerverre k\u00fcldi, ahol a t\u00e1mad\u00f3 hozz\u00e1f\u00e9rhet hozz\u00e1.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-spyware-contaminates-your-devices\"><strong>Hogyan szennyezi be a k\u00e9mprogram az eszk\u00f6zeidet<\/strong><\/h2>\n\n\n<p>A rosszindulat\u00fa k\u00e9mprogramok megpr\u00f3b\u00e1lj\u00e1k \u00e1lc\u00e1zni magukat, hogy rejtve maradjanak \u00e9s \u00e9szrev\u00e9tlen\u00fcl m\u0171k\u00f6djenek. Gyakran \u00fagy teszik ezt, hogy biztons\u00e1gosnak t\u0171n\u0151 let\u00f6lt\u00e9sekben vagy weboldalakon rejt\u0151znek. A k\u00e9mprogramok a rendszered sebezhet\u0151s\u00e9gein kereszt\u00fcl, \u00e1rtalmas programokon kereszt\u00fcl, amelyek val\u00f3di alkalmaz\u00e1soknak t\u0171nnek, vagy hamis weboldalakon \u00e9s alkalmaz\u00e1sokon kereszt\u00fcl juthatnak be a sz\u00e1m\u00edt\u00f3g\u00e9pedre, amelyeket kifejezetten erre a c\u00e9lra hoztak l\u00e9tre.<\/p>\n\n\n\n<p>Amikor let\u00f6ltesz \u00e9s telep\u00edtesz egy programot, l\u00e9gy \u00f3vatos, hogy ne tartalmazzon m\u00e1s nem k\u00edv\u00e1nt szoftvereket is. Ez az extra szoftver, amit <em>bundleware-nek <\/em>vagy <em>csomagolt szoftvercsomagoknak<\/em>, neveznek, tartalmazhat rosszindulat\u00fa programokat. A rosszindulat\u00fa programok olyan szoftverek, amelyek k\u00e1rt okozhatnak a sz\u00e1m\u00edt\u00f3g\u00e9pedben. Elrejt\u0151zhetnek, vagy a v\u00e1lasztott program \u00e9rtes\u00edthet arr\u00f3l, hogy k\u00e9mprogram van a sz\u00e1m\u00edt\u00f3g\u00e9peden, \u00e9s felaj\u00e1nlhatja annak elt\u00e1vol\u00edt\u00e1s\u00e1t. Ha nem cselekszel azonnal, a k\u00e9mprogram elkezdi gy\u0171jteni a szem\u00e9lyes adataidat.<\/p>\n\n\n\n<p>N\u00e9h\u00e1ny k\u00e9mprogram megv\u00e1ltoztathatja a sz\u00e1m\u00edt\u00f3g\u00e9ped be\u00e1ll\u00edt\u00e1sait a tudtod n\u00e9lk\u00fcl. Ez mag\u00e1ban foglalhatja \u00faj szoftverek telep\u00edt\u00e9s\u00e9t, a kezd\u0151lapod megv\u00e1ltoztat\u00e1s\u00e1t vagy \u00e1tir\u00e1ny\u00edt\u00e1s\u00e1t hamis weboldalakra. Ezek a v\u00e1ltoz\u00e1sok megnehez\u00edthetik a sz\u00e1m\u00edt\u00f3g\u00e9ped haszn\u00e1lat\u00e1t, \u00e9s n\u00f6velhetik a tov\u00e1bbi k\u00e9mprogramok let\u00f6lt\u00e9s\u00e9nek kock\u00e1zat\u00e1t.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-spyware\"><strong>A k\u00e9mprogramok t\u00edpusai<\/strong><\/h2>\n\n\n<p>A k\u00e9mprogramokat \u00e1ltal\u00e1ban egy adott c\u00e9lra hozz\u00e1k l\u00e9tre. Az al\u00e1bbiakban a leggyakoribb k\u00e9mprogramt\u00edpusok n\u00e9h\u00e1ny p\u00e9ld\u00e1j\u00e1t tal\u00e1lod.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"adware\"><strong>Hirdet\u0151programok (Adware)<\/strong><\/h3>\n\n\n<p>Az adware olyan rosszindulat\u00fa szoftver, amely bev\u00e9telt termel a fejleszt\u0151j\u00e9nek az\u00e1ltal, hogy rekl\u00e1mokat jelen\u00edt meg a sz\u00e1m\u00edt\u00f3g\u00e9peden. Az adware minden olyan program, amely rekl\u00e1mokat jelen\u00edt meg, legyenek azok j\u00f3k vagy rosszak. A k\u00e9mprogramok, amelyek adware-k\u00e9nt is m\u0171k\u00f6dnek, k\u00e1ros alkalmaz\u00e1sok lehetnek, amelyek f\u00e9lrevezet\u0151 hirdet\u00e9seket mutatnak, p\u00e9ld\u00e1ul villog\u00f3 felugr\u00f3 ablakokat, nagy bannereket \u00e9s teljes k\u00e9perny\u0151s automatikus lej\u00e1tsz\u00e1s\u00fa rekl\u00e1mokat a b\u00f6ng\u00e9sz\u0151ben.<\/p>\n\n\n\n<p>Az adware a felhaszn\u00e1l\u00f3 tudta n\u00e9lk\u00fcl let\u00f6lthet\u0151 \u00e9s telep\u00edthet\u0151 a sz\u00e1m\u00edt\u00f3g\u00e9pre. F\u0151 c\u00e9lja, hogy p\u00e9nzt keressen az\u00e1ltal, hogy rekl\u00e1mokat jelen\u00edt meg az \u00e1ldozat sz\u00e1m\u00edt\u00f3g\u00e9p\u00e9n. N\u00e9h\u00e1ny adware v\u00e1ltozat \u00e1tir\u00e1ny\u00edthat feln\u0151tt oldalakra, amikor megl\u00e1togatsz egy weboldalt, megnehez\u00edtve ezzel a b\u00f6ng\u00e9sz\u00e9st. Az adware m\u00e1s rosszindulat\u00fa programokat is telep\u00edthet v\u00e9letlen\u00fcl, haszn\u00e1lhatatlann\u00e1 t\u00e9ve a rendszeredet.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"key-loggers-or-system-monitors\"><strong>Billenty\u0171napl\u00f3z\u00f3k vagy rendszerfigyel\u0151k<\/strong><\/h3>\n\n\n<p>Sok sz\u00e1m\u00edt\u00f3g\u00e9p-felhaszn\u00e1l\u00f3 passz\u00edv megfigyel\u00e9snek \u00e9s minden billenty\u0171le\u00fct\u00e9s napl\u00f3z\u00e1s\u00e1nak van kit\u00e9ve a g\u00e9p\u00e9n, gyakran a tudta n\u00e9lk\u00fcl. A billenty\u0171le\u00fct\u00e9s b\u00e1rmilyen m\u0171veletre utal, amelyet egy billenty\u0171zet gombj\u00e1val hajtanak v\u00e9gre, p\u00e9ld\u00e1ul egy webc\u00edm vagy jelsz\u00f3 be\u00edr\u00e1s\u00e1ra.<\/p>\n\n\n\n<p>A billenty\u0171le\u00fct\u00e9sek azok a szavak, amelyeket be\u00edrsz a billenty\u0171zeteden. Minden billenty\u0171le\u00fct\u00e9s \u00fczenetet k\u00fcld a sz\u00e1m\u00edt\u00f3g\u00e9pednek, hogy mit tegyen. Az al\u00e1bbiakban n\u00e9h\u00e1ny p\u00e9lda tal\u00e1lhat\u00f3 az utas\u00edt\u00e1sokra:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>A billenty\u0171 lenyom\u00e1s\u00e1nak hossza<\/li>\n<li>A billenty\u0171 lenyom\u00e1s\u00e1nak ideje<\/li>\n<li>A haszn\u00e1lt billenty\u0171 neve<\/li>\n<li>A billenty\u0171le\u00fct\u00e9s sebess\u00e9ge<\/li>\n<\/ul>\n\n\n\n<p>Amikor el\u0151sz\u00f6r bejelentkezel, \u00fagy t\u0171nik, mintha minden egy priv\u00e1t besz\u00e9lget\u00e9s lenne. Azt hiszed, csak a k\u00e9sz\u00fcl\u00e9keddel besz\u00e9lgetsz, de valaki m\u00e1s hallotta \u00e9s r\u00f6gz\u00edtette mindazt, amit mondt\u00e1l. Egyre ink\u00e1bb digit\u00e1lis \u00e9letm\u00f3dunk r\u00e9szek\u00e9nt \u00e9rz\u00e9keny adatokat cser\u00e9l\u00fcnk mobiltelefonokon.<\/p>\n\n\n\n<p>Minden az online banki hozz\u00e1f\u00e9r\u00e9st\u0151l a t\u00e1rsadalombiztos\u00edt\u00e1si sz\u00e1mokig r\u00f6gz\u00edtve van. A sz\u00e1m\u00edt\u00f3g\u00e9pek mindent elmentenek, amit az interneten csin\u00e1lsz, bele\u00e9rtve az e-maileket, a megl\u00e1togatott weboldalakat \u00e9s m\u00e9g az elk\u00fcld\u00f6tt sz\u00f6veges \u00fczeneteket is.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"trojans\"><strong>Tr\u00f3jai programok<\/strong><\/h3>\n\n\n<p>A tr\u00f3jai programok olyan programok, amelyek valami m\u00e1snak \u00e1lc\u00e1zz\u00e1k magukat, hogy becsapjanak. \u00dagy n\u00e9zhetnek ki, mint ingyenes szoftverek, filmek vagy zene, de rejtett b\u0171n\u00f6z\u0151i funkci\u00f3juk van. <em>A tr\u00f3jai v\u00edrus<\/em> nem tudom\u00e1nyos kifejez\u00e9s. A tr\u00f3jai v\u00edrusok technikailag nem v\u00edrusok, mert hasznos szoftverk\u00e9nt vagy adatk\u00e9nt terjednek, hogy megfert\u0151zz\u00e9k m\u00e1s programokat. Sok szak\u00e9rt\u0151 \u00fagy v\u00e9li, hogy a felhaszn\u00e1l\u00f3i tev\u00e9kenys\u00e9g megfigyel\u00e9se \u00e9s a napl\u00f3k vagy inform\u00e1ci\u00f3k visszak\u00fcld\u00e9se a t\u00e1mad\u00f3nak a tr\u00f3jai programok jellemz\u0151je.<\/p>\n\n\n\n<p>A t\u00e1mad\u00f3k sz\u00e1mos m\u00f3don haszn\u00e1lhatj\u00e1k a tr\u00f3jai programokat. Az egyik m\u00f3d az, hogy \u00f6n\u00e1ll\u00f3 eszk\u00f6zk\u00e9nt haszn\u00e1lj\u00e1k \u0151ket. Egy m\u00e1sik m\u00f3d az, hogy j\u00f6v\u0151beli terhel\u00e9seket juttatnak el a sz\u00e1m\u00edt\u00f3g\u00e9pre. P\u00e9ld\u00e1ul egy tr\u00f3jai let\u00f6lt\u0151 egy olyan tr\u00f3jai p\u00e9lda, amelyet a t\u00e1mad\u00f3k haszn\u00e1lnak arra, hogy j\u00f6v\u0151beli terhel\u00e9seket juttassanak el a sz\u00e1m\u00edt\u00f3g\u00e9pre. Emellett rootkitek is haszn\u00e1lhat\u00f3k, hogy folyamatos jelenl\u00e9tet alak\u00edtsanak ki egy szem\u00e9ly eszk\u00f6z\u00e9n vagy h\u00e1l\u00f3zat\u00e1n.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-do-you-protect-yourself-from-spyware\"><strong>Hogyan v\u00e9dheted meg magad a k\u00e9mprogramokt\u00f3l?<\/strong><\/h2>\n\n\n<p>A legjobb m\u00f3dja annak, hogy elker\u00fcld a k\u00e9mprogramokat, ha megakad\u00e1lyozod, hogy bejussanak a sz\u00e1m\u00edt\u00f3g\u00e9pedre. Azonban n\u00e9ha nem ker\u00fclheted el a programok let\u00f6lt\u00e9s\u00e9t vagy az e-mail mell\u00e9kletek megnyit\u00e1s\u00e1t. M\u00e9g a j\u00f3l ismert weboldalak is fert\u0151z\u00f6ttek lehetnek k\u00e9mprogramokkal, amelyek k\u00e1ros\u00edthatj\u00e1k a sz\u00e1m\u00edt\u00f3g\u00e9pedet. Keress olyan internetes biztons\u00e1gi megold\u00e1sokat, amelyek bizony\u00edtottan k\u00e9pesek felismerni a v\u00edrusokat \u00e9s a rosszindulat\u00fa programok al\u00e1\u00edr\u00e1sait.<\/p>\n\n\n\n<p>Gy\u0151z\u0151dj meg arr\u00f3l, hogy a v\u00e1lasztott biztons\u00e1gi c\u00e9g folyamatos v\u00e9delmet ny\u00fajt. Ez mag\u00e1ban foglalja a k\u00e9mprogram-elt\u00e1vol\u00edt\u00f3 eszk\u00f6z\u00f6ket is, ha a sz\u00e1m\u00edt\u00f3g\u00e9ped m\u00e1r fert\u0151z\u00f6tt. Amikor k\u00e9mprogram-elt\u00e1vol\u00edt\u00f3 eszk\u00f6zt v\u00e1lasztasz, v\u00e1lassz egy megb\u00edzhat\u00f3 internetes biztons\u00e1gi c\u00e9gt\u0151l, amely nem illeg\u00e1lis. N\u00e9h\u00e1ny szoftver illeg\u00e1lis lehet, vagy k\u00e1ros \u00f6sszetev\u0151ket tartalmazhat.<\/p>\n\n\n\n<p>Sz\u00e1mos k\u00fcl\u00f6nb\u00f6z\u0151 ingyenes v\u00edrusirt\u00f3 program k\u00f6z\u00fcl v\u00e1laszthatsz. De l\u00e9gy \u00f3vatos, amikor v\u00e1lasztasz. Egy ingyenes pr\u00f3baid\u0151szak kiv\u00e1l\u00f3 m\u00f3dja lehet annak, hogy eld\u00f6ntsd, melyik program a megfelel\u0151 sz\u00e1modra. Azonban ne b\u00edzz meg egy programban, amely azt \u00e1ll\u00edtja, hogy ingyen megv\u00e9d mindent\u0151l. Lehet, hogy nem rendelkeznek minden sz\u00fcks\u00e9ges k\u00e9pess\u00e9ggel ahhoz, hogy felismerj\u00e9k a r\u00e1juk leselked\u0151 rosszindulat\u00fa programokat. Az anti-spam v\u00e9delem, egy fejlett anti-spam \u00e9szlel\u00e9si motor \u00e9s egy virtu\u00e1lis titkos\u00edtott billenty\u0171zet p\u00e9nz\u00fcgyi bevitelhez seg\u00edthet cs\u00f6kkenteni a rossz dolgok bek\u00f6vetkez\u00e9s\u00e9nek kock\u00e1zat\u00e1t.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"final-thoughts\"><strong>Z\u00e1r\u00f3 gondolatok<\/strong><\/h2>\n\n\n<p>V\u00e9gezz kutat\u00e1st, miel\u0151tt b\u00e1rmit let\u00f6lten\u00e9l a sz\u00e1m\u00edt\u00f3g\u00e9pedre. Sok hamis program van, amely anti-k\u00e9mprogramk\u00e9nt \u00e1lc\u00e1zza mag\u00e1t, \u00e9s k\u00e9mprogramokat telep\u00edt a sz\u00e1m\u00edt\u00f3g\u00e9pedre. Ha k\u00e9ts\u00e9geid vannak, csak megb\u00edzhat\u00f3 forr\u00e1sb\u00f3l t\u00f6lts le szoftvert. L\u00e9gy nagyon \u00f3vatos, amikor e-mailekben vagy weboldalakon tal\u00e1lhat\u00f3 linkekre kattintasz. Ezek gyakran haszn\u00e1lhat\u00f3k arra, hogy k\u00e9mprogramokat telep\u00edtsenek a sz\u00e1m\u00edt\u00f3g\u00e9pedre an\u00e9lk\u00fcl, hogy tudn\u00e1l r\u00f3la. Ha \u00fagy gondolod, hogy a sz\u00e1m\u00edt\u00f3g\u00e9ped k\u00e9mprogramokkal fert\u0151z\u00f6tt, futtass egy teljes vizsg\u00e1latot egy megb\u00edzhat\u00f3 anti-k\u00e9mprogram programmal. V\u00e9g\u00fcl pedig tartsd naprak\u00e9szen az oper\u00e1ci\u00f3s rendszeredet \u00e9s az \u00f6sszes szoftveredet. Ez seg\u00edt bez\u00e1rni azokat a biztons\u00e1gi r\u00e9seket, amelyeket a k\u00e9mprogramok kihaszn\u00e1lhatnak.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"spyware-faqs\"><strong>K\u00e9mprogram GYIK<\/strong><\/h2>\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\">\n<div id=\"faq-question-1659385577394\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Hogyan haszn\u00e1lj\u00e1k a hackerek a k\u00e9mprogramokat?<\/strong>\n<p class=\"schema-faq-answer\">Ha k\u00e9mprogram hozz\u00e1f\u00e9r\u00e9st szerez a sz\u00e1m\u00edt\u00f3g\u00e9pedhez vagy eszk\u00f6z\u00f6dh\u00f6z, a hackerek teljes ir\u00e1ny\u00edt\u00e1st szerezhetnek a rendszered felett. Ezt felhaszn\u00e1lhatj\u00e1k \u00e9rz\u00e9keny inform\u00e1ci\u00f3k, p\u00e9ld\u00e1ul bejelentkez\u00e9si adatok vagy p\u00e9nz\u00fcgyi adatok gy\u0171jt\u00e9s\u00e9re. A hackerek a k\u00e9mprogramokat m\u00e1s sz\u00e1m\u00edt\u00f3g\u00e9pek vagy eszk\u00f6z\u00f6k elleni t\u00e1mad\u00e1sok ind\u00edt\u00e1s\u00e1ra is haszn\u00e1lhatj\u00e1k ugyanazon a h\u00e1l\u00f3zaton.<\/p>\n<\/div>\n<div id=\"faq-question-1659385647051\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Mi\u00e9rt vesz\u00e9lyes a k\u00e9mprogram?<\/strong>\n<p class=\"schema-faq-answer\">A k\u00e9mprogramok vesz\u00e9lyesek, mert \u00e9rz\u00e9keny inform\u00e1ci\u00f3k gy\u0171jt\u00e9s\u00e9re haszn\u00e1lhat\u00f3k az \u00d6n tudta vagy beleegyez\u00e9se n\u00e9lk\u00fcl. Ezeket az inform\u00e1ci\u00f3kat csal\u00e1s vagy szem\u00e9lyazonoss\u00e1g-lop\u00e1s elk\u00f6vet\u00e9s\u00e9re lehet felhaszn\u00e1lni. A k\u00e9mprogramok t\u00e1mad\u00e1sokat ind\u00edthatnak m\u00e1s sz\u00e1m\u00edt\u00f3g\u00e9pek vagy eszk\u00f6z\u00f6k ellen ugyanazon a h\u00e1l\u00f3zaton.<\/p>\n<\/div>\n<div id=\"faq-question-1659392977752\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Telep\u00edthet\u0151 k\u00e9mprogram az iPhone-ra?<\/strong>\n<p class=\"schema-faq-answer\">B\u00e1r a k\u00e9mprogramok nem jelentenek jelent\u0151s probl\u00e9m\u00e1t az iPhone-felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra, m\u00e9gis lehets\u00e9ges, hogy k\u00e9mprogramok ker\u00fcljenek a k\u00e9sz\u00fcl\u00e9k\u00e9re. Ha felt\u00f6ri az iPhone-j\u00e1t, sebezhet\u0151bb\u00e9 v\u00e1lik a k\u00e9mprogramokkal szemben. A jailbreakel\u00e9s az a folyamat, amely sor\u00e1n elt\u00e1vol\u00edtj\u00e1k az Apple \u00e1ltal az iOS-re kivetett korl\u00e1toz\u00e1sokat. Ez lehet\u0151v\u00e9 teszi, hogy az App Store-on k\u00edv\u00fcli forr\u00e1sokb\u00f3l t\u00f6lts\u00f6n le \u00e9s telep\u00edtsen alkalmaz\u00e1sokat.<\/p>\n<\/div>\n<div id=\"faq-question-1659393012764\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">A k\u00e9mprogramok \u00e9s a rosszindulat\u00fa programok ugyanazok?<\/strong>\n<p class=\"schema-faq-answer\">A k\u00e9mprogramok \u00e9s a rosszindulat\u00fa szoftverek nem ugyanazok. A k\u00e9mprogramok olyan rosszindulat\u00fa szoftverek, amelyeket arra terveztek, hogy inform\u00e1ci\u00f3kat gy\u0171jtsenek r\u00f3lad a tudtod vagy beleegyez\u00e9sed n\u00e9lk\u00fcl. A rosszindulat\u00fa szoftverek egy \u00e1ltal\u00e1nos kifejez\u00e9s, amely a rosszindulat\u00fa szoftvereket, bele\u00e9rtve a k\u00e9mprogramokat is, le\u00edrja.<\/p>\n<\/div>\n<div id=\"faq-question-1659393042820\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">\u00c1tker\u00fcl a k\u00e9mprogram az \u00faj telefonra?<\/strong>\n<p class=\"schema-faq-answer\">A k\u00e9mprogramok \u00e1ltal\u00e1ban az adott eszk\u00f6zre specifikusak, amelyre telep\u00edtve vannak. Teh\u00e1t, ha \u00faj telefont kapsz, a k\u00e9mprogram nem ker\u00fcl \u00e1t az \u00faj eszk\u00f6zre. Azonban, ha biztons\u00e1gi ment\u00e9st k\u00e9sz\u00edtesz a r\u00e9gi telefonodr\u00f3l, miel\u0151tt \u00fajat kapn\u00e1l, a k\u00e9mprogram is biztons\u00e1gi ment\u00e9sre ker\u00fclhet. Ez\u00e9rt fontos, hogy csak megb\u00edzhat\u00f3 forr\u00e1sra k\u00e9sz\u00edts biztons\u00e1gi ment\u00e9st az adataidr\u00f3l.<br \/><br \/><\/p>\n<\/div>\n<div id=\"faq-question-1659393099035\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Illeg\u00e1lis a k\u00e9mprogramok haszn\u00e1lata?<\/strong>\n<p class=\"schema-faq-answer\">B\u00e1r a k\u00e9mprogramok nem felt\u00e9tlen\u00fcl illeg\u00e1lisak, illeg\u00e1lis c\u00e9lokra is felhaszn\u00e1lhat\u00f3k. T\u00f6rv\u00e9nyt s\u00e9rthetsz, ha k\u00e9mprogramokat haszn\u00e1lsz \u00e9rz\u00e9keny inform\u00e1ci\u00f3k gy\u0171jt\u00e9s\u00e9re valaki tudta vagy beleegyez\u00e9se n\u00e9lk\u00fcl.<br \/><br \/><\/p>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Tudod, mi az a k\u00e9mprogram? Nagy es\u00e9llyel m\u00e1r tal\u00e1lkozt\u00e1l vele valamikor az online \u00e9leted sor\u00e1n. A k\u00e9mprogram olyan rosszindulat\u00fa szoftver, amely telep\u00edti mag\u00e1t az eszk\u00f6z\u00f6kre an\u00e9lk\u00fcl, hogy a\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kemprogram\/mi-az-a-kemprogram\/\">Folytat\u00e1s <span class=\"screen-reader-text\">K\u00e9mprogramok: Mik azok \u00e9s hogyan v\u00e9dheted meg magad<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":491,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-488","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spyware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spyware: What It Is and How to Protect Yourself<\/title>\n<meta name=\"description\" content=\"Everything you need to know about spyware, including what it is, how it installs itself on your device, and how to protect yourself from it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kemprogram\/mi-az-a-kemprogram\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spyware: What It Is and How to Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"Everything you need to know about spyware, including what it is, how it installs itself on your device, and how to protect yourself from it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kemprogram\/mi-az-a-kemprogram\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-01T20:28:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Spyware: What It Is and How to Protect Yourself\",\"datePublished\":\"2022-08-01T20:28:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/\"},\"wordCount\":1613,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg\",\"articleSection\":[\"spyware\"],\"inLanguage\":\"hu\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/\",\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\",\"name\":\"Spyware: What It Is and How to Protect Yourself\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg\",\"datePublished\":\"2022-08-01T20:28:11+00:00\",\"description\":\"Everything you need to know about spyware, including what it is, how it installs itself on your device, and how to protect yourself from it.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394\"},{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051\"},{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752\"},{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764\"},{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820\"},{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035\"}],\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg\",\"width\":640,\"height\":360,\"caption\":\"Spyware: What It Is and How to Protect Yourself\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spyware: What It Is and How to Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394\",\"position\":1,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394\",\"name\":\"How do hackers use spyware?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"By gaining access to your computer or device, spyware can give hackers complete control over your system. They can use it to collect sensitive information, such as your login credentials or financial data. Hackers can also use spyware to launch attacks on other computers or devices on the same network.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051\",\"position\":2,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051\",\"name\":\"Why is spyware dangerous?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Spyware is dangerous because it can be used to collect sensitive information without your knowledge or consent. This information can be used to commit fraud or identity theft. Spyware can launch attacks on other computers or devices on the same network.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752\",\"position\":3,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752\",\"name\":\"Can spyware be installed on the iPhone?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"While spyware is not a significant issue for iPhone users, it is still possible for spyware to be installed on your device. If you jailbreak your iPhone, you are more vulnerable to spyware. Jailbreaking is the process of removing the restrictions imposed by Apple on iOS. This allows you to download and install applications from sources other than the App Store.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764\",\"position\":4,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764\",\"name\":\"Are spyware and malware the same thing?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Spyware and malware are not the same things. Spyware is malicious software designed to collect information about you without your knowledge or consent. Malware is a general term that describes malicious software, including spyware.\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820\",\"position\":5,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820\",\"name\":\"Will spyware transfer to the new phone?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Spyware is usually specific to the device it is installed on. So, if you get a new phone, the spyware will not transfer to the new device. However, if you backup your old phone before getting a new one, the spyware could also be backed up. This is why it's essential to only backup your data to a trusted source.<br\/><br\/>\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035\",\"position\":6,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035\",\"name\":\"Is it illegal to use spyware?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"While spyware is not necessarily illegal, it can be used for illegal purposes. You could be breaking the law if you use spyware to collect sensitive information without someone's knowledge or consent.<br\/><br\/>\",\"inLanguage\":\"hu\"},\"inLanguage\":\"hu\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"K\u00e9mprogramok: Mik azok \u00e9s hogyan v\u00e9dheted meg magad","description":"Minden, amit a k\u00e9mprogramokr\u00f3l tudni kell, bele\u00e9rtve azt, hogy mik azok, hogyan telep\u00edtik magukat az eszk\u00f6z\u00f6dre, \u00e9s hogyan v\u00e9dheted meg magad t\u0151l\u00fck.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kemprogram\/mi-az-a-kemprogram\/","og_locale":"hu_HU","og_type":"article","og_title":"Spyware: What It Is and How to Protect Yourself","og_description":"Everything you need to know about spyware, including what it is, how it installs itself on your device, and how to protect yourself from it.","og_url":"https:\/\/securitybriefing.net\/hu\/kemprogram\/mi-az-a-kemprogram\/","og_site_name":"Security Briefing","article_published_time":"2022-08-01T20:28:11+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"C\u00e9sar Daniel Barreto","Becs\u00fclt olvas\u00e1si id\u0151":"8 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Spyware: What It Is and How to Protect Yourself","datePublished":"2022-08-01T20:28:11+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/"},"wordCount":1613,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg","articleSection":["spyware"],"inLanguage":"hu"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/","url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware","name":"K\u00e9mprogramok: Mik azok \u00e9s hogyan v\u00e9dheted meg magad","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg","datePublished":"2022-08-01T20:28:11+00:00","description":"Minden, amit a k\u00e9mprogramokr\u00f3l tudni kell, bele\u00e9rtve azt, hogy mik azok, hogyan telep\u00edtik magukat az eszk\u00f6z\u00f6dre, \u00e9s hogyan v\u00e9dheted meg magad t\u0151l\u00fck.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#breadcrumb"},"mainEntity":[{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394"},{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051"},{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752"},{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764"},{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820"},{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035"}],"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg","width":640,"height":360,"caption":"Spyware: What It Is and How to Protect Yourself"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Spyware: What It Is and How to Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"C\u00e9sar D\u00e1niel Barreto","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto elismert kiberbiztons\u00e1gi \u00edr\u00f3 \u00e9s szak\u00e9rt\u0151, aki m\u00e9lyrehat\u00f3 tud\u00e1s\u00e1r\u00f3l \u00e9s k\u00e9pess\u00e9g\u00e9r\u0151l ismert, hogy egyszer\u0171s\u00edtse a bonyolult kiberbiztons\u00e1gi t\u00e9m\u00e1kat. Kiterjedt h\u00e1l\u00f3zatbiztons\u00e1gi \u00e9s adatv\u00e9delmi tapasztalattal rendelkezik, rendszeresen k\u00f6z\u00f6l betekint\u0151 cikkeket \u00e9s elemz\u00e9seket a leg\u00fajabb kiberbiztons\u00e1gi trendekr\u0151l, oktatva mind a szakembereket, mind a nagyk\u00f6z\u00f6ns\u00e9get.","url":"https:\/\/securitybriefing.net\/hu\/author\/cesarbarreto\/"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394","position":1,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394","name":"Hogyan haszn\u00e1lj\u00e1k a hackerek a k\u00e9mprogramokat?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"By gaining access to your computer or device, spyware can give hackers complete control over your system. They can use it to collect sensitive information, such as your login credentials or financial data. Hackers can also use spyware to launch attacks on other computers or devices on the same network.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051","position":2,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051","name":"Mi\u00e9rt vesz\u00e9lyes a k\u00e9mprogram?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Spyware is dangerous because it can be used to collect sensitive information without your knowledge or consent. This information can be used to commit fraud or identity theft. Spyware can launch attacks on other computers or devices on the same network.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752","position":3,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752","name":"Telep\u00edthet\u0151 k\u00e9mprogram az iPhone-ra?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"While spyware is not a significant issue for iPhone users, it is still possible for spyware to be installed on your device. If you jailbreak your iPhone, you are more vulnerable to spyware. Jailbreaking is the process of removing the restrictions imposed by Apple on iOS. This allows you to download and install applications from sources other than the App Store.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764","position":4,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764","name":"A k\u00e9mprogramok \u00e9s a rosszindulat\u00fa programok ugyanazok?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Spyware and malware are not the same things. Spyware is malicious software designed to collect information about you without your knowledge or consent. Malware is a general term that describes malicious software, including spyware.","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820","position":5,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820","name":"\u00c1tker\u00fcl a k\u00e9mprogram az \u00faj telefonra?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Spyware is usually specific to the device it is installed on. So, if you get a new phone, the spyware will not transfer to the new device. However, if you backup your old phone before getting a new one, the spyware could also be backed up. This is why it's essential to only backup your data to a trusted source.<br\/><br\/>","inLanguage":"hu"},"inLanguage":"hu"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035","position":6,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035","name":"Illeg\u00e1lis a k\u00e9mprogramok haszn\u00e1lata?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"While spyware is not necessarily illegal, it can be used for illegal purposes. You could be breaking the law if you use spyware to collect sensitive information without someone's knowledge or consent.<br\/><br\/>","inLanguage":"hu"},"inLanguage":"hu"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=488"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/491"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}