{"id":896,"date":"2022-11-01T19:35:09","date_gmt":"2022-11-01T19:35:09","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=896"},"modified":"2024-10-08T23:19:52","modified_gmt":"2024-10-08T23:19:52","slug":"mi-az-adware-es-hogyan-befolyasolhatja-a-biztonsagodat","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/mi-az-adware-es-hogyan-befolyasolhatja-a-biztonsagodat\/","title":{"rendered":"Mi az adware, \u00e9s hogyan befoly\u00e1solhatja a biztons\u00e1g\u00e1t"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Mivel a vil\u00e1g ma m\u00e1r technol\u00f3gia-alap\u00fabb, mint valaha, jelent\u0151s n\u00f6veked\u00e9s tapasztalhat\u00f3 a digit\u00e1lis adatok ter\u00e9n. Az egy\u00e9nek, v\u00e1llalkoz\u00e1sok \u00e9s korm\u00e1nyzati \u00fcgyn\u00f6ks\u00e9gek elektronikusan t\u00e1rolj\u00e1k az adatokat sz\u00e1m\u00edt\u00f3g\u00e9peken, amelyeket azt\u00e1n rendszeresen tov\u00e1bb\u00edtanak egyik sz\u00e1m\u00edt\u00f3g\u00e9pr\u0151l a h\u00e1l\u00f3zat m\u00e1s eszk\u00f6zeire.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A sz\u00e1m\u00edt\u00f3g\u00e9pekben \u00e9s azok teljes rendszereiben sebezhet\u0151s\u00e9gek \u00e9s kiskapuk l\u00e9teznek. Ha valaki megt\u00e1madja ezeket a gyenge pontokat, az jelent\u0151s probl\u00e9m\u00e1kat okozhat az egy\u00e9n vagy a v\u00e1llalat sz\u00e1m\u00e1ra, ez\u00e9rt l\u00e9tfontoss\u00e1g\u00fa a kiberbiztons\u00e1g. Megv\u00e9di elektronikus eszk\u00f6zeinket \u00e9s adatainkat az illet\u00e9ktelen hozz\u00e1f\u00e9r\u00e9st\u0151l vagy adatlop\u00e1st\u00f3l.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Egy rendszer megs\u00e9rt\u00e9se, amely lehet\u0151v\u00e9 teszi a t\u00e1mad\u00f3 hozz\u00e1f\u00e9r\u00e9s\u00e9t, k\u00e1ros k\u00f6vetkezm\u00e9nyekkel j\u00e1rhat. A leg\u00fajabb tanulm\u00e1nyok szerint egy \u00e1tlagos adatv\u00e9delmi incidens k\u00f6lts\u00e9ge k\u00f6zel 4 milli\u00f3 USD a szervezetek sz\u00e1m\u00e1ra.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A nagy horderej\u0171 adatv\u00e9delmi incidensek gyakran ker\u00fclnek a c\u00edmlapokra, k\u00e1ros\u00edtva a v\u00e1llalat h\u00edrnev\u00e9t, ez\u00e9rt a szervezeteknek er\u0151s kiberbiztons\u00e1gi rendszerre van sz\u00fcks\u00e9g\u00fck.<\/span><\/p>\n<h2><b>V\u00e1llalkoz\u00e1sok hirdet\u00e9se a digit\u00e1lis k\u00f6rnyezetben<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Az adatok manaps\u00e1g az egyik legfontosabb dolog a v\u00e1llalkoz\u00e1sok sz\u00e1m\u00e1ra. Lehet\u0151v\u00e9 teszik sz\u00e1mukra a fogyaszt\u00f3i viselked\u00e9s elemz\u00e9s\u00e9t, az \u00e9rt\u00e9kes\u00edt\u00e9sek \u00e9s nyeres\u00e9gek nyomon k\u00f6vet\u00e9s\u00e9t, a j\u00f6v\u0151beli trendek el\u0151rejelz\u00e9s\u00e9t stb.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mivel egy \u00e1tlagos ember naponta k\u00e9t \u00f3r\u00e1t \u00e9s 24 percet t\u00f6lt a k\u00f6z\u00f6ss\u00e9gi m\u00e9di\u00e1ban, nem csoda, hogy a v\u00e1llalkoz\u00e1sok a digit\u00e1lis hirdet\u00e9sek fel\u00e9 fordulnak. De nem minden m\u00f3dszer\u00fck leg\u00e1lis.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sokan rendk\u00edv\u00fcl frusztr\u00e1ltak a felugr\u00f3 hirdet\u00e9sek miatt, amikor dolgozni pr\u00f3b\u00e1lnak vagy a k\u00f6z\u00f6ss\u00e9gi m\u00e9di\u00e1ban b\u00f6ng\u00e9sznek. Ezeket a felugr\u00f3 ablakokat a hirdet\u00e9sekkel t\u00e1mogatott szoftverek, m\u00e1s n\u00e9ven adware okozz\u00e1k.<\/span><\/p>\n<h2><b>Mi az Adware?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Az adware el\u00e1rasztja a felhaszn\u00e1l\u00f3kat v\u00e9gtelen hirdet\u00e9sekkel \u00e9s felugr\u00f3 ablakokkal, ami sz\u00f6rny\u0171 felhaszn\u00e1l\u00f3i \u00e9lm\u00e9nyt okoz. Az adware nemcsak hihetetlen\u00fcl ideges\u00edt\u0151, hanem vesz\u00e9lyeztetheti az eszk\u00f6z biztons\u00e1g\u00e1t is. A nem k\u00edv\u00e1nt hirdet\u00e9sek rosszindulat\u00fa szoftvereket tartalmazhatnak, vagy k\u00e1ros webhelyekre ir\u00e1ny\u00edthatj\u00e1k a felhaszn\u00e1l\u00f3kat, amelyek szem\u00e9lyes inform\u00e1ci\u00f3kat gy\u0171jtenek. Az adware gyakran freeware vagy shareware programokban tal\u00e1lhat\u00f3. Az adware \u00fczemeltet\u0151je k\u00f6zvetett d\u00edjat kap ezeknek a fert\u0151z\u00f6tt programoknak a haszn\u00e1lat\u00e1val. Az adware programok \u00e1ltal\u00e1ban titokban elker\u00fclik a rendszerben val\u00f3 \u00e9szlel\u00e9st. Gyakran az adware programok nem tartalmaznak elt\u00e1vol\u00edt\u00e1si elj\u00e1r\u00e1st. Ezenk\u00edv\u00fcl, ha manu\u00e1lisan pr\u00f3b\u00e1lja elt\u00e1vol\u00edtani \u0151ket, az a hordoz\u00f3 program meghib\u00e1sod\u00e1s\u00e1t okozhatja.<\/span><\/p>\n<h2><b>Az adware t\u00edpusai<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Az adware k\u00e9t form\u00e1ban l\u00e9tezik: leg\u00e1lis \u00e9s rosszindulat\u00fa.<\/span><\/p>\n<h3><b>Leg\u00e1lis adware vagy \u00e1rtalmatlan adware<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ez egy leg\u00e1lis hirdet\u00e9si forma, amellyel val\u00f3sz\u00edn\u0171leg m\u00e1r tal\u00e1lkozott kor\u00e1bban. A legt\u00f6bb adware nem k\u00e1ros, \u00e9s megb\u00edzhat\u00f3 fejleszt\u0151k k\u00e9sz\u00edtik. A leg\u00e1lis adware eset\u00e9ben mindig beleegyez\u00e9s\u00e9t adja, miel\u0151tt b\u00e1rmilyen hirdet\u00e9st vagy szoftver prom\u00f3ci\u00f3t k\u00fclden\u00e9nek.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A gener\u00e1lt hirdet\u00e9si bev\u00e9tel ellens\u00falyozza a szoftver k\u00f6lts\u00e9geit, \u00edgy az megfizethet\u0151bb\u00e9 \u00e9s hozz\u00e1f\u00e9rhet\u0151bb\u00e9 v\u00e1lik a felhaszn\u00e1l\u00f3k sz\u00e1m\u00e1ra. A szoftverfejleszt\u0151 n\u00e9ha ingyenesen is biztos\u00edthatja a term\u00e9ket, ha a bev\u00e9tel el\u00e9g magas. A legt\u00f6bb ember adware-t t\u00f6lt le, miut\u00e1n l\u00e1tott egy aj\u00e1nlatot valami ingyenes vagy kedvezm\u00e9nyes dologra.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00c9rtsd meg, hogy amikor let\u00f6ltesz egy alkalmaz\u00e1st, val\u00f3sz\u00edn\u0171leg enged\u00e9lyt adsz a c\u00e9gnek, hogy marketing c\u00e9lokra gy\u0171jtse az adataidat. P\u00e9ld\u00e1ul sok szoftver- \u00e9s alkalmaz\u00e1sc\u00e9g k\u00edn\u00e1l \u201cingyenes hirdet\u00e9sekkel\u201d verzi\u00f3t a term\u00e9k\u00fckb\u0151l, amely adware-t tartalmaz.<\/span><\/p>\n<h3><b>K\u00e1ros adware vagy alkalmaz\u00e1sok (PUA-k)<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Azokat a programokat, amelyeket nem sz\u00e1nd\u00e9kozt\u00e1l let\u00f6lteni az eszk\u00f6z\u00f6dre, \u201cpotenci\u00e1lisan nem k\u00edv\u00e1nt alkalmaz\u00e1soknak\u201d (PUA-k) nevezik. \u00c1ltal\u00e1ban m\u00e1s teljesen biztons\u00e1gos szoftverprogramokba \u00e1gyazva tal\u00e1lod meg \u0151ket. M\u00e1s n\u00e9ven potenci\u00e1lisan nem k\u00edv\u00e1nt programok (PUP-ok), ez a fajta adware lelass\u00edthatja az eszk\u00f6z\u00f6det, furcsa hirdet\u00e9seket jelen\u00edthet meg, vagy m\u00e1s nem k\u00edv\u00e1nt szoftvereket telep\u00edthet. A \u201cPUA\u201d kifejez\u00e9s nem mindig utal destrukt\u00edv alkalmaz\u00e1sra; n\u00e9ha rossz h\u00edr\u0171 alkalmaz\u00e1sokra haszn\u00e1lj\u00e1k.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Neh\u00e9z megmondani, hogy a PUA adware rosszindulat\u00fa-e vagy sem, mert ez mind att\u00f3l f\u00fcgg, kik terjesztik, \u00e9s mi a sz\u00e1nd\u00e9kuk. N\u00e9h\u00e1ny adware csak arra van tervezve, hogy folyamatosan hirdet\u00e9seket mutasson. M\u00e9g ha a hirdet\u00e9sek l\u00e1tsz\u00f3lag \u00e1rtalmatlan dolgokr\u00f3l sz\u00f3lnak is, mint p\u00e9ld\u00e1ul fogy\u00f3k\u00far\u00e1s tablett\u00e1k, addig leg\u00e1lis, am\u00edg a weboldal nem tartalmaz rosszindulat\u00fa szoftvereket is.\u00a0\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Az \u201cadware\u201d kifejez\u00e9s gyakran vissza\u00e9l\u00e9sszer\u0171 hirdet\u00e9sekre \u00e9s programokra utal, amelyek megnyitj\u00e1k az ajt\u00f3t a rosszindulat\u00fa szoftverek el\u0151tt. Ez az illeg\u00e1lis adware rosszindulat\u00fa szoftvereket, p\u00e9ld\u00e1ul k\u00e9mprogramokat, v\u00edrusokat vagy m\u00e1s k\u00e1ros programokat terjeszt az eszk\u00f6z\u00f6kre. Ez a fajta adware megnehez\u00edtheti a rosszindulat\u00fa szoftverfert\u0151z\u00e9sek megtal\u00e1l\u00e1s\u00e1t, \u00edgy elt\u00e1vol\u00edt\u00e1suk t\u00f6bb id\u0151t \u00e9s p\u00e9nzt ig\u00e9nyel.<\/span><\/p>\n<h2><b>Az adware k\u00f6vetkezm\u00e9nyei<\/b><\/h2>\n<h3><b>Be\u00e1ll\u00edt\u00e1sok megv\u00e1ltoztat\u00e1sa<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Az adware gyakran probl\u00e9m\u00e1s, mivel \u00e1tir\u00e1ny\u00edthatja a sz\u00e1m\u00edt\u00f3g\u00e9p be\u00e1ll\u00edt\u00e1sait, ami megnehez\u00edti az eszk\u00f6z ind\u00edt\u00e1s\u00e1t. Egyes term\u00e9kek megv\u00e1ltoztatj\u00e1k a sz\u00e1m\u00edt\u00f3g\u00e9p kezd\u0151lapj\u00e1t vagy keres\u0151motorj\u00e1t. M\u00e1sok ak\u00e1r az eg\u00e9sz rendszert is \u00e1tkonfigur\u00e1lhatj\u00e1k. Miut\u00e1n megv\u00e1ltoztattak valamit, az \u00e1ltal\u00e1ban \u00e1lland\u00f3v\u00e1 v\u00e1lik \u00e9s neh\u00e9z visszavonni. Lehet, hogy nem tudsz visszat\u00e9rni, mert az adware bonyol\u00edthatja az \u00fajraind\u00edt\u00e1si folyamatot.<\/span><\/p>\n<h3><b>A sz\u00e1m\u00edt\u00f3g\u00e9p lelass\u00edt\u00e1sa<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Amennyire ideges\u00edt\u0151ek is lehetnek, a felugr\u00f3 hirdet\u00e9sek a legkisebb gondok az adware-rel kapcsolatban. Az adware nemcsak frusztr\u00e1l\u00f3, hanem lelass\u00edthatja a sz\u00e1m\u00edt\u00f3g\u00e9pet is. Fokozatosan, de biztosan a sz\u00e1m\u00edt\u00f3g\u00e9p egyre lassabban fog m\u0171k\u00f6dni, mivel az adware helyet \u00e9s er\u0151forr\u00e1sokat foglal el a rendszerben. Min\u00e9l t\u00f6bb k\u00e1ros adware ker\u00fcl a rendszerbe, ann\u00e1l nehezebb lesz dolgokat v\u00e9gezni.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Ahogy a sz\u00e1m\u00edt\u00f3g\u00e9p t\u00f6bb feladatot hajt v\u00e9gre, lelassul. Teljes\u00edtenie kell a k\u00e9r\u00e9seidet \u00e9s a h\u00e1tt\u00e9rben fut\u00f3 k\u00e1ros adware k\u00e9r\u00e9seit is, mint p\u00e9ld\u00e1ul az online nyomk\u00f6vet\u00e9s, a felugr\u00f3 hirdet\u00e9sek megjelen\u00edt\u00e9se \u00e9s a haszn\u00e1latod figyel\u00e9se.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">A sz\u00e1m\u00edt\u00f3g\u00e9p lefagyhat vagy \u00f6sszeomolhat, ha t\u00fal sok folyamat fut egyszerre, amit nem tud kezelni, \u00e9s ez frusztr\u00e1l\u00f3 lehet.<\/span><\/p>\n<h3><b>Inform\u00e1ci\u00f3 tov\u00e1bb\u00edt\u00e1sa<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">N\u00e9h\u00e1ny t\u00edpus\u00fa k\u00e1ros adware sokkal rosszabb. Ezek a ritk\u00e1bb t\u00edpusok nyomon k\u00f6vethetik, mit csin\u00e1lsz online, ak\u00e1rcsak a k\u00e9mprogramok, hogy megfelel\u0151 hirdet\u00e9seket c\u00e9lozzanak meg.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Bizonyos helyzetekben a k\u00e1ros adware k\u00e9peket k\u00e9sz\u00edthet az \u00e1ltalad l\u00e1togatott webhelyekr\u0151l \u00e9s a bevitt inform\u00e1ci\u00f3kr\u00f3l. A k\u00e1ros adware ezeket a k\u00e9peket visszak\u00fcldheti az adware forr\u00e1s\u00e1hoz. A szem\u00e9lyes adataid, p\u00e9ld\u00e1ul a hitelk\u00e1rtyaadataid, c\u00edmeid \u00e9s m\u00e1s \u00e9rz\u00e9keny inform\u00e1ci\u00f3k, amelyeket online adsz meg, visszajuthatnak a forr\u00e1shoz.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">B\u00e1r a k\u00e9mprogramok \u00e9s az adware \u00e1ltal okozott szem\u00e9lyazonoss\u00e1g-lop\u00e1s nem fordul el\u0151 olyan gyakran, mint m\u00e1s b\u0171ncselekm\u00e9nyek, m\u00e9gis el\u00e9g figyelemre m\u00e9lt\u00f3ak ahhoz, hogy l\u00e9p\u00e9seket tegy\u00e9l a v\u00e9delem \u00e9rdek\u00e9ben.<\/span><\/p>\n<h2><b>Hogyan v\u00e9dheted meg a sz\u00e1m\u00edt\u00f3g\u00e9ped az adware-t\u0151l<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Az adware \u00e9s a k\u00e9mprogramok figyelmen k\u00edv\u00fcl hagy\u00e1sa a legt\u00f6bb ember sz\u00e1m\u00e1ra nem opci\u00f3. Amikor online vagy, ez egy olyan dolog, amire gondolnod kell. Azonban t\u00f6bbf\u00e9le m\u00f3don is megv\u00e9dheted magad ezekkel a probl\u00e9m\u00e1kkal szemben hat\u00e9konyan \u00e9s biztons\u00e1gosan:<\/span><\/p>\n<h3><b>Telep\u00edts anti-k\u00e9mprogram programokat<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ezek a programok \u00fagy m\u0171k\u00f6dnek, hogy \u00e1tvizsg\u00e1lj\u00e1k \u00e9s elt\u00e1vol\u00edtj\u00e1k a k\u00e1ros f\u00e1jlokat vagy fert\u0151z\u00e9seket a rendszeredb\u0151l, hasonl\u00f3an ahhoz, ahogyan egy v\u00edrusprogram tenn\u00e9. Ez a szoftver nemcsak a jelenlegi k\u00e9mprogramok ellen v\u00e9d, hanem t\u0171zfalat is k\u00edn\u00e1l, amely seg\u00edt megel\u0151zni a j\u00f6v\u0151beli fert\u0151z\u00e9seket.<\/span><\/p>\n<h3><b>Vigy\u00e1zz, mi van odakint<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Az \u00f6sszes el\u00e9rhet\u0151 program k\u00f6z\u00fcl tudnod kell, melyek azok, amelyek a legnagyobb potenci\u00e1llal b\u00edrnak a k\u00e1rokoz\u00e1sra. Sok n\u00e9pszer\u0171 programban adware vagy k\u00e9mprogram v\u00e1r arra, hogy lecsapjon.<\/span><\/p>\n<h3><b>Biztons\u00e1gi int\u00e9zked\u00e9sek bevezet\u00e9se<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A legjobb lenne, ha konkr\u00e9t biztons\u00e1gi int\u00e9zked\u00e9seket vezetn\u00e9l be a sz\u00e1m\u00edt\u00f3g\u00e9ped j\u00f6v\u0151beli adware \u00e9s k\u00e9mprogram behatol\u00e1sok elleni v\u00e9delm\u00e9re. Ezeknek a m\u00f3dszereknek az alkalmaz\u00e1s\u00e1val megv\u00e9dheted magad a biztons\u00e1gi hib\u00e1k elk\u00f6vet\u00e9s\u00e9t\u0151l, amelyek vesz\u00e9lybe sodorhatnak:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Szerezz be egy antiv\u00edrus szoftvert<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Friss\u00edtsd rendszeresen a szoftvered<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">T\u00e1vol\u00edtsd el az ismeretlen \u00e9s sz\u00fcks\u00e9gtelen programokat<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Telep\u00edts egy adware elt\u00e1vol\u00edt\u00f3 eszk\u00f6zt, \u00e9s futtass gyakran vizsg\u00e1latokat<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Az el\u00e9rhet\u0151 lehet\u0151s\u00e9gek kutat\u00e1s\u00e1val k\u00e9pes leszel megalapozott d\u00f6nt\u00e9st hozni arr\u00f3l, melyik v\u00e9delem a legjobb sz\u00e1modra a k\u00e9mprogramok \u00e9s adware ellen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">B\u00e1r nem lehetsz online an\u00e9lk\u00fcl, hogy ne tal\u00e1lkozn\u00e1l valamilyen k\u00e9mprogrammal vagy adware-rel, vannak m\u00f3dok, hogy megv\u00e9dd magad t\u0151le. Cs\u00f6kkentheted az es\u00e9ly\u00e9t annak, hogy k\u00e1ros szoftvert szerezz be, ha \u00e9ber vagy, \u00e9s n\u00e9h\u00e1ny egyszer\u0171 int\u00e9zked\u00e9st megteszel.<\/span><\/p>\n<h3><b>Oktasd a csal\u00e1dodat<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">B\u00e1rmikor, amikor \u00faj inform\u00e1ci\u00f3t kapsz a k\u00e9mprogramokr\u00f3l \u00e9s az adware-r\u0151l, oszd meg az eg\u00e9sz csal\u00e1ddal vagy b\u00e1rkivel, aki a sz\u00e1m\u00edt\u00f3g\u00e9pedet haszn\u00e1lja. M\u00e9g a gyerekek is ki vannak t\u00e9ve a k\u00e9mprogramoknak \u00e9s adware-nek, ha nem vigy\u00e1znak. Egyetlen kattint\u00e1s is el\u00e9g lehet a fert\u0151z\u00e9shez.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Ha oktatod a gyermekeidet err\u0151l a fenyeget\u00e9sr\u0151l, seg\u00edt cs\u00f6kkenteni a program hat\u00e9konys\u00e1g\u00e1t. Ha a gyermeked tudja, hogyan kell haszn\u00e1lni a sz\u00e1m\u00edt\u00f3g\u00e9pet, val\u00f3sz\u00edn\u0171leg \u00e9rti a vele j\u00e1r\u00f3 vesz\u00e9lyeket. Adj nekik egy ellen\u0151rz\u0151 list\u00e1t, hogy megv\u00e9dj\u00e9k magukat \u00e9s a sz\u00e1m\u00edt\u00f3g\u00e9pes befektet\u00e9sedet.<\/span><\/p>\n<h2><b>Hogyan \u00e1llap\u00edthatod meg, hogy az eszk\u00f6z\u00f6d\u00f6n van-e adware<\/b><\/h2>\n<h3><b>Az eszk\u00f6z\u00f6d lassabb lehet a v\u00e1rtn\u00e1l.<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Az adware cs\u00f6kkent teljes\u00edtm\u00e9nyt eredm\u00e9nyezhet az eszk\u00f6z\u00f6d\u00f6n, ha nem t\u00e1vol\u00edtj\u00e1k el. Az adware lass\u00edthatja az eszk\u00f6z\u00f6d m\u0171k\u00f6d\u00e9s\u00e9t vagy \u00f6sszeoml\u00e1st okozhat, ha bejut az oper\u00e1ci\u00f3s rendszeredbe.<\/span><\/p>\n<h3><b>Az akkumul\u00e1tor \u00e9lettartama gyenge.<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Amikor v\u00e9letlen\u00fcl let\u00f6ltesz adware-t, az eszk\u00f6z\u00f6d \u00e1ltal\u00e1nos teljes\u00edtm\u00e9nye cs\u00f6kken, mert kem\u00e9nyebben kell dolgoznia a rosszindulat\u00fa szoftver t\u00e1mogat\u00e1s\u00e1hoz. Az \u00e1ltal\u00e1nos teljes\u00edtm\u00e9ny miatt az eszk\u00f6z\u00f6d akkumul\u00e1tora gyorsan lemer\u00fclhet. Ha az eszk\u00f6z\u00f6d t\u00falmelegszik vagy forr\u00f3nak \u00e9rzed, probl\u00e9ma lehet.<\/span><\/p>\n<h3><b>A web b\u00f6ng\u00e9sz\u0151d kezd\u0151lapja megv\u00e1ltozott an\u00e9lk\u00fcl, hogy tudt\u00e1l volna r\u00f3la.<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Az adware sokf\u00e9le c\u00e9lt szolg\u00e1l. P\u00e9ld\u00e1ul az adware programok megfert\u0151zhetik az eszk\u00f6zeidet, \u00e9s megv\u00e1ltoztathatj\u00e1k a be\u00e1ll\u00edt\u00e1saidat an\u00e9lk\u00fcl, hogy \u00e9szrevenn\u00e9d. Be\u00e1ll\u00edthatnak egy \u00faj kezd\u0151lapot a web b\u00f6ng\u00e9sz\u0151dben vagy keres\u0151motorodban, vagy \u00e1tn\u00e9zhetik a b\u00f6ng\u00e9sz\u00e9si el\u0151zm\u00e9nyeidet enged\u00e9ly n\u00e9lk\u00fcl. Amikor valamit keresel az interneten, \u00e9s \u00e1tir\u00e1ny\u00edtanak egy hirdet\u00e9sre vagy egy m\u00e1sik oldalra, azt b\u00f6ng\u00e9sz\u0151 elt\u00e9r\u00edt\u00e9snek h\u00edvj\u00e1k.<\/span><\/p>\n<h3><b>Ideges\u00edt\u0151 felugr\u00f3 \u00fczenetek<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Ha adware van telep\u00edtve, t\u00f6bb hirdet\u00e9st l\u00e1thatsz, mint \u00e1ltal\u00e1ban, m\u00e9g akkor is, ha nem haszn\u00e1lod az internetet, k\u00fcl\u00f6n\u00f6sen, ha a gener\u00e1lt ablakokat nem lehet gyorsan bez\u00e1rni. Gyakran a hirdet\u00e9sek, amelyeket a weboldalakon l\u00e1tunk felugrani, m\u00e1s forr\u00e1sokb\u00f3l sz\u00e1rmaznak.<\/span><\/p>\n<h3><b>Furcsa alkalmaz\u00e1sok az eszk\u00f6z\u00f6d\u00f6n<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Rendszeresen ellen\u0151rizd a sz\u00e1m\u00edt\u00f3g\u00e9pedet \u00e9s a mobil eszk\u00f6z\u00f6det olyan alkalmaz\u00e1sok ut\u00e1n, amelyeket m\u00e9g nem t\u00f6lt\u00f6tt\u00e9l le. Ezek adware-t tartalmazhatnak, amely a sz\u00e1m\u00edt\u00f3g\u00e9ped \u00f6sszeoml\u00e1s\u00e1t \u00e9s a telefonod akkumul\u00e1tor\u00e1nak gyors lemer\u00fcl\u00e9s\u00e9t okozhatja.<\/span><\/p>\n<h2><b>\u00d6sszefoglalva<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Az adware jelent\u0151s kellemetlens\u00e9get \u00e9s fenyeget\u00e9st jelenthet az eszk\u00f6z\u00f6d biztons\u00e1g\u00e1ra. Ne hagyd, hogy \u00e1tvegye az ir\u00e1ny\u00edt\u00e1st az eszk\u00f6z\u00f6d felett \u2013 vedd \u00e1t az ir\u00e1ny\u00edt\u00e1st a helyzet felett. Maradj t\u00e1j\u00e9kozott, friss\u00edts rendszeresen, \u00e9s oktasd a k\u00f6r\u00fcl\u00f6tted l\u00e9v\u0151ket az adware vesz\u00e9lyeir\u0151l. Ezekkel a l\u00e9p\u00e9sekkel megv\u00e9dheted magad a j\u00f6v\u0151beli fert\u0151z\u00e9sekt\u0151l, \u00e9s elt\u00e1vol\u00edthatod a jelenlegi probl\u00e9m\u00e1kat.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>With the world now more technology-based than ever before, there has been a significant rise in digital data. Individuals, businesses, and government agencies store data electronically on computers, which is\u2026 <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/mi-az-adware-es-hogyan-befolyasolhatja-a-biztonsagodat\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Mi az adware, \u00e9s hogyan befoly\u00e1solhatja a biztons\u00e1g\u00e1t<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":1016,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-896","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Adware can affect your security? | securitybriefing.netow<\/title>\n<meta name=\"description\" content=\"Adware is a type of malware that floods users with undesired ads and pop-up windows, causing a terrible user experience.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/mi-az-adware-es-hogyan-befolyasolhatja-a-biztonsagodat\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Adware can affect your security? | securitybriefing.netow\" \/>\n<meta property=\"og:description\" content=\"Adware is a type of malware that floods users with undesired ads and pop-up windows, causing a terrible user experience.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/mi-az-adware-es-hogyan-befolyasolhatja-a-biztonsagodat\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-01T19:35:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-08T23:19:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_young-man-hand-touching-on-virtual-screen-padlock-icon-data_4572734-scaled-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"What is adware, and how can it affect your security\",\"datePublished\":\"2022-11-01T19:35:09+00:00\",\"dateModified\":\"2024-10-08T23:19:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/\"},\"wordCount\":1662,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_young-man-hand-touching-on-virtual-screen-padlock-icon-data_4572734-scaled-2.jpg\",\"articleSection\":[\"cybersecurity\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/\",\"url\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/\",\"name\":\"How Adware can affect your security? | securitybriefing.netow\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_young-man-hand-touching-on-virtual-screen-padlock-icon-data_4572734-scaled-2.jpg\",\"datePublished\":\"2022-11-01T19:35:09+00:00\",\"dateModified\":\"2024-10-08T23:19:52+00:00\",\"description\":\"Adware is a type of malware that floods users with undesired ads and pop-up windows, causing a terrible user experience.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_young-man-hand-touching-on-virtual-screen-padlock-icon-data_4572734-scaled-2.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_young-man-hand-touching-on-virtual-screen-padlock-icon-data_4572734-scaled-2.jpg\",\"width\":2560,\"height\":1440,\"caption\":\"Adware image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is adware, and how can it affect your security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hogyan befoly\u00e1solhatja az adware a biztons\u00e1godat? | securitybriefing.netow","description":"Az adware egy olyan rosszindulat\u00fa szoftver, amely nem k\u00edv\u00e1nt hirdet\u00e9sekkel \u00e9s felugr\u00f3 ablakokkal \u00e1rasztja el a felhaszn\u00e1l\u00f3kat, ami borzalmas felhaszn\u00e1l\u00f3i \u00e9lm\u00e9nyt okoz.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/mi-az-adware-es-hogyan-befolyasolhatja-a-biztonsagodat\/","og_locale":"hu_HU","og_type":"article","og_title":"How Adware can affect your security? | securitybriefing.netow","og_description":"Adware is a type of malware that floods users with undesired ads and pop-up windows, causing a terrible user experience.","og_url":"https:\/\/securitybriefing.net\/hu\/kiberbiztonsag\/mi-az-adware-es-hogyan-befolyasolhatja-a-biztonsagodat\/","og_site_name":"Security Briefing","article_published_time":"2022-11-01T19:35:09+00:00","article_modified_time":"2024-10-08T23:19:52+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_young-man-hand-touching-on-virtual-screen-padlock-icon-data_4572734-scaled-2.jpg","type":"image\/jpeg"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"security","Becs\u00fclt olvas\u00e1si id\u0151":"8 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"What is adware, and how can it affect your security","datePublished":"2022-11-01T19:35:09+00:00","dateModified":"2024-10-08T23:19:52+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/"},"wordCount":1662,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_young-man-hand-touching-on-virtual-screen-padlock-icon-data_4572734-scaled-2.jpg","articleSection":["cybersecurity"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/","url":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/","name":"Hogyan befoly\u00e1solhatja az adware a biztons\u00e1godat? | securitybriefing.netow","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_young-man-hand-touching-on-virtual-screen-padlock-icon-data_4572734-scaled-2.jpg","datePublished":"2022-11-01T19:35:09+00:00","dateModified":"2024-10-08T23:19:52+00:00","description":"Az adware egy olyan rosszindulat\u00fa szoftver, amely nem k\u00edv\u00e1nt hirdet\u00e9sekkel \u00e9s felugr\u00f3 ablakokkal \u00e1rasztja el a felhaszn\u00e1l\u00f3kat, ami borzalmas felhaszn\u00e1l\u00f3i \u00e9lm\u00e9nyt okoz.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_young-man-hand-touching-on-virtual-screen-padlock-icon-data_4572734-scaled-2.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/11\/vecteezy_young-man-hand-touching-on-virtual-screen-padlock-icon-data_4572734-scaled-2.jpg","width":2560,"height":1440,"caption":"Adware image"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cybersecurity\/what-is-adware-and-how-can-it-affect-your-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"What is adware, and how can it affect your security"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"biztons\u00e1g","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin a Government Technology vezet\u0151 munkat\u00e1rsa. Kor\u00e1bban a PYMNTS \u00e9s a The Bay State Banner sz\u00e1m\u00e1ra \u00edrt, \u00e9s a Carnegie Mellon Egyetemen szerzett B.A. diplom\u00e1t kreat\u00edv \u00edr\u00e1sb\u00f3l. Boston k\u00f6rny\u00e9k\u00e9n \u00e9l.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/hu\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/896","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=896"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/896\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1016"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=896"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=896"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=896"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}