{"id":1378,"date":"2023-02-13T21:43:54","date_gmt":"2023-02-13T21:43:54","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1378"},"modified":"2023-02-13T21:43:54","modified_gmt":"2023-02-13T21:43:54","slug":"escrocherii-suport-tehnic","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/escrocherii\/escrocherii-suport-tehnic\/","title":{"rendered":"Escrocherii legate de asisten\u021ba tehnic\u0103"},"content":{"rendered":"<p>Nu este niciun secret faptul c\u0103 internetul poate fi un loc periculos. Pentru a v\u0103 proteja, trebuie s\u0103 \u0219ti\u021bi ce este acolo \u0219i cum v-ar putea viza; \u00een\u0219el\u0103toriile legate de asisten\u021ba tehnic\u0103 sunt doar unul dintre aceste riscuri. \u00cen aceast\u0103 postare pe blog, vom oferi sfaturi practice despre cum s\u0103 evita\u021bi s\u0103 deveni\u021bi o victim\u0103, precum \u0219i sfaturi pentru a r\u0103m\u00e2ne \u00een siguran\u021b\u0103 online \u00een continuare, astfel \u00eenc\u00e2t nimic s\u0103 nu v\u0103 ia prin surprindere. Cu toate aceste resurse la dispozi\u021bia dumneavoastr\u0103, nu deveni\u021bi o alt\u0103 statistic\u0103 \u00een epidemia \u00een cre\u0219tere a criminalit\u0103\u021bii informatice!<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"whatnbsparenbsptechnbspsupportnbspscams\"><strong>Ce sunt \u00een\u0219el\u0103toriile legate de asisten\u021ba tehnic\u0103?<\/strong><\/h2>\n\n\n<p>Escrocheriile legate de asisten\u021ba tehnic\u0103 sunt un tip de infrac\u021biune informatic\u0103 \u00een care oamenii pretind c\u0103 sunt de la asisten\u021ba tehnic\u0103 pentru a fura informa\u021bii personale sau bani de la persoane care nu \u0219tiu ce se \u00eent\u00e2mpl\u0103. Ace\u0219ti escroci folosesc diverse tactici, cum ar fi apelurile la rece, e-mailurile de phishing sau infectarea dispozitivului victimei cu malware. Obiectivul final este de a extrage informa\u021bii sensibile sau resurse financiare de la \u021bintele lor. Este esen\u021bial s\u0103 fi\u021bi con\u0219tien\u021bi de aceste escrocherii \u0219i s\u0103 v\u0103 proteja\u021bi informa\u021biile personale \u0219i activele financiare.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"commonnbsptacticsnbspusednbspbynbspscammers\"><strong>Tactici comune utilizate de escroci<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/tech-support-scams-Common-tactics-used-by-scammers-1.jpg\" alt=\"Tactici comune utilizate de escroci\" class=\"wp-image-1407\"\/><\/figure>\n\n\n\n<div style=\"height:23px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Escrocheriile legate de asisten\u021ba tehnic\u0103 sunt din ce \u00een ce mai frecvente \u0219i sunt frecvent realizate prin tehnici de inginerie social\u0103, cum ar fi apelurile la rece \u0219i e-mailurile de phishing. Aceste escrocherii pot utiliza, de asemenea, tactici de speriat, cum ar fi afirma\u021bia fals\u0103 c\u0103 computerul victimei este compromis \u0219i apoi ofer\u0103 \"asisten\u021b\u0103\" la un anumit pre\u021b.<\/p>\n\n\n\n<p>Urm\u0103toarele sunt cele mai frecvente strategii de asisten\u021b\u0103 tehnic\u0103:<\/p>\n\n\n\n<p><strong>Apel la rece: <\/strong>Una dintre cele mai comune tactici folosite de escrocii din domeniul asisten\u021bei tehnice este apelul la rece.<\/p>\n\n\n\n<p>Acest lucru se face prin apelarea unor persoane la \u00eent\u00e2mplare, adesea spun\u00e2nd c\u0103 sunt de la o companie de tehnologie real\u0103 sau de la un furnizor de servicii, \u0219i \u00eencerc\u00e2nd s\u0103 le conving\u0103 c\u0103 pe computerul lor se afl\u0103 programe malware sau alte programe d\u0103un\u0103toare.<\/p>\n\n\n\n<p>Ace\u0219tia se vor oferi apoi s\u0103 rezolve problema contra cost.<\/p>\n\n\n\n<p><strong>Reclame pop-up: <\/strong>O alt\u0103 tactic\u0103 folosit\u0103 de escrocii din domeniul asisten\u021bei tehnice este apari\u021bia de reclame pe site-uri web sau \u00een cadrul aplica\u021biilor.<\/p>\n\n\n\n<p>Aceste anun\u021buri pot sem\u0103na cu avertismente de securitate false sau cu notific\u0103ri privind existen\u021ba unor viru\u0219i pe computerul dumneavoastr\u0103. Acestea v\u0103 vor spune s\u0103 suna\u021bi la un num\u0103r din anun\u021b pentru a ob\u021bine ajutor \u00een vederea elimin\u0103rii viru\u0219ilor.<\/p>\n\n\n\n<p><strong>E-mailuri de phishing<\/strong>: E-mailurile de phishing sunt un alt mod prin care escrocii din domeniul asisten\u021bei tehnice \u00eencearc\u0103 s\u0103 ob\u021bin\u0103 acces la informa\u021bii personale \u0219i bani de la victimele care nu b\u0103nuiesc nimic.<\/p>\n\n\n\n<p>De cele mai multe ori, linkurile din aceste e-mailuri duc oamenii pe site-uri web r\u0103u inten\u021bionate, unde li se solicit\u0103 informa\u021bii sensibile, precum numere de carduri de credit sau parole.<\/p>\n\n\n\n<p><strong>Software de securitate fals: <\/strong>Escrocii care ofer\u0103 asisten\u021b\u0103 tehnic\u0103 pot \u00eencerca, de asemenea, s\u0103 conving\u0103 oamenii s\u0103 descarce software de securitate fals, spun\u00e2nd c\u0103 computerele lor sunt infectate cu malware \u0219i trebuie protejate de mai multe amenin\u021b\u0103ri.<\/p>\n\n\n\n<p>Software-ul \u00een sine poate con\u021bine de fapt coduri mali\u021bioase, care v\u0103 pot deteriora \u0219i mai mult sistemul. <\/p>\n\n\n\n<p><strong>Atacuri de inginerie social\u0103: <\/strong>Atacurile de inginerie social\u0103 implic\u0103 utilizarea unor tehnici de manipulare psihologic\u0103, cum ar fi crearea fricii sau a urgen\u021bei, pentru a convinge o persoan\u0103 s\u0103 ofere informa\u021bii confiden\u021biale sau s\u0103 \u00eentreprind\u0103 anumite ac\u021biuni (cum ar fi plata unor sume de bani).<\/p>\n\n\n\n<p>De exemplu, un escroc ar putea pretinde c\u0103 computerul dvs. are nevoie de repara\u021bii urgente din cauza unei infec\u021bii cu virus, dar acestea trebuie pl\u0103tite \u00eenainte de \u00eenceperea lucr\u0103rilor. <\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"protecting-yourself-from-tech-support-scams\"><strong>Protejarea \u00eempotriva \u00een\u0219el\u0103toriilor legate de asisten\u021ba tehnic\u0103<\/strong><\/h2>\n\n\n<p>Escrocheriile legate de asisten\u021ba tehnic\u0103 sunt o problem\u0103 din ce \u00een ce mai mare \u00een era digital\u0103 \u0219i este important s\u0103 fi\u021bi con\u0219tien\u021bi de aceste escrocherii \u0219i s\u0103 lua\u021bi m\u0103suri pentru a v\u0103 proteja de ele. Iat\u0103 c\u00e2teva sfaturi pentru a evita escrocheriile legate de asisten\u021ba tehnic\u0103:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Nu furniza\u021bi informa\u021bii personale \u0219i nu v\u0103 accesa\u021bi computerul f\u0103r\u0103 a verifica mai \u00eent\u00e2i identitatea persoanei care v\u0103 contacteaz\u0103.<\/li>\n\n\n\n<li>Feri\u021bi-v\u0103 de e-mailurile, apelurile telefonice sau mesajele text nesolicitate care pretind c\u0103 exist\u0103 o problem\u0103 cu dispozitivul sau contul dvs.<\/li>\n\n\n\n<li>Nu da\u021bi clic pe linkuri din e-mailuri suspecte \u0219i nu desc\u0103rca\u021bi ata\u0219amente dec\u00e2t dac\u0103 sunte\u021bi sigur c\u0103 acestea sunt legitime.<\/li>\n\n\n\n<li>Dac\u0103 cineva v\u0103 contacteaz\u0103 pretinz\u00e2nd c\u0103 este de la o companie de renume, cum ar fi Microsoft, Apple, Google etc., \u00eenchide\u021bi \u0219i contacta\u021bi direct compania folosind num\u0103rul oficial de asisten\u021b\u0103 pentru clien\u021bi afi\u0219at pe site-ul s\u0103u, \u00een loc s\u0103 folosi\u021bi orice num\u0103r furnizat de apelant.<\/li>\n\n\n\n<li>\u00centreba\u021bi pentru cine lucreaz\u0103 \u00eenainte de a furniza orice informa\u021bii despre dumneavoastr\u0103 sau de a le permite accesul de la distan\u021b\u0103 la sistemul dumneavoastr\u0103 informatic.<\/li>\n\n\n\n<li>Ave\u021bi \u00eencredere \u00een instinctele dumneavoastr\u0103 \u0219i nu furniza\u021bi nicio informa\u021bie personal\u0103 p\u00e2n\u0103 c\u00e2nd nu a\u021bi verificat mai \u00eent\u00e2i identitatea lor.<\/li>\n\n\n\n<li>\u00cenchide\u021bi imediat dac\u0103 cineva \u00eencearc\u0103 s\u0103 v\u0103 for\u021beze s\u0103 furniza\u021bi date sensibile, cum ar fi parole sau numere de carduri de credit, la telefon, f\u0103r\u0103 a confirma mai \u00eent\u00e2i cine este persoana respectiv\u0103.<\/li>\n\n\n\n<li>Recunoa\u0219te\u021bi e-mailurile \u0219i apelurile telefonice suspecte, fiind aten\u021bi la semnalele de alarm\u0103, cum ar fi contactele nesolicitate, solicit\u0103rile urgente de informa\u021bii personale, promisiunile de servicii sau produse gratuite \u00een schimbul unei pl\u0103\u021bi \u00een avans \u0219i amenin\u021b\u0103rile cu ac\u021biuni \u00een justi\u021bie dac\u0103 plata nu este efectuat\u0103 rapid. <\/li>\n\n\n\n<li>Acorda\u021bi aten\u021bie gre\u0219elilor de ortografie \u0219i gramaticale, care pot indica faptul c\u0103 e-mailul nu este autentic.<\/li>\n<\/ul>\n\n\n\n<p>Urm\u00e2nd ace\u0219ti pa\u0219i, pute\u021bi evita s\u0103 deveni\u021bi o victim\u0103 a escrocheriilor de asisten\u021b\u0103 tehnic\u0103 \u0219i s\u0103 v\u0103 proteja\u021bi de fraud\u0103.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"reporting-tech-support-scams\"><strong>Raportarea \u00een\u0219el\u0103toriilor legate de asisten\u021ba tehnic\u0103<\/strong><\/h2>\n\n\n<p>Dac\u0103 vi se \u00eent\u00e2mpl\u0103 s\u0103 da\u021bi peste o \u00een\u0219el\u0103torie de asisten\u021b\u0103 tehnic\u0103, este important s\u0103 fi\u021bi vigilent \u0219i s\u0103 lua\u021bi m\u0103suri pentru a preveni ca al\u021bii s\u0103 devin\u0103 victime ale acestei infrac\u021biuni. Din p\u0103cate, unii oameni \u0219i-au pierdut toate economiile ca urmare a acestei fraude oribile. Pentru a ajuta la combaterea acestei probleme, este esen\u021bial s\u0103 raporta\u021bi orice \u00een\u0219el\u0103torie de asisten\u021b\u0103 tehnic\u0103 pe care o \u00eent\u00e2lni\u021bi. Iat\u0103 c\u00e2\u021biva pa\u0219i pe care \u00eei pute\u021bi urma pentru a raporta o \u00een\u0219el\u0103torie de asisten\u021b\u0103 tehnic\u0103:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Raporta\u021bi fraudele online \u0219i tentativele de phishing<\/strong>: Dac\u0103 suspecta\u021bi c\u0103 un e-mail sau un site web face parte dintr-o \u00een\u0219el\u0103torie de asisten\u021b\u0103 tehnic\u0103, raporta\u021bi-o la agen\u021bia local\u0103 de aplicare a legii sau la Comisia Federal\u0103 pentru Comer\u021b (<a href=\"https:\/\/www.ftc.gov\/\" target=\"_blank\" rel=\"noreferrer noopener\">FTC<\/a>). (FTC ofer\u0103, de asemenea, resurse pentru victimele furtului de identitate pe site-ul s\u0103u web).<\/li>\n\n\n\n<li><strong>Raporta\u021bi apelurile telefonice \u0219i mesajele text<\/strong>: Dac\u0103 primi\u021bi un apel telefonic sau un mesaj text de la cineva care pretinde c\u0103 este de la asisten\u021ba tehnic\u0103, \u00eenchide\u021bi imediat \u0219i contacta\u021bi furnizorul de telefonie mobil\u0103.<\/li>\n\n\n\n<li><strong>Raporta\u021bi taxele neautorizate<\/strong>: Dac\u0103 pe extrasul de cont al cardului dvs. de credit sau \u00een contul dvs. bancar apar debite neautorizate ca urmare a unei escrocherii legate de asisten\u021ba tehnic\u0103, contacta\u021bi imediat institu\u021bia financiar\u0103. \u00cencerca\u021bi s\u0103 ob\u021bine\u021bi dovada achizi\u021biei, cum ar fi un num\u0103r de factur\u0103, pentru a contribui la anchet\u0103.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"staying-safe-online\"><strong>Siguran\u021ba online <\/strong><\/h2>\n\n\n<p>Amenin\u021b\u0103rile cibernetice precum \u00een\u0219el\u0103ciunile legate de asisten\u021ba tehnic\u0103 reprezint\u0103 un risc semnificativ, astfel \u00eenc\u00e2t este esen\u021bial s\u0103 v\u0103 proteja\u021bi dispozitivele \u0219i conturile. Iat\u0103 c\u00e2teva bune practici pentru a r\u0103m\u00e2ne \u00een siguran\u021b\u0103 online:<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"securing-devices-and-accounts\">Securizarea dispozitivelor \u0219i a conturilor<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>P\u0103stra\u021bi toate dispozitivele conectate la internet, cum ar fi computerele, telefoanele \u0219i tabletele, actualizate cu cele mai recente patch-uri de securitate.<\/li>\n\n\n\n<li>Instala\u021bi un program antivirus de \u00eencredere \u0219i un firewall pe fiecare dispozitiv pentru a v\u0103 proteja \u00eempotriva software-ului r\u0103u inten\u021bionat.<\/li>\n\n\n\n<li>Activa\u021bi autentificarea cu doi factori ori de c\u00e2te ori este posibil pentru o protec\u021bie sporit\u0103.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"creating-strong-passwords\">Crearea de parole puternice<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Atunci c\u00e2nd crea\u021bi parole, asigura\u021bi-v\u0103 c\u0103 acestea sunt puternice \u0219i nu pot fi ghicite cu u\u0219urin\u021b\u0103.<\/li>\n\n\n\n<li>Utiliza\u021bi o combina\u021bie de litere majuscule, litere minuscule, numere \u0219i simboluri pentru a crea parole unice.<\/li>\n\n\n\n<li>Lua\u021bi \u00een considerare utilizarea unui manager de parole pentru a genera \u0219i stoca \u00een siguran\u021b\u0103 parolele aleatorii.<\/li>\n<\/ul>\n\n\n\n<p>R\u0103m\u00e2ne\u021bi informat \u0219i con\u0219tient de cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103 pentru a v\u0103 asigura c\u0103 datele dvs. r\u0103m\u00e2n \u00een siguran\u021b\u0103. Profita\u021bi de resursele disponibile pentru a afla mai multe despre siguran\u021ba cibernetic\u0103.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"resources-for-learning-more-about-cybersecurity-and-safety-online\"><strong>Resurse pentru a afla mai multe despre securitatea cibernetic\u0103 \u0219i siguran\u021ba online<\/strong><\/h2>\n\n\n<p>Guvernul SUA ofer\u0103 mai multe resurse pentru a ajuta persoanele s\u0103 \u00eenve\u021be despre securitatea cibernetic\u0103 \u0219i siguran\u021ba online. Departamentul de Securitate Intern\u0103 ofer\u0103 <a href=\"https:\/\/www.stopthinkconnect.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">StopThinkConnect<\/a> care sensibilizeaz\u0103 publicul cu privire la amenin\u021b\u0103rile cibernetice \u0219i ofer\u0103 sfaturi privind siguran\u021ba. Campania <a href=\"https:\/\/www.cisa.gov\/cybersecurity-awareness-month#:~:text=Since%202004%2C%20the%20President%20of,confidential%20data%20become%20more%20commonplace.\" target=\"_blank\" rel=\"noreferrer noopener\">Luna na\u021bional\u0103 a con\u0219tientiz\u0103rii securit\u0103\u021bii cibernetice<\/a> are loc \u00een fiecare octombrie, educ\u00e2nd cet\u0103\u021benii cu privire la modul de a se proteja de atacurile cibernetice.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"professional-organizations-dedicated-to-cybersecurity-education-and-research\">Organiza\u021bii profesionale dedicate educa\u021biei \u0219i cercet\u0103rii \u00een domeniul securit\u0103\u021bii cibernetice<\/h3>\n\n\n<p>Asocia\u021bia de audit \u0219i control al sistemelor informatice (<a href=\"https:\/\/www.isaca.org\/\">ISACA<\/a>) este o organiza\u021bie non-profit global\u0103 care ofer\u0103 \u00eendrum\u0103ri privind cele mai bune practici pentru gestionarea securit\u0103\u021bii informa\u021biilor, evaluarea riscurilor, tehnici de audit, standarde de conformitate, m\u0103suri de protec\u021bie a vie\u021bii private \u0219i instrumente de analiz\u0103 a datelor. De asemenea, ofer\u0103 strategii de r\u0103spuns la incidente prin intermediul publica\u021biilor sale \u0219i al programului de certificare Certified Information Systems Auditor.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\"><strong>\u00cen concluzie<\/strong><\/h2>\n\n\n<p>Escrocheriile legate de asisten\u021ba tehnic\u0103 pun \u00een pericol securitatea informa\u021biilor noastre digitale. Pentru a ne ap\u0103ra, trebuie s\u0103 fim con\u0219tien\u021bi de securitatea cibernetic\u0103, s\u0103 investim \u00een software antivirus \u0219i s\u0103 ne men\u021binem computerele la zi. Adopt\u00e2nd aceste proceduri, ne putem proteja datele de fraudele de asisten\u021b\u0103 tehnic\u0103 \u0219i putem men\u021bine securitatea internetului. Preia imediat controlul asupra securit\u0103\u021bii tale cibernetice \u0219i \u00eencepe s\u0103 te aperi.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"faqs\"><strong>\u00centreb\u0103ri frecvente<\/strong><\/h2>\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\"><div class=\"schema-faq-section\" id=\"faq-question-1676323085725\"><strong class=\"schema-faq-question\">Cum func\u021bioneaz\u0103 escrocheriile de asisten\u021b\u0103 tehnic\u0103?<\/strong> <p class=\"schema-faq-answer\">escrocii care ofer\u0103 asisten\u021b\u0103 tehnic\u0103 se dau drept reprezentan\u021bi ai unor companii cunoscute, cum ar fi Microsoft sau Apple, \u0219i \u00eencearc\u0103 s\u0103 ob\u021bin\u0103 acces la computerul victimei. Ace\u0219tia pot solicita o plat\u0103 sau pot instala software mali\u021bios odat\u0103 ce au acces.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323342074\"><strong class=\"schema-faq-question\">Cum m\u0103 protejez de \u00een\u0219el\u0103ciunile legate de asisten\u021ba tehnic\u0103?<\/strong> <p class=\"schema-faq-answer\">Pentru a v\u0103 proteja de \u00een\u0219el\u0103ciunile de asisten\u021b\u0103 tehnic\u0103, nu furniza\u021bi niciodat\u0103 informa\u021bii personale sau detalii de plat\u0103 la telefon sau online. Nu da\u021bi clic pe linkuri din e-mailuri sau site-uri suspecte. Dac\u0103 crede\u021bi c\u0103 computerul dvs. a fost infectat, efectua\u021bi o scanare anti-malware \u0219i \u0219terge\u021bi toate fi\u0219ierele mali\u021bioase g\u0103site. Men\u021bine\u021bi toate programele actualizate pentru a detecta \u0219i elimina mai bine amenin\u021b\u0103rile.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323372090\"><strong class=\"schema-faq-question\">Care sunt escrocheriile frecvente \u00een domeniul asisten\u021bei tehnice?<\/strong> <p class=\"schema-faq-answer\">Escrocheriile comune de asisten\u021b\u0103 tehnic\u0103 implic\u0103 infractori care se dau drept reprezentan\u021bi legitimi de asisten\u021b\u0103 tehnic\u0103 \u0219i folosesc tactici precum apeluri la rece, mesaje pop-up \u0219i site-uri web false pentru a ob\u021bine acces la informa\u021bii personale sau bani.<\/p> <\/div> <div class=\"schema-faq-section\" id=\"faq-question-1676323467317\"><strong class=\"schema-faq-question\">De unde provin escrocheriile legate de asisten\u021ba tehnic\u0103?<\/strong> <p class=\"schema-faq-answer\">Escrocheriile legate de asisten\u021ba tehnic\u0103 provin de pe site-uri web r\u0103u inten\u021bionate, e-mailuri de phishing \u0219i apeluri la rece. Escrocii pot crea site-uri web false, pot trimite e-mailuri \u00een mas\u0103 sau pot suna direct utilizatorii care nu b\u0103nuiesc nimic, pretinz\u00e2nd c\u0103 computerul lor este infectat cu malware.<\/p> <\/div> <\/div>","protected":false},"excerpt":{"rendered":"<p>Nu este un secret faptul c\u0103 internetul poate fi un loc periculos. Pentru a v\u0103 proteja, trebuie s\u0103 \u0219ti\u021bi ce este acolo \u0219i cum v-ar putea viza; escrocherii de asisten\u021b\u0103 tehnic\u0103... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/escrocherii\/escrocherii-suport-tehnic\/\">Continue reading <span class=\"screen-reader-text\">Escrocherii legate de asisten\u021ba tehnic\u0103<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1380,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[26],"tags":[],"class_list":["post-1378","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-scams","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protect Yourself From Tech Support Scams - Securitybriefing.net<\/title>\n<meta name=\"description\" content=\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/escrocherii\/escrocherii-suport-tehnic\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Yourself From Tech Support Scams - Securitybriefing.net\" \/>\n<meta property=\"og:description\" content=\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/escrocherii\/escrocherii-suport-tehnic\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-13T21:43:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"662\" \/>\n\t<meta property=\"og:image:height\" content=\"327\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Tech support scams\",\"datePublished\":\"2023-02-13T21:43:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"},\"wordCount\":1537,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"articleSection\":[\"scams\"],\"inLanguage\":\"ro-RO\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\",\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\",\"name\":\"Protect Yourself From Tech Support Scams - Securitybriefing.net\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"datePublished\":\"2023-02-13T21:43:54+00:00\",\"description\":\"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\"},{\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\"}],\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg\",\"width\":662,\"height\":327,\"caption\":\"Tech support scams\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tech support scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\",\"position\":1,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725\",\"name\":\"How do tech support scams work?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"ech support scammers pose as representatives from well-known companies, such as Microsoft or Apple, and attempt to gain access to the victim's computer. They may ask for payment or install malicious software once they have access.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\",\"position\":2,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074\",\"name\":\"How do I protect myself from tech support scams?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"To protect yourself from tech support scams, never give out personal information or payment details over the phone or online. Don't click on links from suspicious emails or websites. If you think your computer has been infected, run an anti-malware scan and delete any malicious files found. Keep all software up-to-date to better detect and remove threats.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\",\"position\":3,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090\",\"name\":\"What are common tech support scams?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Common tech support scams involve criminals posing as legitimate tech support representatives and using tactics like cold calls, pop-up messages, and fake websites to gain access to personal information or money.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\",\"position\":4,\"url\":\"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317\",\"name\":\"Where do tech support scams come from?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Tech support scams come from malicious websites, phishing emails, and cold calls. The scammers may create fake websites, send mass emails, or call unsuspecting users directly, claiming that their computer is infected with malware.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Proteja\u021bi-v\u0103 de \u00een\u0219el\u0103ciunile legate de asisten\u021ba tehnic\u0103 - Securitybriefing.net","description":"R\u0103m\u00e2ne\u021bi \u00een siguran\u021b\u0103 online \u0219i proteja\u021bi-v\u0103 de \u00een\u0219el\u0103ciunile de asisten\u021b\u0103 tehnic\u0103 cu acest ghid cuprinz\u0103tor de securitate cibernetic\u0103.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/escrocherii\/escrocherii-suport-tehnic\/","og_locale":"ro_RO","og_type":"article","og_title":"Protect Yourself From Tech Support Scams - Securitybriefing.net","og_description":"Stay safe online and protect yourself from tech support scams with this comprehensive cybersecurity guide.","og_url":"https:\/\/securitybriefing.net\/ro\/escrocherii\/escrocherii-suport-tehnic\/","og_site_name":"Security Briefing","article_published_time":"2023-02-13T21:43:54+00:00","og_image":[{"width":662,"height":327,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"8 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Tech support scams","datePublished":"2023-02-13T21:43:54+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"},"wordCount":1537,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","articleSection":["scams"],"inLanguage":"ro-RO"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/","url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/","name":"Proteja\u021bi-v\u0103 de \u00een\u0219el\u0103ciunile legate de asisten\u021ba tehnic\u0103 - Securitybriefing.net","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","datePublished":"2023-02-13T21:43:54+00:00","description":"R\u0103m\u00e2ne\u021bi \u00een siguran\u021b\u0103 online \u0219i proteja\u021bi-v\u0103 de \u00een\u0219el\u0103ciunile de asisten\u021b\u0103 tehnic\u0103 cu acest ghid cuprinz\u0103tor de securitate cibernetic\u0103.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb"},"mainEntity":[{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090"},{"@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317"}],"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/scams\/tech-support-scams\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Tech-support-scams-1.jpg","width":662,"height":327,"caption":"Tech support scams"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Tech support scams"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725","position":1,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323085725","name":"Cum func\u021bioneaz\u0103 escrocheriile de asisten\u021b\u0103 tehnic\u0103?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"ech support scammers pose as representatives from well-known companies, such as Microsoft or Apple, and attempt to gain access to the victim's computer. They may ask for payment or install malicious software once they have access.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074","position":2,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323342074","name":"Cum m\u0103 protejez de \u00een\u0219el\u0103ciunile legate de asisten\u021ba tehnic\u0103?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"To protect yourself from tech support scams, never give out personal information or payment details over the phone or online. Don't click on links from suspicious emails or websites. If you think your computer has been infected, run an anti-malware scan and delete any malicious files found. Keep all software up-to-date to better detect and remove threats.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090","position":3,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323372090","name":"Care sunt escrocheriile frecvente \u00een domeniul asisten\u021bei tehnice?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Common tech support scams involve criminals posing as legitimate tech support representatives and using tactics like cold calls, pop-up messages, and fake websites to gain access to personal information or money.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317","position":4,"url":"https:\/\/securitybriefing.net\/scams\/tech-support-scams\/#faq-question-1676323467317","name":"De unde provin escrocheriile legate de asisten\u021ba tehnic\u0103?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Tech support scams come from malicious websites, phishing emails, and cold calls. The scammers may create fake websites, send mass emails, or call unsuspecting users directly, claiming that their computer is infected with malware.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1378","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1378"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1378\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1380"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1378"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1378"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1378"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}