{"id":1504,"date":"2023-02-25T14:46:21","date_gmt":"2023-02-25T14:46:21","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1504"},"modified":"2023-02-25T14:46:21","modified_gmt":"2023-02-25T14:46:21","slug":"criminalitate-cibernetica-prin-wifi-ce-trebuie-sa-stii","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/tehnologie\/criminalitate-cibernetica-prin-wifi-ce-trebuie-sa-stii\/","title":{"rendered":"Criminalitatea informatic\u0103 prin WiFi: ce trebuie s\u0103 \u0219ti\u021bi"},"content":{"rendered":"<p>Securitatea cibernetic\u0103 este considerat\u0103 o prioritate de c\u0103tre corpora\u021bii \u0219i companii, iar acestea fac investi\u021bii semnificative \u00een firewall-uri care permit ca sistemele lor s\u0103 fie efectiv inaccesibile. Cu toate acestea, multe dintre aceste companii nu sunt con\u0219tiente de expunerea la criminalitatea cibernetic\u0103 generat\u0103 de re\u021beaua lor WIFI.<\/p>\n\n\n\n<p>Un WIFI defectuos, \u00eempreun\u0103 cu o \u00een\u021belegere insuficient\u0103 a semnelor evidente ale amenin\u021b\u0103rilor cibernetice, pot oferi infractorilor cibernetici acces la informa\u021bii sensibile din interiorul afacerii. \u00cen plus, poate expune \u0219i angaja\u021bii la riscul dezastruos de furt de identitate, phishing \u0219i alte escrocherii cibernetice. Ceea ce mul\u021bi nu realizeaz\u0103 este c\u0103 WIFI-ul lor poate invalida \u00eencerc\u0103rile lor de a proteja activele. Trebuie s\u0103 fim con\u0219tien\u021bi c\u0103 suntem expu\u0219i atacului \u201c<a href=\"https:\/\/www.techtarget.com\/iotagenda\/definition\/man-in-the-middle-attack-MitM\" target=\"_blank\" rel=\"noreferrer noopener\">omului din mijloc\u201d (MITM).<\/a> Cu toate acestea, cu cuno\u0219tin\u021bele organiza\u021bionale potrivite \u0219i tehnologia simpl\u0103, poate fi prevenit cu u\u0219urin\u021b\u0103.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"cyber-attack-mode-through-wifi\">Modul de atac cibernetic prin WIFI<\/h2>\n\n\n<p>Criminalitatea cibernetic\u0103 nu se odihne\u0219te, iar infractorii cibernetici evolueaz\u0103 constant, viz\u00e2nd organiza\u021bii \u0219i concentr\u00e2ndu-\u0219i aten\u021bia asupra utilizatorilor individuali. \u00cen lumea digital\u0103, unde conectivitatea \u0219i accesul wireless sunt o necesitate, oportuni\u0219tii online caut\u0103 s\u0103 profite.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"rogue-access-points\">Puncte de acces necinstite<\/h3>\n\n\n<p>Infractorii cibernetici intercepteaz\u0103 datele care trec prin punctele de acces wireless \u0219i folosesc acele date pentru c\u00e2\u0219tiguri ilegale. Procedura utilizeaz\u0103 tehnologie ieftin\u0103 care permite infractorilor cibernetici s\u0103 configureze puncte de acces \u201cfalse\u201d sau re\u021bele necinstite care se dau drept puncte de acces WIFI legitime cu un titlu familiar. Apoi observ\u0103 ap\u0103s\u0103rile de taste \u0219i preiau ilegal date personale \u0219i, \u00een majoritatea cazurilor, informa\u021bii confiden\u021biale, de la oricine se conecteaz\u0103 la re\u021bea. Deoarece aceste puncte de acces necinstite nu sunt criptate, toat\u0103 activitatea care trece prin ele este complet deschis\u0103 \u0219i vizibil\u0103 pentru oricine dore\u0219te s\u0103 o caute.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"interception-of-data\">Interceptarea datelor<\/h3>\n\n\n<p>Interceptarea datelor precum parolele \u0219i numele de utilizator poate permite accesul ilegal la informa\u021bii sensibile, inclusiv la conturi bancare online, informa\u021bii despre carduri de credit \u0219i permise corporative. Un infractor cibernetic poate s\u0103 nu foloseasc\u0103 imediat informa\u021biile, dar poate \u00eenc\u0103lca aceste conturi \u0219i informa\u021biile con\u021binute \u00een ele \u00een orice moment.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"lateral-movement\">Mi\u0219care lateral\u0103<\/h3>\n\n\n<p>Preocuparea pentru majoritatea utilizatorilor provine din documenta\u021bia privat\u0103 \u0219i uneori confiden\u021bial\u0103 pe care o p\u0103streaz\u0103 pe dispozitivele lor, dar infractorii cibernetici sunt rareori interesa\u021bi de acest tip de documenta\u021bie. Ei sunt mai interesa\u021bi de mi\u0219carea lateral\u0103 a contului de e-mail al unei victime ne\u0219tiutoare. De exemplu, dac\u0103 un hacker are acces la contul t\u0103u de e-mail, \u00eei ofer\u0103 capacitatea de a activa notific\u0103rile de parol\u0103 de pe site-uri precum PayPal \u0219i de a monitoriza ap\u0103s\u0103rile de taste \u00een timp ce activezi noi detalii de conectare.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"public-vs-corporate-wifi\">WIFI public vs. corporativ<\/h2>\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Public-vs.-corporate-WIFI-2-1.jpg\" alt=\"Public vs. corporate WIFI 2 1\" class=\"wp-image-1510\"\/><\/figure>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Cazurile de spionaj WIFI din \u00eentreaga lume sunt \u00een cre\u0219tere. Infractorii cibernetici au prins multe victime de profil \u00eenalt, hackuind re\u021belele wireless ale unor m\u0103rci de renume precum Starbucks, American Airlines \u0219i TalkTalk. Mi\u0219carea a determinat chiar <a href=\"https:\/\/routersecurity.org\/RouterNews.php\" target=\"_blank\" rel=\"noreferrer noopener\">FBI-ul s\u0103 alerteze utilizatorii<\/a> s\u0103-\u0219i acceseze mediul \u00eenainte de a se conecta la o re\u021bea.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"false-sense-of-security\">Fals sentiment de securitate<\/h3>\n\n\n<p>Acest lucru a crescut concep\u021bia gre\u0219it\u0103 c\u0103 interceptarea este limitat\u0103 doar la WIFI public, ad\u0103ug\u00e2nd la falsul sentiment de securitate c\u0103 re\u021belele bazate pe birou nu sunt rezistente la atac \u0219i acest lucru este incorect. O re\u021bea WIFI este la fel de probabil s\u0103 fie compromis\u0103 \u00eentr-un mediu de birou ca \u0219i \u00eentr-un mall, hol de hotel sau chiar aeroport.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"cybercriminal-tactics\">Tactici ale infractorilor cibernetici<\/h3>\n\n\n<p>Un infractor cibernetic cu tehnologia potrivit\u0103 ar putea sta pe partea cealalt\u0103 a peretelui, \u00een parcarea din afara biroului sau chiar \u00een cl\u0103direa de al\u0103turi. Cu siguran\u021b\u0103 nu fac diferen\u021ba \u00eentre o re\u021bea WIFI public\u0103 sau corporativ\u0103. Scopul lor este pur \u0219i simplu s\u0103 atrag\u0103 utilizatorii ne\u0219tiutori \u00een re\u021belele \u0219i punctele de acces necinstite \u0219i s\u0103 lanseze atacurile cibernetice de acolo.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-can-we-protect-ourselves\">Cum ne putem proteja?<\/h2>\n\n\n<p>\u00cen ciuda cre\u0219terii atacurilor cibernetice prin WIFI, doar un num\u0103r mic de companii au implementat instruirea \u0219i procedurile corecte pentru a aborda amenin\u021barea intercept\u0103rii WIFI. Mul\u021bi chiar cred c\u0103 criptarea parolei ofer\u0103 o ap\u0103rare suficient\u0103, dar, din p\u0103cate, nu este cazul. Criptarea este aplicabil\u0103 doar atunci c\u00e2nd un utilizator alege con\u0219tient o re\u021bea legitim\u0103. Dac\u0103 selectezi un punct de acces necinstite, cheia wireless care protejeaz\u0103 re\u021beaua ta nu este necesar\u0103 \u00een primul r\u00e2nd.<\/p>\n\n\n\n<p>Organiza\u021biile sunt legal responsabile pentru traficul \u0219i informa\u021biile care trec prin re\u021beaua lor. Angaja\u021bii au datoria de a avea grij\u0103 de angaja\u021bii lor \u0219i ar trebui s\u0103 fac\u0103 tot posibilul pentru a se asigura c\u0103 re\u021belele lor sunt sigure. Cu toate acestea, av\u00e2nd \u00een vedere obstacolele, cum pot reduce riscul atacurilor MITM? Este nevoie de o tehnic\u0103 multi-strat care s\u0103 \u00eembine tehnologia \u0219i educa\u021bia.<\/p>\n\n\n\n<p>Puncte de luat \u00een considerare.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"points-to-consider\">Ar trebui s\u0103 se pun\u0103 mai mult accent pe asigurarea faptului c\u0103 utilizatorii \u00een\u021beleg pericolele \u0219i pot percepe orice comportament anormal. \u00cen timp ce infractorii cibernetici devin din ce \u00een ce mai sofistica\u021bi, metoda lor urmeaz\u0103 adesea tipare familiare care, dac\u0103 oamenii sunt vigilen\u021bi, pot ridica alarma. Iat\u0103 c\u00e2teva puncte de luat \u00een considerare:<\/h3>\n\n\n<p>Cunoa\u0219te-\u021bi WIFI-ul companiei<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>: Al\u0103turarea la un hotspot necunoscut necesit\u0103 adesea un comportament neconven\u021bional. Infractorii cibernetici te vor redirec\u021biona de obicei c\u0103tre un site web mali\u021bios \u0219i nesigur care imit\u0103 o pagin\u0103 de conectare legitim\u0103. Toate aceste pagini nu sunt criptate, a\u0219a c\u0103, dac\u0103 te conectezi, toate tranzac\u021biile \u0219i datele tale devin vizibile. A\u0219adar, familiarizeaz\u0103-te cu SOP-urile WIFI ale companiei tale; \u0219tii ce se \u00eent\u00e2mpl\u0103 \u0219i opre\u0219te-te imediat dac\u0103 ceva pare ciudat. Dac\u0103 e\u0219ti redirec\u021bionat c\u0103tre un portal, \u00een special \u00eentr-un mediu de lucru, acesta este de obicei un semnal de alarm\u0103.<\/strong>Caut\u0103 lac\u0103tul.<\/li>\n\n\n\n<li><strong>: Dac\u0103 lucrezi de la distan\u021b\u0103 \u0219i te al\u0103turi WIFI-ului public, nu este neobi\u0219nuit s\u0103 fii redirec\u021bionat c\u0103tre un portal, iar majoritatea nu sunt mali\u021bioase. Po\u021bi c\u0103uta un icon de lac\u0103t \u00een bara de adrese, deoarece acesta este de obicei semnul unui site legitim.<\/strong>Cunoa\u0219te-\u021bi re\u021beaua.<\/li>\n\n\n\n<li><strong>: Dispozitivul t\u0103u va c\u0103uta continuu re\u021bele WIFI recunoscute la care s-a conectat anterior. Infractorii cibernetici le vor imita, configur\u00e2nd<\/strong>puncte de acces necinstite <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/support\/docs\/wireless-mobility\/wlan-security\/68139-rogue-detection.html\" target=\"_blank\" rel=\"noreferrer noopener\">cu acela\u0219i titlu, \u00een speran\u021ba c\u0103 te vei conecta automat, a\u0219a c\u0103 fii vigilent. Dac\u0103 navighezi pe web la McDonald\u2019s \u0219i \u021bi se cere s\u0103 te al\u0103turi WIFI-ului lor corporativ, este cel mai probabil o escrocherie.<\/a> Cre\u0219terea securit\u0103\u021bii cibernetice \u00een re\u021beaua WIFI.<\/li>\n<\/ol>\n\n\n<h3 class=\"wp-block-heading\" id=\"increasing-cybersecurity-in-the-wifi-network\">Tehnologia poate oferi protec\u021bie \u00eempotriva atacurilor MITM. Instrumentele de detectare a punctelor de acces necinstite pot ajuta la recunoa\u0219terea, delimitarea \u0219i eliminarea punctelor de acces necinstite. Func\u021bion\u00e2nd de la puncte de acces legitime, aceste tipuri de solu\u021bii \u00eenregistreaz\u0103 \u0219i inspecteaz\u0103 activitatea care circul\u0103 prin re\u021beaua ta WIFI \u0219i pot semnala orice comportament suspect, oferind vizibilitate \u0219i securitate.<\/h3>\n\n\n<p>De asemenea, unele companii au lansat politici pentru a se asigura c\u0103 dispozitivele \u0219i ma\u0219inile clien\u021bilor se pot conecta doar la anumite re\u021bele WIFI sau de \u00eencredere, elimin\u00e2nd riscul WIFI neautorizat. Cei mai proactivi au apelat \u0219i la.<\/p>\n\n\n\n<p>autentificarea pe baz\u0103 de certificat <a href=\"https:\/\/www.globalsign.com\/en\/blog\/the-differences-between-certificate-based-and-pre-shared-key-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">pentru a asigura utilizatorii c\u0103 securitatea lor este constant protejat\u0103. Exemple bune de acest lucru pot fi v\u0103zute pe strada ta local\u0103, unde comercian\u021bii asigur\u0103 clien\u021bii c\u0103 sunt certifica\u021bi \u201eWiFi Friendly\u201d. Este un exemplu pe care organiza\u021biile corporative ar trebui s\u0103-l urmeze.<\/a> Cele mai bune practici pentru a te proteja.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"best-practices-to-protect-yourself\">\u00centr-o lume \u00een care at\u00e2t mobilitatea, c\u00e2t \u0219i conectivitatea au devenit esen\u021biale pentru comunicarea global\u0103, WIFI-ul este o component\u0103 vital\u0103 a locului de munc\u0103 digital, iar utilizatorii se a\u0219teapt\u0103 acum la el. Dar se a\u0219teapt\u0103, de asemenea, ca comunica\u021biile lor online \u0219i datele s\u0103 fie protejate de amenin\u021barea cibernetic\u0103 a atacurilor cibernetice.<\/h3>\n\n\n<p>Iat\u0103 c\u00e2teva dintre cele mai bune practici pentru a te proteja de criminalitatea cibernetic\u0103 prin WIFI:.<\/p>\n\n\n\n<p>Stai departe de site-uri \u0219i mesaje suspecte.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Creeaz\u0103 parole puternice care sunt lungi, complexe \u0219i unice.<\/li>\n\n\n\n<li>Folose\u0219te un manager de parole de la un furnizor de \u00eencredere.<\/li>\n\n\n\n<li>Activeaz\u0103 autentificarea \u00een doi factori atunci c\u00e2nd este posibil.<\/li>\n\n\n\n<li>Nu reutiliza parolele pentru mai multe conturi sau servicii. Dac\u0103 parola ta este furat\u0103 \u00eentr-un atac, daunele sunt multiplicate deoarece pot accesa conturi diferite.<\/li>\n\n\n\n<li>Monitorizeaz\u0103-\u021bi conturile bancare \u0219i de credit \u00een mod regulat pentru activit\u0103\u021bi suspecte. Acest lucru te poate ajuta s\u0103 detectezi un atac \u00eenainte de a face daune majore finan\u021belor sau reputa\u021biei tale. De asemenea, stabile\u0219te limite pentru tranzac\u021bii pentru a preveni utilizarea gre\u0219it\u0103 a banilor t\u0103i.<\/li>\n\n\n\n<li>Fii atent cu informa\u021biile tale confiden\u021biale. Dac\u0103 vrei s\u0103 scapi de documente care con\u021bin informa\u021bii personale sensibile, asigur\u0103-te c\u0103 o faci \u00eentr-un mod sigur, distrug\u00e2ndu-le astfel \u00eenc\u00e2t s\u0103 fie ireversibile. Aplic\u0103 acela\u0219i bun sim\u021b dispozitivelor tale: c\u00e2nd le elimini sau le vinzi, asigur\u0103-te c\u0103 nu la\u0219i nicio urm\u0103 a informa\u021biilor tale sensibile.<\/li>\n\n\n\n<li>Nu \u00eemp\u0103rt\u0103\u0219i prea mult. Evit\u0103 s\u0103 postezi detalii despre via\u021ba ta personal\u0103, care ar putea fi folosite gre\u0219it de infractori pentru a ac\u021biona \u00een numele t\u0103u.<\/li>\n\n\n\n<li>Este, de asemenea, important s\u0103 fii la curent cu cele mai recente amenin\u021b\u0103ri \u0219i tendin\u021be cibernetice. Infractorii cibernetici evolueaz\u0103 mereu, la fel ar trebui s\u0103 fac\u0103 \u0219i cuno\u0219tin\u021bele tale despre cum s\u0103 te protejezi pe tine \u0219i organiza\u021bia ta. Participarea la.<\/li>\n<\/ul>\n\n\n\n<p>programe de instruire \u00een securitatea cibernetic\u0103 <a href=\"https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/nice\/resources\/cybersecurity-workforce-development\" target=\"_blank\" rel=\"noreferrer noopener\">\u0219i informarea despre cele mai recente tactici \u0219i tehnologii pot contribui mult la prevenirea atacurilor.<\/a> Re\u021belele WIFI sunt o parte convenabil\u0103 \u0219i esen\u021bial\u0103 a vie\u021bii moderne, dar ele prezint\u0103, de asemenea, riscuri semnificative pentru criminalitatea cibernetic\u0103. Este crucial s\u0103 fii con\u0219tient de aceste riscuri \u0219i s\u0103 iei m\u0103suri pentru a te proteja pe tine \u0219i organiza\u021bia ta. Prin implementarea m\u0103surilor de securitate corecte, fiind vigilent \u0219i educ\u00e2ndu-te pe tine \u0219i pe al\u021bii, po\u021bi reduce probabilitatea de a deveni o victim\u0103 a criminalit\u0103\u021bii cibernetice prin WIFI.<\/p>\n\n\n\n<p><strong>\u00cen concluzie<\/strong>, Protejeaz\u0103-te pe tine \u0219i organiza\u021bia ta de criminalitatea cibernetic\u0103 prin WIFI. Afl\u0103 cum s\u0103 r\u0103m\u00e2i \u00een siguran\u021b\u0103 de atacurile MITM cu sfaturile noastre de exper\u021bi.<\/p>","protected":false},"excerpt":{"rendered":"<p>Securitatea cibernetic\u0103 este considerat\u0103 o prioritate de c\u0103tre corpora\u021bii \u0219i companii, iar acestea fac investi\u021bii semnificative \u00een firewall-uri care permit sistemelor lor s\u0103 fie efectiv inaccesibile. Cu toate acestea, multe dintre aceste companii... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/tehnologie\/criminalitate-cibernetica-prin-wifi-ce-trebuie-sa-stii\/\">Continue reading <span class=\"screen-reader-text\">Criminalitatea informatic\u0103 prin WiFi: ce trebuie s\u0103 \u0219ti\u021bi<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":1514,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"tags":[],"class_list":["post-1504","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Protecting Yourself from Cybercrime through WIFI<\/title>\n<meta name=\"description\" content=\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/tehnologie\/criminalitate-cibernetica-prin-wifi-ce-trebuie-sa-stii\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting Yourself from Cybercrime through WIFI\" \/>\n<meta property=\"og:description\" content=\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/tehnologie\/criminalitate-cibernetica-prin-wifi-ce-trebuie-sa-stii\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-25T14:46:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"388\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Cybercrime Through WiFi: What You Need to Know\",\"datePublished\":\"2023-02-25T14:46:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"},\"wordCount\":1468,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"articleSection\":[\"Technology\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\",\"url\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\",\"name\":\"Protecting Yourself from Cybercrime through WIFI\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"datePublished\":\"2023-02-25T14:46:21+00:00\",\"description\":\"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg\",\"width\":760,\"height\":388,\"caption\":\"Cybercrime Through WiFi What You Need To Know\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybercrime Through WiFi: What You Need to Know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protejarea \u00eempotriva criminalit\u0103\u021bii cibernetice prin WIFI","description":"Protejarea \u00eempotriva criminalit\u0103\u021bii cibernetice prin WIFI.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/tehnologie\/criminalitate-cibernetica-prin-wifi-ce-trebuie-sa-stii\/","og_locale":"ro_RO","og_type":"article","og_title":"Protecting Yourself from Cybercrime through WIFI","og_description":"Protect yourself and your organization from WIFI cybercrime. Learn how to stay safe from MITM attacks with our expert tips.","og_url":"https:\/\/securitybriefing.net\/ro\/tehnologie\/criminalitate-cibernetica-prin-wifi-ce-trebuie-sa-stii\/","og_site_name":"Security Briefing","article_published_time":"2023-02-25T14:46:21+00:00","og_image":[{"width":760,"height":388,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"7 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Cybercrime Through WiFi: What You Need to Know","datePublished":"2023-02-25T14:46:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"},"wordCount":1468,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","articleSection":["Technology"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/","url":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/","name":"Protejarea \u00eempotriva criminalit\u0103\u021bii cibernetice prin WIFI","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","datePublished":"2023-02-25T14:46:21+00:00","description":"Protejarea \u00eempotriva criminalit\u0103\u021bii cibernetice prin WIFI.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/02\/Cybercrime-Through-WiFi-What-You-Need-To-Know-min-1.jpg","width":760,"height":388,"caption":"Cybercrime Through WiFi What You Need To Know"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/technology\/cybercrime-through-wifi-what-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Cybercrime Through WiFi: What You Need to Know"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1504","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=1504"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/1504\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/1514"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=1504"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=1504"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=1504"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}