{"id":488,"date":"2022-08-01T20:28:11","date_gmt":"2022-08-01T20:28:11","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=488"},"modified":"2022-08-01T20:28:11","modified_gmt":"2022-08-01T20:28:11","slug":"ce-este-spyware","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/software-spion\/ce-este-spyware\/","title":{"rendered":"Spyware: Ce este \u0219i cum s\u0103 v\u0103 proteja\u021bi"},"content":{"rendered":"<p>\u0218tii ce este spyware-ul? Sunt \u0219anse s\u0103 fi fost infectat cu el la un moment dat \u00een via\u021ba ta online. Spyware-ul este un tip de malware care se instaleaz\u0103 pe dispozitive f\u0103r\u0103 cuno\u0219tin\u021ba utilizatorului \u0219i poate fura informa\u021bii sensibile precum parole, numere de card de credit \u0219i date despre utilizarea internetului. De asemenea, poate fi folosit pentru a urm\u0103ri activitatea ta online \u00een scopuri publicitare. Dac\u0103 nu e\u0219ti atent, spyware-ul poate provoca multe daune computerului t\u0103u \u0219i intimit\u0103\u021bii tale. Acest articol \u00ee\u021bi va spune tot ce trebuie s\u0103 \u0219tii despre spyware \u0219i cum s\u0103 te protejezi de el.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-spyware\"><strong>Ce este spyware-ul?<\/strong><\/h2>\n\n\n<p>Spyware-ul este un software care colecteaz\u0103 ilegal informa\u021bii personale sau corporative. El face acest lucru f\u0103r\u0103 consim\u021b\u0103m\u00e2ntul utilizatorului, rul\u00e2nd \u00een secret pe computerul acestuia. Spyware-ul poate fi adesea g\u0103sit f\u0103c\u00e2nd lucruri precum publicitate, adun\u00e2nd informa\u021bii private \u0219i modific\u00e2nd set\u0103rile computerului f\u0103r\u0103 \u0219tirea dumneavoastr\u0103.<\/p>\n\n\n\n<p>Exist\u0103 diferite tipuri de spyware. Cele mai comune tipuri sunt adware, cookie-uri de urm\u0103rire, monitoare de sistem \u0219i troieni. Cel mai r\u0103u scenariu este atunci c\u00e2nd un computer vine cu spyware care a fost deja instalat pe el. O alt\u0103 posibilitate este ca un program pe care \u00eel descarci de pe internet s\u0103 fie infectat dup\u0103 ce \u00eel salvezi pe hard disk.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-does-spyware-do\"><strong>Ce face spyware-ul?<\/strong><\/h2>\n\n\n<p>Spyware-ul este instalat pe dispozitivele utilizatorilor pentru a le urm\u0103ri activit\u0103\u021bile \u0219i site-urile web vizitate. Acest lucru se face pentru a \u021bine eviden\u021ba activit\u0103\u021bii utilizatorului, pentru a aduna informa\u021bii despre autentificare \u0219i parol\u0103 \u0219i pentru a c\u0103uta date sensibile. Unele spyware pot instala, de asemenea, software suplimentar pe dispozitivul unui utilizator, astfel \u00eenc\u00e2t atacatorul s\u0103 poat\u0103 face modific\u0103ri. Spyware-ul trece de obicei prin trei etape, de la instalare la v\u00e2nzarea sau trimiterea informa\u021biilor furate:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Infiltrare<\/strong>: Spyware-ul trebuie mai \u00eent\u00e2i s\u0103 ajung\u0103 pe dispozitivul dvs. Poate face acest lucru la pachet cu alte programe pe care le desc\u0103rca\u021bi sau o aplica\u021bie ter\u021b\u0103 parte \u00eel poate instala.<\/li>\n<li><strong>Fura\u021bi informa\u021bii:<\/strong> Spyware-ul va colecta date personale precum parole, informa\u021bii de conectare, numere de carduri de credit \u0219i date privind utilizarea internetului.<\/li>\n<li><strong>Captur\u0103<\/strong>: Odat\u0103 ce spyware-ul are toate informa\u021biile de care are nevoie, le va trimite la un server de la distan\u021b\u0103, unde atacatorul le poate accesa.<\/li>\n<\/ol>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-spyware-contaminates-your-devices\"><strong>Modul \u00een care spyware-ul v\u0103 contamineaz\u0103 dispozitivele<\/strong><\/h2>\n\n\n<p>Spyware-ul mali\u021bios \u00eencearc\u0103 s\u0103 se deghizeze pentru a r\u0103m\u00e2ne ascuns \u0219i a func\u021biona f\u0103r\u0103 a fi detectat. Adesea face acest lucru ascunz\u00e2ndu-se \u00een desc\u0103rc\u0103ri sau site-uri web care par sigure. Spyware-ul poate intra \u00een computerul dvs. prin intermediul vulnerabilit\u0103\u021bilor din sistem, al programelor d\u0103un\u0103toare care arat\u0103 ca aplica\u021bii autentice sau al site-urilor web \u0219i aplica\u021biilor contraf\u0103cute create \u00een acest scop specific.<\/p>\n\n\n\n<p>Atunci c\u00e2nd desc\u0103rca\u021bi \u0219i instala\u021bi un program, ave\u021bi grij\u0103 ca acesta s\u0103 nu fie \u00eenso\u021bit de alte programe nedorite. Acest software suplimentar, denumit <em>pachet de software <\/em>sau <em>pachete software incluse<\/em>, poate con\u021bine programe malware. Malware-ul este un tip de software care v\u0103 poate afecta computerul. Acesta se poate ascunde sau programul pe care l-a\u021bi ales v\u0103 poate spune c\u0103 exist\u0103 spyware pe computer \u0219i se poate oferi s\u0103 \u00eel elimine pentru dumneavoastr\u0103. Spyware-ul va \u00eencepe s\u0103 v\u0103 colecteze informa\u021biile personale dac\u0103 nu ac\u021biona\u021bi imediat.<\/p>\n\n\n\n<p>Unele programe spyware v\u0103 pot modifica set\u0103rile computerului f\u0103r\u0103 s\u0103 \u0219ti\u021bi. Acestea pot include instalarea de software nou, schimbarea paginii de pornire sau redirec\u021bionarea c\u0103tre site-uri web false. Aceste modific\u0103ri v\u0103 pot \u00eengreuna utilizarea computerului \u0219i risca\u021bi s\u0103 desc\u0103rca\u021bi mai multe programe spyware.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-spyware\"><strong>Tipuri de spyware<\/strong><\/h2>\n\n\n<p>Spyware-ul este de obicei creat pentru un anumit scop. Urm\u0103toarele sunt c\u00e2teva exemple ale celor mai comune tipuri de spyware.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"adware\"><strong>Adware<\/strong><\/h3>\n\n\n<p>Adware este un program malware care genereaz\u0103 venituri pentru dezvoltatorul s\u0103u prin afi\u0219area de reclame pe computerul dumneavoastr\u0103. Adware este orice program care afi\u0219eaz\u0103 reclame, fie ele bune sau rele. Spyware-ul care ac\u021bioneaz\u0103 \u0219i ca adware poate face acest lucru; acestea sunt aplica\u021bii d\u0103un\u0103toare care prezint\u0103 reclame \u00een\u0219el\u0103toare, cum ar fi ferestre pop-up intermitente, bannere mari \u0219i reclame cu redare automat\u0103 pe tot ecranul \u00een browser.<\/p>\n\n\n\n<p>Adware-ul poate fi desc\u0103rcat \u0219i instalat pe un computer f\u0103r\u0103 \u0219tirea utilizatorului. Scopul s\u0103u principal este de a face bani prin afi\u0219area de publicitate pe computerul victimei. Unele variante de adware v\u0103 pot redirec\u021biona c\u0103tre site-uri pentru adul\u021bi atunci c\u00e2nd vizita\u021bi un site web, f\u0103c\u00e2nd navigarea dificil\u0103. Adware-ul poate instala neinten\u021bionat alte programe malware, f\u0103c\u00e2nd sistemul inutilizabil.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"key-loggers-or-system-monitors\"><strong>Loggere de taste sau monitoare de sistem<\/strong><\/h3>\n\n\n<p>Mul\u021bi utilizatori de computere sunt supu\u0219i monitoriz\u0103rii pasive \u0219i \u00eenregistr\u0103rii fiec\u0103rei ap\u0103s\u0103ri de taste de pe computerul lor, adesea f\u0103r\u0103 \u0219tirea lor. Ap\u0103sarea unei taste se refer\u0103 la orice opera\u021biune efectuat\u0103 prin intermediul unui buton de tastatur\u0103, cum ar fi introducerea unei adrese web sau a unei parole.<\/p>\n\n\n\n<p>Ap\u0103s\u0103rile de taste sunt cuvintele pe care le introduce\u021bi pe tastatur\u0103. Fiecare ap\u0103sare de tast\u0103 trimite un mesaj computerului, spun\u00e2ndu-i ce s\u0103 fac\u0103. Urm\u0103toarele sunt c\u00e2teva exemple de instruc\u021biuni:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Durata ap\u0103s\u0103rii tastelor<\/li>\n<li>Timpul ap\u0103s\u0103rii tastelor<\/li>\n<li>Numele cheii utilizate<\/li>\n<li>Rata de ap\u0103sare a tastelor<\/li>\n<\/ul>\n\n\n\n<p>C\u00e2nd v\u0103 conecta\u021bi pentru prima dat\u0103, vi se pare c\u0103 totul este o discu\u021bie privat\u0103. Crede\u021bi c\u0103 doar discuta\u021bi cu gadgetul dumneavoastr\u0103, dar altcineva a auzit \u0219i a \u00eenregistrat tot ce a\u021bi spus. Schimbul de date sensibile pe telefoanele mobile face parte din stilul nostru de via\u021b\u0103 tot mai digital.<\/p>\n\n\n\n<p>Totul este \u00eenregistrat, de la accesul online la b\u0103nci p\u00e2n\u0103 la numerele de asigur\u0103ri sociale. Computerele salveaz\u0103 tot ceea ce face\u021bi pe internet, inclusiv e-mailurile, site-urile vizitate \u0219i chiar mesajele text trimise.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"trojans\"><strong>Troieni<\/strong><\/h3>\n\n\n<p>Troienii sunt programe care sunt deghizate \u00een altceva pentru a v\u0103 p\u0103c\u0103li. Acestea pot ar\u0103ta ca programe gratuite, filme sau muzic\u0103, dar au o func\u021bie criminal\u0103 ascuns\u0103. <em>Virus troian<\/em> nu este un termen \u0219tiin\u021bific. Viru\u0219ii troieni nu sunt viru\u0219i din punct de vedere tehnic, deoarece se r\u0103sp\u00e2ndesc ca software sau date utile pentru a infecta alte programe. Mul\u021bi exper\u021bi consider\u0103 c\u0103 monitorizarea activit\u0103\u021bii utilizatorului \u0219i returnarea jurnalelor sau a informa\u021biilor c\u0103tre atacator indic\u0103 existen\u021ba troienilor.<\/p>\n\n\n\n<p>Exist\u0103 mai multe moduri \u00een care atacatorii pot utiliza troienii. Un mod este de a le folosi ca un instrument de sine st\u0103t\u0103tor. Un alt mod este de a le utiliza pentru a furniza viitoare sarcini utile computerului. De exemplu, un desc\u0103rc\u0103tor de troieni este un exemplu de troian pe care atacatorii \u00eel folosesc pentru a furniza viitoare sarcini utile computerului. \u00cen plus, rootkit-urile pot fi utilizate pentru a dezvolta o prezen\u021b\u0103 continu\u0103 pe dispozitivul sau re\u021beaua unei persoane.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-do-you-protect-yourself-from-spyware\"><strong>Cum v\u0103 proteja\u021bi de spyware?<\/strong><\/h2>\n\n\n<p>Cea mai bun\u0103 modalitate de a evita spyware-ul este s\u0103 \u00eempiedica\u021bi p\u0103trunderea acestuia \u00een computer. Cu toate acestea, uneori nu pute\u021bi evita desc\u0103rcarea programelor sau deschiderea ata\u0219amentelor de e-mail. Chiar \u0219i site-urile web bine cunoscute pot fi infectate cu spyware care v\u0103 poate afecta computerul. C\u0103uta\u021bi solu\u021bii de securitate pentru internet care s-au dovedit a detecta viru\u0219i \u0219i semn\u0103turi antimalware.<\/p>\n\n\n\n<p>Asigura\u021bi-v\u0103 c\u0103 firma de securitate pe care o alege\u021bi ofer\u0103 protec\u021bie permanent\u0103. Aceasta include instrumente de eliminare a programelor spyware \u00een cazul \u00een care computerul dvs. este deja infectat. Atunci c\u00e2nd selecta\u021bi un instrument de eliminare a programelor spyware, alege\u021bi unul de la o firm\u0103 de securitate pe internet de renume, care nu este ilegal. Unele programe pot fi ilegale sau pot con\u021bine componente d\u0103un\u0103toare.<\/p>\n\n\n\n<p>Exist\u0103 multe programe antivirus gratuite diferite din care pute\u021bi alege. Dar fi\u021bi aten\u021bi c\u00e2nd alege\u021bi unul. O \u00eencercare gratuit\u0103 ar putea fi o modalitate excelent\u0103 de a determina ce program este potrivit pentru dvs. Cu toate acestea, nu ave\u021bi \u00eencredere \u00eentr-un program care spune c\u0103 v\u0103 va proteja gratuit de orice. S-ar putea s\u0103 nu aib\u0103 toate abilit\u0103\u021bile necesare pentru a g\u0103si programele malware care \u00eencearc\u0103 s\u0103 se strecoare pe l\u00e2ng\u0103 ele. Protec\u021bia antispam, un motor avansat de detectare antispam \u0219i o tastatur\u0103 virtual\u0103 criptat\u0103 pentru introducerea datelor financiare pot contribui la reducerea riscului de a se \u00eent\u00e2mpla ceva r\u0103u.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"final-thoughts\"><strong>G\u00e2nduri finale<\/strong><\/h2>\n\n\n<p>Face\u021bi c\u00e2teva cercet\u0103ri \u00eenainte de a desc\u0103rca ceva pe computer. Exist\u0103 o mul\u021bime de programe false mascate drept anti-spyware care vor instala spyware pe computerul dvs. \u00cen caz de \u00eendoial\u0103, desc\u0103rca\u021bi programe numai din surse de \u00eencredere. Fi\u021bi foarte aten\u021bi atunci c\u00e2nd face\u021bi clic pe linkuri din e-mailuri sau de pe site-uri web. Acestea pot fi adesea folosite pentru a instala spyware pe computerul dvs. f\u0103r\u0103 ca dvs. s\u0103 \u0219ti\u021bi. Dac\u0103 crede\u021bi c\u0103 computerul dvs. ar putea fi infectat cu spyware, efectua\u021bi o scanare complet\u0103 cu un program anti-spyware de \u00eencredere. \u00cen cele din urm\u0103, men\u021bine\u021bi-v\u0103 sistemul de operare \u0219i toate programele actualizate. Acest lucru v\u0103 va ajuta s\u0103 \u00eenchide\u021bi orice bre\u0219\u0103 de securitate pe care spyware-ul ar putea s\u0103 o exploateze.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"spyware-faqs\"><strong>\u00centreb\u0103ri frecvente despre spyware<\/strong><\/h2>\n\n\n<div class=\"schema-faq wp-block-yoast-faq-block\">\n<div id=\"faq-question-1659385577394\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Cum folosesc hackerii spyware-ul?<\/strong>\n<p class=\"schema-faq-answer\">Ob\u021bin\u00e2nd acces la computerul sau dispozitivul dvs., spyware-ul poate oferi hackerilor controlul complet asupra sistemului. Ace\u0219tia \u00eel pot folosi pentru a colecta informa\u021bii sensibile, cum ar fi datele dvs. de autentificare sau datele financiare. De asemenea, hackerii pot utiliza spyware pentru a lansa atacuri asupra altor computere sau dispozitive din aceea\u0219i re\u021bea.<\/p>\n<\/div>\n<div id=\"faq-question-1659385647051\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">De ce este spyware-ul periculos?<\/strong>\n<p class=\"schema-faq-answer\">Spyware-ul este periculos deoarece poate fi utilizat pentru a colecta informa\u021bii sensibile f\u0103r\u0103 \u0219tirea sau consim\u021b\u0103m\u00e2ntul dumneavoastr\u0103. Aceste informa\u021bii pot fi utilizate pentru a comite fraude sau furturi de identitate. Spyware-ul poate lansa atacuri asupra altor computere sau dispozitive din aceea\u0219i re\u021bea.<\/p>\n<\/div>\n<div id=\"faq-question-1659392977752\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Pot fi instalate programe spyware pe iPhone?<\/strong>\n<p class=\"schema-faq-answer\">De\u0219i spyware-ul nu este o problem\u0103 semnificativ\u0103 pentru utilizatorii de iPhone, este totu\u0219i posibil ca spyware-ul s\u0103 fie instalat pe dispozitivul dvs. Dac\u0103 v\u0103 face\u021bi jailbreak la iPhone, sunte\u021bi mai vulnerabil la spyware. Jailbreaking-ul este procesul de eliminare a restric\u021biilor impuse de Apple asupra iOS. Acest lucru v\u0103 permite s\u0103 desc\u0103rca\u021bi \u0219i s\u0103 instala\u021bi aplica\u021bii din alte surse dec\u00e2t App Store.<\/p>\n<\/div>\n<div id=\"faq-question-1659393012764\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Sunt spyware \u0219i malware acela\u0219i lucru?<\/strong>\n<p class=\"schema-faq-answer\">Spyware \u0219i malware nu sunt acela\u0219i lucru. Spyware este un software mali\u021bios conceput pentru a colecta informa\u021bii despre dvs. f\u0103r\u0103 \u0219tirea sau consim\u021b\u0103m\u00e2ntul dvs. Malware este un termen general care descrie software-ul r\u0103u inten\u021bionat, inclusiv spyware.<\/p>\n<\/div>\n<div id=\"faq-question-1659393042820\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Se va transfera spyware-ul pe noul telefon?<\/strong>\n<p class=\"schema-faq-answer\">Spyware-ul este de obicei specific dispozitivului pe care este instalat. Astfel, dac\u0103 v\u0103 cump\u0103ra\u021bi un telefon nou, spyware-ul nu va fi transferat pe noul dispozitiv. Cu toate acestea, dac\u0103 face\u021bi o copie de rezerv\u0103 a telefonului vechi \u00eenainte de a achizi\u021biona unul nou, spyware-ul ar putea fi, de asemenea, copiat. Acesta este motivul pentru care este esen\u021bial s\u0103 v\u0103 salva\u021bi datele doar \u00eentr-o surs\u0103 de \u00eencredere.<br \/><br \/><\/p>\n<\/div>\n<div id=\"faq-question-1659393099035\" class=\"schema-faq-section\"><strong class=\"schema-faq-question\">Este ilegal s\u0103 folose\u0219ti spyware?<\/strong>\n<p class=\"schema-faq-answer\">De\u0219i spyware-ul nu este neap\u0103rat ilegal, acesta poate fi utilizat \u00een scopuri ilegale. A\u021bi putea \u00eenc\u0103lca legea dac\u0103 utiliza\u021bi spyware pentru a colecta informa\u021bii sensibile f\u0103r\u0103 \u0219tirea sau consim\u021b\u0103m\u00e2ntul cuiva.<br \/><br \/><\/p>\n<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>\u0218ti\u021bi ce este spyware-ul? Sunt \u0219anse mari s\u0103 fi fost infectat de acesta la un moment dat \u00een via\u021ba dvs. online. Spyware-ul este un malware care se instaleaz\u0103 pe dispozitive f\u0103r\u0103... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/software-spion\/ce-este-spyware\/\">Continue reading <span class=\"screen-reader-text\">Spyware: Ce este \u0219i cum s\u0103 v\u0103 proteja\u021bi<\/span><\/a><\/p>","protected":false},"author":3,"featured_media":491,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-488","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-spyware","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Spyware: What It Is and How to Protect Yourself<\/title>\n<meta name=\"description\" content=\"Everything you need to know about spyware, including what it is, how it installs itself on your device, and how to protect yourself from it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/software-spion\/ce-este-spyware\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spyware: What It Is and How to Protect Yourself\" \/>\n<meta property=\"og:description\" content=\"Everything you need to know about spyware, including what it is, how it installs itself on your device, and how to protect yourself from it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/software-spion\/ce-este-spyware\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-01T20:28:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"Spyware: What It Is and How to Protect Yourself\",\"datePublished\":\"2022-08-01T20:28:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/\"},\"wordCount\":1613,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg\",\"articleSection\":[\"spyware\"],\"inLanguage\":\"ro-RO\"},{\"@type\":[\"WebPage\",\"FAQPage\"],\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/\",\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\",\"name\":\"Spyware: What It Is and How to Protect Yourself\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg\",\"datePublished\":\"2022-08-01T20:28:11+00:00\",\"description\":\"Everything you need to know about spyware, including what it is, how it installs itself on your device, and how to protect yourself from it.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#breadcrumb\"},\"mainEntity\":[{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394\"},{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051\"},{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752\"},{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764\"},{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820\"},{\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035\"}],\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg\",\"width\":640,\"height\":360,\"caption\":\"Spyware: What It Is and How to Protect Yourself\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Spyware: What It Is and How to Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394\",\"position\":1,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394\",\"name\":\"How do hackers use spyware?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"By gaining access to your computer or device, spyware can give hackers complete control over your system. They can use it to collect sensitive information, such as your login credentials or financial data. Hackers can also use spyware to launch attacks on other computers or devices on the same network.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051\",\"position\":2,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051\",\"name\":\"Why is spyware dangerous?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Spyware is dangerous because it can be used to collect sensitive information without your knowledge or consent. This information can be used to commit fraud or identity theft. Spyware can launch attacks on other computers or devices on the same network.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752\",\"position\":3,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752\",\"name\":\"Can spyware be installed on the iPhone?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"While spyware is not a significant issue for iPhone users, it is still possible for spyware to be installed on your device. If you jailbreak your iPhone, you are more vulnerable to spyware. Jailbreaking is the process of removing the restrictions imposed by Apple on iOS. This allows you to download and install applications from sources other than the App Store.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764\",\"position\":4,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764\",\"name\":\"Are spyware and malware the same thing?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Spyware and malware are not the same things. Spyware is malicious software designed to collect information about you without your knowledge or consent. Malware is a general term that describes malicious software, including spyware.\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820\",\"position\":5,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820\",\"name\":\"Will spyware transfer to the new phone?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"Spyware is usually specific to the device it is installed on. So, if you get a new phone, the spyware will not transfer to the new device. However, if you backup your old phone before getting a new one, the spyware could also be backed up. This is why it's essential to only backup your data to a trusted source.<br\/><br\/>\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"},{\"@type\":\"Question\",\"@id\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035\",\"position\":6,\"url\":\"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035\",\"name\":\"Is it illegal to use spyware?\",\"answerCount\":1,\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"While spyware is not necessarily illegal, it can be used for illegal purposes. You could be breaking the law if you use spyware to collect sensitive information without someone's knowledge or consent.<br\/><br\/>\",\"inLanguage\":\"ro-RO\"},\"inLanguage\":\"ro-RO\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Spyware: Ce este \u0219i cum s\u0103 v\u0103 proteja\u021bi","description":"Tot ce trebuie s\u0103 \u0219ti\u021bi despre spyware, inclusiv ce este, cum se instaleaz\u0103 pe dispozitivul dvs. \u0219i cum s\u0103 v\u0103 proteja\u021bi de el.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/software-spion\/ce-este-spyware\/","og_locale":"ro_RO","og_type":"article","og_title":"Spyware: What It Is and How to Protect Yourself","og_description":"Everything you need to know about spyware, including what it is, how it installs itself on your device, and how to protect yourself from it.","og_url":"https:\/\/securitybriefing.net\/ro\/software-spion\/ce-este-spyware\/","og_site_name":"Security Briefing","article_published_time":"2022-08-01T20:28:11+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"C\u00e9sar Daniel Barreto","Timp estimat pentru citire":"8 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"Spyware: What It Is and How to Protect Yourself","datePublished":"2022-08-01T20:28:11+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/"},"wordCount":1613,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg","articleSection":["spyware"],"inLanguage":"ro-RO"},{"@type":["WebPage","FAQPage"],"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware\/","url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware","name":"Spyware: Ce este \u0219i cum s\u0103 v\u0103 proteja\u021bi","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg","datePublished":"2022-08-01T20:28:11+00:00","description":"Tot ce trebuie s\u0103 \u0219ti\u021bi despre spyware, inclusiv ce este, cum se instaleaz\u0103 pe dispozitivul dvs. \u0219i cum s\u0103 v\u0103 proteja\u021bi de el.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#breadcrumb"},"mainEntity":[{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394"},{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051"},{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752"},{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764"},{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820"},{"@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035"}],"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/08\/Spyware-banner.jpg","width":640,"height":360,"caption":"Spyware: What It Is and How to Protect Yourself"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Spyware: What It Is and How to Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto este un apreciat scriitor \u0219i expert \u00een securitate cibernetic\u0103, cunoscut pentru cuno\u0219tin\u021bele sale aprofundate \u0219i capacitatea de a simplifica subiecte complexe de securitate cibernetic\u0103. Cu o vast\u0103 experien\u021b\u0103 \u00een securitatea re\u021belelor \u0219i protec\u021bia datelor, el contribuie \u00een mod regulat cu articole \u0219i analize p\u0103trunz\u0103toare privind cele mai recente tendin\u021be \u00een materie de securitate cibernetic\u0103, educ\u00e2nd at\u00e2t profesioni\u0219tii, c\u00e2t \u0219i publicul.","url":"https:\/\/securitybriefing.net\/ro\/author\/cesarbarreto\/"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394","position":1,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385577394","name":"Cum folosesc hackerii spyware-ul?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"By gaining access to your computer or device, spyware can give hackers complete control over your system. They can use it to collect sensitive information, such as your login credentials or financial data. Hackers can also use spyware to launch attacks on other computers or devices on the same network.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051","position":2,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659385647051","name":"De ce este spyware-ul periculos?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Spyware is dangerous because it can be used to collect sensitive information without your knowledge or consent. This information can be used to commit fraud or identity theft. Spyware can launch attacks on other computers or devices on the same network.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752","position":3,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659392977752","name":"Pot fi instalate programe spyware pe iPhone?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"While spyware is not a significant issue for iPhone users, it is still possible for spyware to be installed on your device. If you jailbreak your iPhone, you are more vulnerable to spyware. Jailbreaking is the process of removing the restrictions imposed by Apple on iOS. This allows you to download and install applications from sources other than the App Store.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764","position":4,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393012764","name":"Sunt spyware \u0219i malware acela\u0219i lucru?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Spyware and malware are not the same things. Spyware is malicious software designed to collect information about you without your knowledge or consent. Malware is a general term that describes malicious software, including spyware.","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820","position":5,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393042820","name":"Se va transfera spyware-ul pe noul telefon?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"Spyware is usually specific to the device it is installed on. So, if you get a new phone, the spyware will not transfer to the new device. However, if you backup your old phone before getting a new one, the spyware could also be backed up. This is why it's essential to only backup your data to a trusted source.<br\/><br\/>","inLanguage":"ro-RO"},"inLanguage":"ro-RO"},{"@type":"Question","@id":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035","position":6,"url":"https:\/\/securitybriefing.net\/spyware\/what-it-is-spyware#faq-question-1659393099035","name":"Este ilegal s\u0103 folose\u0219ti spyware?","answerCount":1,"acceptedAnswer":{"@type":"Answer","text":"While spyware is not necessarily illegal, it can be used for illegal purposes. You could be breaking the law if you use spyware to collect sensitive information without someone's knowledge or consent.<br\/><br\/>","inLanguage":"ro-RO"},"inLanguage":"ro-RO"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/488","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=488"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/488\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/491"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=488"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=488"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=488"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}