{"id":611,"date":"2022-09-15T18:13:39","date_gmt":"2022-09-15T18:13:39","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=611"},"modified":"2022-09-15T18:13:39","modified_gmt":"2022-09-15T18:13:39","slug":"atac-de-la-distanta","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/atac-de-la-distanta\/","title":{"rendered":"Atac de la distan\u021b\u0103"},"content":{"rendered":"<h2 class=\"wp-block-heading\" id=\"what-is-a-remote-attack\"><strong>Ce este un atac de la distan\u021b\u0103?<\/strong><\/h2>\n\n\n<p>C\u00e2nd un ho\u021b jefuie\u0219te o cas\u0103 pentru obiecte materiale, risc\u0103 s\u0103 lase dovezi ADN sau amprente care ar putea duce la arestarea lor. Totu\u0219i, hackerii care comit infrac\u021biuni cibernetice pot face acest lucru f\u0103r\u0103 a fi vreodat\u0103 \u00een aceea\u0219i zon\u0103 cu victima lor \u0219i, prin urmare, sunt mult mai pu\u021bin probabil s\u0103 fie prin\u0219i. \u00cen plus, hackerii experimenta\u021bi pot \u00eencadra oameni nevinova\u021bi prin plantarea de dovezi false online care indic\u0103 dispozitivele sau conturile digitale ale nevinova\u021bilor.<\/p>\n\n\n\n<p>Deoarece hackerii experimenta\u021bi sunt abili \u00een a g\u0103si sl\u0103biciuni \u00een sistemele actuale, niciunul dintre instrumentele sau metodele preventive nu \u00eei poate opri. Din p\u0103cate, cei responsabili de dezvoltarea m\u0103surilor legale pentru a proteja oamenii \u0219i afacerile de hacking nu par s\u0103 fie cu adev\u0103rat cunosc\u0103tori sau preocupa\u021bi de acest lucru.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"types-of-remote-attacks\"><strong>Tipuri de atacuri de la distan\u021b\u0103<\/strong><\/h2>\n\n\n<p>Atacatorii pot prelua controlul asupra sistemelor de la distan\u021b\u0103 \u00een diverse moduri:<\/p>\n\n\n\n\n<h3 class=\"wp-block-heading\" id=\"dns-poisoning\">Otr\u0103virea DNS<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-619\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg\" alt=\"Infografic despre atacul de otr\u0103vire DNS \" width=\"823\" height=\"566\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic.jpg 800w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/DNS-Poisoning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 823px) 100vw, 823px\" \/><\/figure>\n\n\n\n<p>Fiecare dispozitiv \u0219i server are un set de numere numit adres\u0103 de protocol internet (IP) folosit\u0103 pentru a-l identifica \u00een comunica\u021bii. Fiecare site web are un nume de domeniu pentru a ajuta oamenii s\u0103 g\u0103seasc\u0103 site-urile pe care le doresc (de exemplu, www.domeniu.com). Sistemul de nume de domeniu (<a href=\"https:\/\/www.javatpoint.com\/computer-network-dns\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">DNS<\/a>) converte\u0219te numele de domeniu specificat de utilizator \u00een adresa IP corect\u0103 folosind servere DNS pentru a direc\u021biona traficul corespunz\u0103tor. Toate acestea sunt gestionate prin servere DNS.<\/p>\n\n\n\n<p>Otr\u0103virea DNS este atunci c\u00e2nd un atacator redirec\u021bioneaz\u0103 traficul de la site-ul inten\u021bionat c\u0103tre un site fals prin schimbarea \u00eenregistr\u0103rilor DNS. De exemplu, dac\u0103 \u00eencerci s\u0103 te conectezi la contul t\u0103u bancar online, dar \u00een schimb e\u0219ti redirec\u021bionat c\u0103tre o pagin\u0103 care arat\u0103 identic cu pagina de autentificare a b\u0103ncii, atacatorul a efectuat un atac de otr\u0103vire DNS. Dac\u0103 introduci informa\u021bii sensibile pe acest site fals, atacatorul \u00ee\u021bi poate fura informa\u021biile \u00een beneficiul s\u0103u.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"port-scanning\">Scanarea porturilor<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"820\" height=\"564\" class=\"wp-image-626\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg\" alt=\"Infografic despre deturnarea TCP IP\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Port-scanning-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 820px) 100vw, 820px\" \/><\/figure>\n\n\n\n<p>Scanarea porturilor este o modalitate de a afla care porturi dintr-o re\u021bea sunt deschise. Acest lucru se face \u00eencerc\u00e2nd s\u0103 trimi\u021bi \u0219i s\u0103 prime\u0219ti date prin fiecare port, ca \u0219i cum ai bate la u\u0219i pentru a vedea dac\u0103 este cineva acas\u0103. Dac\u0103 cineva r\u0103spunde, \u0219tii c\u0103 portul este deschis. Ei ruleaz\u0103 o scanare a porturilor \u00eempotriva unei re\u021bele sau server pentru a ar\u0103ta care porturi sunt deschise \u0219i ascult\u0103 (primesc informa\u021bii) \u0219i dac\u0103 exist\u0103 dispozitive de securitate, cum ar fi firewall-urile, \u00eentre surs\u0103 \u0219i \u021bint\u0103. Scanarea porturilor poate fi folosit\u0103 \u0219i pentru a identifica un dispozitiv prin examinarea activit\u0103\u021bii porturilor individuale.<\/p>\n\n\n\n<p>Acest program nu este folosit doar de administratorii de securitate pentru a-\u0219i monitoriza re\u021beaua pentru eventuale vulnerabilit\u0103\u021bi, ci este adesea folosit \u0219i de hackeri ca parte a recunoa\u0219terii lor atunci c\u00e2nd caut\u0103 puncte slabe de exploatat.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"dos-attacks\">Atacuri DoS<\/h3>\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-628\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg\" alt=\"Infografic despre atacul DoS \" width=\"825\" height=\"568\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic-.jpg 820w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/Dos-Attack-infographic--768x528.jpg 768w\" sizes=\"auto, (max-width: 825px) 100vw, 825px\" \/><\/figure>\n\n\n\n<p>Scopul unui atac DoS este de a \u00eempiedica persoanele care au permisiunea de a folosi o ma\u0219in\u0103 sau o re\u021bea s\u0103 o foloseasc\u0103. Acest lucru se face prin inundarea \u021bintei cu \u00eentreb\u0103ri \u0219i date care cauzeaz\u0103 pr\u0103bu\u0219irea sistemului. Angaja\u021bii, membrii \u0219i consumatorii nu pot folosi sistemul deoarece cererile lor legitime sunt cople\u0219ite de activit\u0103\u021bile ilicite ale atacatorului.<\/p>\n\n\n\n<p><a href=\"https:\/\/securitybriefing.net\/ro\/atac-ddos\/ce-este-un-atac-ddos\/\">Atacuri DDoS<\/a> poate fi foarte costisitor pentru cei afecta\u021bi. Atacurile pot fi despre furtul de date sau bunuri. \u00centreprinderile, cum ar fi b\u0103ncile, magazinele, companiile media \u0219i institu\u021biile guvernamentale, \u00ee\u0219i vizeaz\u0103 adesea serverele web \u00een aceste atacuri.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"tcp-ip-hijacking\">Deturnarea TCP\/IP<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-624\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg\" alt=\"Infografic despre deturnarea TCP IP\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/TCP-IP-Hijacking-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>Acest tip de atac este atunci c\u00e2nd un hacker preia controlul asupra unei sesiuni \u00eentre dou\u0103 dispozitive care comunic\u0103 deja \u00eentre ele. Atacatorul trebuie s\u0103 fie pe aceea\u0219i re\u021bea cu victima pentru a efectua acest atac.<\/p>\n\n\n\n<p>C\u00e2nd atacatorul preia controlul asupra sesiunii, poate asculta conversa\u021bia \u0219i modifica datele care sunt schimbate. Acest atac injecteaz\u0103 adesea malware \u00eentr-un sistem sau fur\u0103 informa\u021bii sensibile.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"smb-relay-attack\">Atacul de tip SMB Relay<\/h3>\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"850\" height=\"584\" class=\"wp-image-620\" src=\"http:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg\" alt=\"Infografic despre atacul SMB Relay\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic.jpg 850w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-300x206.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/SMB-Relay-Attack-infographic-768x528.jpg 768w\" sizes=\"auto, (max-width: 850px) 100vw, 850px\" \/><\/figure>\n\n\n\n<p>Atacurile de tip Server Message Block (SMB) Relay sunt din p\u0103cate comune \u00een corpora\u021biile care \u00eenc\u0103 folosesc autentificarea NTLM Versiunea 2. Infractorii cibernetici pot redirec\u021biona \u00een secret date sensibile c\u0103tre alte servere f\u0103r\u0103 a fi prin\u0219i, ascult\u00e2nd \u00een secret traficul de re\u021bea.<\/p>\n\n\n\n<p>G\u00e2nde\u0219te-te la aceast\u0103 problem\u0103 din perspectiva unui utilizator exemplar \u0219i a unui hacker r\u0103u. Scenariul ideal este atunci c\u00e2nd persoana real\u0103 \u00eencearc\u0103 s\u0103 se autentifice \u0219i s\u0103 se autentifice. C\u00e2nd, \u00een locul unui utilizator valid, un hacker \u00eencearc\u0103 s\u0103 foloseasc\u0103 acreditive furate monitoriz\u00e2nd traficul de re\u021bea pentru a ob\u021bine acces \u2013 nu este nevoie de o parol\u0103.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"recent-advancements-in-hacking-technology\"><strong>Progrese recente \u00een tehnologia de hacking<\/strong><\/h2>\n\n\n<p>Hackerii g\u0103sesc constant noi modalit\u0103\u021bi de a accesa informa\u021bii restric\u021bionate, ceea ce face evident c\u0103 Legea privind Frauda \u0219i Abuzul Informatic trebuie actualizat\u0103. Aceast\u0103 lege a fost creat\u0103 \u00een anii 1980, dar nu a fost schimbat\u0103 din 2011, ceea ce \u00eenseamn\u0103 c\u0103 nu este receptiv\u0103 la progresele tehnologice mai recente. CFAA trebuie s\u0103 r\u0103m\u00e2n\u0103 \u00eenaintea hackerilor prin actualiz\u0103ri regulate.<\/p>\n\n\n\n<p>Min\u021bitul pe un profil de \u00eent\u00e2lniri poate s\u0103 nu par\u0103 important, dar dac\u0103 termenii de utilizare ai site-ului sunt \u00eenc\u0103lca\u021bi, ai putea fi acuzat de hacking conform <a href=\"https:\/\/www.nacdl.org\/Landing\/ComputerFraudandAbuseAct\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CFAA<\/a>. Aceast\u0103 infrac\u021biune minor\u0103 vine cu un an de \u00eenchisoare sau o amend\u0103 de $100,000.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"bypassing-captcha-test\">Ocolirea Testului CAPTCHA<\/h3>\n\n\n<p>Testul CAPTCHA determin\u0103 dac\u0103 un utilizator este un om sau un robot. Este folosit \u00een mod obi\u0219nuit \u00een scopuri de securitate, cum ar fi autentificarea \u00een contul t\u0103u bancar. Dac\u0103 e\u0219ti prins \u00eencerc\u00e2nd s\u0103 ocole\u0219ti CAPTCHA, ai putea fi acuzat de hacking \u0219i s\u0103 te confrun\u021bi cu p\u00e2n\u0103 la 8 ani de \u00eenchisoare.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.captcha.net\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">CAPTCHA <\/a>este o m\u0103sur\u0103 de securitate a unui site web pentru a preveni accesul robo\u021bilor. Afi\u0219eaz\u0103 o imagine care este dificil de descifrat \u0219i pentru a ob\u021bine acces, trebuie s\u0103 introduci literele \u0219i numerele afi\u0219ate \u00eentr-o caset\u0103 de sub imagine. Totu\u0219i, hackerii au devenit at\u00e2t de pricepu\u021bi \u00een a-l hackui \u00eenc\u00e2t CAPTCHA a trebuit s\u0103 devin\u0103 mai complex, rezult\u00e2nd c\u0103 acestea sunt rezolvate mai frecvent dec\u00e2t oamenii. Pentru a combate acest lucru, <strong><a href=\"https:\/\/cloud.google.com\/recaptcha-enterprise\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">reCAPTCHA <\/a><\/strong>a fost dezvoltat \u0219i a implicat privirea la p\u0103trate mici \u0219i marcarea lor cu un hidrant, autobuz sau trecere de pietoni.<\/p>\n\n\n\n<p>Deocamdat\u0103, <strong>reCAPTCHA<\/strong> este \u00eenc\u0103 activ. Totu\u0219i, nu va trece mult timp p\u00e2n\u0103 c\u00e2nd tehnicile automate de \u00eenv\u0103\u021bare automat\u0103 pot fi descoperite pentru a-l ocoli.<\/p>\n\n\n\n<p>At\u00e2t reCAPTCHA, c\u00e2t \u0219i CAPTCHA au fost derivate din ideea c\u0103 este fezabil s\u0103 identifici oamenii de computere online \u00eentr-un mod ieftin, prietenos cu utilizatorul \u0219i rapid. Aceste \u00eentreb\u0103ri ne for\u021beaz\u0103 s\u0103 ne g\u00e2ndim la ceea ce ne face umani \u0219i dac\u0103 ma\u0219inile pot duplica acel aspect. R\u0103spunsul evident este c\u0103 nu \u0219tim, deoarece acum am s\u0103rit \u00een partea ad\u00e2nc\u0103 a iazului filosofic.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"so-how-do-you-stay-ahead-of-the-curve-and-ensure-your-business-or-website-is-not-hacked\"><strong>Deci, cum r\u0103m\u00e2i \u00eenaintea curbei \u0219i te asiguri c\u0103 afacerea sau site-ul t\u0103u nu este hackuit?<\/strong><\/h2>\n\n<h3 class=\"wp-block-heading\" id=\"keep-your-software-up-to-date\">P\u0103streaz\u0103-\u021bi software-ul actualizat<\/h3>\n\n\n<p>Cel mai important lucru este s\u0103-\u021bi p\u0103strezi software-ul actualizat. Acest lucru include sistemul de operare, orice aplica\u021bii \u0219i pluginuri. Software-ul \u00eenvechit este una dintre cele mai comune modalit\u0103\u021bi prin care hackerii ob\u021bin acces la un sistem.<\/p>\n\n\n\n<p>O alt\u0103 modalitate de a te proteja este s\u0103 schimbi numele de utilizator \u0219i parola implicit\u0103 pentru orice dispozitive sau conturi. Mul\u021bi oameni nu \u00ee\u0219i dau seama c\u0103 numele de utilizator \u0219i parola implicit\u0103 sunt u\u0219or de g\u0103sit online. Hackerii \u0219tiu acest lucru \u0219i \u00eencearc\u0103 aceste acreditive \u00eenainte de a trece la metode mai complexe.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"use-twofactor-authentication\">Folose\u0219te autentificarea \u00een doi pa\u0219i<\/h3>\n\n\n<p>Folosirea autentific\u0103rii \u00een doi pa\u0219i (2FA) este una dintre cele mai bune modalit\u0103\u021bi de a-\u021bi proteja conturile de a fi hackuite. 2FA adaug\u0103 un strat suplimentar de securitate prin cerin\u021ba de a introduce at\u00e2t o parol\u0103, c\u00e2t \u0219i un cod trimis pe telefonul t\u0103u. Acest lucru face mult mai dificil pentru hackeri s\u0103 acceseze contul t\u0103u chiar dac\u0103 au parola ta.<\/p>\n\n\n<h3 class=\"wp-block-heading\" id=\"disable-anonymous-system-access\">Dezactiveaz\u0103 accesul anonim la sistem<\/h3>\n\n\n<p>Atacurile de acces de la distan\u021b\u0103 sunt \u00een cre\u0219tere \u0219i este esen\u021bial s\u0103 iei m\u0103suri pentru a te proteja. Infractorii cibernetici devin din ce \u00een ce mai sofistica\u021bi, a\u0219a c\u0103 este esen\u021bial s\u0103 r\u0103m\u00e2i \u00eenaintea curbei. P\u0103strarea software-ului actualizat, folosirea autentific\u0103rii \u00een doi pa\u0219i \u0219i dezactivarea accesului anonim sunt toate modalit\u0103\u021bi eficiente de a te proteja. Pe m\u0103sur\u0103 ce tehnologia avanseaz\u0103, va trebui s\u0103 dezvolt\u0103m noi modalit\u0103\u021bi de a r\u0103m\u00e2ne \u00eenaintea hackerilor \u00een acest joc de-a \u0219oarecele \u0219i pisica.<\/p>","protected":false},"excerpt":{"rendered":"<p>Ce este un atac la distan\u021b\u0103? Atunci c\u00e2nd un ho\u021b jefuie\u0219te o cas\u0103 pentru a lua obiecte materiale, risc\u0103 s\u0103 lase dovezi ADN sau amprente care ar putea duce la arestarea sa. Cu toate acestea, hackerii care... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/atac-de-la-distanta\/\">Continue reading <span class=\"screen-reader-text\">Atac de la distan\u021b\u0103<\/span><\/a><\/p>","protected":false},"author":1,"featured_media":650,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[],"class_list":["post-611","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-attacks","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Remote Attack | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/atac-de-la-distanta\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Remote Attack | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; Continu\u0103 lectura Remote Attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/atac-de-la-distanta\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-15T18:13:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\" \/>\n\t<meta property=\"og:image:width\" content=\"558\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"author\":{\"name\":\"security\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\"},\"headline\":\"Remote Attack\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"},\"wordCount\":1260,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"articleSection\":[\"Cyber Attacks\"],\"inLanguage\":\"ro-RO\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"url\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\",\"name\":\"Remote Attack | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"datePublished\":\"2022-09-15T18:13:39+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png\",\"width\":558,\"height\":500,\"caption\":\"What is a Remote Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Remote Attack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81\",\"name\":\"security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g\",\"caption\":\"security\"},\"description\":\"admin is a senior staff writer for Government Technology. She previously wrote for PYMNTS and The Bay State Banner, and holds a B.A. in creative writing from Carnegie Mellon. She\u2019s based outside Boston.\",\"sameAs\":[\"http:\/\/securitybriefing.net\"],\"url\":\"https:\/\/securitybriefing.net\/ro\/author\/security\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Atac de la distan\u021b\u0103 | Informare de securitate","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/atac-de-la-distanta\/","og_locale":"ro_RO","og_type":"article","og_title":"Remote Attack | Security Briefing","og_description":"What is a Remote Attack? When a thief robs a house for material items, they risk leaving DNA evidence or fingerprints that could lead to their arrest. However, hackers who&hellip; Continu\u0103 lectura Remote Attack","og_url":"https:\/\/securitybriefing.net\/ro\/atacuri-cibernetice\/atac-de-la-distanta\/","og_site_name":"Security Briefing","article_published_time":"2022-09-15T18:13:39+00:00","og_image":[{"width":558,"height":500,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","type":"image\/png"}],"author":"security","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"security","Timp estimat pentru citire":"6 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"author":{"name":"security","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81"},"headline":"Remote Attack","datePublished":"2022-09-15T18:13:39+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"},"wordCount":1260,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","articleSection":["Cyber Attacks"],"inLanguage":"ro-RO"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","url":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/","name":"Atac de la distan\u021b\u0103 | Informare de securitate","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","datePublished":"2022-09-15T18:13:39+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2022\/09\/What-is-a-Remote-Attack.png","width":558,"height":500,"caption":"What is a Remote Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/cyber-attacks\/remote-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Remote Attack"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Informare de Securitate","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Informare de Securitate","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/e99d7bfcfc8ecee5ed34ef3f0416ee81","name":"securitate","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f882f35c703c897d1ec76c380b39ceed3f7309182d44a3177612bc192f6c9ddb?s=96&d=mm&r=g","caption":"security"},"description":"admin este redactor senior pentru Government Technology. Anterior a scris pentru PYMNTS \u0219i The Bay State Banner \u0219i de\u021bine o diplom\u0103 de licen\u021b\u0103 \u00een scriere creativ\u0103 de la Carnegie Mellon. Ea locuie\u0219te \u00een afara Bostonului.","sameAs":["http:\/\/securitybriefing.net"],"url":"https:\/\/securitybriefing.net\/ro\/author\/security\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/611","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/comments?post=611"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/posts\/611\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media\/650"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/media?parent=611"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/categories?post=611"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ro\/wp-json\/wp\/v2\/tags?post=611"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}