{"id":1545,"date":"2005-12-10T18:40:00","date_gmt":"2005-12-10T18:40:00","guid":{"rendered":"https:\/\/bm.dev.synology.me\/?p=1545"},"modified":"2026-04-02T07:26:07","modified_gmt":"2026-04-02T07:26:07","slug":"cum-ne-ferim","status":"publish","type":"post","link":"https:\/\/bm.dev.synology.me\/?p=1545","title":{"rendered":"Cum ne ferim?"},"content":{"rendered":"<p><FONT face=Times><SPAN class=text>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify><STRONG>Phishing-ul, atacurile informatice care simuleaza servicii legitime pentru a-i convinge pe utilizatori sa-si introduca datele personale, poate fi evitat daca respectam cateva recomandari simple ale expertilor in securitate.<\/STRONG><\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify><STRONG><\/STRONG>&nbsp;<\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify><EM><STRONG>Ce inseamna \u0084Phishing\u0093?<\/STRONG><\/EM><\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify>Termenul are o etimologie neclara &#8211; reprezinta o combinatie intre vechea tehnica a hackerilor numita \u0084phone phreaking\u0093, pe care acestia o utilizau ca sa pacaleasca retelele de telefonie fixa si sa se aleaga cu convorbiri telefonice gratuite, si \u0084fishing\u0093, adica \u0084pescuitul\u0093 dupa informatii si detalii personale pentru a le folosi in scopuri ilicite, de regula pentru a devaliza conturile bancare ale victimelor.<\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify>&nbsp;<\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify><EM><STRONG>Cum a inceput?<\/STRONG><\/EM><\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify>O prima infractiune considerata premergatoarea phishing-ului a fost inregistrata in anul 1996, cand unii abonati ai provider-ului de Internet America Online (AOL) au inceput sa primeasca mesaje e-mail prin care erau rugati, ca din partea companiei, sa trimita parolele cu care se logau la serviciile AOL, \u0084pentru a actualiza bazele de date\u0093. Scopul, destul de inocent pe atunci, era ca autorii inselatoriei sa poata naviga pe Internet pe gratis, folosind conturile piratate.<BR><\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify>&nbsp;<\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify><STRONG>UN TELEFON FACE MINUNI<\/STRONG> In primul rand, e nevoie de o doza de scepticism la citirea mesajelor e-mail. Atunci cand primiti un mesaj legat de banci si in special de contul dumneavoastra bancar, puteti sa luati legatura cu banca pentru a verifica autenticitatea informatiilor din mesaj.<\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify>&nbsp;<\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify><STRONG>SOFTWARE<\/STRONG> Au inceput sa apara solutii software antispam si antiphishing care, actualizate cat mai des, pot oferi o buna protectie. Multe programe antivirus ofera deja si astfel de functii.<\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify>&nbsp;<\/P>  <P class=MsoNormal style=\"MARGIN: 0in 0in 0pt\" align=justify><STRONG>COMUNICARE<\/STRONG> Companiile de securitate IT recomanda ca atunci cand primiti mesaje suspecte sa le trimiteti lor pentru a fi analizate. Astfel pot fi descoperite si anihilate mult mai rapid inselatoriile online. La randul lor, firmele (in special bancile) sunt sfatuite sa-si defineasca politicile de comunicare prin e-mail cu clientii, pentru ca acestia sa observe mai usor mesajele suspecte.<BR><\/SPAN><\/FONT><\/P><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing-ul, atacurile informatice care simuleaza servicii legitime pentru a-i convinge pe utilizatori sa-si introduca datele personale, poate fi evitat daca respectam cateva recomandari simple ale expertilor in securitate.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[571],"tags":[1060],"class_list":["post-1545","post","type-post","status-publish","format-standard","hentry","category-business-hi-tech","tag-cum-ne-ferim"],"_links":{"self":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/1545","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1545"}],"version-history":[{"count":1,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/1545\/revisions"}],"predecessor-version":[{"id":23016,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=\/wp\/v2\/posts\/1545\/revisions\/23016"}],"wp:attachment":[{"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1545"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1545"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bm.dev.synology.me\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1545"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}