{"id":5539,"date":"2024-11-14T06:15:18","date_gmt":"2024-11-14T06:15:18","guid":{"rendered":"https:\/\/howtogeek.blog\/cs\/?p=5539"},"modified":"2024-11-14T06:15:18","modified_gmt":"2024-11-14T06:15:18","slug":"understanding-quishing-protecting-yourself-from-this-cyber-threat","status":"publish","type":"post","link":"https:\/\/howtogeek.blog\/cs\/understanding-quishing-protecting-yourself-from-this-cyber-threat\/","title":{"rendered":"Pochopen\u00ed Quishing: Chra\u0148te se p\u0159ed touto kybernetickou hrozbou"},"content":{"rendered":"<p>Quishing neboli QR phishing p\u0159edstavuje rostouc\u00ed riziko kybernetick\u00e9 bezpe\u010dnosti, kter\u00e9 vyu\u017e\u00edv\u00e1 \u0161kodliv\u00e9 QR k\u00f3dy k p\u0159esm\u011brov\u00e1n\u00ed nic netu\u0161\u00edc\u00edch u\u017eivatel\u016f na \u0161kodliv\u00e9 webov\u00e9 str\u00e1nky. Prim\u00e1rn\u00edm z\u00e1m\u011brem t\u011bchto \u00fatok\u016f je z\u00edskat p\u0159\u00edstup k citliv\u00fdm \u00fadaj\u016fm v\u010detn\u011b osobn\u00edch \u00fadaj\u016f a finan\u010dn\u00edch informac\u00ed nebo nainstalovat \u0161kodliv\u00fd software do za\u0159\u00edzen\u00ed ob\u011bt\u00ed.<\/p>\n<h2 class=\"wp-block-heading\">Pro\u010d je Quishing na vzestupu<\/h2>\n<p>V posledn\u00edch letech se p\u0159ijet\u00ed QR k\u00f3d\u016f prudce zv\u00fd\u0161ilo, co\u017e vedlo k jejich \u0161irok\u00e9mu pou\u017eit\u00ed na r\u016fzn\u00fdch platform\u00e1ch \u2013 od digit\u00e1ln\u00edch plateb po p\u0159\u00edstup k informac\u00edm. Kyberzlo\u010dinci vyu\u017e\u00edvaj\u00ed tohoto trendu t\u00edm, \u017ee navrhuj\u00ed QR k\u00f3dy, kter\u00e9 vypadaj\u00ed legitimn\u011b, ale po skenov\u00e1n\u00ed p\u0159esm\u011brov\u00e1vaj\u00ed na \u0161kodliv\u00e9 str\u00e1nky. Mohou tak nasadit malware, p\u0159istupovat k d\u016fle\u017eit\u00fdm dat\u016fm nebo manipulovat s platbami ur\u010den\u00fdmi pro ostatn\u00ed.<\/p>\n<h2 class=\"wp-block-heading\">V\u00fdzvy p\u0159i identifikaci quishingov\u00fdch \u00fatok\u016f<\/h2>\n<p>Povaha quishingov\u00fdch \u00fatok\u016f je \u010din\u00ed zvl\u00e1\u0161t\u011b z\u00e1ke\u0159n\u00fdmi; je t\u00e9m\u011b\u0159 nemo\u017en\u00e9 rozli\u0161it \u0161kodliv\u00e9 QR k\u00f3dy od legitimn\u00edch bez jejich skenov\u00e1n\u00ed. Kyberzlo\u010dinci obvykle um\u00eds\u0165uj\u00ed tyto klamav\u00e9 k\u00f3dy do oblast\u00ed s vysok\u00fdm provozem, jako jsou leti\u0161t\u011b, parky a n\u00e1kupn\u00ed centra, a vyd\u011bl\u00e1vaj\u00ed na nic netu\u0161\u00edc\u00edch jednotlivc\u00edch. Tradi\u010dn\u00ed bezpe\u010dnostn\u00ed r\u00e1mce nav\u00edc mohou QR k\u00f3dy zcela p\u0159ehl\u00ed\u017eet, co\u017e umo\u017e\u0148uje taktiku quishing k obch\u00e1zen\u00ed b\u011b\u017en\u00fdch bezpe\u010dnostn\u00edch opat\u0159en\u00ed.<\/p>\n<h2 class=\"wp-block-heading\">Zranitelnosti v\u00edce za\u0159\u00edzen\u00ed<\/h2>\n<p>Quishing \u00fatoky se mohou t\u00fdkat v\u00edce za\u0159\u00edzen\u00ed, co\u017e komplikuje detekci a prevenci. \u00dato\u010dn\u00edk by nap\u0159\u00edklad mohl odeslat \u0161kodliv\u00fd QR k\u00f3d e-mailem, kter\u00fd si u\u017eivatel prohl\u00ed\u017e\u00ed na sv\u00e9m po\u010d\u00edta\u010di, ale skenuje jej pomoc\u00ed smartphonu, \u010d\u00edm\u017e vytv\u00e1\u0159\u00ed dal\u0161\u00ed vrstvy zranitelnosti.<\/p>\n<h2 class=\"wp-block-heading\" id=\"consequences-of-a-quishing-attack\">D\u016fsledky quishingov\u00e9ho \u00fatoku<\/h2>\n<p>D\u016fsledky quishingov\u00fdch \u00fatok\u016f mohou b\u00fdt v\u00e1\u017en\u00e9 a \u010dasto se projev\u00ed d\u0159\u00edve, ne\u017e si ob\u011b\u0165 uv\u011bdom\u00ed, \u017ee byla kompromitov\u00e1na. N\u00ed\u017ee uv\u00e1d\u00edme n\u011bkolik potenci\u00e1ln\u00edch v\u00fdsledk\u016f:<\/p>\n<ul class=\"wp-block-list\">\n<li><strong>P\u0159esm\u011brov\u00e1n\u00ed na phishingov\u00e9 str\u00e1nky:<\/strong> Naskenov\u00e1n\u00ed \u0161kodliv\u00e9ho QR k\u00f3du \u010dasto vede k podvodn\u00fdm webov\u00fdm str\u00e1nk\u00e1m navr\u017een\u00fdm tak, aby se podobaly legitimn\u00edmu webu, a vyb\u00edzej\u00ed u\u017eivatele k zad\u00e1v\u00e1n\u00ed citliv\u00fdch informac\u00ed, jako jsou p\u0159ihla\u0161ovac\u00ed \u00fadaje a finan\u010dn\u00ed \u00fadaje.<\/li>\n<li><strong>Instalace malwaru:<\/strong> Mnoho QR k\u00f3d\u016f m\u016f\u017ee obsahovat \u0161kodliv\u00fd software, jako jsou trojsk\u00e9 kon\u011b nebo ransomware, kter\u00fd se po skenov\u00e1n\u00ed automaticky st\u00e1hne do va\u0161eho za\u0159\u00edzen\u00ed, \u010d\u00edm\u017e p\u0159iprav\u00ed p\u016fdu pro dal\u0161\u00ed \u00fatoky a potenci\u00e1ln\u00ed ztr\u00e1tu citliv\u00fdch informac\u00ed.<\/li>\n<li><strong>P\u0159\u00edstup k \u00fa\u010dt\u016fm soci\u00e1ln\u00edch m\u00e9di\u00ed:<\/strong> Efektivn\u00ed quishing \u00fatok m\u016f\u017ee tak\u00e9 ohrozit va\u0161e \u00fa\u010dty soci\u00e1ln\u00edch m\u00e9di\u00ed, co\u017e hacker\u016fm umo\u017en\u00ed odes\u00edlat neopr\u00e1vn\u011bn\u00e9 zpr\u00e1vy z va\u0161ich profil\u016f na platform\u00e1ch, jako je Facebook, Instagram nebo WhatsApp.<\/li>\n<\/ul>\n<h2 class=\"wp-block-heading\" id=\"protecting-yourself-from-quishing-attacks\">Tipy, jak se chr\u00e1nit p\u0159ed vra\u017eedn\u00fdmi \u00fatoky<\/h2>\n<h3 class=\"wp-block-heading\" id=\"be-wary-of-unsolicited-qr-codes\">Bu\u010fte opatrn\u00ed s nevy\u017e\u00e1dan\u00fdmi QR k\u00f3dy<\/h3>\n<p>V\u017edy bu\u010fte opatrn\u00ed p\u0159i skenov\u00e1n\u00ed QR k\u00f3d\u016f nalezen\u00fdch v neo\u010dek\u00e1van\u00fdch zpr\u00e1v\u00e1ch nebo e-mailech, zejm\u00e9na pokud v\u00e1s vyz\u00fdvaj\u00ed k okam\u017eit\u00e9 akci. V p\u0159\u00edpad\u011b pochybnost\u00ed se vyhn\u011bte skenov\u00e1n\u00ed takov\u00fdch k\u00f3d\u016f.<\/p>\n<h3 class=\"wp-block-heading\" id=\"check-for-accompanying-explanation-or-context\">Hledejte kontextov\u00e9 informace<\/h3>\n<p>Legitimn\u00ed QR k\u00f3dy obvykle poskytuj\u00ed doprovodn\u00fd vysv\u011btluj\u00edc\u00ed text. Nen\u00ed-li p\u0159\u00edtomen \u017e\u00e1dn\u00fd kontext nebo je-li zdroj nezn\u00e1m\u00fd, je rozumn\u00e9 zdr\u017eet se skenov\u00e1n\u00ed k\u00f3du.<\/p>\n<h3 class=\"wp-block-heading\" id=\"preview-the-link\">P\u0159ed otev\u0159en\u00edm zobrazte n\u00e1hled adresy URL<\/h3>\n<p>V\u011bt\u0161ina za\u0159\u00edzen\u00ed nab\u00edz\u00ed n\u00e1hled URL p\u0159i skenov\u00e1n\u00ed QR k\u00f3du. Pokud se odkaz zd\u00e1 b\u00fdt zkr\u00e1cen\u00fd nebo nem\u016f\u017eete rozeznat jeho c\u00edl, je nejlep\u0161\u00ed se mu vyhnout. Tak\u00e9 se ujist\u011bte, \u017ee web pou\u017e\u00edv\u00e1 HTTPS pro zabezpe\u010den\u00e9 p\u0159ipojen\u00ed.<\/p>\n<h3 class=\"wp-block-heading\" id=\"check-the-source\">Ov\u011b\u0159te zdroj QR k\u00f3du<\/h3>\n<p>Chcete-li zjistit legitimitu QR k\u00f3du, pokuste se ov\u011b\u0159it jeho zdroj. Vyhledejte kontaktn\u00ed informace a ov\u011b\u0159te podrobnosti o odes\u00edlateli, abyste zjistili jak\u00e9koli nesrovnalosti, kter\u00e9 by mohly nazna\u010dovat podvod.<\/p>\n<h3 class=\"wp-block-heading\" id=\"check-the-destination-website\">Prohl\u00e9dn\u011bte si c\u00edlov\u00fd web<\/h3>\n<p>Pokud se po naskenov\u00e1n\u00ed QR k\u00f3du otev\u0159e podez\u0159el\u00fd web, vyhodno\u0165te jeho obsah. Mezi zn\u00e1mky phishingov\u00e9ho webu pat\u0159\u00ed \u0161patn\u00fd design, p\u0159eklepy nebo po\u017eadavky na nal\u00e9havou akci. Pokud se tyto \u010derven\u00e9 vlajky objev\u00ed, okam\u017eit\u011b web zav\u0159ete.<\/p>\n<h3 class=\"wp-block-heading\" id=\"be-careful-when-sharing-personal-information\">Bu\u010fte opatrn\u00ed s osobn\u00edmi \u00fadaji<\/h3>\n<p>P\u0159ed odesl\u00e1n\u00edm jak\u00fdchkoli osobn\u00edch \u00fadaj\u016f po naskenov\u00e1n\u00ed QR k\u00f3du znovu zkontrolujte URL a ov\u011b\u0159te logo \u017e\u00e1daj\u00edc\u00edho subjektu. Zva\u017ete ru\u010dn\u00ed zad\u00e1v\u00e1n\u00ed adresy URL do prohl\u00ed\u017ee\u010de nam\u00edsto n\u00e1sledov\u00e1n\u00ed odkazu. Pokud se v\u00e1m zd\u00e1, \u017ee n\u011bco nen\u00ed v po\u0159\u00e1dku, nesd\u011blujte sv\u00e9 informace.<\/p>\n<h3 class=\"wp-block-heading\" id=\"turn-on-two-factor-authentication\">Vyu\u017eijte dvoufaktorov\u00e9 ov\u011b\u0159ov\u00e1n\u00ed<\/h3>\n<p>Aktivace dvoufaktorov\u00e9 autentizace je vysoce \u00fa\u010dinn\u00fdm odstra\u0161uj\u00edc\u00edm prost\u0159edkem proti neopr\u00e1vn\u011bn\u00e9mu p\u0159\u00edstupu k va\u0161im \u00fa\u010dt\u016fm. I kdy\u017e jsou va\u0161e p\u0159ihla\u0161ovac\u00ed \u00fadaje ohro\u017eeny, m\u016f\u017ee tato vrstva zabezpe\u010den\u00ed zabr\u00e1nit vet\u0159elc\u016fm v p\u0159\u00edstupu.<\/p>\n<h3 class=\"wp-block-heading\" id=\"avoid-downloading-apps-using-qr-codes\">Stahujte aplikace pouze z ofici\u00e1ln\u00edch zdroj\u016f<\/h3>\n<p>P\u0159i stahov\u00e1n\u00ed aplikac\u00ed se v\u017edy rozhodujte pro ofici\u00e1ln\u00ed platformy, jako je Google Play Store nebo Apple App Store. Vyhn\u011bte se z\u00edsk\u00e1v\u00e1n\u00ed aplikac\u00ed prost\u0159ednictv\u00edm QR k\u00f3d\u016f, proto\u017ee to m\u016f\u017ee va\u0161e za\u0159\u00edzen\u00ed nev\u011bdomky vystavit malwaru.<\/p>\n<h3 class=\"wp-block-heading\" id=\"use-antivirus-apps\">Pou\u017e\u00edvejte antivirov\u00fd software<\/h3>\n<p>Antivirov\u00e9 programy jsou nezbytn\u00e9 pro ochranu za\u0159\u00edzen\u00ed p\u0159ed \u0161kodliv\u00fdm stahov\u00e1n\u00edm a webov\u00fdmi str\u00e1nkami. Tyto n\u00e1stroje v\u00e1s mohou upozornit na potenci\u00e1ln\u00ed hrozby a pomoci zm\u00edrnit rizika spojen\u00e1 s quishingov\u00fdmi \u00fatoky.<\/p>\n<h3 class=\"wp-block-heading\" id=\"rely-on-the-built-in-scanner-on-your-device\">Pou\u017eijte vestav\u011bn\u00e9 funkce skenov\u00e1n\u00ed<\/h3>\n<p>Chcete-li zv\u00fd\u0161it zabezpe\u010den\u00ed, spol\u00e9hejte se na integrovan\u00e9 mo\u017enosti skenov\u00e1n\u00ed QR k\u00f3d\u016f va\u0161eho smartphonu sp\u00ed\u0161e ne\u017e na aplikace t\u0159et\u00edch stran, kter\u00e9 nemus\u00ed nab\u00edzet stejnou \u00farove\u0148 ochrany p\u0159ed \u0161kodliv\u00fdmi k\u00f3dy.<\/p>\n<h3 class=\"wp-block-heading\" id=\"things-to-know\">D\u016fle\u017eit\u00e9 \u00favahy<\/h3>\n<ul class=\"wp-block-list\">\n<li>Ve fyzick\u00e9m obchod\u011b si p\u0159ed naskenov\u00e1n\u00edm QR k\u00f3du ov\u011b\u0159te jeho opr\u00e1vn\u011bnost u majitele.<\/li>\n<li>U plateb ov\u011b\u0159te, zda se jm\u00e9no p\u0159\u00edjemce shoduje s podrobnostmi transakce.<\/li>\n<li>Pravideln\u011b aktualizujte sv\u00e9 za\u0159\u00edzen\u00ed a aplikace, abyste mohli vyu\u017e\u00edvat nejnov\u011bj\u0161\u00ed vylep\u0161en\u00ed zabezpe\u010den\u00ed.<\/li>\n<li>Z\u016fsta\u0148te informov\u00e1ni o nov\u00fdch hrozb\u00e1ch a bezpe\u010dnostn\u00edch postupech souvisej\u00edc\u00edch s QR k\u00f3dy.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Quishing neboli QR phishing p\u0159edstavuje rostouc\u00ed riziko kybernetick\u00e9 bezpe\u010dnosti, kter\u00e9 vyu\u017e\u00edv\u00e1 \u0161kodliv\u00e9 QR k\u00f3dy k p\u0159esm\u011brov\u00e1n\u00ed nic netu\u0161\u00edc\u00edch u\u017eivatel\u016f na \u0161kodliv\u00e9 webov\u00e9 str\u00e1nky. Prim\u00e1rn\u00edm z\u00e1m\u011brem t\u011bchto \u00fatok\u016f je z\u00edskat p\u0159\u00edstup k citliv\u00fdm \u00fadaj\u016fm v\u010detn\u011b osobn\u00edch \u00fadaj\u016f a finan\u010dn\u00edch informac\u00ed nebo nainstalovat \u0161kodliv\u00fd software do za\u0159\u00edzen\u00ed ob\u011bt\u00ed. Pro\u010d je Quishing na vzestupu V posledn\u00edch letech se [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[126,195],"class_list":["post-5539","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-microsoft","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/5539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/comments?post=5539"}],"version-history":[{"count":1,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/5539\/revisions"}],"predecessor-version":[{"id":5540,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/posts\/5539\/revisions\/5540"}],"wp:attachment":[{"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/media?parent=5539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/categories?post=5539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/howtogeek.blog\/cs\/wp-json\/wp\/v2\/tags?post=5539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}