{"id":3812,"date":"2025-03-21T09:15:12","date_gmt":"2025-03-21T08:15:12","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=3812"},"modified":"2025-12-10T09:57:24","modified_gmt":"2025-12-10T08:57:24","slug":"malver","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/malver\/","title":{"rendered":"Malware"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3812\" class=\"elementor elementor-3812\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Malware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d96ee1 elementor-widget elementor-widget-heading\" data-id=\"0d96ee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What is malware?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0e97db4 e-con-full e-flex e-con e-child\" data-id=\"0e97db4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ecee4a1 elementor-widget elementor-widget-button\" data-id=\"ecee4a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/vzdelavanie\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7da5d21 elementor-widget elementor-widget-button\" data-id=\"7da5d21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/elektronicky-podpis-kryptografia-a-certifikat\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Previous topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88be53e elementor-widget elementor-widget-button\" data-id=\"88be53e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/typy-malveru\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Next topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-362ca88 elementor-widget elementor-widget-spacer\" data-id=\"362ca88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21aa2d0 e-flex e-con-boxed e-con e-child\" data-id=\"21aa2d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f4bb5c6 e-flex e-con-boxed e-con e-parent\" data-id=\"f4bb5c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33c0798 elementor-widget elementor-widget-heading\" data-id=\"33c0798\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Malicious code<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-398186d e-flex e-con-boxed e-con e-parent\" data-id=\"398186d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-cd42816 e-con-full e-flex e-con e-child\" data-id=\"cd42816\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8977a23 elementor-widget elementor-widget-text-editor\" data-id=\"8977a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><span lang=\"SK\">Malware is a combination of two English words: <\/span><strong><span lang=\"SK\" style=\"color: #0c3a76;\">malicious<\/span><\/strong><span lang=\"SK\"> and <\/span><span lang=\"SK\"><strong><span style=\"color: #0c3a76;\">software<\/span><\/strong>,<\/span><span lang=\"SK\"> which means <\/span><span lang=\"SK\"><strong><span style=\"color: #0c3a76;\">harmful code<\/span><\/strong>.<br \/><\/span><span lang=\"SK\">Malware is malicious code\/software that damages or disables computer systems, and often provides partial or complete control over systems for the purpose of theft or fraud.<br \/>The functionality of malware can vary depending on its type and purpose. Here is a look at some of the typical features of malware:<\/span><\/p><ul><li style=\"list-style-type: none;\"><ul><li style=\"text-align: left;\"><strong><span lang=\"SK\" style=\"color: #0c3a76;\">Backdoor<\/span><\/strong><span lang=\"SK\"> \u2013 Gives an attacker remote access to an infected system, allowing them to manipulate it and collect information.<\/span><\/li><li style=\"text-align: left;\"><span style=\"color: #0c3a76;\"><strong><span lang=\"SK\">Cryptocurrency mining<\/span><\/strong><\/span><span lang=\"SK\"> \u2013 It uses the computing power of infected devices to mine cryptocurrency, increasing the load and electricity consumption.<\/span><\/li><li style=\"text-align: left;\"><strong><span lang=\"SK\" style=\"color: #0c3a76;\">Link to fraudulent websites<\/span><\/strong><span lang=\"SK\"> \u2013 Impersonates genuine websites in order to obtain sensitive data from users.<\/span><\/li><li style=\"text-align: left;\"><strong><span lang=\"SK\" style=\"color: #0c3a76;\">Part of a botnet (robot network)<\/span><\/strong><span lang=\"SK\"> \u2013 Inclusion in a botnet network allows attackers to coordinate various types of attacks from a large number of infected devices. <\/span><\/li><li style=\"text-align: left;\"><strong><span lang=\"SK\" style=\"color: #0c3a76;\">Downloading additional malicious code<\/span><\/strong><span lang=\"SK\"> \u2013 Downloads and installs additional malicious code, expanding its capabilities and attack effectiveness.<\/span><\/li><li style=\"text-align: left;\"><strong><span lang=\"SK\" style=\"color: #0c3a76;\">Encryption and Ransomware<\/span><\/strong><span lang=\"SK\"> \u2013 Encrypts important files on the target system and demands a ransom for their decryption.<\/span><\/li><li style=\"text-align: left;\"><strong><span lang=\"SK\" style=\"color: #0c3a76;\">Remote tool<\/span><\/strong><span lang=\"SK\"> \u2013 Allows an attacker to remotely control an infected system and perform various activities, such as collecting data or spreading additional malware.<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6eb5a1c e-flex e-con-boxed e-con e-parent\" data-id=\"6eb5a1c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9124ec9 elementor-widget elementor-widget-image\" data-id=\"9124ec9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/malware-300x300.png\" class=\"attachment-medium size-medium wp-image-3815\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/malware-300x300.png 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/malware-150x150.png 150w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/malware-12x12.png 12w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/malware.png 512w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/www.flaticon.com\/free-icon\/malware_554241<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bc322d7 e-flex e-con-boxed e-con e-parent\" data-id=\"bc322d7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c61e53b elementor-widget elementor-widget-spacer\" data-id=\"c61e53b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2d53cd5 e-flex e-con-boxed e-con e-parent\" data-id=\"2d53cd5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-07c534b e-con-full e-flex e-con e-child\" data-id=\"07c534b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9385c70 elementor-widget elementor-widget-heading\" data-id=\"9385c70\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Symptoms of malware<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1661cc1 e-flex e-con-boxed e-con e-parent\" data-id=\"1661cc1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-63c352b e-con-full e-flex e-con e-child\" data-id=\"63c352b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a5bfe34 elementor-widget elementor-widget-text-editor\" data-id=\"a5bfe34\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span lang=\"SK\">Most categories of malware do not show their activity outwardly. An exception is, for example, the displayed advertisement in the case of Adware or the information window about the ransom for data in the case of Ransomware. The presence of malware on a device can be confirmed by the following symptoms:<\/span><\/p><ul><li style=\"list-style-type: none;\"><ul><li><span lang=\"SK\">increased processor usage,<\/span><\/li><li><span lang=\"SK\">slow device or web browser speed, <\/span><span lang=\"SK\">problems connecting to a computer network,<\/span><\/li><li><span lang=\"SK\">\"freezing\" of the operating system or its random restart, <\/span><\/li><li><span lang=\"SK\">the appearance of modified or deleted files, <\/span><span lang=\"SK\">the appearance of strange files, programs or icons on the desktop, <\/span><\/li><li><span lang=\"SK\">starting, stopping, or changing the configuration of programs (malware often changes settings or disables antivirus protection and firewalls), <\/span><\/li><li><span lang=\"SK\">unusual device behavior (e.g., apps opening automatically), <\/span><\/li><li><span lang=\"SK\">Email messages are sent automatically and without the user's knowledge.<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-398655b e-con-full e-flex e-con e-child\" data-id=\"398655b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-598b56f elementor-widget elementor-widget-image\" data-id=\"598b56f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/what-is-a-computer-virus-02.png\" title=\"virusysymptomssk\" alt=\"virusysymptomssk\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/us.norton.com\/content\/dam\/blogs\/images\/norton\/am\/what-is-a-computer-virus-02.png<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6942740 e-flex e-con-boxed e-con e-parent\" data-id=\"6942740\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-255408d elementor-widget elementor-widget-spacer\" data-id=\"255408d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Malv\u00e9r \u010co je malv\u00e9r? Sp\u00e4\u0165 Predo\u0161l\u00e1 t\u00e9ma \u010eal\u0161ia t\u00e9ma \u0160kodliv\u00fd k\u00f3d Malv\u00e9r je zlo\u017eenie dvoch anglick\u00fdch slov: malicious a software, \u010do v\u00a0preklade znamen\u00e1 \u0161kodliv\u00fd k\u00f3d.Malv\u00e9r je \u0161kodliv\u00fd k\u00f3d\/softv\u00e9r, ktor\u00fd po\u0161kodzuje alebo blokuje po\u010d\u00edta\u010dov\u00e9 syst\u00e9my, a \u010dasto poskytuje \u010diasto\u010dn\u00fa alebo \u00fapln\u00fa kontrolu nad syst\u00e9mami \u00a0za \u00fa\u010delom kr\u00e1de\u017ee alebo podvodu.Funkcionality malv\u00e9ru sa m\u00f4\u017eu l\u00ed\u0161i\u0165 v z\u00e1vislosti od [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-3812","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3812","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=3812"}],"version-history":[{"count":43,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3812\/revisions"}],"predecessor-version":[{"id":6902,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3812\/revisions\/6902"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=3812"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}