{"id":3817,"date":"2025-01-22T22:47:38","date_gmt":"2025-01-22T21:47:38","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=3817"},"modified":"2025-12-18T12:56:04","modified_gmt":"2025-12-18T11:56:04","slug":"socialne-inzinierstvo","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/socialne-inzinierstvo\/","title":{"rendered":"Social engineering"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3817\" class=\"elementor elementor-3817\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Social engineering<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0819cc e-con-full e-flex e-con e-child\" data-id=\"e0819cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d1b3e46 elementor-widget elementor-widget-button\" data-id=\"d1b3e46\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/vzdelavanie\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50ae233 elementor-widget elementor-widget-button\" data-id=\"50ae233\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/bezpecnost-mobilnych-zariadeni-ako-si-vybrat-bezpecny-telefon\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Previous topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c80afb7 elementor-widget elementor-widget-button\" data-id=\"c80afb7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/trestne-pravo-a-kyberneticka-kriminalita\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Next topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-362ca88 elementor-widget elementor-widget-spacer\" data-id=\"362ca88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21aa2d0 e-flex e-con-boxed e-con e-child\" data-id=\"21aa2d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0ac261f e-flex e-con-boxed e-con e-parent\" data-id=\"0ac261f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb82da2 elementor-widget elementor-widget-text-editor\" data-id=\"bb82da2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Social engineering is the methods and techniques used by attackers to manipulate people to achieve their goals.<\/p><p>It is any type of attack that is not technical in nature and involves some type of interaction with a victim in order to try to trick or coerce them into revealing information or violating common security practices.<\/p><p>Attackers who use social engineering are called <span style=\"color: #0c3a76;\"><strong>social engineers<\/strong>.<\/span><\/p><p>Social engineers may be motivated by:\u00a0<\/p><ul><li>financial gain,<\/li><li>obtaining personal data,<\/li><li>gaining unauthorized access,<\/li><li>bypassing established procedures,<\/li><li>performing social engineering simply because they can.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-320c419 elementor-widget elementor-widget-spacer\" data-id=\"320c419\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0aed2c7 e-flex e-con-boxed e-con e-parent\" data-id=\"0aed2c7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f84f2e7 elementor-widget elementor-widget-heading\" data-id=\"f84f2e7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b364e63 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"b364e63\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"188108387\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1881083871\" data-tab-title-id=\"e-n-tab-title-1881083871\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1881083871\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tPhishing\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1881083872\" data-tab-title-id=\"e-n-tab-title-1881083872\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1881083872\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSpear Phishing\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1881083873\" data-tab-title-id=\"e-n-tab-title-1881083873\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1881083873\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tVishing\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1881083874\" data-tab-title-id=\"e-n-tab-title-1881083874\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1881083874\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSmishing \t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1881083875\" data-tab-title-id=\"e-n-tab-title-1881083875\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1881083875\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tWhaling \t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1881083871\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1881083871\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-c68bb0f e-con-full e-flex e-con e-child\" data-id=\"c68bb0f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-343a760 e-con-full e-flex e-con e-child\" data-id=\"343a760\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1601dce elementor-widget elementor-widget-text-editor\" data-id=\"1601dce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Phishing is a common form of social engineering where attackers try to obtain information using fake messages via emails, chats or websites.<\/p><p>These messages often pretend to be legitimate and try to create a sense of urgency or fear.<\/p><p>Users are prompted to take various actions, such as clicking on a link or downloading an attachment.<\/p><p>Some phishing messages ask the recipient to verify their account credentials, saying that the link leads to a fake (not legitimate) website where they can verify this information.<\/p><p>This is how attackers obtain sensitive information, such as login credentials.<\/p><p>For an attacker, it takes a few minutes to create a perfect copy of a legitimate website, <span style=\"text-decoration: underline;\"><a href=\"https:\/\/www.youtube.com\/watch?v=CLuOGBCHNW8\"><strong>view a short<\/strong> <strong>video<\/strong><\/a><\/span>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ca95e63 e-con-full e-flex e-con e-child\" data-id=\"ca95e63\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-93378d4 elementor-widget elementor-widget-image\" data-id=\"93378d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/phishing.png\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/phishing.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5696c35 e-con-full e-flex e-con e-child\" data-id=\"5696c35\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9ede18f elementor-widget elementor-widget-n-accordion\" data-id=\"9ede18f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1660\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1660\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Phishing using streaming services <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1660\" class=\"elementor-element elementor-element-42f4410 e-con-full e-flex e-con e-child\" data-id=\"42f4410\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b316176 elementor-widget elementor-widget-image\" data-id=\"b316176\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/phishing2.png\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/phishing2.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/www.hooksecurity.co\/phishing-examples\/netflix-phishing-example<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1661\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1661\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Phishing using delivery services <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1661\" class=\"elementor-element elementor-element-1cf5858 e-con-full e-flex e-con e-child\" data-id=\"1cf5858\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65ca0a9 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"65ca0a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/phishing3.png\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/phishing3.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/www.posta.sk\/informacie\/pozor-na-podvody<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1881083872\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1881083872\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-e0e2f32 e-con-full e-flex e-con e-child\" data-id=\"e0e2f32\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-fef5de6 e-con-full e-flex e-con e-child\" data-id=\"fef5de6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7cfc8d4 elementor-widget elementor-widget-text-editor\" data-id=\"7cfc8d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Spear phishing has the same goal as phishing, but the attacker targets specific individuals within an organization.<br \/>Before launching an attack, the attacker conducts extensive research, gathers personal information, and tracks the victim\u2019s interests through Internet searches and social media profiles.<br \/>The attacker then sends phishing messages tailored to the individual, increasing the credibility of the message and the likelihood of a successful attack. Spear phishing is therefore more effective and reaches a higher percentage of victims than regular phishing.\u00a0<br \/><br \/><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7c08492 e-con-full e-flex e-con e-child\" data-id=\"7c08492\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-aec79a6 elementor-widget elementor-widget-image\" data-id=\"aec79a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"318\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/67b430e791152c5e56184706_62c585e6a7e5102c3335d165_Spear_20phishing_20attacks_20in_20action.jpeg\" class=\"attachment-large size-large wp-image-6944\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/67b430e791152c5e56184706_62c585e6a7e5102c3335d165_Spear_20phishing_20attacks_20in_20action.jpeg 800w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/67b430e791152c5e56184706_62c585e6a7e5102c3335d165_Spear_20phishing_20attacks_20in_20action-300x119.jpeg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/67b430e791152c5e56184706_62c585e6a7e5102c3335d165_Spear_20phishing_20attacks_20in_20action-768x305.jpeg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/67b430e791152c5e56184706_62c585e6a7e5102c3335d165_Spear_20phishing_20attacks_20in_20action-18x7.jpeg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/www.wallarm.com\/what\/what-is-a-spear-phishing-attack-how-to-prevent-one<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1881083873\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1881083873\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-6d8b429 e-con-full e-flex e-con e-child\" data-id=\"6d8b429\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-d3e3b62 e-con-full e-flex e-con e-child\" data-id=\"d3e3b62\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e26180 elementor-widget elementor-widget-text-editor\" data-id=\"8e26180\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Vishing (voice phishing) is a form of social engineering in which an attacker uses a telephone conversation to obtain sensitive information or to convince the victim to perform a certain action (e.g., logging into a fake website).<br \/>An example is a fake call to the IT department, where the caller pretends to be an employee of the organization who has forgotten their login details. Another case is a call from a fake IT support that claims that your device has an issue and that they can help you with it. Instead they remotely install malicious code on the device or steal sensitive information.<br \/>With the fast progress of artificial intelligence attackers have started using AI voice spoofing, a technique in which they can imitate the voice of a real person using voice synthesis. All they need is a short sample of the victim's voice recording (e.g., from a video on a social network, or a phone call that was \"mistakenly\" constructed by the attacker) to create realistic-sounding phone calls.<\/p><p><span style=\"color: #0c3a76;\"><strong>How to protect yourself from vishing?<\/strong><\/span><\/p><ul><li>Verify the caller using information that only a legitimate person knows (e.g. internal data that is not publicly available, date of birth, identification number, etc.).<\/li><li>Cancel the call and call back the official number of the organization, which is usually published on the website. A common argument of social engineers is that they have a common (internal) number within the organization, and therefore it is impossible to reach them.<\/li><li>If you are not sure, consult the situation with the IT department or security team (CSIRT-UPJS) using official channels, or physically.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-60dc280 e-con-full e-flex e-con e-child\" data-id=\"60dc280\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-49b4e88 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"49b4e88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Vishing-photo-1024x1024-1.png\" class=\"attachment-large size-large wp-image-6969\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Vishing-photo-1024x1024-1.png 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Vishing-photo-1024x1024-1-300x300.png 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Vishing-photo-1024x1024-1-150x150.png 150w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Vishing-photo-1024x1024-1-768x768.png 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Vishing-photo-1024x1024-1-12x12.png 12w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Vishing-photo-1024x1024-1-600x600.png 600w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/www.sainthelenabank.com\/cybercrime-and-fraud-information\/vishing\/<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1881083874\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1881083874\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\"elementor-element elementor-element-1d33be3 e-flex e-con-boxed e-con e-child\" data-id=\"1d33be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-37fd67b e-con-full e-flex e-con e-child\" data-id=\"37fd67b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-91d1395 elementor-widget elementor-widget-text-editor\" data-id=\"91d1395\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A form of phishing attack in which attackers use text messages (SMS) to fraudulently obtain sensitive information such as login details, payment card numbers or personal data. The main goal is to convince the victim to click on a malicious link or provide information via a fake page.<\/p><p><span style=\"color: #0c3a76;\"><strong>How does smishing work?<\/strong><\/span><\/p><ul><li><span style=\"color: #0c3a76;\"><strong>Text message from the attacker<\/strong><\/span> \u2013 The victim receives a message pretending to be from a trusted institution (bank, courier service, government agency).<\/li><li><span style=\"color: #0c3a76;\"><strong>Urgent tone or a prize<\/strong><\/span> \u2013 The message often contains threatening notifications (account blocking) or offers a prize, creating a sense of urgency.<\/li><li><span style=\"color: #0c3a76;\"><strong>Malicious link or number<\/strong><\/span> \u2013 The message contains a link to a fraudulent website or a request for a response with sensitive data.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3025f9d e-con-full e-flex e-con e-child\" data-id=\"3025f9d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fdcf262 elementor-widget elementor-widget-image\" data-id=\"fdcf262\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"768\" height=\"845\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/smishingeng.png\" class=\"attachment-medium_large size-medium_large wp-image-5475\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/smishingeng.png 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/smishingeng-273x300.png 273w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/smishingeng-11x12.png 11w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/www.proofpoint.com\/us\/threat-reference\/smishing<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1881083875\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1881083875\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\"elementor-element elementor-element-4f9370f e-flex e-con-boxed e-con e-child\" data-id=\"4f9370f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-afcf3d9 e-con-full e-flex e-con e-child\" data-id=\"afcf3d9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9956f39 elementor-widget elementor-widget-text-editor\" data-id=\"9956f39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Whaling is a specific type of phishing attack that targets high-ranking individuals in organizations, such as directors, managers, or other senior management.<\/p><p><span style=\"color: #0c3a76;\"><strong>Characteristics:<\/strong><\/span><\/p><ul><li><span style=\"color: #0c3a76;\"><strong>Target group<\/strong><\/span>: Top management or individuals with access to sensitive data and finances.<\/li><li><span style=\"color: #0c3a76;\"><strong>Personalization<\/strong>:<\/span> Attacks are finely tailored to the victim, often containing information about the company or projects to appear trustworthy.<\/li><li><span style=\"color: #0c3a76;\"><strong>Purpose<\/strong><\/span>: Gaining access to corporate resources, sensitive data, or committing financial fraud.<\/li><\/ul><p><span style=\"color: #0c3a76;\"><strong>Example: <\/strong><\/span>An attacker impersonates a CEO and asks an accountant via email to urgently transfer a large sum of money to an external account.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-85c1758 e-con-full e-flex e-con e-child\" data-id=\"85c1758\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6f167a1 elementor-widget elementor-widget-image\" data-id=\"6f167a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"400\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Whaling-1.png\" class=\"attachment-large size-large wp-image-5476\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Whaling-1.png 700w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Whaling-1-300x171.png 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Whaling-1-18x10.png 18w\" sizes=\"(max-width: 700px) 100vw, 700px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/computerone.com.au\/phishing-spear-phishing-whaling-whats-difference\/<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-421e970 elementor-widget elementor-widget-spacer\" data-id=\"421e970\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3e6a878 elementor-widget elementor-widget-heading\" data-id=\"3e6a878\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Other examples<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afd9d54 e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"afd9d54\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;none&quot;,&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"184393044\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1843930441\" data-tab-title-id=\"e-n-tab-title-1843930441\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1843930441\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tBaiting\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1843930442\" data-tab-title-id=\"e-n-tab-title-1843930442\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1843930442\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tPiggybacking\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1843930443\" data-tab-title-id=\"e-n-tab-title-1843930443\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1843930443\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tPig butchering\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1843930441\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1843930441\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-51bbd44 e-con-full e-flex e-con e-child\" data-id=\"51bbd44\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-adf8791 e-con-full e-flex e-con e-child\" data-id=\"adf8791\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-868aa55 elementor-widget elementor-widget-text-editor\" data-id=\"868aa55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Baiting is a form of social engineering that exploits human curiosity and the desire to get something for free. Attackers offer attractive rewards in exchange for sensitive data. Baiting can take both physical and digital forms.\u00a0<\/p><p><span style=\"color: #0c3a76;\"><strong>Example 1<\/strong>:<\/span> Free download of programs, music or movies. This way, the attacker can obtain valuable data from a person (e.g. an email account or password that the person also uses for other services)<\/p><p><span style=\"color: #0c3a76;\"><strong>Example 2<\/strong>:<\/span> Leaving a USB flash drive containing a malicious program in the open, through which the victim can download the malicious program when trying it.<\/p><p><span style=\"color: #0c3a76;\"><strong>Example 3<\/strong><\/span>: Spreading malware using torrent services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-70addc2 e-con-full e-flex e-con e-child\" data-id=\"70addc2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9e1e361 elementor-widget elementor-widget-image\" data-id=\"9e1e361\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"1009\" height=\"1024\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Top_Baiting_Attack_Techniques_Key_Methods_Revealed_45623ebe36.jpg\" class=\"attachment-large size-large wp-image-6940\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Top_Baiting_Attack_Techniques_Key_Methods_Revealed_45623ebe36.jpg 1037w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Top_Baiting_Attack_Techniques_Key_Methods_Revealed_45623ebe36-296x300.jpg 296w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Top_Baiting_Attack_Techniques_Key_Methods_Revealed_45623ebe36-1009x1024.jpg 1009w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Top_Baiting_Attack_Techniques_Key_Methods_Revealed_45623ebe36-768x779.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/08\/Top_Baiting_Attack_Techniques_Key_Methods_Revealed_45623ebe36-12x12.jpg 12w\" sizes=\"(max-width: 1009px) 100vw, 1009px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/keepnetlabs.com\/blog\/what-is-baiting-in-cyber-security<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1843930442\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1843930442\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-c0955cb e-con-full e-flex e-con e-child\" data-id=\"c0955cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-bc8ed56 e-con-full e-flex e-con e-child\" data-id=\"bc8ed56\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e7b94e5 elementor-widget elementor-widget-text-editor\" data-id=\"e7b94e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Piggybacking is a form of unauthorized access in which an attacker uses an authorized person or their device to gain access to a protected system, area, or network. This access can be physical or digital and often occurs without the authorized person\u2019s knowledge.\u00a0\u00a0<\/p><p><span style=\"color: #0c3a76;\"><strong>Examples of piggybacking:<\/strong><\/span><\/p><ul><li>A typical example of physical piggybacking is when an attacker enters a secure area with an authorized person, for example by taking advantage of their willingness to hold the door.<\/li><li>The attacker asks an employee to lend him their laptop for a while. Then, they quickly install malicious software on it (for remote connection, to capture login details, etc.).<\/li><li>The attacker gains access to the system because the authorized user remains logged in on a shared device or does not lock their computer.<\/li><\/ul><p><span style=\"color: #0c3a76;\"><strong>How to protect yourself from piggybacking?<\/strong><\/span><\/p><ul><li>Never allow unauthorized people to enter secure areas.<\/li><li>Always lock your device when you are not using it (on a Windows device, just remember the keyboard shortcut Win + L).<\/li><li>Don't share your computer. If you need to give someone temporary access to your computer, set up a limited guest account to prevent unauthorized changes, installations, and protect your sensitive files.<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0294954 e-con-full e-flex e-con e-child\" data-id=\"0294954\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eb0225e elementor-widget elementor-widget-image\" data-id=\"eb0225e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"576\" height=\"956\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/tailgatingpiggybackingen.png\" class=\"attachment-large size-large wp-image-6978\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/tailgatingpiggybackingen.png 576w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/tailgatingpiggybackingen-181x300.png 181w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/tailgatingpiggybackingen-7x12.png 7w\" sizes=\"(max-width: 576px) 100vw, 576px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/keepnetlabs.com\/blog\/what-is-a-tailgating-attack<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1843930443\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1843930443\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-89d778c e-con-full e-flex e-con e-child\" data-id=\"89d778c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-321aeb6 e-flex e-con-boxed e-con e-child\" data-id=\"321aeb6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1665ca5 elementor-widget elementor-widget-text-editor\" data-id=\"1665ca5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is a cyber fraud in which fraudsters manipulate the victim over a long period of time to convince them of trust and force them to invest in a fake investment scheme.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab5827f elementor-widget elementor-widget-heading\" data-id=\"ab5827f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How it works:<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-63783d7 elementor-widget elementor-widget-n-accordion\" data-id=\"63783d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1040\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1040\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> First contact <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1040\" class=\"elementor-element elementor-element-ce87b3d e-con-full e-flex e-con e-child\" data-id=\"ce87b3d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e605a20 elementor-widget elementor-widget-text-editor\" data-id=\"e605a20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Fraudsters establish contact via social media, SMS, or chat apps (often pretending it was a mistake). The victim becomes the target of a long-term relationship.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1041\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1041\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Building Trust <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1041\" class=\"elementor-element elementor-element-d775a4f e-con-full e-flex e-con e-child\" data-id=\"d775a4f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8a7f2f0 elementor-widget elementor-widget-text-editor\" data-id=\"8a7f2f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The scammer plays the role of a friend or investment advisor and slowly convinces the victim of the benefits of investing in cryptocurrencies, stocks, or other assets<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1042\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1042\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Creating a fake platform <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1042\" class=\"elementor-element elementor-element-fede51c e-con-full e-flex e-con e-child\" data-id=\"fede51c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b3a2ec4 elementor-widget elementor-widget-text-editor\" data-id=\"b3a2ec4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The victim is directed to a website or app that looks like a legitimate investment platform. The platform allows you to track \u201cinvestment growth,\u201d but it\u2019s all a scam.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1043\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1043\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Gradual investment <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1043\" class=\"elementor-element elementor-element-60c16cf e-flex e-con-boxed e-con e-child\" data-id=\"60c16cf\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e110fee elementor-widget elementor-widget-text-editor\" data-id=\"e110fee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The victim first invests small amounts that can be \"profitably\" paid out, thereby increasing their confidence. Then they start investing larger amounts.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1044\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1044\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u201cKilling the Pig\u201d <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewbox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1044\" class=\"elementor-element elementor-element-49abb0b e-flex e-con-boxed e-con e-child\" data-id=\"49abb0b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc3e875 elementor-widget elementor-widget-text-editor\" data-id=\"fc3e875\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Once the victim deposits a large amount, the scammers disappear \u2013 blocking their access to the platform, contact, and stealing all the money.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1f9d9e elementor-widget elementor-widget-spacer\" data-id=\"f1f9d9e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd65ca6 elementor-widget elementor-widget-heading\" data-id=\"fd65ca6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rules for protecting against fraudulent messages<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5ea86fc elementor-widget elementor-widget-text-editor\" data-id=\"5ea86fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Recognizing a fraudulent email message is not easy, but there are clues that can help you (not only with email messages, but also with other written frauds). The most common signs of a scam include:<\/p><ol><li><span style=\"color: #0c3a76;\"><strong>Generic greeting<\/strong>:<\/span> The message pretends to be from an important institution, but uses a generic greeting. (e.g. \"Dear User\", \"Dear Client\", etc.)<\/li><li><span style=\"color: #0c3a76;\"><strong>Spoofed sender<\/strong>:<\/span> The message may look like it was sent by someone you know or a trusted institution, but in fact it has been forged. Check the sender's email address - scammers often use addresses that are slightly different from the official ones (e.g. \"support@paypa1.com\" instead of \"support@paypal.com\"). Since the correctness of the filled-in fields is not verified when sending the message, the attacker can even send an email with a legitimate address in the sender field, even if the real sender's address is different (this is called spoofing).\u00a0\u00a0<\/li><li><span style=\"color: #0c3a76;\"><strong>Sense of urgency<\/strong>:<\/span> Scammers try to create panic or pressure you to act quickly. Common phrases include: \u201cyour email quota has expired,\u201d \u201cyou need to download a new version of the program to communicate electronically with the state,\u201d \u201cyour account will be deactivated within 24 hours.\u201d\u00a0<\/li><li><span style=\"color: #0c3a76;\"><strong>Grammar errors<\/strong>:<\/span> Some scam emails contain grammatical errors or unusual wording. Although attackers today use better grammar, they often make mistakes in inflection and formality.\u00a0<\/li><\/ol><ol start=\"5\"><li><span style=\"color: #0c3a76;\"><strong>Fake links<\/strong>:<\/span> Links in emails can lead to fraudulent sites that try to get you to enter your bank, work, or social account login information. Always check links in suspicious emails by hovering over them\u2014the actual URL will appear in the bottom left corner of your screen. If you are unsure, do not log in via the provided link, but visit the service page manually. You can also ask the university security team CSIRT-UPJS for help in evaluating it by forwarding the suspicious message to csirt@upjs.sk\u00a0<\/li><li><span style=\"color: #0c3a76;\"><strong>False information<\/strong>:<\/span> The email may contain official-looking data, such as logos, contacts or legal wording, but the content itself is false. If in doubt, check the situation directly with the institution in question.\u00a0<\/li><li><span style=\"color: #0c3a76;\"><strong>Malicious attachments<\/strong>:<\/span> Fraudulent emails may contain dangerous attachments, often disguised as invoices, product offers or important documents. Opening them may lead to infection of the device with malware.\u00a0<\/li><li><strong><span style=\"color: #0c3a76;\">Too good to be true:<\/span>\u00a0<\/strong>If the offer seems too tempting to be true (e.g. winning the lottery, unexpected refund), it is probably fraudulent.\u00a0<\/li><li><strong><span style=\"color: #0c3a76;\">Image with a link:<\/span>\u00a0<\/strong>Instead of a text link, the link may be hidden in an image. Clicking on it may redirect you to a malicious website.\u00a0<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-877b5fa elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"877b5fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/Pravidla-ochrany-pred-podvodnymi-e-mailovymi-spravami.png\">\n\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/01\/Pravidla-ochrany-pred-podvodnymi-e-mailovymi-spravami.png\" title=\"\" alt=\"\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ffa3ff elementor-widget elementor-widget-spacer\" data-id=\"6ffa3ff\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e87af52 elementor-widget elementor-widget-text-editor\" data-id=\"e87af52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>It is important to remember that banks and institutions never request sensitive data via email. It is best to ignore or delete suspicious messages.<br \/>Fraudulent emails often give the impression that they are from known people or organizations. They take advantage of the fact that we trust messages from acquaintances. A thorough check is important because the sender of the email can be easily forged.<br \/>To verify suspicious links, you can use web services such as <span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.virustotal.com\/gui\/home\/url\">virustotal.com<\/a><\/strong><\/span> and <span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/urlscan.io\/\">urlscan.io<\/a><\/strong><\/span> , which evaluate the level of risk of the given page after entering the URL of the link.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eed7e89 e-flex e-con-boxed e-con e-parent\" data-id=\"eed7e89\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a4d228 e-con-full e-flex e-con e-child\" data-id=\"2a4d228\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fb12253 elementor-widget elementor-widget-image\" data-id=\"fb12253\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"602\" height=\"225\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/Obrazok1.png\" class=\"attachment-large size-large wp-image-5279\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/Obrazok1.png 602w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/Obrazok1-300x112.png 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/Obrazok1-18x7.png 18w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/Obrazok1-600x225.png 600w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d53849f e-con-full e-flex e-con e-child\" data-id=\"d53849f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-22d6da9 elementor-widget elementor-widget-image\" data-id=\"22d6da9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"492\" height=\"217\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/Obrazok2.png\" class=\"attachment-large size-large wp-image-5280\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/Obrazok2.png 492w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/Obrazok2-300x132.png 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/Obrazok2-18x8.png 18w\" sizes=\"(max-width: 492px) 100vw, 492px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c70f53b e-flex e-con-boxed e-con e-parent\" data-id=\"c70f53b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-95fa065 elementor-widget elementor-widget-text-editor\" data-id=\"95fa065\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A sample scan of a suspicious page \u2013 VirusTotal (above) shows that the page has been flagged as malicious twice. URLScan also warns that it is a \u201cMalicious Activity\u201d page.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-28f5c37 e-flex e-con-boxed e-con e-parent\" data-id=\"28f5c37\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bb2e918 elementor-widget elementor-widget-spacer\" data-id=\"bb2e918\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Soci\u00e1lne in\u017einierstvo Sp\u00e4\u0165 Predo\u0161l\u00e1 t\u00e9ma \u010eal\u0161ia t\u00e9ma Soci\u00e1lne in\u017einierstvo s\u00fa met\u00f3dy, sp\u00f4soby a\u00a0techniky, ak\u00fdmi \u00fato\u010dn\u00edci manipuluj\u00fa\u00a0\u013eu\u010fmi, za \u00fa\u010delom dosiahnutia svojho cie\u013ea. Je to ak\u00fdko\u013evek druh \u00fatoku, ktor\u00fd nie je technick\u00e9ho charakteru, a ktor\u00fd zah\u0155\u0148a ur\u010dit\u00fd typ interakcie s\u00a0obe\u0165ou s cie\u013eom pok\u00fasi\u0165 sa ju oklama\u0165 alebo prin\u00fati\u0165 k odhaleniu inform\u00e1ci\u00ed alebo poru\u0161ovaniu be\u017en\u00fdch bezpe\u010dnostn\u00fdch postupov. \u00dato\u010dn\u00edkov, [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-3817","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3817","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=3817"}],"version-history":[{"count":154,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3817\/revisions"}],"predecessor-version":[{"id":7050,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3817\/revisions\/7050"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=3817"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}