{"id":3903,"date":"2025-03-21T14:08:19","date_gmt":"2025-03-21T13:08:19","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=3903"},"modified":"2025-12-10T12:06:34","modified_gmt":"2025-12-10T11:06:34","slug":"malver-sposoby-sirenia-a-ochrana-pred-malverom","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/malver-sposoby-sirenia-a-ochrana-pred-malverom\/","title":{"rendered":"Malv\u00e9r &#8211; Sp\u00f4soby \u0161\u00edrenia a ochrana pred malv\u00e9rom"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"3903\" class=\"elementor elementor-3903\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Malware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0d96ee1 elementor-widget elementor-widget-heading\" data-id=\"0d96ee1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Methods of spread and protection against malware<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-faa3347 e-con-full e-flex e-con e-child\" data-id=\"faa3347\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e70b10 elementor-widget elementor-widget-button\" data-id=\"5e70b10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/vzdelavanie\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a378696 elementor-widget elementor-widget-button\" data-id=\"a378696\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/typy-malveru\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Previous topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7e9409f elementor-widget elementor-widget-button\" data-id=\"7e9409f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/bezpecnost-mobilnych-zariadeni\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Next topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-362ca88 elementor-widget elementor-widget-spacer\" data-id=\"362ca88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21aa2d0 e-flex e-con-boxed e-con e-child\" data-id=\"21aa2d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32a31f2 e-flex e-con-boxed e-con e-parent\" data-id=\"32a31f2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d3dbed4 elementor-widget elementor-widget-heading\" data-id=\"d3dbed4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Ways malware spreads<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-de76c35 elementor-widget elementor-widget-text-editor\" data-id=\"de76c35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>From an information security and malware protection perspective, it is important to understand the ways in which malware can spread. An attacker can spread malware using one or more of the following methods:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b01880d e-flex e-con-boxed e-con e-parent\" data-id=\"b01880d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-89bd2bd e-n-tabs-mobile elementor-widget elementor-widget-n-tabs\" data-id=\"89bd2bd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;horizontal_scroll&quot;:&quot;disable&quot;}\" data-widget_type=\"nested-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-tabs\" data-widget-number=\"144429757\" aria-label=\"Tabs. Open items with Enter or Space, close with Escape and navigate using the Arrow keys.\" data-no-translation-aria-label=\"\">\n\t\t\t<div class=\"e-n-tabs-heading\" role=\"tablist\">\n\t\t\t\t\t<button id=\"e-n-tab-title-1444297571\" data-tab-title-id=\"e-n-tab-title-1444297571\" class=\"e-n-tab-title\" aria-selected=\"true\" data-tab-index=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"e-n-tab-content-1444297571\" style=\"--n-tabs-title-order: 1;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tPhysical media\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1444297572\" data-tab-title-id=\"e-n-tab-title-1444297572\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1444297572\" style=\"--n-tabs-title-order: 2;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tEmail messages\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1444297573\" data-tab-title-id=\"e-n-tab-title-1444297573\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1444297573\" style=\"--n-tabs-title-order: 3;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tChat and social network\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1444297574\" data-tab-title-id=\"e-n-tab-title-1444297574\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1444297574\" style=\"--n-tabs-title-order: 4;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tURL links\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1444297575\" data-tab-title-id=\"e-n-tab-title-1444297575\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"5\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1444297575\" style=\"--n-tabs-title-order: 5;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tFile sharing\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t<button id=\"e-n-tab-title-1444297576\" data-tab-title-id=\"e-n-tab-title-1444297576\" class=\"e-n-tab-title\" aria-selected=\"false\" data-tab-index=\"6\" role=\"tab\" tabindex=\"-1\" aria-controls=\"e-n-tab-content-1444297576\" style=\"--n-tabs-title-order: 6;\">\n\t\t\t\t\t\t<span class=\"e-n-tab-title-text\">\n\t\t\t\tSoftware vulnerability\t\t\t<\/span>\n\t\t<\/button>\n\t\t\t\t\t<\/div>\n\t\t\t<div class=\"e-n-tabs-content\">\n\t\t\t\t<div id=\"e-n-tab-content-1444297571\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1444297571\" data-tab-index=\"1\" style=\"--n-tabs-title-order: 1;\" class=\"e-active elementor-element elementor-element-57d422e e-con-full e-flex e-con e-child\" data-id=\"57d422e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6adafa4 elementor-widget elementor-widget-text-editor\" data-id=\"6adafa4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This is one of the <span style=\"color: #0c3a76;\"><strong>oldest ways of spreading malware<\/strong><\/span>, which does not require a computer network.<\/p><p>Nowadays, it is necessary to pay particular attention to <span style=\"color: #0c3a76;\"><strong>USB flash drives<\/strong><\/span>, which are a frequent gift item from various meetings, conferences, etc.<\/p><p>Another popular tactic is the so-called <span style=\"color: #0c3a76;\"><strong>\"USB drop attack\"<\/strong><\/span>, in which an attacker leaves an infected USB in publicly accessible places (parking lots, reception areas, company hallways) in the hope that someone will plug it into a computer out of curiosity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1444297572\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1444297572\" data-tab-index=\"2\" style=\"--n-tabs-title-order: 2;\" class=\"elementor-element elementor-element-afddf27 e-con-full e-flex e-con e-child\" data-id=\"afddf27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-09bad81 elementor-widget elementor-widget-text-editor\" data-id=\"09bad81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Email messages are one of\u202f <span style=\"color: #0c3a76;\"><strong>the most effective<\/strong> <strong>ways to spread malware<\/strong>.<\/span> Anyone with an email account can be a potential target.<\/p><p>Various forms of social engineering (e.g. phishing, spear phishing) are most often used for this purpose.<\/p><p>Currently, every email service provider has at least basic protection against this method of malware distribution.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1444297573\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1444297573\" data-tab-index=\"3\" style=\"--n-tabs-title-order: 3;\" class=\"elementor-element elementor-element-c5899b2 e-con-full e-flex e-con e-child\" data-id=\"c5899b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e01b6f8 elementor-widget elementor-widget-text-editor\" data-id=\"e01b6f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>They are one of\u202f <span style=\"color: #0c3a76;\"><strong>the fastest ways to spread malware<\/strong>.<\/span> All an attacker needs to do is send a link to a malicious URL.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1444297574\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1444297574\" data-tab-index=\"4\" style=\"--n-tabs-title-order: 4;\" class=\"elementor-element elementor-element-f791266 e-flex e-con-boxed e-con e-child\" data-id=\"f791266\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6212803 elementor-widget elementor-widget-text-editor\" data-id=\"6212803\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This method of malware distribution is directly related to the security of web servers, and at the same time, to the safe browsing of web content.<\/p><p>The attacker places the malware directly on a specific web address. They can send it to you directly or disguise it in various ways, such as in an image or another URL link that redirects you to a malicious page.<\/p><p>The page downloads malicious code to your device. In the worst case scenario, the code is directly executed.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1444297575\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1444297575\" data-tab-index=\"5\" style=\"--n-tabs-title-order: 5;\" class=\"elementor-element elementor-element-7a48d48 e-flex e-con-boxed e-con e-child\" data-id=\"7a48d48\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47c60f1 elementor-widget elementor-widget-text-editor\" data-id=\"47c60f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Once malware is downloaded to a device, the malware can automatically replace or add additional malicious files to shared directories, ensuring further spread.<\/p><p>To get users to download and run files, malware uses enticing names, such as <strong><span style=\"color: #0c3a76;\">Windowscrack.exe<\/span><\/strong>, <strong><span style=\"color: #0c3a76;\">Nhl2018crack.exe<\/span><\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div id=\"e-n-tab-content-1444297576\" role=\"tabpanel\" aria-labelledby=\"e-n-tab-title-1444297576\" data-tab-index=\"6\" style=\"--n-tabs-title-order: 6;\" class=\"elementor-element elementor-element-45d3571 e-flex e-con-boxed e-con e-child\" data-id=\"45d3571\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8fb17f6 elementor-widget elementor-widget-text-editor\" data-id=\"8fb17f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Any software can contain bugs or vulnerabilities that can be exploited by attackers to infect devices.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-58d4eb5 e-flex e-con-boxed e-con e-parent\" data-id=\"58d4eb5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-217df78 elementor-widget elementor-widget-image\" data-id=\"217df78\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/12\/macrovirusesen-1.png\" title=\"macrovirusessk\" alt=\"macrovirusessk\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: https:\/\/us.norton.com\/content\/dam\/blogs\/images\/norton\/am\/What-is-a-macro-virus-02.png<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d5cbf4 e-flex e-con-boxed e-con e-parent\" data-id=\"8d5cbf4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-17d5772 elementor-widget elementor-widget-spacer\" data-id=\"17d5772\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-afa39f6 e-flex e-con-boxed e-con e-parent\" data-id=\"afa39f6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08bef55 elementor-widget elementor-widget-heading\" data-id=\"08bef55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to protect yourself from malware<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-fe8080f e-flex e-con-boxed e-con e-parent\" data-id=\"fe8080f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3f20c25 elementor-widget elementor-widget-text-editor\" data-id=\"3f20c25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><span style=\"color: #0c3a76;\"><strong>Update your software and operating system<\/strong>:<\/span> Keep your devices and software up to date with regular updates. This can help close security gaps that could be exploited by malware.<\/li><li><span style=\"color: #0c3a76;\"><strong>Use strong passwords and two-factor authentication<\/strong><\/span>: Create strong and unique passwords for your accounts and enable two-factor authentication where possible.<\/li><li><span style=\"color: #0c3a76;\"><strong>Be careful when opening attachments and clicking links<\/strong>:<\/span> Be careful when opening attachments in emails or clicking links, especially from unknown senders.<\/li><li><span style=\"color: #0c3a76;\"><strong>Using antivirus software<\/strong>:<\/span> Install and regularly update reliable antivirus software on your device.<\/li><li><strong><span style=\"color: #0c3a76;\">Check and scan files:<\/span><\/strong> Before downloading or opening files from unknown sources, scan them with antivirus software or online services like VirusTotal, URLScan Hybrid Analysis, and Any.run.<\/li><\/ol><ul><li style=\"list-style-type: none;\"><ul><li><strong><span style=\"color: #0c3a76;\">VirusTotal<\/span><\/strong> \u2013 an online tool that analyzes suspicious files and URLs to detect various types of malware. The tool is available at: <a href=\"https:\/\/www.virustotal.com\">https:\/\/www.virustotal.com<\/a><\/li><li><strong><span style=\"color: #0c3a76;\">Hybrid analysis<\/span><\/strong> \u2013 a free malware analysis service that detects and analyzes unknown threats using unique hybrid analysis technology. The tool is available at: <a href=\"https:\/\/hybrid-analysis.com\/\">https:\/\/hybrid-analysis.com\/<\/a><\/li><li><strong><span style=\"color: #0c3a76;\">Any.run<\/span><\/strong> \u2013 an online malware execution tool. The tool is available at: <a href=\"https:\/\/any.run\/\">https:\/\/any.run\/<\/a><\/li><li><strong><span style=\"color: #0c3a76;\">URLScan<\/span><\/strong> \u2013 a free online service designed to scan and analyze web addresses (URLs) to detect potentially malicious or dangerous elements on those pages. Tool available at: <a href=\"https:\/\/urlscan.io\/\">https:\/\/urlscan.io\/\u00a0<\/a><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d5dcca0 e-flex e-con-boxed e-con e-parent\" data-id=\"d5dcca0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2c7aa86 elementor-widget elementor-widget-spacer\" data-id=\"2c7aa86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-505fe77 e-flex e-con-boxed e-con e-parent\" data-id=\"505fe77\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7429b1 elementor-widget elementor-widget-heading\" data-id=\"b7429b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What to do if you suspect malware<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1fe67c3 e-flex e-con-boxed e-con e-parent\" data-id=\"1fe67c3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3994a4e elementor-widget elementor-widget-text-editor\" data-id=\"3994a4e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ol><li><span style=\"color: #0c3a76;\"><strong>Scan with antivirus software<\/strong>:<\/span> : If you suspect a malware infection, it's important to scan your device with at least two antivirus programs, if possible. These tools can identify and remove malware.<\/li><li><span style=\"color: #0c3a76;\"><strong>Contact your local administrator<\/strong>:<\/span> For work or corporate devices, you should immediately contact your local administrator for a quick and effective resolution of the situation.<\/li><li><span style=\"color: #0c3a76;\"><strong>Consult an expert<\/strong>:<\/span> If you feel unsure or the situation requires a professional opinion, consulting an IT professional or security expert can be helpful.<\/li><li><span style=\"color: #0c3a76;\"><strong>Reinstall the device and restore uninfected data from backup<\/strong>:<\/span> In extreme cases, if the device is heavily infected, it may be necessary to reinstall the operating system. It is important to have backups of uninfected data that can be restored after the reinstallation.<\/li><li><span style=\"color: #0c3a76;\"><strong>System Restore option in Windows:<\/strong><\/span>Windows includes a System Restore feature that allows you to revert the system to a previous state before a malware infection. This option can be useful, but it is not always completely reliable.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8b0bf72 e-flex e-con-boxed e-con e-parent\" data-id=\"8b0bf72\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6bd1bc1 elementor-widget elementor-widget-spacer\" data-id=\"6bd1bc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Malv\u00e9r Sp\u00f4soby \u0161\u00edrenia a ochrana pred malv\u00e9rom Sp\u00e4\u0165 Predo\u0161l\u00e1 t\u00e9ma \u010eal\u0161ia t\u00e9ma Sp\u00f4soby \u0161\u00edrenia malv\u00e9ru Z poh\u013eadu informa\u010dnej bezpe\u010dnosti a ochrany vo\u010di malv\u00e9ru je d\u00f4le\u017eit\u00e9 pozna\u0165 sp\u00f4soby, ak\u00fdmi sa malv\u00e9r m\u00f4\u017ee \u0161\u00edri\u0165.\u00a0 \u00dato\u010dn\u00edk m\u00f4\u017ee \u0161\u00edri\u0165 malv\u00e9r pomocou jedn\u00e9ho alebo viacer\u00fdch nasleduj\u00facich sp\u00f4sobov: Fyzick\u00e9 m\u00e9dia E-mailov\u00e9 spr\u00e1vy Chat a soci\u00e1lne siete URL odkazy Zdie\u013eanie s\u00faborov Zranite\u013enos\u0165 [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-3903","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=3903"}],"version-history":[{"count":73,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3903\/revisions"}],"predecessor-version":[{"id":6932,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/3903\/revisions\/6932"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=3903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}