{"id":4085,"date":"2025-04-24T21:29:22","date_gmt":"2025-04-24T19:29:22","guid":{"rendered":"https:\/\/cyberawareness.sk\/?page_id=4085"},"modified":"2025-12-18T12:38:27","modified_gmt":"2025-12-18T11:38:27","slug":"bezpecnost-mobilnych-zariadeni-ako-si-vybrat-bezpecny-telefon","status":"publish","type":"page","link":"https:\/\/cyberawareness.sk\/en\/bezpecnost-mobilnych-zariadeni-ako-si-vybrat-bezpecny-telefon\/","title":{"rendered":"Bezpe\u010dnos\u0165 mobiln\u00fdch zariaden\u00ed &#8211; Ako si vybra\u0165 bezpe\u010dn\u00fd telef\u00f3n?"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"4085\" class=\"elementor elementor-4085\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0dbe076 e-flex e-con-boxed e-con e-parent\" data-id=\"0dbe076\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d7c6a74 e-flex e-con-boxed e-con e-child\" data-id=\"d7c6a74\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46c502 elementor-widget elementor-widget-spacer\" data-id=\"b46c502\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1cbd28 elementor-widget elementor-widget-heading\" data-id=\"b1cbd28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Mobile Device Security<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4e38d28 elementor-widget elementor-widget-heading\" data-id=\"4e38d28\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Choosing a secure phone<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1b8b03b e-con-full e-flex e-con e-child\" data-id=\"1b8b03b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-db69134 elementor-widget elementor-widget-button\" data-id=\"db69134\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/vzdelavanie\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Back<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-99550a6 elementor-widget elementor-widget-button\" data-id=\"99550a6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/bezpecnost-mobilnych-zariadeni\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Previous topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60a9b98 elementor-widget elementor-widget-button\" data-id=\"60a9b98\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/cyberawareness.sk\/en\/socialne-inzinierstvo\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Next topic<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-362ca88 elementor-widget elementor-widget-spacer\" data-id=\"362ca88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21aa2d0 e-flex e-con-boxed e-con e-child\" data-id=\"21aa2d0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8b12f9e e-flex e-con-boxed e-con e-parent\" data-id=\"8b12f9e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-28152b5 elementor-widget elementor-widget-heading\" data-id=\"28152b5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">How to choose a secure phone?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79ab3d7 elementor-widget elementor-widget-text-editor\" data-id=\"79ab3d7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: #0c3a76;\"><strong>It is necessary to focus on two main parameters:\u00a0<\/strong><\/span><\/p><ul><li>Number of major updates.<\/li><li>Security patch release period.<\/li><\/ul><p class=\"MsoNormal\">This information is usually available online and can vary depending on the manufacturer and specific model. iPhones, Google Pixels, and Samsung devices tend to be supported the longest (but you'll need to find your specific model). Keeping <span style=\"color: #0c3a76;\"><strong>your software and apps up to date<\/strong><\/span> is key, as developers are constantly patching new vulnerabilities that could be exploited by hackers. <span style=\"color: #0c3a76;\"><strong>Enabling automatic updates<\/strong><\/span> helps keep your device protected without the need for manual intervention.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-542b31c elementor-widget elementor-widget-image\" data-id=\"542b31c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"768\" height=\"341\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Data_security_14-768x341.jpg\" class=\"attachment-medium_large size-medium_large wp-image-4087\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Data_security_14-768x341.jpg 768w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Data_security_14-300x133.jpg 300w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Data_security_14-1024x455.jpg 1024w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Data_security_14-1536x683.jpg 1536w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Data_security_14-2048x910.jpg 2048w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/02\/Data_security_14-18x8.jpg 18w\" sizes=\"(max-width: 768px) 100vw, 768px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Source: jcomp \/ Freepik<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-134a080 elementor-widget elementor-widget-heading\" data-id=\"134a080\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Biometric authentication<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08e6537 elementor-widget elementor-widget-text-editor\" data-id=\"08e6537\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Biometric authentication, such as using fingerprints or facial recognition, provides a convenient way to secure devices, but not all methods are equally secure.<\/p><p><span style=\"color: #0c3a76;\"><strong>Biometric verification methods:<\/strong><\/span><\/p><ol><li><strong><span style=\"color: #0c3a76;\">Optical (mainly those under the display) sensors:<\/span> <\/strong>They use a camera that takes a photo of the fingerprint (If someone were to obtain a photo of this fingerprint, they would be able to bypass this verification).<\/li><li><span style=\"color: #0c3a76;\"><strong>Capacitive sensors:<\/strong><\/span> They are more reliable because they do not record a photo, but work with changes in the electrical charge of the finger.<\/li><li><span style=\"color: #0c3a76;\"><strong>Ultrasonic sensors:<\/strong><\/span> They take into account multiple parameters, such as the depth and width of the finger.<\/li><li><span style=\"color: #0c3a76;\"><strong>Face unlock:<\/strong> <\/span>Some phones only authenticate based on the camera, which can be bypassed with a photo, for example. iPhones use FaceID technology, which uses an infrared projector and a camera that takes photos of the face, or spatial scan. So they capture not only what the face looks like but also the depth of the face and its general features.<\/li><\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a31f00 e-flex e-con-boxed e-con e-parent\" data-id=\"5a31f00\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-91e5afe e-con-full e-flex e-con e-child\" data-id=\"91e5afe\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-eed19a0 elementor-widget elementor-widget-image\" data-id=\"eed19a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/synaptics-clear-id-800x450.jpg\" class=\"attachment-ocean-thumb-ml size-ocean-thumb-ml wp-image-5178\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Optical sensor. Source: https:\/\/www.engadget.com\/2017-12-12-under-display-fingerprint-reader-arrives-on-major-phone.html<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-50b5cef e-con-full e-flex e-con e-child\" data-id=\"50b5cef\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c82781f elementor-widget elementor-widget-image\" data-id=\"c82781f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"422\" src=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/phone-fingerprint-sensor-800x422.jpg\" class=\"attachment-ocean-thumb-ml size-ocean-thumb-ml wp-image-5179\" alt=\"\" srcset=\"https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/phone-fingerprint-sensor-800x422.jpg 800w, https:\/\/cyberawareness.sk\/wp-content\/uploads\/2025\/06\/phone-fingerprint-sensor-18x9.jpg 18w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">Capacitive sensor. Source: https:\/\/www.makeuseof.com\/fixes-fingerprint-sensor-isnt-working<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-dd4a5f7 e-flex e-con-boxed e-con e-parent\" data-id=\"dd4a5f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e486253 elementor-widget elementor-widget-spacer\" data-id=\"e486253\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Bezpe\u010dnos\u0165 mobiln\u00fdch zariaden\u00ed V\u00fdber bezpe\u010dn\u00e9ho telef\u00f3nu Sp\u00e4\u0165 Predo\u0161l\u00e1 t\u00e9ma \u010eal\u0161ia t\u00e9ma Ako si vybra\u0165 bezpe\u010dn\u00fd telef\u00f3n? Je potrebn\u00e9 sa zamera\u0165 na dva hlavn\u00e9 parametre:\u00a0 Po\u010det ve\u013ek\u00fdch aktualiz\u00e1ci\u00ed. Doba vyd\u00e1vania bezpe\u010dnostn\u00fdch z\u00e1plat. Tieto inform\u00e1cie s\u00fa v\u00e4\u010d\u0161inou dostupn\u00e9 na internete a m\u00f4\u017eu sa l\u00ed\u0161i\u0165 v z\u00e1vislosti od v\u00fdrobcu aj konkr\u00e9tneho modelu. Zariadenia zna\u010dky iPhone, Google Pixel a [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":""},"class_list":["post-4085","page","type-page","status-publish","hentry","entry"],"_links":{"self":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4085","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/comments?post=4085"}],"version-history":[{"count":33,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4085\/revisions"}],"predecessor-version":[{"id":7041,"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/pages\/4085\/revisions\/7041"}],"wp:attachment":[{"href":"https:\/\/cyberawareness.sk\/en\/wp-json\/wp\/v2\/media?parent=4085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}