{"id":3437,"date":"2018-06-26T12:13:10","date_gmt":"2018-06-26T09:13:10","guid":{"rendered":"https:\/\/www.one-it.ro\/blog\/?p=3437"},"modified":"2018-06-26T12:22:49","modified_gmt":"2018-06-26T09:22:49","slug":"infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365","status":"publish","type":"post","link":"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/","title":{"rendered":"Infractorii cibernetici care folosesc \u201ee-mail phishing\u201d reu\u0219esc s\u0103 evite m\u0103surile de protec\u021bie ale MS Office 365"},"content":{"rendered":"\n\n<div class=\"kk-star-ratings kksr-auto kksr-align-right kksr-valign-top\"\n    data-payload='{&quot;align&quot;:&quot;right&quot;,&quot;id&quot;:&quot;3437&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;top&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;1&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;5&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;4&quot;,&quot;greet&quot;:&quot;Rate this post&quot;,&quot;legend&quot;:&quot;5\\\/5 - (1 vote)&quot;,&quot;size&quot;:&quot;12&quot;,&quot;width&quot;:&quot;78&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n            \n<div class=\"kksr-stars\">\n    \n<div class=\"kksr-stars-inactive\">\n            <div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n    <\/div>\n    \n<div class=\"kksr-stars-active\" style=\"width: 78px;\">\n            <div class=\"kksr-star\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 4px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 12px; height: 12px;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>\n                \n\n<div class=\"kksr-legend\" style=\"font-size: 9.6px;\">\n            5\/5 - (1 vote)    <\/div>\n    <\/div>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-3446\" src=\"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2018\/06\/rawpixel-651365-unsplash.jpg\" alt=\"e-mail phishing\" width=\"3000\" height=\"2000\" \/><\/p>\n<p>Atacurile cibernetice sunt tot mai dese \u0219i mai puternice. Mai mult, hackerii caut\u0103 noi metode de a trece de securitatea programelor, pentru a face ilegalit\u0103\u021bi. \u00cens\u0103 speciali\u0219tii \u00een securitatea informatic\u0103 fac eforturi pentru a le face fa\u021b\u0103. Iat\u0103 ce metode folosesc hackerii pentru a trece de m\u0103surile de securitate ale <strong>Microsoft Office 365<\/strong>!<!--more--><\/p>\n<p>Cercet\u0103torii din domeniul securit\u0103\u021bii avertizeaz\u0103 cu privire la o tehnic\u0103 simpl\u0103 pe care infractorii cibernetici o folosesc, pentru a ocoli cele mai multe mecanisme de detectare a phishing-ului implementate de cele mai utilizate servicii de e-mail \u0219i scanere de securitate web.<\/p>\n<p><strong>Tehnica ZeroFont<\/strong> presupune introducerea unor cuvinte ascunse cu o dimensiune a fontului de zero \u00een con\u021binutul real al unui e-mail phishing. Aspectul vizual al e-mailului este acela\u0219i, \u00eens\u0103, este nedetectabil de scanerele de securitate ale e-mailului.<\/p>\n<p>Potrivit companiei de securitate cloud <a href=\"https:\/\/www.avanan.com\/resources\/zerofont-phishing-attack\" target=\"_blank\" rel=\"noopener\">Avanan<\/a>, Microsoft Office 365 nu reu\u0219e\u0219te, de asemenea, s\u0103 detecteze astfel de e-mailuri ca fiind d\u0103un\u0103toare \u00een urma folosirii tehnicii ZeroFont.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter size-full wp-image-3441\" src=\"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2018\/06\/zerofont.gif\" alt=\"e-mail phishing\" width=\"600\" height=\"44\" \/><\/p>\n<p>La fel ca Microsoft Office 365, multe servicii de po\u0219t\u0103 electronic\u0103 \u0219i securitate web utilizeaz\u0103 tehnici de prelucrare a limbajului natural \u0219i alte tehnici de \u00eenv\u0103\u021bare automat\u0103 bazate pe inteligen\u021b\u0103 artificial\u0103, pentru a identifica mai rapid e-mailuri d\u0103un\u0103toare de tip \u201emalware\u201d \u0219i de tip phishing. Aceast\u0103 tehnologia ajut\u0103 companiile de securitate s\u0103 analizeze, s\u0103 \u00een\u021beleag\u0103 \u0219i s\u0103 ob\u021bin\u0103 o semnifica\u021bie din textul nestructurat \u00eencorporat \u00eentr-un e-mail sau pagin\u0103 web, prin identificarea unor indicatori baza\u021bi pe text, precum escrocherii prin e-mail. Acestea imit\u0103 o companie cunoscut\u0103, fraze utilizate pentru a solicita pl\u0103\u021bi, resetarea de parole \u0219i altele.<\/p>\n<p>Cu toate acestea, prin ad\u0103ugarea aleatorie de caractere cu font zero \u00eentre textele indicatorilor prezenta\u021bi \u00eentr-un e-mail phishing, infractorii cibernetici pot transforma ace\u0219ti indicatori \u00eentr-un text nestructurat de tip \u201egarbage\u201d, ascunz\u00e2ndu-i de motorul de procesare al limbajului natural.<\/p>\n<p>Astfel, e-mailul pare normal din punct de vedere vizual, dar Microsoft cite\u0219te \u00eentregul text de tip garbage, chiar dac\u0103 nu este vizibil.<\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"aligncenter wp-image-3442\" src=\"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2018\/06\/zerofont.png\" alt=\"e-mail phishing\" width=\"594\" height=\"486\" \/><\/p>\n<p>Pe blogul companiei Avanan se spune c\u0103 \u201eMicrosoft nu \u00eel poate identifica ca fiind un e-mail de falsificare, deoarece nu poate vedea cuv\u00e2ntul &lt;&lt;Microsoft &gt;&gt; \u00een versiunea f\u0103r\u0103 emula\u021bie&#8230; \u00cen esen\u021b\u0103, atacul ZeroFont face posibil\u0103 afi\u0219area unui mesaj filtrelor anti-phishing \u0219i altui mesaj c\u0103tre utilizatorul final\u201d.<\/p>\n<p>Pe l\u00e2ng\u0103 tehnica ZeroFont s-au detectat \u0219i alte trucuri folosite de hackeri, precum uilizarea caracterelor Punycode, Unicode sau Hexadecimal Escape, \u00een atacurile de tip phishing.<\/p>\n<p>Mai mult, cercet\u0103torii au descoperit c\u0103 infractorii cibernetici au divizat URL-ul d\u0103un\u0103tor, astfel \u00eenc\u00e2t nu poate fi identificat sau \u00eenlocuit hyperlink-ul par\u021bial de caracteristica de securitate Safe Links din Office 365. Acest lucru duce la redirec\u021bionarea victimelor c\u0103tre un site de tip phishing.<\/p>\n<p>Pericolele din lumea virtual\u0103 exist\u0103 la fiecare pas. Provocarea adev\u0103rat\u0103 este de a g\u0103si modalit\u0103\u021bi pentru a le combate. Pentru a \u021bine pasul cu aceste pericole, fiecare trebuie s\u0103 \u00ee\u0219i ia m\u0103suri de siguran\u021b\u0103 pentru a minimiza amenin\u021barea. Desigur, vor exista mereu noi modalit\u0103\u021bi prin care infractorii cibernetici vor face ilegalit\u0103\u021bi \u0219i vor ataca spa\u021biul virtual. \u00cens\u0103 \u00een aceea\u0219i m\u0103sur\u0103, vor exista \u0219i speciali\u0219ti care caut\u0103 solu\u021bii pentru a le combate.<\/p>\n<p>&nbsp;<\/p>\n<p>Sursa informa\u021biilor din acest articol: <a href=\"https:\/\/thehackernews.com\/2018\/06\/email-phishing-protection.html\" target=\"_blank\" rel=\"noopener\">https:\/\/thehackernews.com\/2018\/06\/email-phishing-protection.html<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atacurile cibernetice sunt tot mai dese \u0219i mai puternice. Mai mult, hackerii caut\u0103 noi metode de a trece de securitatea programelor, pentru a face ilegalit\u0103\u021bi. \u00cens\u0103 speciali\u0219tii \u00een securitatea informatic\u0103 fac eforturi pentru a le face fa\u021b\u0103. Iat\u0103 ce metode folosesc hackerii pentru a trece de m\u0103surile de securitate ale Microsoft Office 365!<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[202],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Infractorii cibernetici care folosesc \u201ee-mail phishing\u201d reu\u0219esc s\u0103 evite m\u0103surile de protec\u021bie ale MS Office 365<\/title>\n<meta name=\"description\" content=\"Hackerii folosesc e-mail phishing pentru a ocoli m\u0103surile de securitate ale Microsoft Office 365. Iat\u0103 care sunt \u0219i cum \u00eencearc\u0103 speciali\u0219tii s\u0103 le combat\u0103.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Infractorii cibernetici care folosesc \u201ee-mail phishing\u201d reu\u0219esc s\u0103 evite m\u0103surile de protec\u021bie ale MS Office 365\" \/>\n<meta property=\"og:description\" content=\"Hackerii folosesc e-mail phishing pentru a ocoli m\u0103surile de securitate ale Microsoft Office 365. Iat\u0103 care sunt \u0219i cum \u00eencearc\u0103 speciali\u0219tii s\u0103 le combat\u0103.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/\" \/>\n<meta property=\"og:site_name\" content=\"One-IT blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OneIT\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-26T09:13:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-06-26T09:22:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2018\/06\/rawpixel-651365-unsplash.jpg\" \/>\n<meta name=\"author\" content=\"Gabriela\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@oneitro\" \/>\n<meta name=\"twitter:site\" content=\"@oneitro\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gabriela\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/\"},\"author\":{\"name\":\"Gabriela\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/6f9301b0b13e41b64fc7ff4de0c91fa2\"},\"headline\":\"Infractorii cibernetici care folosesc \u201ee-mail phishing\u201d reu\u0219esc s\u0103 evite m\u0103surile de protec\u021bie ale MS Office 365\",\"datePublished\":\"2018-06-26T09:13:10+00:00\",\"dateModified\":\"2018-06-26T09:22:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/\"},\"wordCount\":576,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/#organization\"},\"articleSection\":[\"Sfaturi IT\"],\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/\",\"url\":\"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/\",\"name\":\"Infractorii cibernetici care folosesc \u201ee-mail phishing\u201d reu\u0219esc s\u0103 evite m\u0103surile de protec\u021bie ale MS Office 365\",\"isPartOf\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/#website\"},\"datePublished\":\"2018-06-26T09:13:10+00:00\",\"dateModified\":\"2018-06-26T09:22:49+00:00\",\"description\":\"Hackerii folosesc e-mail phishing pentru a ocoli m\u0103surile de securitate ale Microsoft Office 365. Iat\u0103 care sunt \u0219i cum \u00eencearc\u0103 speciali\u0219tii s\u0103 le combat\u0103.\",\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#website\",\"url\":\"https:\/\/www.one-it.ro\/blog\/\",\"name\":\"One-IT blog\",\"description\":\"Mai mult dec\u00e2t un expert, un prieten!\",\"publisher\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.one-it.ro\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#organization\",\"name\":\"ONE-IT\",\"url\":\"https:\/\/www.one-it.ro\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2019\/10\/logo_OneIT.png\",\"contentUrl\":\"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2019\/10\/logo_OneIT.png\",\"width\":255,\"height\":230,\"caption\":\"ONE-IT\"},\"image\":{\"@id\":\"https:\/\/www.one-it.ro\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/OneIT\",\"https:\/\/twitter.com\/oneitro\",\"https:\/\/www.instagram.com\/oneit.ro\/\",\"https:\/\/www.linkedin.com\/company\/oneit\/\",\"https:\/\/www.youtube.com\/oneit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/6f9301b0b13e41b64fc7ff4de0c91fa2\",\"name\":\"Gabriela\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1007da32e4544ea8b1a58fdb9fe846ae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1007da32e4544ea8b1a58fdb9fe846ae?s=96&d=mm&r=g\",\"caption\":\"Gabriela\"},\"description\":\"ONE-IT - Smart technologies, Cyber Security, Cloud, integrated IT solutions for business productivity. Detalii despre noi: echipa One-IT\",\"sameAs\":[\"http:\/\/goo.gl\/DCFbmW\"],\"url\":\"https:\/\/www.one-it.ro\/blog\/author\/gabriela\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Infractorii cibernetici care folosesc \u201ee-mail phishing\u201d reu\u0219esc s\u0103 evite m\u0103surile de protec\u021bie ale MS Office 365","description":"Hackerii folosesc e-mail phishing pentru a ocoli m\u0103surile de securitate ale Microsoft Office 365. Iat\u0103 care sunt \u0219i cum \u00eencearc\u0103 speciali\u0219tii s\u0103 le combat\u0103.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/","og_locale":"ro_RO","og_type":"article","og_title":"Infractorii cibernetici care folosesc \u201ee-mail phishing\u201d reu\u0219esc s\u0103 evite m\u0103surile de protec\u021bie ale MS Office 365","og_description":"Hackerii folosesc e-mail phishing pentru a ocoli m\u0103surile de securitate ale Microsoft Office 365. Iat\u0103 care sunt \u0219i cum \u00eencearc\u0103 speciali\u0219tii s\u0103 le combat\u0103.","og_url":"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/","og_site_name":"One-IT blog","article_publisher":"https:\/\/www.facebook.com\/OneIT","article_published_time":"2018-06-26T09:13:10+00:00","article_modified_time":"2018-06-26T09:22:49+00:00","og_image":[{"url":"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2018\/06\/rawpixel-651365-unsplash.jpg"}],"author":"Gabriela","twitter_card":"summary_large_image","twitter_creator":"@oneitro","twitter_site":"@oneitro","twitter_misc":{"Scris de":"Gabriela","Timp estimat pentru citire":"3 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/#article","isPartOf":{"@id":"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/"},"author":{"name":"Gabriela","@id":"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/6f9301b0b13e41b64fc7ff4de0c91fa2"},"headline":"Infractorii cibernetici care folosesc \u201ee-mail phishing\u201d reu\u0219esc s\u0103 evite m\u0103surile de protec\u021bie ale MS Office 365","datePublished":"2018-06-26T09:13:10+00:00","dateModified":"2018-06-26T09:22:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/"},"wordCount":576,"commentCount":0,"publisher":{"@id":"https:\/\/www.one-it.ro\/blog\/#organization"},"articleSection":["Sfaturi IT"],"inLanguage":"ro-RO","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/","url":"https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/","name":"Infractorii cibernetici care folosesc \u201ee-mail phishing\u201d reu\u0219esc s\u0103 evite m\u0103surile de protec\u021bie ale MS Office 365","isPartOf":{"@id":"https:\/\/www.one-it.ro\/blog\/#website"},"datePublished":"2018-06-26T09:13:10+00:00","dateModified":"2018-06-26T09:22:49+00:00","description":"Hackerii folosesc e-mail phishing pentru a ocoli m\u0103surile de securitate ale Microsoft Office 365. Iat\u0103 care sunt \u0219i cum \u00eencearc\u0103 speciali\u0219tii s\u0103 le combat\u0103.","inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.one-it.ro\/blog\/infractorii-cibernetici-e-mail-phishing-evita-masurile-de-protectie-ms-office-365\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.one-it.ro\/blog\/#website","url":"https:\/\/www.one-it.ro\/blog\/","name":"One-IT blog","description":"Mai mult dec\u00e2t un expert, un prieten!","publisher":{"@id":"https:\/\/www.one-it.ro\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.one-it.ro\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ro-RO"},{"@type":"Organization","@id":"https:\/\/www.one-it.ro\/blog\/#organization","name":"ONE-IT","url":"https:\/\/www.one-it.ro\/blog\/","logo":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.one-it.ro\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2019\/10\/logo_OneIT.png","contentUrl":"https:\/\/www.one-it.ro\/blog\/wp-content\/uploads\/2019\/10\/logo_OneIT.png","width":255,"height":230,"caption":"ONE-IT"},"image":{"@id":"https:\/\/www.one-it.ro\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OneIT","https:\/\/twitter.com\/oneitro","https:\/\/www.instagram.com\/oneit.ro\/","https:\/\/www.linkedin.com\/company\/oneit\/","https:\/\/www.youtube.com\/oneit"]},{"@type":"Person","@id":"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/6f9301b0b13e41b64fc7ff4de0c91fa2","name":"Gabriela","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.one-it.ro\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1007da32e4544ea8b1a58fdb9fe846ae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1007da32e4544ea8b1a58fdb9fe846ae?s=96&d=mm&r=g","caption":"Gabriela"},"description":"ONE-IT - Smart technologies, Cyber Security, Cloud, integrated IT solutions for business productivity. Detalii despre noi: echipa One-IT","sameAs":["http:\/\/goo.gl\/DCFbmW"],"url":"https:\/\/www.one-it.ro\/blog\/author\/gabriela\/"}]}},"_links":{"self":[{"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/posts\/3437"}],"collection":[{"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/comments?post=3437"}],"version-history":[{"count":10,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/posts\/3437\/revisions"}],"predecessor-version":[{"id":3450,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/posts\/3437\/revisions\/3450"}],"wp:attachment":[{"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/media?parent=3437"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/categories?post=3437"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.one-it.ro\/blog\/wp-json\/wp\/v2\/tags?post=3437"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}