{"id":51227,"date":"2021-11-23T13:53:29","date_gmt":"2021-11-23T12:53:29","guid":{"rendered":"https:\/\/fotc.com\/?p=51227"},"modified":"2022-11-03T09:45:53","modified_gmt":"2022-11-03T08:45:53","slug":"atacurile-phishing-cum-protejeaza-google-utilizatorii","status":"publish","type":"post","link":"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/","title":{"rendered":"Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii \u00een fa\u021ba acestora?"},"content":{"rendered":"\n<div class=\"wp-block-yoast-seo-table-of-contents yoast-table-of-contents collapsed\"><h2>  Cuprins  <\/h2><ul><li><a href=\"#h-ce-este-phishing-ul-i-ce-tipuri-de-atac-phishing-exist\" data-level=\"2\">Ce este phishing-ul \u0219i ce tipuri de atac phishing exist\u0103?<\/a><\/li><li><a href=\"#h-cine-poate-c-dea-victim-unui-atac-phishing\" data-level=\"2\"> Cine poate c\u0103dea victim\u0103 unui atac phishing? <\/a><\/li><li><a href=\"#h-cum-recuno-ti-un-atac-phishing\" data-level=\"2\"> Cum recuno\u0219ti un atac phishing? <\/a><\/li><li><a href=\"#h-cum-v-proteja-i-n-fa-a-atacurilor-online-phishing\" data-level=\"2\"> Cum v\u0103 proteja\u021bi \u00een fa\u021ba atacurilor online phishing? <\/a><\/li><li><a href=\"#h-cum-i-protejeaz-google-utilizatorii-n-fa-a-amenin-rilor-phishing\" data-level=\"2\"> Cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii \u00een fa\u021ba amenin\u021b\u0103rilor phishing? <\/a><ul><li><a href=\"#h-protec-ie-mpotriva-phishing-ului-n-gmail-chrome-sau-google-workspace\" data-level=\"3\"> Protec\u021bie \u00eempotriva phishing-ului \u00een Gmail, Chrome sau Google Workspace <\/a><\/li><li><a href=\"#h-protec-ie-anti-phishing-pentru-utilizatorii-android\" data-level=\"3\"> Protec\u021bie anti-phishing pentru utilizatorii Android <\/a><\/li><\/ul><\/li><li><a href=\"#h-chestionar-phishing-de-la-google\" data-level=\"2\"> Chestionar phishing de la Google <\/a><\/li><\/ul><\/div>\n\n\n\n<p>Atacurile online sunt mai mediatizate ca niciodat\u0103, dar la fel sunt \u0219i metodele de preven\u021bie sau de solu\u021bionare ale acestora. Atacurile de phishing sunt printre cele mai comune, fiind o metod\u0103 digital\u0103 de furt de identitate. Infractorii cibernetici folosesc cu succes metode precum email-uri, mesaje text sau mesaje trimise pe re\u021belele de socializare pentru a ob\u021bine informa\u021bii personale de la utilizatori.<\/p>\n\n\n\n<p>Informarea este absolut esen\u021bial\u0103 pentru a bloca toate aceste tipuri de phishing. Suplimentar, exist\u0103 servicii \u0219i instrumente care v\u0103 pot proteja compania \u0219i angaja\u021bii deopotriv\u0103. Google blocheaz\u0103 zilnic peste 100 de milioane de astfel de email-uri de la a ajunge \u00een Inbox-urile utilizatorilor s\u0103i. \u00cen articolul de jos v\u0103 vom ajuta s\u0103 \u00een\u021belege\u021bi \u0219i s\u0103 filtra\u021bi noi astfel de amenin\u021b\u0103ri cibernetice al\u0103turi de Google \u0219i Gmail. Materialul o s\u0103 v\u0103 ajute s\u0103 \u00een\u021belege\u021bi evolu\u021bia acestor atacuri \u0219i nevoia de preven\u021bie \u00een special \u00een perioada muncii de la distan\u021b\u0103, perioad\u0103 \u00een care s-au raportat tot mai multe cazuri de phishing.<\/p>\n\n\n\n<h2 id=\"h-ce-este-phishing-ul-i-ce-tipuri-de-atac-phishing-exist\">Ce este phishing-ul \u0219i ce tipuri de atac phishing exist\u0103?<\/h2>\n\n\n\n<p>La baz\u0103, phishing este o metod\u0103 frauduloas\u0103 prin care se \u00eencearc\u0103 ob\u021binerea unor date personale sau confiden\u021biale precum detalii ale c\u0103r\u021bilor de credit, parole sau cifre numerice unice. Hackerii primesc astfel acces la dispozitive sau conturi private f\u0103r\u0103 ca utilizatorii s\u0103 fie con\u0219tien\u021bi c\u0103 le-au oferit acestora detaliile necesare. Prin phishing, victima acceseaz\u0103 un link sau descarc\u0103 un fi\u0219ier benevol, permi\u021b\u00e2nd astfel software-urilor s\u0103 se infiltreze pe dispozitivul acestuia.<\/p>\n\n\n\n<p>Atacurile de tip phishing sunt printre cele mai vechi tipuri de fraud\u0103 cybernetic\u0103, origin\u00e2nd la mijlocul anilor 1990. Odat\u0103 cu modelele noi de inginerie social\u0103, aceste \u00eencerc\u0103ri de fraud\u0103 au evoluat \u0219i ele \u0219i s-au extins de la email la text, fi\u0219iere voce sau intermediate de social media. Mai departe, ve\u021bi descoperi care sunt c\u00e2teva dintre cele mai \u00eent\u00e2lnite tipuri de atacuri phishing.<\/p>\n\n\n\n<ol type=\"1\"><li><strong>Email phishing<\/strong>. Este una dintre cele mai comune forme de phishing care \u00eencearc\u0103 s\u0103 conving\u0103 utilizatorii fie s\u0103 partajeze informa\u021bii private, fie s\u0103 descarce programe malware d\u0103un\u0103toare. Ce este important de \u0219tiut \u00een preven\u021bia acestui tip de atac este c\u0103 nicio companie nu \u00ee\u021bi va cere informa\u021bii sensibile via email. De asemenea, cea mai mare parte a acestor email-uri con\u021bin gre\u0219eli de scriere, a\u0219a c\u0103 pute\u021bi acorda mai mult\u0103 aten\u021bie acestor detalii. O adres\u0103 de email cu un domeniu sau mesaj suspicios, text redactat cu gre\u0219eli sau ata\u0219amente nesolicitate, acestea sunt c\u00e2teva dintre detaliile care s\u0103 v\u0103 ajute s\u0103 depista\u021bi un astfel de email.<\/li><li><strong>Spear phishing.<\/strong> Aceast\u0103 form\u0103 de comunicare va targeta un singur individ, organiza\u021bie sau companie. Fraudatorii pot, \u00een prezent, achizi\u021biona baze \u00eentregi de date de informa\u021bii de pe dark web pentru a construi o serie de email-uri special targetate pentru a convinge victima.<\/li><li><strong>Clone phishing<\/strong>. Folosindu-se de un prim email sau un prim contact f\u0103cut de o organza\u021bie de \u00eencredere, hackerii cloneaz\u0103 acest mesaj \u0219i insereaz\u0103 \u00een el programe d\u0103un\u0103toare sau leg\u0103turi spre site-uri de ne\u00eencredere.<\/li><li><strong>Angler phishing<\/strong>. Este un nou tip de atac phishing care \u021binte\u0219te utilizatorii re\u021belelor social media. Hackerii pretind c\u0103 sunt agen\u021bi de customer service \u0219i folosesc profilele victimelor ca vector de inginerie social\u0103 pentru a ob\u021bine acces la aceste conturi sau la alte date personale.<\/li><\/ol>\n\n\n\n<h2 id=\"h-cine-poate-c-dea-victim-unui-atac-phishing\"> Cine poate c\u0103dea victim\u0103 unui atac phishing? <\/h2>\n\n\n\n<p>De la promo\u021bii digitale la inform\u0103ri oficiale din partea b\u0103ncilor sau mesaje pe social media, oricine poate c\u0103dea victim\u0103 phishing-ului \u0219i diferitelor forme ale acestuia.<\/p>\n\n\n\n<p>Nici companiile nu sunt imune \u00een fa\u021ba unor astfel de tentative de escrocherie. Una din cele mai mari gre\u0219eli care expun vulnerabilitatea unei afaceri este lipsa de informare a angaja\u021bilor. Ace\u0219tia de\u021bin creden\u021biale \u0219i informa\u021bii critice care pot pune \u00een pericol securitatea companiei. Practic, ace\u0219tia sunt v\u0103zu\u021bi ca ni\u0219te puncte slabe \u00een securitatea companiei \u0219i \u021binte ideale pentru atacuri precum phishing.<\/p>\n\n\n\n<h2 id=\"h-cum-recuno-ti-un-atac-phishing\"> Cum recuno\u0219ti un atac phishing? <\/h2>\n\n\n\n<p>Primul pas \u00een a depista tentative phishing const\u0103 \u00een a \u00een\u021belege exact ce sunt acestea. Cel mai relevant exemplu este cel al unui email sau sms primit prin care vi se solicit\u0103 s\u0103 \u00eendeplini\u021bi o anumit\u0103 sarcin\u0103. Hackerul vi se adreseaz\u0103 sub un nume de utilizator care pare legitim \u0219i v\u0103 solicit\u0103 deschiderea unui link, desc\u0103rcarea unui ata\u0219ament sau furnizarea de date personale sau creden\u021biale de logare.<\/p>\n\n\n\n<p>\u00cen lista de mai jos, am semnalizat c\u00e2teva indicii care ar trebui s\u0103 v\u0103 ridice suspiciuni odat\u0103 ce le \u00eent\u00e2lni\u021bi \u00eentr-un mail sosit de pe un domeniu neobi\u0219nuit sau din partea unui individ necunoscut.<\/p>\n\n\n\n<ul><li>Email care cere o ac\u021biune urgent\u0103. Nu deschide\u021bi \u0219i nu da\u021bi clic pe niciun mail care amenin\u021b\u0103 cu consecin\u021be negative sau oportunit\u0103\u021bi ratate. Asigura\u021bi-v\u0103 c\u0103 \u0219ti\u021bi perfect cine este expeditorul \u00een astfel de cazuri.<\/li><li>Gre\u0219eli de exprimare sau scriere. Acestea sunt deseori indiciile unei tentative de phishing. Un expeditor legitim nu este expus unor astfel de erori sau le va corecta \u00eenainte de a trimite o comunicare.<\/li><li>Necoeren\u021be \u00een adresele de email, link-uri sau numele domeniilor de unde provin aceste mesaje. Cu survolarea mouse-ului deasupra link-urilor, pute\u021bi verifica legitimitatea adreselor ata\u0219ate. <\/li><li>Ata\u0219amente suspicioase. Cunoa\u0219te\u021bi bine formatele cu care lucra\u021bi al\u0103turi de colaboratorii dvs. Nu desc\u0103rca\u021bi sau deschide\u021bi alte formate de fi\u0219iere provenite de la astfel de surse. Nu deschide\u021bi fi\u0219iere cu extensii asociate cu malware precum .zip, .exe, .scr etc.<\/li><li>Cerin\u021be de predare date cu caracter privat. Trata\u021bi cu aten\u021bie emailurile din partea destinatarilor care nu v\u0103 sunt cunoscu\u021bi \u0219i care pretind creden\u021biale \u0219i alte informa\u021bii sensibile.<\/li><li>Emailuri prea bune ca s\u0103 fie adev\u0103rate. Premii, cadouri sau alte beneficii nerevendicate \u2013 sta\u021bi deoparte de emailuri care v\u0103 promit r\u0103splat\u0103 de orice natur\u0103. Acestea sunt printre cel mai des folosite mesaje \u00een atacurile phishing.<\/li><\/ul>\n\n\n\n<h2 id=\"h-cum-v-proteja-i-n-fa-a-atacurilor-online-phishing\"> Cum v\u0103 proteja\u021bi \u00een fa\u021ba atacurilor online phishing? <\/h2>\n\n\n\n<p>De\u0219i complexitatea acestor atacuri difer\u0103 de la un caz la altul, exist\u0103 c\u00e2teva no\u021biuni de bun\u0103 practic\u0103 pentru a v\u0103 proteja pe c\u00e2t posibil. Acestea sunt esen\u021biale \u0219i pentru angaja\u021bii companiei dvs, \u00een special \u00een perioadele de lucru remote sau \u00een folosirea echipamentelor companiei \u00een afara perimetrului de munc\u0103.<\/p>\n\n\n\n<ol type=\"1\"><li>Proteja\u021bi-v\u0103 calculatoarele cu software de securitate. Acesta poate identifica automat atacurile mali\u021bioase.<\/li><li>Proteja\u021bi-v\u0103 conturile de utilizator cu autentificarea multi-factor. Astfel, conturile vor putea fi accesate doar dup\u0103 mai mul\u021bi pa\u0219i accesa\u021bi.<\/li><li>Fi\u021bi precau\u021bi \u00een privin\u021ba link-urilor venite din surse nesigure \u0219i care cer logarea sau autentificarea dvs. cu username \u0219i parol\u0103.<\/li><li>Nu accesa\u021bi site-uri f\u0103r\u0103 conexiune securizat\u0103. Site-urile sigure au \u00een adres\u0103 prefixul HTTPS.<\/li><li>Nu deschide\u021bi sau desc\u0103rca\u021bi fi\u0219iere cu extensii exe sau html de la persoane necunoscute.<\/li><li>Nu v\u0103 conecta\u021bi la conturile dvs folosind o re\u021bea public\u0103 nesecurizat\u0103. Datele dvs. pot fi interceptate de al\u021bi utilizatori conecta\u021bi la aceast\u0103 re\u021bea.<\/li><li>Folosi\u021bi un client de email cu filtru spam integrat. Gmail are filtre care au poten\u021bialul de a \u00eendep\u0103rta numeroase amenin\u021b\u0103ri phishing.<\/li><li>Fi\u021bi suspicios cu orice mesaj care v\u0103 cere informa\u021bii personale \u0219i verifica\u021bi temeinic expeditorul, adresa acestuia, domeniul \u0219i orice alte informa\u021bii disponibile \u00eenainte de a ac\u021biona.<\/li><\/ol>\n\n\n<div class=\"bg-blue banners mt-4 mb-4\">\r\n  <div class=\"container \">\r\n    <div class=\"row sw\">\r\n        <div class=\"col-md-7 sw col-12 mb-md-0\">\r\n        <span style=\"margin-bottom: 1rem;\r\n    font-weight: 500;margin-top: 25px;\r\n    line-height: 1.1;\r\n    font-size: 2rem; display: block; color:#fff\">Al\u0103tur\u0103-te comunit\u0103\u021bii noastre Google Workspace<\/span>\r\n        <\/div>\r\n        <div class=\"col-md-5 sw sww\">\r\n        <img style=\"margin-top:25px;\" src=\"\/app\/uploads\/2023\/02\/FOTC-LOGO-WWW-RGB-RED-2.png\">\r\n        <\/div>\r\n        <\/div>\r\n        <div class=\"row\">\r\n          <div class=\"col-md-7\"><p style=\"color:#fff\">Fii la curent cu cele mai recente \u0219tiri despre cum po\u021bi \u00eembun\u0103t\u0103\u021bi productivitatea \u00een cadrul colabor\u0103rii hibride<\/p><\/div>\r\n        <div class=\"col-md-5 col-12 text-cent-right\">\r\n        <a class=\"newbtn bannerbtn\" href=\"https:\/\/www.facebook.com\/groups\/552467848862231\">Devin-o un membru<\/a>\r\n        \r\n        <\/div>\r\n    <\/div>\r\n  <\/div>\r\n<\/div>\n\n\n<h2 id=\"h-cum-i-protejeaz-google-utilizatorii-n-fa-a-amenin-rilor-phishing\"> Cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii \u00een fa\u021ba amenin\u021b\u0103rilor phishing? <\/h2>\n\n\n\n<h3 id=\"h-protec-ie-mpotriva-phishing-ului-n-gmail-chrome-sau-google-workspace\"> Protec\u021bie \u00eempotriva phishing-ului \u00een Gmail, Chrome sau Google Workspace <\/h3>\n\n\n\n<p>Gmail are automat bifat\u0103 protec\u021bia \u00eempotriva atacurilor phishing \u0219i mali\u021bioase. Exist\u0103 alte c\u00e2teva recomand\u0103ri pentru a spori aceast\u0103 protec\u021bie:<\/p>\n\n\n\n<ul><li>Efectua\u021bi o <a href=\"http:\/\/g.co\/securitycheckup\" rel=\"nofollow\" class=\"ek-link\">Verificare de securitate<\/a> pentru recomand\u0103ri personalizate conturilor dvs.<\/li><li>Dac\u0103 considera\u021bi necesar, \u00eenrola\u021bi-v\u0103 \u00een <a href=\"https:\/\/landing.google.com\/advancedprotection\/\" class=\"ek-link\" rel=\"nofollow\">programul de protec\u021bie avansat\u0103 Google<\/a><\/li><li>Porni\u021bi <a href=\"https:\/\/security.googleblog.com\/2020\/05\/enhanced-safe-browsing-protection-now.html\" class=\"ek-link\">protec\u021bia avansat\u0103 \u0219i \u00een Google Chrome<\/a> pentru a cre\u0219te substan\u021bial ap\u0103rarea \u00een cazul website-urilor suspicioase<\/li><li>Descoperi\u021bi \u0219i <a href=\"https:\/\/safety.google\/security\/security-tips\/\" class=\"ek-link\" rel=\"nofollow\">mai multe sfaturi<\/a> care s\u0103 v\u0103 ajute s\u0103 face\u021bi cea mai bun\u0103 alegere.<\/li><\/ul>\n\n\n\n<p>Pentru utilizatorii <a href=\"https:\/\/fotc.com\/ro\/google-workspace\/\" class=\"ek-link\">Google Workspace<\/a> Enterprise, v\u0103 recomand\u0103m s\u0103 descoperi\u021bi <a href=\"https:\/\/support.google.com\/a\/answer\/7577854\" rel=\"nofollow\" class=\"ek-link\">protec\u021bia avansat\u0103 phishing \u0219i malware<\/a>. Aceasta este activat\u0103 \u00een mod automat, dar o pute\u021bi personaliza mai departe pentru nevoile companiei.<\/p>\n\n\n\n<h3 id=\"h-protec-ie-anti-phishing-pentru-utilizatorii-android\"> Protec\u021bie anti-phishing pentru utilizatorii Android <\/h3>\n\n\n\n<p>Pentru utilizatorii de dispozitive cu software Android, exist\u0103 c\u00e2teva aplica\u021bii recomandate anti-phishing \u0219i malware. \u00cen Google Play Store, pute\u021bi g\u0103si c\u00e2teva astfel de aplica\u021bii care s\u0103 \u00eent\u0103reasc\u0103 securitatea oferit\u0103 deja de Android. Printre aceste aplica\u021bii complet gratuite \u0219i eficiente se num\u0103r\u0103 Avira, McAfee, BullGuar sau Traced.<\/p>\n\n\n\n<p>Pe l\u00e2ng\u0103 aceste op\u021biuni, prima recomandare este cea de a folosi aplica\u021bia nativ\u0103 Gmail pentru Android. Aceasta v\u0103 va oferi protec\u021bie anti-phising \u0219i nici nu va consuma extra baterie a\u0219a cum o fac aplica\u021biile externe de securitate.<\/p>\n\n\n\n<h2 id=\"h-chestionar-phishing-de-la-google\"> Chestionar phishing de la Google <\/h2>\n\n\n\n<p>Pentru a afla c\u00e2t de vulnerabili sunte\u021bi \u00een fa\u021ba amenin\u021b\u0103rilor phishing, Google v\u0103 pune la \u00eendem\u00e2n\u0103 <a href=\"https:\/\/phishingquiz.withgoogle.com\/\" class=\"ek-link\">urm\u0103torul chestionar. <\/a>Completa\u021bi-l pentru a trece printr-o simulare de situa\u021bii \u00een care v\u0103 pute\u021bi confrunta sau nu cu tentative de phishing.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img width=\"1024\" height=\"671\" src=\"https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl-1024x671.png\" alt=\"\" class=\"wp-image-51860\" srcset=\"https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl-1024x671.png 1024w, https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl-300x197.png 300w, https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl-768x503.png 768w, https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl-123x81.png 123w, https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl-142x93.png 142w, https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl-267x175.png 267w, https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl-430x282.png 430w, https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl-279x183.png 279w, https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl-22x14.png 22w, https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-googl.png 1048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Pentru a afla mai multe despre protec\u021bia Gmail \u00een fa\u021ba unor astfel de amenin\u021b\u0103ri de furt de identitate, <a href=\"https:\/\/fotc.com\/ro\/contact\/\" class=\"ek-link\">contacta\u021bi echipa noastr\u0103 FOTC<\/a>. V\u0103 vom sf\u0103tui care sunt cele mai bune decizii pe care le pute\u021bi lua pentru a proteja \u00eentreaga echip\u0103.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Atacurile online sunt mai mediatizate ca niciodat\u0103, dar la fel sunt \u0219i metodele de preven\u021bie sau de solu\u021bionare ale acestora. Atacurile de phishing sunt printre cele mai comune, fiind o metod\u0103 digital\u0103 de furt de identitate. Infractorii cibernetici folosesc cu succes metode precum email-uri, mesaje text sau mesaje trimise pe re\u021belele de socializare pentru a&#8230;<\/p>\n","protected":false},"author":19,"featured_media":51229,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":6,"_editorskit_typography_data":[],"_editorskit_blocks_typography":"","_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}"},"categories":[565],"tags":[789,786,787,788,790,785],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v16.7 (Yoast SEO v19.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii de ele?<\/title>\n<meta name=\"description\" content=\"Gmail este dotat cu o serie de func\u021bii anti-phishing, fiind un instrument tot mai proactiv \u00een asigurarea securit\u0103\u021bii pentru utilizatorii s\u0103i.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii de ele?\" \/>\n<meta property=\"og:description\" content=\"Gmail este dotat cu o serie de func\u021bii anti-phishing, fiind un instrument tot mai proactiv \u00een asigurarea securit\u0103\u021bii pentru utilizatorii s\u0103i.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/\" \/>\n<meta property=\"og:site_name\" content=\"FOTC\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-23T12:53:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-03T08:45:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-07-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1204\" \/>\n\t<meta property=\"og:image:height\" content=\"651\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Laura Paraschiv\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii de ele?\" \/>\n<meta name=\"twitter:description\" content=\"Gmail este dotat cu o serie de func\u021bii anti-phishing, fiind un instrument tot mai proactiv \u00een asigurarea securit\u0103\u021bii pentru utilizatorii s\u0103i.\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/\",\"url\":\"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/\",\"name\":\"Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii de ele?\",\"isPartOf\":{\"@id\":\"https:\/\/fotc.com\/#website\"},\"datePublished\":\"2021-11-23T12:53:29+00:00\",\"dateModified\":\"2022-11-03T08:45:53+00:00\",\"author\":{\"@id\":\"https:\/\/fotc.com\/#\/schema\/person\/e3a6b214e5a3311a79985b4c3dd137fd\"},\"description\":\"Gmail este dotat cu o serie de func\u021bii anti-phishing, fiind un instrument tot mai proactiv \u00een asigurarea securit\u0103\u021bii pentru utilizatorii s\u0103i.\",\"breadcrumb\":{\"@id\":\"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/\"]}],\"accessibilityFeature\":[\"tableOfContents\"]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"RO\",\"item\":\"https:\/\/fotc.com\/ro\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google Workspace\",\"item\":\"https:\/\/fotc.com\/ro\/blog\/category\/google-workspace-ro\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii \u00een fa\u021ba acestora?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fotc.com\/#website\",\"url\":\"https:\/\/fotc.com\/\",\"name\":\"FOTC\",\"description\":\"Partner Google Cloud\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fotc.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/fotc.com\/#\/schema\/person\/e3a6b214e5a3311a79985b4c3dd137fd\",\"name\":\"Laura Paraschiv\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/fotc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cba586d4f1373c8f4c7a30c466e1a6a0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cba586d4f1373c8f4c7a30c466e1a6a0?s=96&d=mm&r=g\",\"caption\":\"Laura Paraschiv\"},\"description\":\"Laura Paraschiv are peste 5 ani de activitate ca jurnalist \u0219i al\u021bi 5 ani experien\u021b\u0103 de content writer \u0219i marketer. Nu are nicio problem\u0103 \u00een a scrie pentru orice public sau industrie, dar mai mereu se b\u00e2lb\u00e2ie c\u00e2nd trebuie s\u0103 scrie despre sine.\",\"sameAs\":[\"https:\/\/ro.linkedin.com\/in\/laura-teodora-paraschiv\"],\"knowsAbout\":[\"Google Workspace\",\"Google Cloud\"],\"jobTitle\":\"Content Manager\",\"url\":\"https:\/\/fotc.com\/ro\/blog\/author\/laura-paraschiv\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii de ele?","description":"Gmail este dotat cu o serie de func\u021bii anti-phishing, fiind un instrument tot mai proactiv \u00een asigurarea securit\u0103\u021bii pentru utilizatorii s\u0103i.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/","og_locale":"ro_RO","og_type":"article","og_title":"Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii de ele?","og_description":"Gmail este dotat cu o serie de func\u021bii anti-phishing, fiind un instrument tot mai proactiv \u00een asigurarea securit\u0103\u021bii pentru utilizatorii s\u0103i.","og_url":"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/","og_site_name":"FOTC","article_published_time":"2021-11-23T12:53:29+00:00","article_modified_time":"2022-11-03T08:45:53+00:00","og_image":[{"width":1204,"height":651,"url":"https:\/\/fotc.com\/app\/uploads\/2021\/11\/phishing-07-1.png","type":"image\/png"}],"author":"Laura Paraschiv","twitter_card":"summary_large_image","twitter_title":"Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii de ele?","twitter_description":"Gmail este dotat cu o serie de func\u021bii anti-phishing, fiind un instrument tot mai proactiv \u00een asigurarea securit\u0103\u021bii pentru utilizatorii s\u0103i.","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/","url":"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/","name":"Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii de ele?","isPartOf":{"@id":"https:\/\/fotc.com\/#website"},"datePublished":"2021-11-23T12:53:29+00:00","dateModified":"2022-11-03T08:45:53+00:00","author":{"@id":"https:\/\/fotc.com\/#\/schema\/person\/e3a6b214e5a3311a79985b4c3dd137fd"},"description":"Gmail este dotat cu o serie de func\u021bii anti-phishing, fiind un instrument tot mai proactiv \u00een asigurarea securit\u0103\u021bii pentru utilizatorii s\u0103i.","breadcrumb":{"@id":"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/"]}],"accessibilityFeature":["tableOfContents"]},{"@type":"BreadcrumbList","@id":"https:\/\/fotc.com\/ro\/blog\/atacurile-phishing-cum-protejeaza-google-utilizatorii\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"RO","item":"https:\/\/fotc.com\/ro\/"},{"@type":"ListItem","position":2,"name":"Google Workspace","item":"https:\/\/fotc.com\/ro\/blog\/category\/google-workspace-ro\/"},{"@type":"ListItem","position":3,"name":"Ce sunt atacurile phishing \u0219i cum \u00ee\u0219i protejeaz\u0103 Google utilizatorii \u00een fa\u021ba acestora?"}]},{"@type":"WebSite","@id":"https:\/\/fotc.com\/#website","url":"https:\/\/fotc.com\/","name":"FOTC","description":"Partner Google Cloud","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fotc.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"ro-RO"},{"@type":"Person","@id":"https:\/\/fotc.com\/#\/schema\/person\/e3a6b214e5a3311a79985b4c3dd137fd","name":"Laura Paraschiv","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/fotc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cba586d4f1373c8f4c7a30c466e1a6a0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cba586d4f1373c8f4c7a30c466e1a6a0?s=96&d=mm&r=g","caption":"Laura Paraschiv"},"description":"Laura Paraschiv are peste 5 ani de activitate ca jurnalist \u0219i al\u021bi 5 ani experien\u021b\u0103 de content writer \u0219i marketer. Nu are nicio problem\u0103 \u00een a scrie pentru orice public sau industrie, dar mai mereu se b\u00e2lb\u00e2ie c\u00e2nd trebuie s\u0103 scrie despre sine.","sameAs":["https:\/\/ro.linkedin.com\/in\/laura-teodora-paraschiv"],"knowsAbout":["Google Workspace","Google Cloud"],"jobTitle":"Content Manager","url":"https:\/\/fotc.com\/ro\/blog\/author\/laura-paraschiv\/"}]}},"_links":{"self":[{"href":"https:\/\/fotc.com\/ro\/wp-json\/wp\/v2\/posts\/51227"}],"collection":[{"href":"https:\/\/fotc.com\/ro\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fotc.com\/ro\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fotc.com\/ro\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/fotc.com\/ro\/wp-json\/wp\/v2\/comments?post=51227"}],"version-history":[{"count":0,"href":"https:\/\/fotc.com\/ro\/wp-json\/wp\/v2\/posts\/51227\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fotc.com\/ro\/wp-json\/wp\/v2\/media\/51229"}],"wp:attachment":[{"href":"https:\/\/fotc.com\/ro\/wp-json\/wp\/v2\/media?parent=51227"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fotc.com\/ro\/wp-json\/wp\/v2\/categories?post=51227"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fotc.com\/ro\/wp-json\/wp\/v2\/tags?post=51227"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}