{"id":3403,"date":"2022-02-23T18:07:34","date_gmt":"2022-02-23T17:07:34","guid":{"rendered":"https:\/\/sajberinfo.com\/?p=3403"},"modified":"2025-04-22T21:13:16","modified_gmt":"2025-04-22T19:13:16","slug":"phishing","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2022\/02\/23\/phishing\/","title":{"rendered":"Phishing"},"content":{"rendered":"<p data-original-attrs=\"{&quot;style&quot;:&quot;&quot;}\"><span style=\"font-size: 14pt;\" data-keep-original-tag=\"false\" data-original-attrs=\"{&quot;style&quot;:&quot;&quot;}\"><span data-keep-original-tag=\"false\" data-original-attrs=\"{&quot;style&quot;:&quot;&quot;}\"><em>Phishing<\/em> &#8211; pecanje ili mre\u017ena kra\u0111a identiteta je vrsta napada kojim se poku\u0161avaju prikupljati informacije uz kori\u0161tenje tehnika obmanjivanja. Sama rije\u010d je neologizam od rije\u010di ribolov (eng. <em>Fishing<\/em>), odnosno misli se na analogiju gdje ribar baca mamac \u010dekaju\u0107i da ulov \u201c<em>zagrize<\/em>\u201d. Ono \u0161to posebno izdvaja ovu vrstu napad je to \u0161to se napada\u010d pretvara da je osoba ili organizacija od povjerenja, \u010desto stvarana osoba ili organizacija \u2013 neko sa kim potencijalna \u017ertva ima kontakt. Kakva god bila varijacija <em>phishing<\/em> napada, cilj je isti: natjerati metu napada da preduzme odgovaraju\u0107u akciju. Ako je cilj da se isporu\u010di <a href=\"https:\/\/sajberinfo.com\/en\/2021\/09\/26\/malware\/\" target=\"_blank\" rel=\"nofollow noopener\">zlonamjerni softver<\/a>, \u010desto je dovoljno da se poruka otvori i da proces instalacije po\u010dne. U drugom slu\u010daju, napada\u010d \u0107e preko poruka poku\u0161ati da usmjeri korisnika na akciju koja mu odgovara kako bi ugrozio korisnikovu sigurnost, poput posjete odre\u0111enoj Internet stranici, otvaranja priloga elektronske po\u0161te, slanja novaca ili informacija, preuzimanje dokumenta ili davanja korisni\u010dkih lozinki. <em>Phishing<\/em><i> s<\/i>pada u jedne od najstarijih vrsta napada, a trenutno je i jedan od najmasovnijih i najpogubnijih napada. Detaljnije mo\u017eete saznatu u objavi <a href=\"https:\/\/sajberinfo.com\/en\/2022\/01\/02\/phishing-meta-su-ljudi-ne-tehnologija\/\" target=\"_blank\" rel=\"nofollow noopener\"><em>Phishing:<\/em> Meta su ljudi, ne tehnologija<\/a>.<\/span><\/span><\/p>\n<div id=\"attachment_3321\" style=\"width: 1008px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3321\" class=\"size-large wp-image-3321\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/proces-copy-998x1024.jpg\" alt=\"anatomy of phishing attack\" width=\"998\" height=\"1024\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/proces-copy-998x1024.jpg 998w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/proces-copy-292x300.jpg 292w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/proces-copy-768x788.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/proces-copy-12x12.jpg 12w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2022\/11\/proces-copy.jpg 1024w\" sizes=\"auto, (max-width: 998px) 100vw, 998px\" \/><p id=\"caption-attachment-3321\" class=\"wp-caption-text\">Anatomija phishing napada; Designed by Sa\u0161a \u0110uri\u0107<\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>Phishing &#8211; pecanje ili mre\u017ena kra\u0111a identiteta je vrsta napada kojim se poku\u0161avaju prikupljati informacije uz kori\u0161tenje tehnika obmanjivanja. Sama rije\u010d je neologizam od rije\u010di ribolov (eng. Fishing), odnosno misli se na analogiju gdje&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":3321,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[105,104,61],"class_list":["post-3403","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-leksikon","tag-mrezna-kradja-identiteta","tag-pecanje","tag-phishing"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3403","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=3403"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3403\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/3321"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=3403"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=3403"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=3403"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}