[{"@context":"https:\/\/schema.org\/","@type":"Article","@id":"https:\/\/www.stronger.sk\/bezdrotove-ohrozenie-pocitaca\/#Article","mainEntityOfPage":"https:\/\/www.stronger.sk\/bezdrotove-ohrozenie-pocitaca\/","headline":"Bezdr\u00f4tov\u00e9 ohrozenie po\u010d\u00edta\u010da","name":"Bezdr\u00f4tov\u00e9 ohrozenie po\u010d\u00edta\u010da","description":"Hovor\u00ed sa, a medzi u\u017e\u00edvate\u013emi v\u00fdpo\u010dtovej techniky sa ve\u013emi r\u00fdchlo \u0161\u00edri n\u00e1zor, \u017ee ak chceme ma\u0165 istotu, \u017ee n\u00e1\u0161 po\u010d\u00edta\u010d nenapadn\u00fa \u017eiadne v\u00edrusy a\u00a0hackeri, mus\u00edme sa pohybova\u0165 v re\u017eime OF-LINE. Pokia\u013e je V\u00e1\u0161 po\u010d\u00edta\u010d pripojen\u00fd k sieti cez Bluetooth, Wi-Fi, alebo klasick\u00fd internet, m\u00f4\u017ee by\u0165 ohrozen\u00fd kr\u00e1de\u017eami d\u00e1t, v\u00edrusmi, hackermi, alebo stiahnut\u00edm niektor\u00fdch komponentov. \u00a0 [&hellip;]","datePublished":"2025-02-27","dateModified":"2023-04-25","author":{"@type":"Person","@id":"https:\/\/www.stronger.sk\/author\/#Person","name":"stronger.sk\n","url":"https:\/\/www.stronger.sk\/author\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/7726f7b8e3ba8979c4cf2ad896cb2e8cc05af8ceb17ce4fb40617b72e0be53b4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/7726f7b8e3ba8979c4cf2ad896cb2e8cc05af8ceb17ce4fb40617b72e0be53b4?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"stronger.sk","logo":{"@type":"ImageObject","@id":"\/logo.png","url":"\/logo.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.stronger.sk\/wp-content\/uploads\/img_a281022_w2004_t1497209842.jpg","url":"https:\/\/www.stronger.sk\/wp-content\/uploads\/img_a281022_w2004_t1497209842.jpg","height":0,"width":0},"url":"https:\/\/www.stronger.sk\/bezdrotove-ohrozenie-pocitaca\/","about":["Online"],"wordCount":363,"articleBody":"Hovor\u00ed sa, a medzi u\u017e\u00edvate\u013emi v\u00fdpo\u010dtovej techniky sa ve\u013emi r\u00fdchlo \u0161\u00edri n\u00e1zor, \u017ee ak chceme ma\u0165 istotu, \u017ee n\u00e1\u0161 po\u010d\u00edta\u010d nenapadn\u00fa \u017eiadne v\u00edrusy a\u00a0hackeri, mus\u00edme sa pohybova\u0165 v re\u017eime OF-LINE. Pokia\u013e je V\u00e1\u0161 po\u010d\u00edta\u010d pripojen\u00fd k sieti cez Bluetooth, Wi-Fi, alebo klasick\u00fd internet, m\u00f4\u017ee by\u0165 ohrozen\u00fd kr\u00e1de\u017eami d\u00e1t, v\u00edrusmi, hackermi, alebo stiahnut\u00edm niektor\u00fdch komponentov.\u00a0Mus\u00edme si v\u0161ak uvedomi\u0165, \u017ee aj dobre zabezpe\u010den\u00fd po\u010d\u00edta\u010d bez pripojenia k internetu, teda v re\u017eime OF-LINE, m\u00f4\u017ee by\u0165 cie\u013eom \u00fatoku a napadnutia. Zauj\u00edmav\u00e9 rie\u0161enie tohto probl\u00e9mu na\u0161li traja vedci z izraelskej univerzity. Zistili, \u017ee je mo\u017eno software pod ozna\u010den\u00edm USBee zabudova\u0165 do be\u017en\u00fdch USB zariaden\u00ed a potom z infikovan\u00fdch zariaden\u00ed bezdr\u00f4tovo pren\u00e1\u0161a\u0165 d\u00e1ta.\u00a0Software USBee:\u00a0&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Vlastn\u00e1 funkcia je zalo\u017een\u00e1 na prenose elektromagnetick\u00fdch sign\u00e1lov.&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Aby bolo mo\u017en\u00e9 tieto sign\u00e1ly zaznamena\u0165 a analyzova\u0165, potrebuje druh\u00fd po\u010d\u00edta\u010d len v\u00fdkonn\u00fa ant\u00e9nu a tie spr\u00e1vne funk\u010dn\u00e9 n\u00e1stroje.&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Tento sp\u00f4sob \u00fatoku umo\u017e\u0148uje prenies\u0165 a\u017e 80 bajtov za sekundu, v z\u00e1vislosti od typu USB zariadenia, ktor\u00fd software vyu\u017e\u00edva.&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Napr\u00edklad be\u017en\u00fd USB flash disk umo\u017e\u0148uje tento prenos na vzdialenos\u0165 necel\u00e9 tri metre. Ak je zariadenie pripojen\u00e9 prostredn\u00edctvom k\u00e1bla, ktor\u00fd mo\u017eno pou\u017ei\u0165 ako ant\u00e9nu, potom sa zvy\u0161uje dosah prenosu a\u017e na osem metrov.&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Aj cez t\u00fato, vy\u0161\u0161ie pop\u00edsan\u00fa mo\u017enos\u0165, nie je pravdepodobn\u00e9, \u017ee by sa USBee nejako nekontrolovate\u013ene \u0161\u00edril. Prv\u00fdm krokom je toti\u017e nutnos\u0165 infikova\u0165 po\u010d\u00edta\u010d, ktor\u00fd nie je pripojen\u00fd k sieti a v praxi to vy\u017eaduje obrovsk\u00e9 \u00fasilie a dlhodob\u00e9 pl\u00e1novanie.&#8211;\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 USBee napr\u00edklad dok\u00e1\u017ee pou\u017ei\u0165 k\u00e1bel z USB kl\u00e1vesnice, alebo my\u0161i na prenos pr\u00edstupov\u00fdch \u00fadajov do pripravenej prij\u00edmacej ant\u00e9ny druh\u00e9ho po\u010d\u00edta\u010da.\u00a0Z vy\u0161\u0161ie uveden\u00fdch poznatkov teda vypl\u00fdva, \u017ee pomocou USBee m\u00f4\u017eu by\u0165 teoreticky ohrozen\u00e9 aj syst\u00e9my, ktor\u00e9 s\u00fa pova\u017eovan\u00e9 za \u00faplne bezpe\u010dn\u00e9.                                                                                                                                                                                                                                                                                                                                                                                        3.8\/5 - (5 votes)        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Bezdr\u00f4tov\u00e9 ohrozenie po\u010d\u00edta\u010da","item":"https:\/\/www.stronger.sk\/bezdrotove-ohrozenie-pocitaca\/#breadcrumbitem"}]}]