{"id":3082,"date":"2025-05-15T07:39:16","date_gmt":"2025-05-15T07:39:16","guid":{"rendered":"https:\/\/www.thc.ro\/blog\/?p=3082"},"modified":"2025-05-09T11:20:13","modified_gmt":"2025-05-09T08:20:13","slug":"tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice","status":"publish","type":"post","link":"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/","title":{"rendered":"Tot ce trebuie s\u0103 \u0219tii despre phishing: cum recuno\u0219ti \u0219i evi\u021bi atacurile informatice"},"content":{"rendered":"\n<p>Phishing-ul este una dintre cele mai frecvente metode prin care infractorii cibernetici \u00eencearc\u0103 s\u0103 fure date personale, parole sau informa\u021bii bancare. Dac\u0103 folose\u0219ti internetul \u2013 fie pentru e-mail, re\u021bele sociale sau cump\u0103r\u0103turi online \u2013 este important s\u0103 \u0219tii cum func\u021bioneaz\u0103 aceste atacuri \u0219i ce po\u021bi face pentru a te proteja.<\/p>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Ce este phishing-ul?<\/h2>\n\n\n\n<p>Phishing-ul este o tehnic\u0103 de atac informatic prin care un atacator \u00eencearc\u0103 s\u0103 p\u0103c\u0103leasc\u0103 o persoan\u0103 s\u0103 ofere voluntar informa\u021bii sensibile, pretinz\u00e2nd c\u0103 este o entitate de \u00eencredere, precum o banc\u0103, un magazin online, un serviciu de streaming sau chiar o institu\u021bie public\u0103.<\/p>\n\n\n\n<p>De obicei, aceste tentative vin sub forma unui e-mail, mesaj text (SMS), apel telefonic sau chiar prin re\u021bele sociale.<\/p>\n\n\n\n<div style=\"height:32px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Cele mai frecvente tipuri de phishing<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>Phishing prin e-mail<\/strong><\/h3>\n\n\n\n<p>Cele mai \u00eent\u00e2lnite atacuri. Atacatorii trimit mesaje aparent legitime, cu logouri \u0219i formul\u0103ri asem\u0103n\u0103toare celor reale. E-mailul poate con\u021bine un link sau un ata\u0219ament infectat.<\/p>\n\n\n\n<p><em>Exemplu:<\/em> \u201eContul t\u0103u PayPal a fost suspendat. Click aici pentru a verifica datele.\u201d<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>Spear phishing<\/strong><\/h3>\n\n\n\n<p>Este un phishing personalizat, \u021bintit c\u0103tre o anumit\u0103 persoan\u0103 sau companie. Atacatorul folose\u0219te informa\u021bii reale despre victim\u0103 (nume, func\u021bie, colegi) pentru a c\u00e2\u0219tiga \u00eencredere.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. <strong>Phishing prin SMS (Smishing)<\/strong><\/h3>\n\n\n\n<p>Mesaje text cu linkuri suspecte sau avertismente false (\u201eColetul t\u0103u nu a putut fi livrat. Confirm\u0103 aici.\u201d).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. <strong>Phishing vocal (Vishing)<\/strong><\/h3>\n\n\n\n<p>Apeluri telefonice prin care atacatorii se dau drept angaja\u021bi ai b\u0103ncii sau ai unei institu\u021bii \u0219i cer date confiden\u021biale.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. <strong>Clone phishing<\/strong><\/h3>\n\n\n\n<p>O versiune falsificat\u0103 a unui e-mail real deja primit, dar cu linkuri sau ata\u0219amente modificate, ce con\u021bin programe mali\u021bioase.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">6. <strong>Pharming<\/strong><\/h3>\n\n\n\n<p>Victima acceseaz\u0103 un site web aparent legitim (ex. pagina b\u0103ncii), dar este redirec\u021bionat\u0103 c\u0103tre o versiune fals\u0103 creat\u0103 de atacator.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cum recuno\u0219ti un atac de phishing?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Adrese de e-mail sau numere necunoscute<\/strong>, u\u0219or modificate (ex: <a>info@micr0soft.com<\/a>).<\/li>\n\n\n\n<li><strong>Mesaje cu gre\u0219eli gramaticale<\/strong> sau exprim\u0103ri suspecte.<\/li>\n\n\n\n<li><strong>Presiune de timp<\/strong> (\u201eTrebuie s\u0103 ac\u021bionezi imediat!\u201d).<\/li>\n\n\n\n<li><strong>Linkuri ciudate<\/strong> (verific\u0103 dac\u0103 adresa URL este corect\u0103, trec\u00e2nd cu mouse-ul peste ea).<\/li>\n\n\n\n<li><strong>Solicit\u0103ri neobi\u0219nuite<\/strong> de informa\u021bii personale prin e-mail sau telefon.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Cum te po\u021bi proteja de phishing?<\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Verific\u0103 \u00eentotdeauna sursa.<\/strong> Nu da clic pe linkuri din e-mailuri suspecte. Acceseaz\u0103 manual site-ul b\u0103ncii sau companiei.<\/li>\n\n\n\n<li><strong>Activeaz\u0103 autentificarea \u00een doi pa\u0219i (2FA)<\/strong> pentru conturile importante.<\/li>\n\n\n\n<li><strong>Nu deschide ata\u0219amente din surse necunoscute.<\/strong><\/li>\n\n\n\n<li><strong>Nu oferi niciodat\u0103 date personale sau parole<\/strong> prin telefon sau e-mail.<\/li>\n\n\n\n<li><strong>Actualizeaz\u0103 constant sistemul de operare \u0219i programele antivirus.<\/strong><\/li>\n\n\n\n<li><strong>Folose\u0219te un filtru anti-phishing \u00een browser sau \u00een clientul de e-mail.<\/strong><\/li>\n\n\n\n<li><strong>Educa\u021bie digital\u0103.<\/strong> Particip\u0103 la cursuri sau cite\u0219te materiale informative despre securitatea online.<\/li>\n<\/ol>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Ce faci dac\u0103 ai c\u0103zut victim\u0103?<\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Schimb\u0103 imediat parolele<\/strong> conturilor afectate.<\/li>\n\n\n\n<li><strong>Anun\u021b\u0103 banca<\/strong> sau institu\u021bia \u00een cauz\u0103 dac\u0103 ai oferit date financiare.<\/li>\n\n\n\n<li><strong>Scaneaz\u0103 calculatorul<\/strong> cu un antivirus actualizat.<\/li>\n\n\n\n<li><strong>Raporteaz\u0103 incidentul<\/strong> c\u0103tre CERT-RO (<a class=\"\" href=\"https:\/\/www.cert.ro\/\">https:\/\/www.cert.ro\/<\/a>), autoritatea na\u021bional\u0103 \u00een domeniul securit\u0103\u021bii cibernetice.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading\">Concluzie<\/h2>\n\n\n\n<p>Phishing-ul este o amenin\u021bare real\u0103, dar cu pu\u021bin\u0103 aten\u021bie \u0219i educa\u021bie digital\u0103, poate fi evitat. Fii sceptic atunci c\u00e2nd prime\u0219ti mesaje alarmante sau oferte \u201eprea bune ca s\u0103 fie adev\u0103rate\u201d \u0219i nu uita: <strong>companiile serioase nu cer niciodat\u0103 parole sau date personale prin e-mail<\/strong>.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Te-ar putea interesa \u0219i:<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.thc.ro\/blog\/malware-pericolul-nevazut-din-spatele-ecranelor\/\" target=\"_blank\" rel=\"noreferrer noopener\">Malware \u2013 pericolul nevazut din spatele ecranelor<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.thc.ro\/blog\/cum-influenteaza-securitatea-siteului-seo\/\">Securitatea precara a siteului te poate afecta din punct de vedere SEO<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.thc.ro\/blog\/securitatea-cibernetica-ce-este-si-de-ce-este-importanta-pentru-securitatea-afacerii\/\">Securitatea cibernetica \u2013 ce este si de ce este importanta pentru securitatea afacerii?<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing-ul este una dintre cele mai frecvente metode prin care infractorii cibernetici \u00eencearc\u0103 s\u0103 fure date personale, parole sau informa\u021bii&#8230;<\/p>\n","protected":false},"author":1,"featured_media":3083,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[47],"tags":[524,525,522,523,521],"class_list":["post-3082","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-utile","tag-atacuri-informatice","tag-educatie-digitala","tag-phishing","tag-protectie-date-2","tag-securitate-online"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Tot ce trebuie s\u0103 \u0219tii despre phishing: cum recuno\u0219ti \u0219i evi\u021bi atacurile informatice - Blog THC.ro<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/\" \/>\n<meta property=\"og:locale\" content=\"ro_RO\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tot ce trebuie s\u0103 \u0219tii despre phishing: cum recuno\u0219ti \u0219i evi\u021bi atacurile informatice - Blog THC.ro\" \/>\n<meta property=\"og:description\" content=\"Phishing-ul este una dintre cele mai frecvente metode prin care infractorii cibernetici \u00eencearc\u0103 s\u0103 fure date personale, parole sau informa\u021bii...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog THC.ro\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-15T07:39:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.thc.ro\/blog\/wp-content\/uploads\/cum-recunosti-phishing-ul.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"THC.ro\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scris de\" \/>\n\t<meta name=\"twitter:data1\" content=\"THC.ro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Timp estimat pentru citire\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/\",\"url\":\"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/\",\"name\":\"Tot ce trebuie s\u0103 \u0219tii despre phishing: cum recuno\u0219ti \u0219i evi\u021bi atacurile informatice - Blog THC.ro\",\"isPartOf\":{\"@id\":\"https:\/\/www.thc.ro\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.thc.ro\/blog\/wp-content\/uploads\/cum-recunosti-phishing-ul.jpg\",\"datePublished\":\"2025-05-15T07:39:16+00:00\",\"author\":{\"@id\":\"https:\/\/www.thc.ro\/blog\/#\/schema\/person\/abd77755b6e2c5e3beb6fc28bcdabf51\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/#breadcrumb\"},\"inLanguage\":\"ro-RO\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/#primaryimage\",\"url\":\"https:\/\/www.thc.ro\/blog\/wp-content\/uploads\/cum-recunosti-phishing-ul.jpg\",\"contentUrl\":\"https:\/\/www.thc.ro\/blog\/wp-content\/uploads\/cum-recunosti-phishing-ul.jpg\",\"width\":1200,\"height\":628,\"caption\":\"cum-recunosti-phishing-ul\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.thc.ro\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tot ce trebuie s\u0103 \u0219tii despre phishing: cum recuno\u0219ti \u0219i evi\u021bi atacurile informatice\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.thc.ro\/blog\/#website\",\"url\":\"https:\/\/www.thc.ro\/blog\/\",\"name\":\"Blog THC.ro\",\"description\":\"Servicii gazduire web\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.thc.ro\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ro-RO\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.thc.ro\/blog\/#\/schema\/person\/abd77755b6e2c5e3beb6fc28bcdabf51\",\"name\":\"THC.ro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ro-RO\",\"@id\":\"https:\/\/www.thc.ro\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d3ad5db70fc2a0a4b84dab31ca9472d11f17d16fce71c831f7d093850d320be?s=96&d=retro&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d3ad5db70fc2a0a4b84dab31ca9472d11f17d16fce71c831f7d093850d320be?s=96&d=retro&r=g\",\"caption\":\"THC.ro\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Tot ce trebuie s\u0103 \u0219tii despre phishing: cum recuno\u0219ti \u0219i evi\u021bi atacurile informatice - Blog THC.ro","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/","og_locale":"ro_RO","og_type":"article","og_title":"Tot ce trebuie s\u0103 \u0219tii despre phishing: cum recuno\u0219ti \u0219i evi\u021bi atacurile informatice - Blog THC.ro","og_description":"Phishing-ul este una dintre cele mai frecvente metode prin care infractorii cibernetici \u00eencearc\u0103 s\u0103 fure date personale, parole sau informa\u021bii...","og_url":"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/","og_site_name":"Blog THC.ro","article_published_time":"2025-05-15T07:39:16+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.thc.ro\/blog\/wp-content\/uploads\/cum-recunosti-phishing-ul.jpg","type":"image\/jpeg"}],"author":"THC.ro","twitter_card":"summary_large_image","twitter_misc":{"Scris de":"THC.ro","Timp estimat pentru citire":"4 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/","url":"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/","name":"Tot ce trebuie s\u0103 \u0219tii despre phishing: cum recuno\u0219ti \u0219i evi\u021bi atacurile informatice - Blog THC.ro","isPartOf":{"@id":"https:\/\/www.thc.ro\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/#primaryimage"},"image":{"@id":"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/#primaryimage"},"thumbnailUrl":"https:\/\/www.thc.ro\/blog\/wp-content\/uploads\/cum-recunosti-phishing-ul.jpg","datePublished":"2025-05-15T07:39:16+00:00","author":{"@id":"https:\/\/www.thc.ro\/blog\/#\/schema\/person\/abd77755b6e2c5e3beb6fc28bcdabf51"},"breadcrumb":{"@id":"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/#breadcrumb"},"inLanguage":"ro-RO","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/"]}]},{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/#primaryimage","url":"https:\/\/www.thc.ro\/blog\/wp-content\/uploads\/cum-recunosti-phishing-ul.jpg","contentUrl":"https:\/\/www.thc.ro\/blog\/wp-content\/uploads\/cum-recunosti-phishing-ul.jpg","width":1200,"height":628,"caption":"cum-recunosti-phishing-ul"},{"@type":"BreadcrumbList","@id":"https:\/\/www.thc.ro\/blog\/tot-ce-trebuie-sa-stii-despre-phishing-cum-recunosti-si-eviti-atacurile-informatice\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.thc.ro\/blog\/"},{"@type":"ListItem","position":2,"name":"Tot ce trebuie s\u0103 \u0219tii despre phishing: cum recuno\u0219ti \u0219i evi\u021bi atacurile informatice"}]},{"@type":"WebSite","@id":"https:\/\/www.thc.ro\/blog\/#website","url":"https:\/\/www.thc.ro\/blog\/","name":"Blog THC.ro","description":"Servicii gazduire web","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.thc.ro\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ro-RO"},{"@type":"Person","@id":"https:\/\/www.thc.ro\/blog\/#\/schema\/person\/abd77755b6e2c5e3beb6fc28bcdabf51","name":"THC.ro","image":{"@type":"ImageObject","inLanguage":"ro-RO","@id":"https:\/\/www.thc.ro\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d3ad5db70fc2a0a4b84dab31ca9472d11f17d16fce71c831f7d093850d320be?s=96&d=retro&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d3ad5db70fc2a0a4b84dab31ca9472d11f17d16fce71c831f7d093850d320be?s=96&d=retro&r=g","caption":"THC.ro"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/www.thc.ro\/blog\/wp-content\/uploads\/cum-recunosti-phishing-ul.jpg","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/posts\/3082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/comments?post=3082"}],"version-history":[{"count":2,"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/posts\/3082\/revisions"}],"predecessor-version":[{"id":3086,"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/posts\/3082\/revisions\/3086"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/media\/3083"}],"wp:attachment":[{"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/media?parent=3082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/categories?post=3082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.thc.ro\/blog\/wp-json\/wp\/v2\/tags?post=3082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}