[{"@context":"https:\/\/schema.org\/","@type":"Article","@id":"https:\/\/www.pweb.cz\/chytra-elektronika-jako-cil-hackeru\/#Article","mainEntityOfPage":"https:\/\/www.pweb.cz\/chytra-elektronika-jako-cil-hackeru\/","headline":"Chytr\u00e1 elektronika jako c\u00edl hacker\u016f","name":"Chytr\u00e1 elektronika jako c\u00edl hacker\u016f","description":"Po\u010d\u00edta\u010d a mobil Asi nikoho nep\u0159ekvap\u00ed, \u017ee nejzraniteln\u011bj\u0161\u00ed jsou pr\u00e1v\u011b po\u010d\u00edta\u010de, mobily a tablety \u2013 elektronika, kter\u00e1 n\u00e1m slou\u017e\u00ed jako br\u00e1na do online sv\u011bta. Je proto zcela z\u00e1sadn\u00ed striktn\u011b zachov\u00e1vat p\u0159i jejich u\u017e\u00edv\u00e1n\u00ed bezpe\u010dnostn\u00ed pravidla, kter\u00e1 mo\u017enost hackersk\u00e9ho \u00fatoku minimalizuj\u00ed. Mluv\u00edme-li o prevenci takov\u00e9ho napaden\u00ed, je nutn\u00e9 za\u010d\u00edt pr\u00e1v\u011b tady. Va\u0161e auto V\u00e1\u0161 v\u016fz nemus\u00ed [&hellip;]","datePublished":"2018-06-12","dateModified":"2023-05-02","author":{"@type":"Person","@id":"https:\/\/www.pweb.cz\/author\/#Person","name":"pweb.cz","url":"https:\/\/www.pweb.cz\/author\/","identifier":1,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/86b519ae28c05e7834416117bec12e679aa78b8940db1f26d4a52ad5648f8c3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/86b519ae28c05e7834416117bec12e679aa78b8940db1f26d4a52ad5648f8c3a?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"pweb.cz","logo":{"@type":"ImageObject","@id":"\/logo.png","url":"\/logo.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/www.pweb.cz\/wp-content\/uploads\/img_a321013_w2445_t1532203121.jpg","url":"https:\/\/www.pweb.cz\/wp-content\/uploads\/img_a321013_w2445_t1532203121.jpg","height":0,"width":0},"url":"https:\/\/www.pweb.cz\/chytra-elektronika-jako-cil-hackeru\/","about":["Web"],"wordCount":449,"articleBody":"\tPo\u010d\u00edta\u010d a mobil\tAsi nikoho nep\u0159ekvap\u00ed, \u017ee nejzraniteln\u011bj\u0161\u00ed jsou pr\u00e1v\u011b po\u010d\u00edta\u010de, mobily a tablety \u2013 elektronika, kter\u00e1 n\u00e1m slou\u017e\u00ed jako br\u00e1na do online sv\u011bta. Je proto zcela z\u00e1sadn\u00ed striktn\u011b zachov\u00e1vat p\u0159i jejich u\u017e\u00edv\u00e1n\u00ed bezpe\u010dnostn\u00ed pravidla, kter\u00e1 mo\u017enost hackersk\u00e9ho \u00fatoku minimalizuj\u00ed. Mluv\u00edme-li o prevenci takov\u00e9ho napaden\u00ed, je nutn\u00e9 za\u010d\u00edt pr\u00e1v\u011b tady.\tVa\u0161e auto\tV\u00e1\u0161 v\u016fz nemus\u00ed b\u00fdt pr\u00e1v\u011b technologick\u00e1 novinka. V nov\u011bj\u0161\u00edch automobilech se nach\u00e1z\u00ed des\u00edtky mikroprocesor\u016f, kter\u00e9 maj\u00ed na starosti t\u0159eba kontrolu stability nebo v\u00fdkonu. Podle spole\u010dnosti Norton, kter\u00e1 se zab\u00fdv\u00e1 po\u010d\u00edta\u010dovou bezpe\u010dnost\u00ed, by pr\u00e1v\u011b tudy mohli hacke\u0159i nad va\u0161\u00edm vozem p\u0159evz\u00edt kontrolu. Mo\u017enost je to zat\u00edm sp\u00ed\u0161 teoretick\u00e1, sta\u010dilo by ov\u0161em, aby se n\u011bkter\u00fd z hacker\u016f rozhodl zkusit sv\u00e9 schopnosti na va\u0161em aut\u011b a u\u017e se \u201evezete.\u201c Rada je v tomto p\u0159\u00edpad\u011b n\u00e1sleduj\u00edc\u00ed: pozor na v\u0161echna vylep\u0161en\u00ed, prohl\u00eddky a d\u00edly, kter\u00fdm sv\u016fj v\u016fz vybav\u00edte.\tV dne\u0161n\u00ed dob\u011b, kdy prob\u00edh\u00e1 aktivn\u00ed v\u00fdvoj tohoto pr\u016fmyslu, sm\u011b\u0159uj\u00edc\u00ed k \u0159\u00edzen\u00ed bez \u0159idi\u010de, bude tato hrozba ov\u0161em nejsp\u00ed\u0161 st\u00e1le konkr\u00e9tn\u011bj\u0161\u00ed.\tV\u00e1\u0161 (v\u00fd)let\tU\u017e v roce 2013 na konferenci Hack in the Box v Amsterodamu se n\u011bmeck\u00e9mu bezpe\u010dnostn\u00edmu konzultantovi Hugo Tesovi povedlo pomoc\u00ed speci\u00e1ln\u00ed aplikace vzd\u00e1len\u011b z\u00edskat p\u0159\u00edstup k palubn\u00edmu po\u010d\u00edta\u010di letadla. V sou\u010dasn\u00e9 dob\u011b je toti\u017e ve\u0161ker\u00e1 komunikace mezi \u0159\u00edd\u00edc\u00edmi letov\u00e9ho provozu a komer\u010dn\u00edmi proudy ne\u0161ifrovan\u00e1. Tesovi se poda\u0159ilo uk\u00e1zat, jak snadn\u00e9 by bylo p\u0159evz\u00edt nad letadlem plnou kontrolu, dokonce ho zni\u010dit, pokud by cht\u011bl. Pracoval pouze se simul\u00e1torem, ov\u0161em v\u00fdsledek je i tak znepokojuj\u00edc\u00ed. \tVa\u0161e televize\tSt\u00e1le obl\u00edben\u011bj\u0161\u00ed Smart TV jsou v z\u00e1sad\u011b velmi podobn\u00e9 smartphon\u016fm. Rozd\u00edl je ov\u0161em v tom, \u017ee zat\u00edmco skrze chytr\u00fd telefon lze sledovat va\u0161e data, prost\u0159ednictv\u00edm \u201enapaden\u00e9\u201c televize by m\u011bl hacker neru\u0161en\u00fd v\u00fdhled p\u0159\u00edmo do va\u0161eho ob\u00fdv\u00e1ku. A p\u0159iznejme si, zhusta by \u0161lo o pod\u00edvanou, p\u0159i kter\u00e9 o pozornost nestoj\u00edme. Tyto televize nav\u00edc na rozd\u00edl od mobil\u016f nedisponuj\u00ed bateriemi, p\u0159ipojeny jsou neust\u00e1le \u2013 a nez\u00e1le\u017e\u00ed tak \u00fapln\u011b na tom, jestli zapnut\u00e9, \u010di nikoliv. Odborn\u00edci proto rad\u00ed\u00a0 zakr\u00fdvat objektiv sn\u00edmac\u00ed kamery v\u017edy, kdy\u017e ho aktivn\u011b nepou\u017e\u00edv\u00e1te.                                                                                                                                                                                                                                                                                                                                                                                        4.5\/5 - (8 votes)        "},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Chytr\u00e1 elektronika jako c\u00edl hacker\u016f","item":"https:\/\/www.pweb.cz\/chytra-elektronika-jako-cil-hackeru\/#breadcrumbitem"}]}]