{"id":719,"date":"2026-01-22T19:43:21","date_gmt":"2026-01-22T18:43:21","guid":{"rendered":"http:\/\/cybersecure24.pl\/social-media\/"},"modified":"2026-03-03T18:26:30","modified_gmt":"2026-03-03T17:26:30","slug":"phishing-falszywe-wiadomosci","status":"publish","type":"page","link":"https:\/\/cybersecure24.pl\/en\/phishing-falszywe-wiadomosci\/","title":{"rendered":"Phishing i fa\u0142szywe wiadomo\u015bci"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"719\" class=\"elementor elementor-719\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e24666 e-flex e-con-boxed e-con e-parent\" data-id=\"3e24666\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-87600d1 e-con-full e-flex e-con e-child\" data-id=\"87600d1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-27a7e83 elementor-widget elementor-widget-heading\" data-id=\"27a7e83\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Lekcje<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f986b26 elementor-widget elementor-widget-heading\" data-id=\"f986b26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Phishing i fa\u0142szywe wiadomo\u015bci<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5a86610 elementor-widget elementor-widget-heading\" data-id=\"5a86610\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Phishing to najcz\u0119stsza metoda wy\u0142udzania danych i pieni\u0119dzy przez fa\u0142szywe SMS-y, e-maile i wiadomo\u015bci w social media.\nW tej lekcji pokazuj\u0119 realne przyk\u0142ady, czerwone flagi oraz prost\u0105 checklist\u0119 \u201eco sprawdzi\u0107\u201d zanim klikniesz.<\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3904a7 e-con-full e-flex e-con e-parent\" data-id=\"c3904a7\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-b43d13c e-con-full e-flex e-con e-child\" data-id=\"b43d13c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-3f665c8 e-con-full e-flex e-con e-child\" data-id=\"3f665c8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-685c144 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"685c144\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d05881 e-con-full e-flex e-con e-child\" data-id=\"3d05881\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5ba486c elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"5ba486c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Czym jest phishing i dlaczego tak cz\u0119sto dzia\u0142a?<\/h3>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-99d25a4 e-grid e-con-full e-con e-child\" data-id=\"99d25a4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c44dad8 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"c44dad8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"345\" data-end=\"846\">Phishing to jedna z najcz\u0119stszych metod oszustwa w internecie. Polega na tym, \u017ce atakuj\u0105cy podszywa si\u0119 pod zaufan\u0105 instytucj\u0119, serwis, firm\u0119 lub konkretn\u0105 osob\u0119 po to, aby sk\u0142oni\u0107 u\u017cytkownika do wykonania okre\u015blonego dzia\u0142ania. Najcz\u0119\u015bciej celem jest wy\u0142udzenie danych logowania, pieni\u0119dzy, kodu BLIK, danych karty p\u0142atniczej albo dost\u0119pu do konta. W praktyce nie chodzi wi\u0119c o \u201ew\u0142amanie techniczne\u201d w pierwszym kroku, ale o zmanipulowanie cz\u0142owieka tak, \u017ceby sam odda\u0142 to, co dla oszusta ma warto\u015b\u0107.<\/p><p data-start=\"848\" data-end=\"1431\">To w\u0142a\u015bnie dlatego phishing jest tak skuteczny. Zamiast atakowa\u0107 system, wykorzystuje co\u015b znacznie prostszego: po\u015bpiech, zaufanie, strach i automatyczne reakcje. Wiadomo\u015b\u0107 mo\u017ce wygl\u0105da\u0107 jak powiadomienie z banku, informacja od kuriera, alert bezpiecze\u0144stwa z serwisu spo\u0142eczno\u015bciowego albo pro\u015bba o dop\u0142at\u0119 do przesy\u0142ki. Cz\u0119sto jest kr\u00f3tka, konkretna i zbudowana tak, \u017ceby nie da\u0107 Ci czasu na spokojne sprawdzenie szczeg\u00f3\u0142\u00f3w. Pojawiaj\u0105 si\u0119 zwroty w stylu: \u201eostatnie ostrze\u017cenie\u201d, \u201ekonto zostanie zablokowane\u201d, \u201edop\u0142a\u0107 teraz\u201d, \u201ewykryto nieznane logowanie\u201d, \u201ekliknij, aby potwierdzi\u0107\u201d.<\/p><p data-start=\"1433\" data-end=\"1920\">Najgro\u017aniejsze jest to, \u017ce phishing coraz rzadziej wygl\u0105da jak \u017ale napisany e-mail pe\u0142en b\u0142\u0119d\u00f3w. Dzi\u015b oszu\u015bci potrafi\u0105 tworzy\u0107 wiadomo\u015bci bardzo podobne do prawdziwych: z poprawnym j\u0119zykiem, logo, uk\u0142adem graficznym i linkiem przypominaj\u0105cym oficjalny adres. Dla u\u017cytkownika r\u00f3\u017cnica cz\u0119sto sprowadza si\u0119 do jednego szczeg\u00f3\u0142u: nieco zmienionej domeny, zbyt du\u017cej presji czasu albo nietypowej pro\u015bby o dane. Je\u015bli kto\u015b nie wie, na co patrze\u0107, bardzo \u0142atwo uzna tak\u0105 wiadomo\u015b\u0107 za prawdziw\u0105.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4f0a3bc elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"4f0a3bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1944\" data-end=\"2583\">Phishing mo\u017ce przybiera\u0107 wiele form, ale mechanizm zwykle pozostaje podobny. Pierwszy etap to <strong data-start=\"2038\" data-end=\"2074\">podszycie si\u0119 pod zaufane \u017ar\u00f3d\u0142o<\/strong> &#8211; bank, urz\u0105d, sklep, przewo\u017anika, platform\u0119 streamingow\u0105, dzia\u0142 bezpiecze\u0144stwa albo znajomego z komunikatora. Drugi etap to <strong data-start=\"2200\" data-end=\"2220\">wywo\u0142anie emocji<\/strong>: strachu, presji czasu, poczucia pilno\u015bci albo obietnicy szybkiego rozwi\u0105zania problemu. Trzeci etap to <strong data-start=\"2325\" data-end=\"2353\">nak\u0142onienie do dzia\u0142ania<\/strong> &#8211; klikni\u0119cia w link, pobrania pliku, wpisania has\u0142a, zatwierdzenia p\u0142atno\u015bci lub podania kodu. Niezale\u017cnie od tego, czy phishing przychodzi mailem, SMS-em, telefonem czy przez social media, ten schemat powtarza si\u0119 bardzo cz\u0119sto.<\/p><p data-start=\"2585\" data-end=\"3195\">W praktyce phishing mo\u017ce prowadzi\u0107 do kilku r\u00f3\u017cnych skutk\u00f3w. Naj\u0142agodniejszy wariant to przekierowanie na fa\u0142szyw\u0105 stron\u0119, kt\u00f3ra jedynie pr\u00f3buje wy\u0142udzi\u0107 dane. Powa\u017cniejszy to przej\u0119cie konta, gdy u\u017cytkownik wpisze login, has\u0142o i kod 2FA. Jeszcze inny scenariusz to utrata pieni\u0119dzy: po wej\u015bciu w fa\u0142szyw\u0105 bramk\u0119 p\u0142atno\u015bci albo po zatwierdzeniu operacji BLIK. Zdarza si\u0119 te\u017c, \u017ce link lub za\u0142\u0105cznik prowadzi do pobrania z\u0142o\u015bliwego pliku, czyli phishing \u0142\u0105czy si\u0119 z malware. Dlatego ten typ oszustwa jest tak niebezpieczny &#8211; mo\u017ce by\u0107 pocz\u0105tkiem wielu r\u00f3\u017cnych problem\u00f3w, a nie tylko \u201ejednej fa\u0142szywej wiadomo\u015bci\u201d.<\/p><p data-start=\"3197\" data-end=\"3807\">Warto te\u017c pami\u0119ta\u0107, \u017ce phishing nie dzia\u0142a dlatego, \u017ce u\u017cytkownicy s\u0105 \u201enierozs\u0105dni\u201d. Dzia\u0142a dlatego, \u017ce atakuj\u0105cy \u015bwietnie rozumiej\u0105 codzienne nawyki. Wi\u0119kszo\u015b\u0107 os\u00f3b korzysta z telefonu w biegu, sprawdza wiadomo\u015bci mi\u0119dzy innymi czynno\u015bciami i podejmuje decyzje w kilka sekund. Je\u017celi komunikat dotyczy czego\u015b znajomego &#8211; paczki, p\u0142atno\u015bci, logowania, konta w banku &#8211; bardzo \u0142atwo zareagowa\u0107 automatycznie. Dlatego najlepsz\u0105 obron\u0105 nie jest pr\u00f3ba zapami\u0119tania wszystkich mo\u017cliwych oszustw, ale wyrobienie prostego nawyku: zatrzymaj si\u0119, sprawd\u017a \u017ar\u00f3d\u0142o wiadomo\u015bci, przyjrzyj si\u0119 linkowi i dopiero wtedy dzia\u0142aj.<\/p><p data-start=\"3809\" data-end=\"4151\">Phishing jest skuteczny w\u0142a\u015bnie dlatego, \u017ce wygl\u0105da jak co\u015b zwyczajnego. Nie przypomina \u201eataku z filmu\u201d, tylko codzienn\u0105 sytuacj\u0119, kt\u00f3ra wydaje si\u0119 pilna i wiarygodna. Im szybciej nauczysz si\u0119 rozpoznawa\u0107 wsp\u00f3lne elementy tych wiadomo\u015bci, tym \u0142atwiej b\u0119dzie Ci wychwyci\u0107 zagro\u017cenie, zanim klikniesz, zalogujesz si\u0119 albo zatwierdzisz p\u0142atno\u015b\u0107.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5909767 elementor-widget elementor-widget-heading\" data-id=\"5909767\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">W skr\u00f3cie<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8cc002a elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"8cc002a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Phishing to oszustwo oparte na manipulacji, nie na sile. Atakuj\u0105cy chce, \u017ceby\u015b zareagowa\u0142 zanim pomy\u015blisz: klikn\u0105\u0142 link, pobra\u0142 plik, wpisa\u0142 has\u0142o albo zatwierdzi\u0142 operacj\u0119. Dlatego najwa\u017cniejszym elementem ochrony nie jest tylko technologia, ale nawyk kr\u00f3tkiej weryfikacji. Kilka dodatkowych sekund bardzo cz\u0119sto wystarcza, \u017ceby zatrzyma\u0107 ca\u0142y atak.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-788ebbe elementor-widget elementor-widget-button\" data-id=\"788ebbe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"#quiz-phishing-final\" quiz-malware=\"\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 2048 2048\"><path d=\"M6.125 1088h1797.89l-402.976 403 89.994 90L2048 1024l-556.966-557-89.994 90 402.976 403H6.125v128z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Rozpocznij lekcje<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-02d1a51 e-con-full e-flex e-con e-parent\" data-id=\"02d1a51\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-d6a0886 e-con-full e-flex e-con e-child\" data-id=\"d6a0886\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-df6ae89 e-con-full e-flex e-con e-child\" data-id=\"df6ae89\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65456fc elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"65456fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-80b1387 e-con-full e-flex e-con e-child\" data-id=\"80b1387\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1796360 elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"1796360\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Jak rozpozna\u0107 phishing zanim b\u0119dzie za p\u00f3\u017ano<\/h3>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d96aab8 e-grid e-con-full e-con e-child\" data-id=\"d96aab8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d5b9d6 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"3d5b9d6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Oszustwa dzia\u0142aj\u0105, bo bazuj\u0105 na po\u015bpiechu i emocjach: \u201edop\u0142a\u0107\u201d, \u201eTwoje konto zablokowane\u201d, \u201eostatnie ostrze\u017cenie\u201d. Celem jest klikni\u0119cie w link, pobranie pliku lub podanie danych (login, has\u0142o, kod SMS\/BLIK).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81864a3 elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"81864a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1766\" data-end=\"2003\">Najcz\u0119\u015bciej spotkasz wiadomo\u015bci podszywaj\u0105ce si\u0119 pod bank, kuriera, serwisy og\u0142oszeniowe i platformy streamingowe. Tre\u015b\u0107 wygl\u0105da wiarygodnie, ale link prowadzi na podstawion\u0105 stron\u0119, kt\u00f3ra kradnie dane.<\/p><p data-start=\"2005\" data-end=\"2194\">Je\u015bli widzisz presj\u0119 czasu, pro\u015bb\u0119 o \u201eweryfikacj\u0119\u201d, \u201edop\u0142at\u0119\u201d albo podanie kodu &#8211; zatrzymaj si\u0119. Bezpieczniej jest wej\u015b\u0107 na stron\u0119 r\u0119cznie (z zak\u0142adki) lub zadzwoni\u0107 na oficjaln\u0105 infolini\u0119.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2f534ef e-flex e-con-boxed e-con e-parent\" data-id=\"2f534ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-6745073 e-con-full e-flex e-con e-child\" data-id=\"6745073\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6aecab6 elementor-widget elementor-widget-heading\" data-id=\"6aecab6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">PLAN LEKCJI<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6dcc6ed elementor-widget elementor-widget-heading\" data-id=\"6dcc6ed\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Jak dzia\u0142a phishing? 3 elementy, kt\u00f3re powtarzaj\u0105 si\u0119 zawsze<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c4a55b elementor-widget elementor-widget-text-editor\" data-id=\"1c4a55b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Je\u015bli rozumiesz schemat, szybciej rozpoznasz pr\u00f3b\u0119 oszustwa &#8211; niezale\u017cnie czy to SMS, e-mail czy social media.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d77f668 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"d77f668\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b7bfba2 e-grid e-con-full e-con e-child\" data-id=\"b7bfba2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b86a61e elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"b86a61e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-user-secret\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M383.9 308.3l23.9-62.6c4-10.5-3.7-21.7-15-21.7h-58.5c11-18.9 17.8-40.6 17.8-64v-.3c39.2-7.8 64-19.1 64-31.7 0-13.3-27.3-25.1-70.1-33-9.2-32.8-27-65.8-40.6-82.8-9.5-11.9-25.9-15.6-39.5-8.8l-27.6 13.8c-9 4.5-19.6 4.5-28.6 0L182.1 3.4c-13.6-6.8-30-3.1-39.5 8.8-13.5 17-31.4 50-40.6 82.8-42.7 7.9-70 19.7-70 33 0 12.6 24.8 23.9 64 31.7v.3c0 23.4 6.8 45.1 17.8 64H56.3c-11.5 0-19.2 11.7-14.7 22.3l25.8 60.2C27.3 329.8 0 372.7 0 422.4v44.8C0 491.9 20.1 512 44.8 512h358.4c24.7 0 44.8-20.1 44.8-44.8v-44.8c0-48.4-25.8-90.4-64.1-114.1zM176 480l-41.6-192 49.6 32 24 40-32 120zm96 0l-32-120 24-40 49.6-32L272 480zm41.7-298.5c-3.9 11.9-7 24.6-16.5 33.4-10.1 9.3-48 22.4-64-25-2.8-8.4-15.4-8.4-18.3 0-17 50.2-56 32.4-64 25-9.5-8.8-12.7-21.5-16.5-33.4-.8-2.5-6.3-5.7-6.3-5.8v-10.8c28.3 3.6 61 5.8 96 5.8s67.7-2.1 96-5.8v10.8c-.1.1-5.6 3.2-6.4 5.8z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPodszywanie si\u0119\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tOszust udaje bank, kuriera albo serwis (np. \u201eTwoja paczka\u201d, \u201edop\u0142a\u0107 1,49 z\u0142\u201d). Celem jest wzbudzenie zaufania i sk\u0142onienie do klikni\u0119cia.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d2d9b9 elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"6d2d9b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-clock\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm0 448c-110.5 0-200-89.5-200-200S145.5 56 256 56s200 89.5 200 200-89.5 200-200 200zm61.8-104.4l-84.9-61.7c-3.1-2.3-4.9-5.9-4.9-9.7V116c0-6.6 5.4-12 12-12h32c6.6 0 12 5.4 12 12v141.7l66.8 48.6c5.4 3.9 6.5 11.4 2.6 16.8L334.6 349c-3.9 5.3-11.4 6.5-16.8 2.6z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPresja i emocje\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tPojawia si\u0119 po\u015bpiech, strach albo \u201eostatnia szansa\u201d. To ma wy\u0142\u0105czy\u0107 spokojne my\u015blenie i wymusi\u0107 reakcj\u0119 \u201etu i teraz\u201d.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-184082f elementor-widget__width-initial elementor-widget-mobile__width-inherit elementor-view-default elementor-position-block-start elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"184082f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-key\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M512 176.001C512 273.203 433.202 352 336 352c-11.22 0-22.19-1.062-32.827-3.069l-24.012 27.014A23.999 23.999 0 0 1 261.223 384H224v40c0 13.255-10.745 24-24 24h-40v40c0 13.255-10.745 24-24 24H24c-13.255 0-24-10.745-24-24v-78.059c0-6.365 2.529-12.47 7.029-16.971l161.802-161.802C163.108 213.814 160 195.271 160 176 160 78.798 238.797.001 335.999 0 433.488-.001 512 78.511 512 176.001zM336 128c0 26.51 21.49 48 48 48s48-21.49 48-48-21.49-48-48-48-48 21.49-48 48z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h5 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPrzej\u0119cie dost\u0119pu\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h5>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tLink prowadzi na fa\u0142szyw\u0105 stron\u0119 logowania lub p\u0142atno\u015bci, a czasem do z\u0142o\u015bliwego pliku. Efekt: kradzie\u017c danych, pieni\u0119dzy albo konta.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-714d999 e-flex e-con-boxed e-con e-parent\" data-id=\"714d999\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8cc2859 e-con-full e-flex e-con e-child\" data-id=\"8cc2859\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-028bd44 elementor-widget__width-inherit elementor-widget-mobile__width-inherit elementor-widget elementor-widget-heading\" data-id=\"028bd44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Najcz\u0119stsze scenariusze phishingu<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5532663 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"5532663\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<div class=\"elementor-heading-title elementor-size-default\">Te wiadomo\u015bci wygl\u0105daj\u0105 wiarygodnie, ale maj\u0105 jeden cel: wy\u0142udzi\u0107 dane lub pieni\u0105dze. Zobacz 4 najpopularniejsze typy.<\/div>\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4c302e0 e-con-full e-flex e-con e-child\" data-id=\"4c302e0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-cd9b81a e-con-full e-flex e-con e-child\" data-id=\"cd9b81a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1766402 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"1766402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/cybersecure24.pl\/wp-content\/uploads\/2026\/02\/1.png\" class=\"attachment-full size-full wp-image-1948\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">\u201eDop\u0142a\u0107 do paczki\u201d (kurier)<\/h4><p class=\"elementor-image-box-description\">Link do \u201edop\u0142aty\u201d prowadzi na fa\u0142szyw\u0105 p\u0142atno\u015b\u0107. Cz\u0119sto ko\u0144czy si\u0119 pobraniem pieni\u0119dzy i danymi karty w r\u0119kach oszusta.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-443b2de elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"443b2de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"1310\" height=\"857\" src=\"https:\/\/cybersecure24.pl\/wp-content\/uploads\/2026\/02\/3.png\" class=\"attachment-full size-full wp-image-1954\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">\u201eFaktura \/ dokument \/ zdj\u0119cia\u201d (za\u0142\u0105cznik)<\/h4><p class=\"elementor-image-box-description\">Pliki .zip\/.html\/.exe lub dokumenty z makrami potrafi\u0105 zainstalowa\u0107 malware albo przej\u0105\u0107 Twoje konto e-mail.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69032c6 e-con-full e-flex e-con e-child\" data-id=\"69032c6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c186093 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"c186093\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" width=\"1046\" height=\"696\" src=\"https:\/\/cybersecure24.pl\/wp-content\/uploads\/2026\/02\/2.png\" class=\"attachment-full size-full wp-image-1950\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">\u201eZablokujemy konto\u201d (bank)<\/h4><p class=\"elementor-image-box-description\">Wiadomo\u015b\u0107 straszy blokad\u0105 konta. Link prowadzi do strony \u0142udz\u0105co podobnej do banku i wy\u0142udza login, has\u0142o oraz kod SMS.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3075df5 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3075df5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img loading=\"lazy\" decoding=\"async\" width=\"1536\" height=\"1024\" src=\"https:\/\/cybersecure24.pl\/wp-content\/uploads\/2026\/02\/4.png\" class=\"attachment-full size-full wp-image-1969\" alt=\"\" \/><\/figure><div class=\"elementor-image-box-content\"><h4 class=\"elementor-image-box-title\">\u201eNieznane logowanie\u201d (serwis)<\/h4><p class=\"elementor-image-box-description\">Wiadomo\u015b\u0107 udaje alert bezpiecze\u0144stwa. Klikasz \u201ezabezpiecz konto\u201d, a trafiasz na fa\u0142szywy reset has\u0142a.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e53aae6 e-flex e-con-boxed e-con e-parent\" data-id=\"e53aae6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f4960dd e-con-full e-flex e-con e-child\" data-id=\"f4960dd\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8d81e10 elementor-widget elementor-widget-heading\" data-id=\"8d81e10\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Co zrobi\u0107, gdy trafisz na taki scenariusz?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a2b3ce3 elementor-widget elementor-widget-text-editor\" data-id=\"a2b3ce3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Poni\u017cej masz szybkie reakcje \u201ekrok po kroku\u201d dla najcz\u0119stszych pu\u0142apek. Zasada jest prosta: zatrzymaj si\u0119, sprawd\u017a te par\u0119\u00a0 rzeczy i dopiero dzia\u0142aj.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ee0678a acc-noauto elementor-widget elementor-widget-accordion\" data-id=\"ee0678a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2491\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-2491\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u201eDop\u0142a\u0107 do paczki\u201d (kurier)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2491\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-2491\"><p data-start=\"393\" data-end=\"736\">Jak dzia\u0142a ten phishing?<\/p><p data-start=\"393\" data-end=\"736\">Oszu\u015bci wysy\u0142aj\u0105 SMS o \u201eniedop\u0142acie\u201d (cz\u0119sto 1-10 z\u0142), bo ma\u0142a kwota obni\u017ca czujno\u015b\u0107. Link prowadzi do strony \u0142udz\u0105co podobnej do serwisu kuriera, gdzie prosz\u0105 o dane karty lub o \u201epotwierdzenie\u201d p\u0142atno\u015bci. Czasem strona pokazuje komunikat o b\u0142\u0119dzie, \u017ceby\u015b spr\u00f3bowa\u0142 jeszcze raz &#8211; a dane ju\u017c zosta\u0142y przechwycone.<\/p><p data-start=\"738\" data-end=\"780\"><strong data-start=\"738\" data-end=\"778\">Co zrobi\u0107 od razu (najbezpieczniej):<\/strong><\/p><ul data-start=\"781\" data-end=\"1032\"><li data-start=\"781\" data-end=\"808\"><p data-start=\"783\" data-end=\"808\">Nie klikaj linku z SMS.<\/p><\/li><li data-start=\"809\" data-end=\"911\"><p data-start=\"811\" data-end=\"911\">Status przesy\u0142ki sprawd\u017a <strong data-start=\"836\" data-end=\"847\">r\u0119cznie<\/strong>: wejd\u017a na stron\u0119 przewo\u017anika z przegl\u0105darki albo w aplikacji.<\/p><\/li><li data-start=\"912\" data-end=\"1032\"><p data-start=\"914\" data-end=\"1032\">Je\u015bli faktycznie co\u015b dop\u0142acasz, r\u00f3b to tylko na oficjalnej stronie (z poprawn\u0105 domen\u0105) i przez znany proces p\u0142atno\u015bci.<\/p><\/li><\/ul><p data-start=\"1034\" data-end=\"1056\"><strong data-start=\"1034\" data-end=\"1054\">Czego nie robi\u0107:<\/strong><\/p><ul data-start=\"1057\" data-end=\"1195\"><li data-start=\"1057\" data-end=\"1111\"><p data-start=\"1059\" data-end=\"1111\">Nie wpisuj danych karty na stronie otwartej z SMS.<\/p><\/li><li data-start=\"1112\" data-end=\"1195\"><p data-start=\"1114\" data-end=\"1195\">Nie zatwierdzaj \u201edziwnych\u201d ekran\u00f3w p\u0142atno\u015bci, kt\u00f3re wygl\u0105daj\u0105 inaczej ni\u017c zwykle.<\/p><\/li><\/ul><p data-start=\"1197\" data-end=\"1243\"><strong data-start=\"1197\" data-end=\"1241\">Czerwone flagi (prawie pewnik oszustwa):<\/strong><\/p><ul data-start=\"1244\" data-end=\"1402\"><li data-start=\"1244\" data-end=\"1281\"><p data-start=\"1246\" data-end=\"1281\">presja czasu (\u201eostatnia szansa\u201d),<\/p><\/li><li data-start=\"1282\" data-end=\"1310\"><p data-start=\"1284\" data-end=\"1310\">link z nietypow\u0105 domen\u0105,<\/p><\/li><li data-start=\"1311\" data-end=\"1355\"><p data-start=\"1313\" data-end=\"1355\">brak numeru przesy\u0142ki \/ brak szczeg\u00f3\u0142\u00f3w,<\/p><\/li><li data-start=\"1356\" data-end=\"1402\"><p data-start=\"1358\" data-end=\"1402\">pro\u015bba o dane karty przy \u201edrobnej dop\u0142acie\u201d.<\/p><\/li><\/ul><p data-start=\"1404\" data-end=\"1551\"><strong data-start=\"1404\" data-end=\"1424\">Je\u015bli klikn\u0105\u0142e\u015b:<\/strong><br data-start=\"1424\" data-end=\"1427\" \/>Zamknij stron\u0119, nic nie wpisuj. Je\u015bli poda\u0142e\u015b dane karty: <strong data-start=\"1485\" data-end=\"1513\">skontaktuj si\u0119 z bankiem<\/strong>, rozwa\u017c blokad\u0119 karty i ustaw limity.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2492\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-2492\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u201eZablokujemy konto\u201d (bank)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2492\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-2492\"><p data-start=\"1596\" data-end=\"1919\"><strong data-start=\"1596\" data-end=\"1624\">Jak dzia\u0142a ten phishing?<\/strong><br data-start=\"1624\" data-end=\"1627\" \/>Wiadomo\u015b\u0107 straszy blokad\u0105 konta, \u201epodejrzan\u0105 transakcj\u0105\u201d albo konieczno\u015bci\u0105 pilnej weryfikacji. Link prowadzi do fa\u0142szywego logowania. Celem jest przej\u0119cie loginu i has\u0142a, a czasem r\u00f3wnie\u017c kodu SMS\/2FA. Atak bywa \u0142\u0105czony z telefonem od \u201ekonsultanta\u201d, kt\u00f3ry pr\u00f3buje wy\u0142udzi\u0107 kod autoryzacyjny.<\/p><p data-start=\"1921\" data-end=\"1945\"><strong data-start=\"1921\" data-end=\"1943\">Co zrobi\u0107 od razu:<\/strong><\/p><ul data-start=\"1946\" data-end=\"2178\"><li data-start=\"1946\" data-end=\"2026\"><p data-start=\"1948\" data-end=\"2026\">Wejd\u017a do banku <strong data-start=\"1963\" data-end=\"1972\">tylko<\/strong> przez aplikacj\u0119 mobiln\u0105 lub wpisuj\u0105c adres r\u0119cznie.<\/p><\/li><li data-start=\"2027\" data-end=\"2095\"><p data-start=\"2029\" data-end=\"2095\">Je\u015bli w banku naprawd\u0119 jest alert &#8211; zobaczysz go po zalogowaniu.<\/p><\/li><li data-start=\"2096\" data-end=\"2178\"><p data-start=\"2098\" data-end=\"2178\">Je\u015bli kto\u015b dzwoni \u201ez banku\u201d: roz\u0142\u0105cz si\u0119 i oddzwo\u0144 na numer z oficjalnej strony.<\/p><\/li><\/ul><p data-start=\"2180\" data-end=\"2202\"><strong data-start=\"2180\" data-end=\"2200\">Czego nie robi\u0107:<\/strong><\/p><ul data-start=\"2203\" data-end=\"2305\"><li data-start=\"2203\" data-end=\"2243\"><p data-start=\"2205\" data-end=\"2243\">Nie loguj si\u0119 z linku w SMS\/e-mailu.<\/p><\/li><li data-start=\"2244\" data-end=\"2305\"><p data-start=\"2246\" data-end=\"2305\">Nie podawaj kod\u00f3w SMS\/2FA nikomu. Bank tego nie potrzebuje.<\/p><\/li><\/ul><p data-start=\"2307\" data-end=\"2328\"><strong data-start=\"2307\" data-end=\"2326\">Czerwone flagi:<\/strong><\/p><ul data-start=\"2329\" data-end=\"2464\"><li data-start=\"2329\" data-end=\"2366\"><p data-start=\"2331\" data-end=\"2366\">\u201eZaloguj si\u0119 natychmiast\u201d + link,<\/p><\/li><li data-start=\"2367\" data-end=\"2417\"><p data-start=\"2369\" data-end=\"2417\">pro\u015bba o kod potwierdzaj\u0105cy \u201edla weryfikacji\u201d,<\/p><\/li><li data-start=\"2418\" data-end=\"2464\"><p data-start=\"2420\" data-end=\"2464\">b\u0142\u0119dy j\u0119zykowe lub nietypowa nadawca\/domena.<\/p><\/li><\/ul><p data-start=\"2466\" data-end=\"2639\"><strong data-start=\"2466\" data-end=\"2504\">Je\u015bli klikn\u0105\u0142e\u015b lub wpisa\u0142e\u015b dane:<\/strong><br data-start=\"2504\" data-end=\"2507\" \/>Od razu zmie\u0144 has\u0142o (je\u015bli jeszcze masz dost\u0119p), w\u0142\u0105cz\/zmie\u0144 2FA i skontaktuj si\u0119 z bankiem. Sprawd\u017a histori\u0119 logowa\u0144 i autoryzacji.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2493\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-2493\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u201eFaktura \/ dokument \/ zdj\u0119cia\u201d (za\u0142\u0105cznik)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2493\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-2493\"><p data-start=\"2700\" data-end=\"3034\"><strong data-start=\"2700\" data-end=\"2728\">Jak dzia\u0142a ten phishing?<\/strong><br data-start=\"2728\" data-end=\"2731\" \/>To jeden z najcz\u0119stszych wektor\u00f3w malware. Wiadomo\u015b\u0107 udaje faktur\u0119, dokument lub \u201eskan\u201d, a za\u0142\u0105cznik bywa ZIP\/HTML\/EXE albo dokument z pro\u015bb\u0105 o w\u0142\u0105czenie makr. Czasem w tre\u015bci jest link do \u201epobrania\u201d, kt\u00f3ry prowadzi do fa\u0142szywej chmury. Cel: uruchomi\u0107 plik, kt\u00f3ry zainstaluje malware lub wykradnie dane.<\/p><p data-start=\"3036\" data-end=\"3060\"><strong data-start=\"3036\" data-end=\"3058\">Co zrobi\u0107 od razu:<\/strong><\/p><ul data-start=\"3061\" data-end=\"3311\"><li data-start=\"3061\" data-end=\"3125\"><p data-start=\"3063\" data-end=\"3125\">Je\u015bli nie spodziewasz si\u0119 faktury &#8211; nie otwieraj za\u0142\u0105cznika.<\/p><\/li><li data-start=\"3126\" data-end=\"3200\"><p data-start=\"3128\" data-end=\"3200\">Sprawd\u017a nadawc\u0119: czy domena jest prawdziwa i czy to realny kontrahent.<\/p><\/li><li data-start=\"3201\" data-end=\"3311\"><p data-start=\"3203\" data-end=\"3311\">Zamiast otwiera\u0107 plik, odpowiedz: \u201eprosz\u0119 o numer zam\u00f3wienia\u201d lub zweryfikuj innym kana\u0142em (telefon\/portal).<\/p><\/li><\/ul><p data-start=\"3313\" data-end=\"3335\"><strong data-start=\"3313\" data-end=\"3333\">Czego nie robi\u0107:<\/strong><\/p><ul data-start=\"3336\" data-end=\"3477\"><li data-start=\"3336\" data-end=\"3404\"><p data-start=\"3338\" data-end=\"3404\">Nie uruchamiaj plik\u00f3w .exe, .js, .bat, .scr ani dziwnych ZIP-\u00f3w.<\/p><\/li><li data-start=\"3405\" data-end=\"3477\"><p data-start=\"3407\" data-end=\"3477\">Nie w\u0142\u0105czaj \u201emakr\u201d ani \u201ezawarto\u015bci\u201d w dokumentach z niepewnego \u017ar\u00f3d\u0142a.<\/p><\/li><\/ul><p data-start=\"3479\" data-end=\"3500\"><strong data-start=\"3479\" data-end=\"3498\">Czerwone flagi:<\/strong><\/p><ul data-start=\"3501\" data-end=\"3669\"><li data-start=\"3501\" data-end=\"3534\"><p data-start=\"3503\" data-end=\"3534\">\u201epilne\u201d, \u201eostatnie wezwanie\u201d,<\/p><\/li><li data-start=\"3535\" data-end=\"3587\"><p data-start=\"3537\" data-end=\"3587\">nietypowa nazwa pliku (np. faktura2026.pdf.exe),<\/p><\/li><li data-start=\"3588\" data-end=\"3616\"><p data-start=\"3590\" data-end=\"3616\">pro\u015bba o w\u0142\u0105czenie makr,<\/p><\/li><li data-start=\"3617\" data-end=\"3669\"><p data-start=\"3619\" data-end=\"3669\">link do \u201epobrania dokumentu\u201d z podejrzanej domeny.<\/p><\/li><\/ul><p data-start=\"3671\" data-end=\"3831\"><strong data-start=\"3671\" data-end=\"3692\">Je\u015bli otworzy\u0142e\u015b:<\/strong><br data-start=\"3692\" data-end=\"3695\" \/>Od\u0142\u0105cz internet, zr\u00f3b skan antywirusowy, sprawd\u017a uruchamiane procesy i rozszerzenia przegl\u0105darki. Je\u015bli to firmowy sprz\u0119t &#8211; zg\u0142o\u015b do IT.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2494\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-2494\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u201eNieznane logowanie\u201d (serwis)<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2494\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-2494\"><p data-start=\"3879\" data-end=\"4186\"><strong data-start=\"3879\" data-end=\"3907\">Jak dzia\u0142a ten phishing?<\/strong><br data-start=\"3907\" data-end=\"3910\" \/>Mail udaje alert bezpiecze\u0144stwa: \u201ewykryto logowanie\u201d, \u201ekto\u015b pr\u00f3buje si\u0119 zalogowa\u0107\u201d. Link \u201eZabezpiecz konto\u201d prowadzi do fa\u0142szywego resetu has\u0142a. Cz\u0119sto wygl\u0105da identycznie jak prawdziwy serwis. Celem jest przej\u0119cie danych logowania i ustawienie nowego has\u0142a przez atakuj\u0105cego.<\/p><p data-start=\"4188\" data-end=\"4212\"><strong data-start=\"4188\" data-end=\"4210\">Co zrobi\u0107 od razu:<\/strong><\/p><ul data-start=\"4213\" data-end=\"4444\"><li data-start=\"4213\" data-end=\"4280\"><p data-start=\"4215\" data-end=\"4280\">Wejd\u017a na serwis <strong data-start=\"4231\" data-end=\"4247\">samodzielnie<\/strong> (aplikacja \/ wpisanie adresu).<\/p><\/li><li data-start=\"4281\" data-end=\"4354\"><p data-start=\"4283\" data-end=\"4354\">Sprawd\u017a w ustawieniach konta: aktywne sesje, urz\u0105dzenia, lokalizacje.<\/p><\/li><li data-start=\"4355\" data-end=\"4399\"><p data-start=\"4357\" data-end=\"4399\">Zmie\u0144 has\u0142o i w\u0142\u0105cz 2FA, je\u015bli nie by\u0142o.<\/p><\/li><li data-start=\"4400\" data-end=\"4444\"><p data-start=\"4402\" data-end=\"4444\">Wyloguj inne sesje (\u201elog out everywhere\u201d).<\/p><\/li><\/ul><p data-start=\"4446\" data-end=\"4468\"><strong data-start=\"4446\" data-end=\"4466\">Czego nie robi\u0107:<\/strong><\/p><ul data-start=\"4469\" data-end=\"4599\"><li data-start=\"4469\" data-end=\"4531\"><p data-start=\"4471\" data-end=\"4531\">Nie klikaj resetu has\u0142a z maila, dop\u00f3ki nie zweryfikujesz.<\/p><\/li><li data-start=\"4532\" data-end=\"4599\"><p data-start=\"4534\" data-end=\"4599\">Nie wpisuj has\u0142a na stronie, kt\u00f3rej adres nie jest 100% poprawny.<\/p><\/li><\/ul><p data-start=\"4601\" data-end=\"4622\"><strong data-start=\"4601\" data-end=\"4620\">Czerwone flagi:<\/strong><\/p><ul data-start=\"4623\" data-end=\"4743\"><li data-start=\"4623\" data-end=\"4651\"><p data-start=\"4625\" data-end=\"4651\">mail z presj\u0105 i linkiem,<\/p><\/li><li data-start=\"4652\" data-end=\"4705\"><p data-start=\"4654\" data-end=\"4705\">brak szczeg\u00f3\u0142\u00f3w (jakie urz\u0105dzenie, gdzie, kiedy),<\/p><\/li><li data-start=\"4706\" data-end=\"4743\"><p data-start=\"4708\" data-end=\"4743\">domena podobna, ale nie identyczna.<\/p><\/li><\/ul><p data-start=\"4745\" data-end=\"4898\"><strong data-start=\"4745\" data-end=\"4765\">Je\u015bli klikn\u0105\u0142e\u015b:<\/strong><br data-start=\"4765\" data-end=\"4768\" \/>Zamknij stron\u0119, wejd\u017a do serwisu r\u0119cznie i natychmiast zmie\u0144 has\u0142o + w\u0142\u0105cz 2FA. Sprawd\u017a, czy nie dodano nowego maila odzyskiwania.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2495\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-2495\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u201eOferta pracy \/ HR \/ LinkedIn\u201d<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2495\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-2495\"><p data-start=\"4970\" data-end=\"5289\"><strong data-start=\"4970\" data-end=\"4998\">Jak dzia\u0142a ten phishing?<\/strong><br data-start=\"4998\" data-end=\"5001\" \/>Oszu\u015bci podszywaj\u0105 si\u0119 pod rekruter\u00f3w, firmy lub agencje. Wysy\u0142aj\u0105 link do \u201eszczeg\u00f3\u0142\u00f3w oferty\u201d, \u201etestu\u201d albo prosz\u0105 o pobranie pliku. Celem jest przej\u0119cie konta (np. maila\/LinkedIn) lub instalacja malware. Cz\u0119sto wykorzystuj\u0105 presj\u0119 (\u201ewy\u015blij dzi\u015b\u201d, \u201eostatnie miejsce\u201d) i wiarygodne nazwy.<\/p><p data-start=\"5291\" data-end=\"5315\"><strong data-start=\"5291\" data-end=\"5313\">Co zrobi\u0107 od razu:<\/strong><\/p><ul data-start=\"5316\" data-end=\"5527\"><li data-start=\"5316\" data-end=\"5379\"><p data-start=\"5318\" data-end=\"5379\">Sprawd\u017a profil firmy i domen\u0119 e-mail (czy to realna firma).<\/p><\/li><li data-start=\"5380\" data-end=\"5450\"><p data-start=\"5382\" data-end=\"5450\">Nie pobieraj aplikacji\/plik\u00f3w \u201edo rozmowy\u201d z przypadkowych link\u00f3w.<\/p><\/li><li data-start=\"5451\" data-end=\"5527\"><p data-start=\"5453\" data-end=\"5527\">Je\u015bli link prowadzi do logowania &#8211; wejd\u017a na portal pracy\/LinkedIn r\u0119cznie.<\/p><\/li><\/ul><p data-start=\"5529\" data-end=\"5551\"><strong data-start=\"5529\" data-end=\"5549\">Czego nie robi\u0107:<\/strong><\/p><ul data-start=\"5552\" data-end=\"5681\"><li data-start=\"5552\" data-end=\"5611\"><p data-start=\"5554\" data-end=\"5611\">Nie otwieraj plik\u00f3w z nieznanych chmur bez weryfikacji.<\/p><\/li><li data-start=\"5612\" data-end=\"5681\"><p data-start=\"5614\" data-end=\"5681\">Nie instaluj \u201enarz\u0119dzi do rozmowy\u201d spoza oficjalnych sklep\u00f3w\/stron.<\/p><\/li><\/ul><p data-start=\"5683\" data-end=\"5704\"><strong data-start=\"5683\" data-end=\"5702\">Czerwone flagi:<\/strong><\/p><ul data-start=\"5705\" data-end=\"5832\"><li data-start=\"5705\" data-end=\"5744\"><p data-start=\"5707\" data-end=\"5744\">podejrzane domeny i skr\u00f3cone linki,<\/p><\/li><li data-start=\"5745\" data-end=\"5777\"><p data-start=\"5747\" data-end=\"5777\">\u201ezr\u00f3b to teraz\u201d + za\u0142\u0105cznik,<\/p><\/li><li data-start=\"5778\" data-end=\"5832\"><p data-start=\"5780\" data-end=\"5832\">pro\u015bba o dane wra\u017cliwe od razu (PESEL, skan dowodu).<\/p><\/li><\/ul><p data-start=\"5834\" data-end=\"5947\"><strong data-start=\"5834\" data-end=\"5854\">Je\u015bli klikn\u0105\u0142e\u015b:<\/strong><br data-start=\"5854\" data-end=\"5857\" \/>Zmie\u0144 has\u0142o do maila\/LinkedIn, w\u0142\u0105cz 2FA i sprawd\u017a, czy nie dodano przekierowa\u0144 w poczcie.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2496\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-2496\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-right\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><svg class=\"e-font-icon-svg e-fas-plus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm144 276c0 6.6-5.4 12-12 12h-92v92c0 6.6-5.4 12-12 12h-56c-6.6 0-12-5.4-12-12v-92h-92c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h92v-92c0-6.6 5.4-12 12-12h56c6.6 0 12 5.4 12 12v92h92c6.6 0 12 5.4 12 12v56z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><svg class=\"e-font-icon-svg e-fas-minus-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zM124 296c-6.6 0-12-5.4-12-12v-56c0-6.6 5.4-12 12-12h264c6.6 0 12 5.4 12 12v56c0 6.6-5.4 12-12 12H124z\"><\/path><\/svg><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" tabindex=\"0\">\u201eDop\u0142ata do subskrypcji \/ rachunku\u201d<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2496\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-2496\"><p data-start=\"6024\" data-end=\"6287\"><strong data-start=\"6024\" data-end=\"6052\">Jak dzia\u0142a ten phishing?<\/strong><br data-start=\"6052\" data-end=\"6055\" \/>Wiadomo\u015b\u0107 udaje platform\u0119 (np. subskrypcja, operator, pr\u0105d) i informuje o problemie z p\u0142atno\u015bci\u0105. Link kieruje do fa\u0142szywej bramki p\u0142atno\u015bci albo strony logowania. Cel: dane karty lub dost\u0119p do konta, a potem kolejne pr\u00f3by obci\u0105\u017ce\u0144.<\/p><p data-start=\"6289\" data-end=\"6313\"><strong data-start=\"6289\" data-end=\"6311\">Co zrobi\u0107 od razu:<\/strong><\/p><ul data-start=\"6314\" data-end=\"6504\"><li data-start=\"6314\" data-end=\"6348\"><p data-start=\"6316\" data-end=\"6348\">Nie p\u0142a\u0107 z linku w wiadomo\u015bci.<\/p><\/li><li data-start=\"6349\" data-end=\"6446\"><p data-start=\"6351\" data-end=\"6446\">Sprawd\u017a status subskrypcji po zalogowaniu <strong data-start=\"6393\" data-end=\"6416\">z w\u0142asnej aplikacji<\/strong> lub wpisuj\u0105c adres r\u0119cznie.<\/p><\/li><li data-start=\"6447\" data-end=\"6504\"><p data-start=\"6449\" data-end=\"6504\">Je\u015bli to rachunek: sprawd\u017a w oficjalnym panelu klienta.<\/p><\/li><\/ul><p data-start=\"6506\" data-end=\"6528\"><strong data-start=\"6506\" data-end=\"6526\">Czego nie robi\u0107:<\/strong><\/p><ul data-start=\"6529\" data-end=\"6692\"><li data-start=\"6529\" data-end=\"6606\"><p data-start=\"6531\" data-end=\"6606\">Nie wpisuj danych karty na stronie, kt\u00f3rej adres jest inny ni\u017c oficjalny.<\/p><\/li><li data-start=\"6607\" data-end=\"6692\"><p data-start=\"6609\" data-end=\"6692\">Nie zatwierdzaj p\u0142atno\u015bci, kt\u00f3rej nie rozumiesz (np. dziwna waluta, inny odbiorca).<\/p><\/li><\/ul><p data-start=\"6694\" data-end=\"6715\"><strong data-start=\"6694\" data-end=\"6713\">Czerwone flagi:<\/strong><\/p><ul data-start=\"6716\" data-end=\"6810\"><li data-start=\"6716\" data-end=\"6733\"><p data-start=\"6718\" data-end=\"6733\">presja czasu,<\/p><\/li><li data-start=\"6734\" data-end=\"6764\"><p data-start=\"6736\" data-end=\"6764\">\u201eostatnia pr\u00f3ba pobrania\u201d,<\/p><\/li><li data-start=\"6765\" data-end=\"6810\"><p data-start=\"6767\" data-end=\"6810\">nietypowa domena i brak danych us\u0142ugodawcy.<\/p><\/li><\/ul><p data-start=\"6812\" data-end=\"6942\"><strong data-start=\"6812\" data-end=\"6847\">Je\u015bli klikn\u0105\u0142e\u015b i poda\u0142e\u015b dane:<\/strong><br data-start=\"6847\" data-end=\"6850\" \/>Zablokuj kart\u0119 \/ ustaw limity, sprawd\u017a histori\u0119 transakcji, zmie\u0144 has\u0142a do kont powi\u0105zanych.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9414a9 elementor-widget elementor-widget-html\" data-id=\"f9414a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t\t<script>\nwindow.addEventListener('load', function () {\n\n  \/\/ usu\u0144 ewentualny #... z URL (czasem to otwiera panel)\n  if (location.hash) {\n    history.replaceState(null, '', location.pathname + location.search);\n  }\n\n  function closeAcc() {\n    document\n      .querySelectorAll('.acc-noauto .elementor-tab-title[aria-expanded=\"true\"]')\n      .forEach(function (t) { t.click(); });\n  }\n\n  closeAcc();\n  setTimeout(closeAcc, 300);\n  setTimeout(closeAcc, 900);\n  setTimeout(closeAcc, 1800);\n});\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a1d1a80 elementor-widget elementor-widget-text-editor\" data-id=\"a1d1a80\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><strong data-start=\"7001\" data-end=\"7024\">Zasada uniwersalna:<\/strong> je\u015bli masz w\u0105tpliwo\u015b\u0107 &#8211;&nbsp;<strong data-start=\"7049\" data-end=\"7063\">nie klikaj<\/strong>, tylko wejd\u017a na stron\u0119\/us\u0142ug\u0119 samodzielnie. To nawyk, kt\u00f3ry ucina wi\u0119kszo\u015b\u0107 phishingu.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2bccf9f e-flex e-con-boxed e-con e-parent\" data-id=\"2bccf9f\" data-element_type=\"container\" data-e-type=\"container\" id=\"quiz-phishing-final\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-dab3f7d e-con-full e-flex e-con e-child\" data-id=\"dab3f7d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3aa81cc elementor-widget elementor-widget-heading\" data-id=\"3aa81cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Chcesz dowiedzie\u0107 si\u0119 wi\u0119cej o phishingu i fa\u0142szywych wiadomo\u015bciach?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1ae290 elementor-widget elementor-widget-text-editor\" data-id=\"e1ae290\" data-element_type=\"widget\" data-e-type=\"widget\" id=\"#quiz-malware\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"233\" data-end=\"588\">Je\u015bli chcesz lepiej zrozumie\u0107, jak dzia\u0142aj\u0105 oszustwa w SMS-ach, e-mailach i wiadomo\u015bciach w social media, przejd\u017a do kursu po\u015bwi\u0119conego phishingowi. Znajdziesz tam najcz\u0119stsze scenariusze atak\u00f3w, czerwone flagi, przyk\u0142ady wiadomo\u015bci oraz proste zasady, kt\u00f3re pomagaj\u0105 rozpozna\u0107 zagro\u017cenie zanim klikniesz link, pobierzesz za\u0142\u0105cznik albo podasz swoje dane.<\/p><p data-start=\"590\" data-end=\"833\">Kurs pokazuje nie tylko <strong data-start=\"614\" data-end=\"630\">na co uwa\u017ca\u0107<\/strong>, ale te\u017c <strong data-start=\"640\" data-end=\"670\">jak reagowa\u0107 krok po kroku<\/strong>, gdy wiadomo\u015b\u0107 wydaje si\u0119 podejrzana. Dzi\u0119ki temu \u0142atwiej odr\u00f3\u017cnisz prawdziwy komunikat od pr\u00f3by oszustwa i zbudujesz nawyk kr\u00f3tkiej weryfikacji przed dzia\u0142aniem.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a58390 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2a58390\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8a532b8 e-grid e-con-full e-con e-child\" data-id=\"8a532b8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1c61cae8 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"1c61cae8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-clock\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8zm0 448c-110.5 0-200-89.5-200-200S145.5 56 256 56s200 89.5 200 200-89.5 200-200 200zm61.8-104.4l-84.9-61.7c-3.1-2.3-4.9-5.9-4.9-9.7V116c0-6.6 5.4-12 12-12h32c6.6 0 12 5.4 12 12v141.7l66.8 48.6c5.4 3.9 6.5 11.4 2.6 16.8L334.6 349c-3.9 5.3-11.4 6.5-16.8 2.6z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h6 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tKr\u00f3tka forma\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ec22caf elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"2ec22caf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-sitemap\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M128 352H32c-17.67 0-32 14.33-32 32v96c0 17.67 14.33 32 32 32h96c17.67 0 32-14.33 32-32v-96c0-17.67-14.33-32-32-32zm-24-80h192v48h48v-48h192v48h48v-57.59c0-21.17-17.23-38.41-38.41-38.41H344v-64h40c17.67 0 32-14.33 32-32V32c0-17.67-14.33-32-32-32H256c-17.67 0-32 14.33-32 32v96c0 17.67 14.33 32 32 32h40v64H94.41C73.23 224 56 241.23 56 262.41V320h48v-48zm264 80h-96c-17.67 0-32 14.33-32 32v96c0 17.67 14.33 32 32 32h96c17.67 0 32-14.33 32-32v-96c0-17.67-14.33-32-32-32zm240 0h-96c-17.67 0-32 14.33-32 32v96c0 17.67 14.33 32 32 32h96c17.67 0 32-14.33 32-32v-96c0-17.67-14.33-32-32-32z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h6 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tPytania z realnych scenariuszy\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7a15627b elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"7a15627b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-check-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119.033 8 8 119.033 8 256s111.033 248 248 248 248-111.033 248-248S392.967 8 256 8zm0 48c110.532 0 200 89.451 200 200 0 110.532-89.451 200-200 200-110.532 0-200-89.451-200-200 0-110.532 89.451-200 200-200m140.204 130.267l-22.536-22.718c-4.667-4.705-12.265-4.736-16.97-.068L215.346 303.697l-59.792-60.277c-4.667-4.705-12.265-4.736-16.97-.069l-22.719 22.536c-4.705 4.667-4.736 12.265-.068 16.971l90.781 91.516c4.667 4.705 12.265 4.736 16.97.068l172.589-171.204c4.704-4.668 4.734-12.266.067-16.971z\"><\/path><\/svg>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h6 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tWynik od razu\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h6>\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7793c3f elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"7793c3f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-054b403 e-con-full e-flex e-con e-child\" data-id=\"054b403\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16940f1 elementor-widget elementor-widget-shortcode\" data-id=\"16940f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\n<div class=\"tutor-wrap tutor-wrap-parent tutor-courses-wrap tutor-container course-archive-page\" data-tutor_courses_meta=\"{&quot;course_filter&quot;:false,&quot;supported_filters&quot;:{&quot;search&quot;:&quot;search&quot;,&quot;category&quot;:&quot;category&quot;},&quot;loop_content_only&quot;:false,&quot;column_per_row&quot;:&quot;1&quot;,&quot;course_per_page&quot;:1,&quot;show_pagination&quot;:false}\">\n\t\n\t<div class=\"tutor-row tutor-gx-xl-5\">\n\t\t\t\t\t<div class=\"tutor-col-12\">\n\t\t\t\t<div class=\"\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"tutor-pagination-wrapper-replaceable\" tutor-course-list-container>\n\t\t\t\t\t<div class=\"tutor-course-list tutor-grid tutor-grid-1\">\n<div class=\"tutor-card tutor-course-card\">\n<div class=\"tutor-course-thumbnail\">\n\t<a href=\"https:\/\/cybersecure24.pl\/en\/kursy\/phishing-i-falszywe-wiadomosci\/\" class=\"tutor-d-block\">\n\t\t<div class=\"tutor-ratio tutor-ratio-16x9\">\n\t\t\t<img decoding=\"async\" class=\"tutor-card-image-top\" src=\"https:\/\/cybersecure24.pl\/wp-content\/uploads\/2026\/02\/quiz.png\" alt=\"Phishing i fa\u0142szywe wiadomo\u015bci\" loading=\"lazy\">\n\t\t<\/div>\n\t<\/a>\n\t<\/div>\n\n<div class=\"tutor-card-body\">\n\n<h3 class=\"tutor-course-name tutor-fs-5 tutor-fw-medium\" title=\"Phishing i fa\u0142szywe wiadomo\u015bci\">\n\t<a href=\"https:\/\/cybersecure24.pl\/en\/kursy\/phishing-i-falszywe-wiadomosci\/\">Phishing i fa\u0142szywe wiadomo\u015bci<\/a>\n<\/h3>\n\n\n<div class=\"tutor-meta tutor-mt-auto\">\n\t<div>\n\t\t<a href=\"https:\/\/cybersecure24.pl\/en\/profile\/a-szczerbik?view=instructor\" class=\"tutor-d-flex\">\n\t\t\t<div class=\"tutor-avatar\"><div class=\"tutor-ratio tutor-ratio-1x1\"><span class=\"tutor-avatar-text\">A<\/span><\/div><\/div>\t\t<\/a>\n\t<\/div>\n\n\t<div>\n\t\tBy\t\t<a href=\"https:\/\/cybersecure24.pl\/en\/profile\/a-szczerbik?view=instructor\">A.Szczerbik<\/a>\n\n\t\t\t<\/div>\n<\/div>\n\n<\/div>\n\n<div class=\"tutor-card-footer\">\n\t<div class=\"tutor-course-list-btn\"><a href=\"https:\/\/cybersecure24.pl\/en\/kursy\/phishing-i-falszywe-wiadomosci\/\" class=\"tutor-btn tutor-btn-outline-primary tutor-btn-md tutor-btn-block tutor-open-login-modal\">Enroll Course<\/a><\/div>\t<\/div>\n<\/div>\n<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t\t<\/div>\n<\/div>\n\n\n<input type=\"hidden\" id=\"course_filter_post_ids\" value=\"[&quot;2136&quot;]\"><\/input>\n\n<div class=\"tutor-modal tutor-login-modal\">\n\t<div class=\"tutor-modal-overlay\"><\/div>\n\t<div class=\"tutor-modal-window tutor-modal-window-sm\">\n\t\t<div class=\"tutor-modal-content tutor-modal-content-white\">\n\t\t\t<button class=\"tutor-iconic-btn tutor-modal-close-o\" data-tutor-modal-close>\n\t\t\t\t<span class=\"tutor-icon-times\" area-hidden=\"true\"><\/span>\n\t\t\t<\/button>\n\n\t\t\t<div class=\"tutor-modal-body\">\n\t\t\t\t<div class=\"tutor-py-48\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"tutor-fs-4 tutor-fw-medium tutor-color-black tutor-mb-32\">Hi, Welcome back!<\/div>\n\t\t\t\t\t<form id=\"tutor-login-form\" method=\"post\">\n\t\t<input type=\"hidden\" id=\"_tutor_nonce\" name=\"_tutor_nonce\" value=\"0d6f9ac38f\" \/><input type=\"hidden\" name=\"_wp_http_referer\" value=\"\/en\/wp-json\/wp\/v2\/pages\/719\" \/>\t<input type=\"hidden\" name=\"tutor_action\" value=\"tutor_user_login\" \/>\n\t<input type=\"hidden\" name=\"redirect_to\" value=\"https:\/\/cybersecure24.pl\/en\/wp-json\/wp\/v2\/pages\/719\" \/>\n\n\t<div class=\"tutor-mb-20\">\n\t\t<input type=\"text\" class=\"tutor-form-control\" placeholder=\"Username or Email Address\" name=\"log\" value=\"\" size=\"20\" required\/>\n\t<\/div>\n\n\t<div class=\"tutor-mb-32\">\n\t\t<input type=\"password\" class=\"tutor-form-control\" placeholder=\"Password\" name=\"pwd\" value=\"\" size=\"20\" required\/>\n\t<\/div>\n\n\t<div class=\"tutor-login-error\"><\/div>\n\t\t\t<input type=\"hidden\" name=\"timezone\" value=\"Europe\/Warsaw\" \/>\n\t\t<script>\n\t\t\tdocument.addEventListener('DOMContentLoaded', function() {\n\t\t\t\tconst timezone = document.querySelector('input[name=\"timezone\"]');\n\t\t\t\tif ( timezone) {\n\t\t\t\t\tconst tz = Intl.DateTimeFormat().resolvedOptions().timeZone;\n\t\t\t\t\ttimezone.value = tz\n\t\t\t\t}\n\t\t\t});\n\t\t<\/script>\n\t\t\t<div class=\"tutor-d-flex tutor-justify-between tutor-align-center tutor-mb-40\">\n\t\t<div class=\"tutor-form-check\">\n\t\t\t<input id=\"tutor-login-agmnt-1\" type=\"checkbox\" class=\"tutor-form-check-input tutor-bg-black-40\" name=\"rememberme\" value=\"forever\" \/>\n\t\t\t<label for=\"tutor-login-agmnt-1\" class=\"tutor-fs-7 tutor-color-muted\">\n\t\t\t\tKeep me signed in\t\t\t<\/label>\n\t\t<\/div>\n\t\t<a href=\"https:\/\/cybersecure24.pl\/en\/kokpit\/retrieve-password\" class=\"tutor-btn tutor-btn-ghost\">\n\t\t\tForgot Password?\t\t<\/a>\n\t<\/div>\n\n\t\t<button type=\"submit\" class=\"tutor-btn tutor-btn-primary tutor-btn-block\">\n\t\tSign In\t<\/button>\n\t\n\t\t\t\t\t<div class=\"tutor-text-center tutor-fs-6 tutor-color-secondary tutor-mt-20\">\n\t\t\tDon&#039;t have an account?&nbsp;\n\t\t\t<a href=\"https:\/\/cybersecure24.pl\/en\/strona-rejestracji-studenta\/?redirect_to=https:\/\/cybersecure24.pl\/en\/wp-json\/wp\/v2\/pages\/719\" class=\"tutor-btn tutor-btn-link\">\n\t\t\t\tRegister Now\t\t\t<\/a>\n\t\t<\/div>\n\t\t<\/form>\n<script>\n\tdocument.addEventListener('DOMContentLoaded', function() {\n\t\tvar { __ } = wp.i18n;\n\t\tvar loginModal = document.querySelector('.tutor-modal.tutor-login-modal');\n\t\tvar errors = [];\n\t\tif (loginModal && errors.length) {\n\t\t\tloginModal.classList.add('tutor-is-active');\n\t\t}\n\t});\n<\/script>\n\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Lekcje Phishing i fa\u0142szywe wiadomo\u015bci Phishing to najcz\u0119stsza metoda wy\u0142udzania danych i pieni\u0119dzy przez fa\u0142szywe SMS-y, e-maile i wiadomo\u015bci w social media. W tej lekcji pokazuj\u0119 realne przyk\u0142ady, czerwone flagi oraz prost\u0105 checklist\u0119 \u201eco sprawdzi\u0107\u201d zanim klikniesz. Czym jest phishing i dlaczego tak cz\u0119sto dzia\u0142a? Phishing to jedna z najcz\u0119stszych metod oszustwa w internecie. Polega [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_crdt_document":"","_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"disabled","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-719","page","type-page","status-publish","hentry"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"A.Szczerbik","author_link":"https:\/\/cybersecure24.pl\/en\/author\/a-szczerbik\/"},"uagb_comment_info":0,"uagb_excerpt":"Lekcje Phishing i fa\u0142szywe wiadomo\u015bci Phishing to najcz\u0119stsza metoda wy\u0142udzania danych i pieni\u0119dzy przez fa\u0142szywe SMS-y, e-maile i wiadomo\u015bci w social media. W tej lekcji pokazuj\u0119 realne przyk\u0142ady, czerwone flagi oraz prost\u0105 checklist\u0119 \u201eco sprawdzi\u0107\u201d zanim klikniesz. Czym jest phishing i dlaczego tak cz\u0119sto dzia\u0142a? Phishing to jedna z najcz\u0119stszych metod oszustwa w internecie. Polega&hellip;","_links":{"self":[{"href":"https:\/\/cybersecure24.pl\/en\/wp-json\/wp\/v2\/pages\/719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cybersecure24.pl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cybersecure24.pl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecure24.pl\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecure24.pl\/en\/wp-json\/wp\/v2\/comments?post=719"}],"version-history":[{"count":325,"href":"https:\/\/cybersecure24.pl\/en\/wp-json\/wp\/v2\/pages\/719\/revisions"}],"predecessor-version":[{"id":3957,"href":"https:\/\/cybersecure24.pl\/en\/wp-json\/wp\/v2\/pages\/719\/revisions\/3957"}],"wp:attachment":[{"href":"https:\/\/cybersecure24.pl\/en\/wp-json\/wp\/v2\/media?parent=719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}