{"id":3976,"date":"2020-09-13T16:48:03","date_gmt":"2020-09-13T16:48:03","guid":{"rendered":"https:\/\/www.hostnic.id\/blog\/?p=3976"},"modified":"2020-09-22T16:54:26","modified_gmt":"2020-09-22T16:54:26","slug":"eksploitasi-keamanan-cyber-selama-pandemi","status":"publish","type":"post","link":"https:\/\/www.hostnic.id\/blog\/berita\/eksploitasi-keamanan-cyber-selama-pandemi\/","title":{"rendered":"Eksploitasi Keamanan Cyber Selama Pandemi"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3977\" data-permalink=\"https:\/\/www.hostnic.id\/blog\/berita\/eksploitasi-keamanan-cyber-selama-pandemi\/attachment\/kopie-van-corona_phishing\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&amp;ssl=1?v=1600793638\" data-orig-size=\"1000,650\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Kopie-van-Corona_Phishing\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&amp;ssl=1?v=1600793638\" class=\"wp-image-3977 aligncenter\" src=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?resize=362%2C235&#038;ssl=1\" alt=\"\" width=\"362\" height=\"235\" srcset=\"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?w=1000&amp;ssl=1 1000w, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?resize=300%2C195&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?resize=768%2C499&amp;ssl=1 768w\" sizes=\"auto, (max-width: 362px) 100vw, 362px\" \/><\/p>\n<p>Selama pandemi corona terjadi, peretas memanfaatkan rasa takut masyarakat untuk menjalankan berbagai cara hacker. Seperti yang kita ketahui, wabah corona telah membawa dampak besar untuk berbagai aspek kehidupan tidak terkecuali untuk keamanan dunia maya.<\/p>\n<p>Peretas yang mengetahui bahwa masyarakat sedang dalam keadaan takut dan panik memanfaatkan kondisi tersebut. Mereka menciptakan situs terkait Corona untuk menyebarkan malware atau melakukan berbagai tindak kejahatan yang lain. Agar tidak menjadi korban, ada baiknya jika kalian mengetahui apa saja cara hacker yang digunakan peretas. Berikut informasinya.<\/p>\n<ol>\n<li>Mobile Malware<\/li>\n<li>Email Phishing<\/li>\n<li>Malicious Software<\/li>\n<\/ol>\n<p>Masing- masing dari istilah tersebut akan dibahas satu persatu, di artikel selanjutnya. Check it out!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Selama pandemi corona terjadi, peretas memanfaatkan rasa takut masyarakat untuk menjalankan berbagai cara hacker. Seperti yang kita ketahui, wabah corona telah membawa dampak besar untuk berbagai aspek kehidupan tidak terkecuali untuk keamanan dunia maya. Peretas yang mengetahui bahwa masyarakat sedang dalam keadaan takut dan panik memanfaatkan kondisi tersebut. Mereka menciptakan situs terkait Corona untuk menyebarkan [&hellip;]<\/p>\n","protected":false},"author":8,"featured_media":3977,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[85,84,4,8,82],"tags":[],"class_list":["post-3976","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-berita","category-domain","category-teknologi","category-tips","category-website"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Eksploitasi Keamanan Cyber Selama Pandemi - Hostnic.id<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/\" \/>\n<meta property=\"og:locale\" content=\"id_ID\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Eksploitasi Keamanan Cyber Selama Pandemi - Hostnic.id\" \/>\n<meta property=\"og:description\" content=\"Selama pandemi corona terjadi, peretas memanfaatkan rasa takut masyarakat untuk menjalankan berbagai cara hacker. Seperti yang kita ketahui, wabah corona telah membawa dampak besar untuk berbagai aspek kehidupan tidak terkecuali untuk keamanan dunia maya. Peretas yang mengetahui bahwa masyarakat sedang dalam keadaan takut dan panik memanfaatkan kondisi tersebut. Mereka menciptakan situs terkait Corona untuk menyebarkan [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/\" \/>\n<meta property=\"og:site_name\" content=\"Hostnic.id\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-13T16:48:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-22T16:54:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?v=1600793638\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nanda Anubis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Ditulis oleh\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nanda Anubis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimasi waktu membaca\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 menit\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/\"},\"author\":{\"name\":\"Nanda Anubis\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"headline\":\"Eksploitasi Keamanan Cyber Selama Pandemi\",\"datePublished\":\"2020-09-13T16:48:03+00:00\",\"dateModified\":\"2020-09-22T16:54:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/\"},\"wordCount\":107,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&ssl=1?v=1600793638\",\"articleSection\":[\"Berita\",\"Domain\",\"Teknologi\",\"Tips\",\"Website\"],\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/\",\"name\":\"Eksploitasi Keamanan Cyber Selama Pandemi - Hostnic.id\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&ssl=1?v=1600793638\",\"datePublished\":\"2020-09-13T16:48:03+00:00\",\"dateModified\":\"2020-09-22T16:54:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/#breadcrumb\"},\"inLanguage\":\"id\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&ssl=1?v=1600793638\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.hostnic.id\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&ssl=1?v=1600793638\",\"width\":1000,\"height\":650},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/teknologi\\\/eksploitasi-keamanan-cyber-selama-pandemi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Eksploitasi Keamanan Cyber Selama Pandemi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/\",\"name\":\"hostnic.id\",\"description\":\"Info, Tips dan Tutorial Seputar Layanan Hostnic\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"id\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/#\\\/schema\\\/person\\\/94c8fb52dcf131c9c48f774bb0cf4b89\",\"name\":\"Nanda Anubis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"id\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g\",\"caption\":\"Nanda Anubis\"},\"url\":\"https:\\\/\\\/www.hostnic.id\\\/blog\\\/author\\\/nanda\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Eksploitasi Keamanan Cyber Selama Pandemi - Hostnic.id","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/","og_locale":"id_ID","og_type":"article","og_title":"Eksploitasi Keamanan Cyber Selama Pandemi - Hostnic.id","og_description":"Selama pandemi corona terjadi, peretas memanfaatkan rasa takut masyarakat untuk menjalankan berbagai cara hacker. Seperti yang kita ketahui, wabah corona telah membawa dampak besar untuk berbagai aspek kehidupan tidak terkecuali untuk keamanan dunia maya. Peretas yang mengetahui bahwa masyarakat sedang dalam keadaan takut dan panik memanfaatkan kondisi tersebut. Mereka menciptakan situs terkait Corona untuk menyebarkan [&hellip;]","og_url":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/","og_site_name":"Hostnic.id","article_published_time":"2020-09-13T16:48:03+00:00","article_modified_time":"2020-09-22T16:54:26+00:00","og_image":[{"width":1000,"height":650,"url":"https:\/\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?v=1600793638","type":"image\/png"}],"author":"Nanda Anubis","twitter_card":"summary_large_image","twitter_misc":{"Ditulis oleh":"Nanda Anubis","Estimasi waktu membaca":"1 menit"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/#article","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/"},"author":{"name":"Nanda Anubis","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"headline":"Eksploitasi Keamanan Cyber Selama Pandemi","datePublished":"2020-09-13T16:48:03+00:00","dateModified":"2020-09-22T16:54:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/"},"wordCount":107,"commentCount":0,"image":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&ssl=1?v=1600793638","articleSection":["Berita","Domain","Teknologi","Tips","Website"],"inLanguage":"id","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/","url":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/","name":"Eksploitasi Keamanan Cyber Selama Pandemi - Hostnic.id","isPartOf":{"@id":"https:\/\/www.hostnic.id\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/#primaryimage"},"image":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&ssl=1?v=1600793638","datePublished":"2020-09-13T16:48:03+00:00","dateModified":"2020-09-22T16:54:26+00:00","author":{"@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89"},"breadcrumb":{"@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/#breadcrumb"},"inLanguage":"id","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/"]}]},{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/#primaryimage","url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&ssl=1?v=1600793638","contentUrl":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&ssl=1?v=1600793638","width":1000,"height":650},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostnic.id\/blog\/teknologi\/eksploitasi-keamanan-cyber-selama-pandemi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostnic.id\/blog\/"},{"@type":"ListItem","position":2,"name":"Eksploitasi Keamanan Cyber Selama Pandemi"}]},{"@type":"WebSite","@id":"https:\/\/www.hostnic.id\/blog\/#website","url":"https:\/\/www.hostnic.id\/blog\/","name":"hostnic.id","description":"Info, Tips dan Tutorial Seputar Layanan Hostnic","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostnic.id\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"id"},{"@type":"Person","@id":"https:\/\/www.hostnic.id\/blog\/#\/schema\/person\/94c8fb52dcf131c9c48f774bb0cf4b89","name":"Nanda Anubis","image":{"@type":"ImageObject","inLanguage":"id","@id":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f153245876f0c796972babfabe1cd8fe3a7c1eeab741d031a67d2c060e8691c3?s=96&d=mm&r=g","caption":"Nanda Anubis"},"url":"https:\/\/www.hostnic.id\/blog\/author\/nanda\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/Kopie-van-Corona_Phishing.png?fit=1000%2C650&ssl=1?v=1600793638","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8D2mv-128","jetpack-related-posts":[{"id":3893,"url":"https:\/\/www.hostnic.id\/blog\/berita\/waspada-serangan-hacker-pada-website\/","url_meta":{"origin":3976,"position":0},"title":"Waspada Serangan Hacker Pada Website","author":"Nanda Anubis","date":"2020-08-17","format":false,"excerpt":"Mengelola website memang tidak selalu mudah. Ada saja halangan seperti kendala atau eror pada website hingga diserang peretas (hacker) yang tidak bertanggung jawab. Namun, kamu wajib memahami apa saja jenis serangan ini agar bisa lebih waspada terhadap serangan siber (cyber attack). DDoS Attack DDoS Attack (Distributed-Denial-of-Service Attack) adalah serangan yang\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/gambar-1.jpg?fit=626%2C462&ssl=1%3Fv%3D1598378984&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/gambar-1.jpg?fit=626%2C462&ssl=1%3Fv%3D1598378984&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/gambar-1.jpg?fit=626%2C462&ssl=1%3Fv%3D1598378984&resize=525%2C300 1.5x"},"classes":[]},{"id":3950,"url":"https:\/\/www.hostnic.id\/blog\/berita\/waspada-terhadap-malware-corona\/","url_meta":{"origin":3976,"position":1},"title":"Waspada Terhadap Malware Corona","author":"Nanda Anubis","date":"2020-09-10","format":false,"excerpt":"Para ahli telah menemukan malware yang dapat mencuri serta menghapus data dari perangkat suatu pengguna. Malware ini menerpa Master Boot Record (MBR) serta mencegah sistem untuk beroperasi secara normal. Pada tahap pertama, malware akan menampilkan jendela yang tidak dapat ditutup, dikarenakan telah menonaktifkan task manager windows milik pengguna. Sementara pengguna\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/corona.jpg?fit=750%2C500&ssl=1%3Fv%3D1599756248&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/corona.jpg?fit=750%2C500&ssl=1%3Fv%3D1599756248&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/corona.jpg?fit=750%2C500&ssl=1%3Fv%3D1599756248&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/corona.jpg?fit=750%2C500&ssl=1%3Fv%3D1599756248&resize=700%2C400 2x"},"classes":[]},{"id":1033,"url":"https:\/\/www.hostnic.id\/blog\/tutorial\/website\/ini-alasan-sederhana-wordpress-anda-mudah-diretas\/","url_meta":{"origin":3976,"position":2},"title":"Ini Alasan Sederhana WordPress Anda Mudah Diretas","author":"Monic","date":"2018-10-14","format":false,"excerpt":"Belum lama ini kami mendapatkan pertanyaan seputar bagaimana caranya situs Wordpress agar tidak diretas, ketika website anda berhasil diretas pastinya anda akan jengkel. Nah, didalam artikel kali ini kami akan berbagi alasan kenapa website wordpress anda diretas, dengan begitu anda bisa menghindari hal seperti ini. Peretas sendiri memiliki berbagai macam\u2026","rel":"","context":"dalam &quot;Website&quot;","block_context":{"text":"Website","link":"https:\/\/www.hostnic.id\/blog\/.\/tutorial\/website\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2018\/10\/security-265130_640.jpg?fit=640%2C426&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2018\/10\/security-265130_640.jpg?fit=640%2C426&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2018\/10\/security-265130_640.jpg?fit=640%2C426&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":5662,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/sebutkan-dampak-shared-hosting-terkena-hack-temukan-solusinya-di-sini\/","url_meta":{"origin":3976,"position":3},"title":"Sebutkan Dampak Shared Hosting Terkena Hack: Temukan Solusinya Di Sini","author":"Monic","date":"2023-07-13","format":false,"excerpt":"Hostnic.id\u00a0- Terkena hack pada shared hosting dapat memberikan dampak yang sangat merugikan bagi website Anda. Selain mengganggu kinerja website dan menurunkan reputasi bisnis Anda, serangan hacking juga dapat menyebabkan kehilangan data penting dan informasi pribadi pengguna. Jika website Anda digunakan untuk transaksi online, serangan hacking dapat mengakibatkan pencurian data pembayaran\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"Shared Hosting Terkena Hack","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/SHOS.jpeg?fit=602%2C299&ssl=1%3Fv%3D1689249303&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/SHOS.jpeg?fit=602%2C299&ssl=1%3Fv%3D1689249303&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2023\/07\/SHOS.jpeg?fit=602%2C299&ssl=1%3Fv%3D1689249303&resize=525%2C300 1.5x"},"classes":[]},{"id":3909,"url":"https:\/\/www.hostnic.id\/blog\/teknologi\/ketahui-penyebab-website-diserang-malware\/","url_meta":{"origin":3976,"position":4},"title":"Ketahui Penyebab Website Diserang Malware","author":"Nanda Anubis","date":"2020-08-31","format":false,"excerpt":"Beberapa pesan error yang kerap muncul ada pada daftar di bawah ini: Deceptive site ahead This site has been marked as a phishing site The site ahead contains malware Berbagai macam serangan hack, mulai dari serangan sederhana hingga berbahaya, dapat menyebabkan kesalahan seperti di atas. Parahnya lagi, malware dapat menyebar\u2026","rel":"","context":"dalam &quot;Teknologi&quot;","block_context":{"text":"Teknologi","link":"https:\/\/www.hostnic.id\/blog\/.\/teknologi\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/virus-1.jpg?fit=640%2C360&ssl=1%3Fv%3D1597771256&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/virus-1.jpg?fit=640%2C360&ssl=1%3Fv%3D1597771256&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/08\/virus-1.jpg?fit=640%2C360&ssl=1%3Fv%3D1597771256&resize=525%2C300 1.5x"},"classes":[]},{"id":3968,"url":"https:\/\/www.hostnic.id\/blog\/berita\/pentingkah-autentikasi-dua-faktor\/","url_meta":{"origin":3976,"position":5},"title":"Pentingkah Autentikasi Dua Faktor?","author":"Nanda Anubis","date":"2020-09-22","format":false,"excerpt":"Penggunaan kata sandi yang kuat pada sebuah sistem menjadi semakin diperlukan mengingat banyaknya data-data penting yang tersimpan di dalamnya. Peretas memiliki banyak metode atau trik untuk mencuri kata sandi seperti dengan serangan brute force. Jika kata sandi kalian berhasil dicuri, maka informasi tersebut dapat dimanfaatkan oleh peretas untuk berbagai hal\u2026","rel":"","context":"dalam &quot;Berita&quot;","block_context":{"text":"Berita","link":"https:\/\/www.hostnic.id\/blog\/.\/berita\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/elgin-feature.jpg?fit=1200%2C699&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/elgin-feature.jpg?fit=1200%2C699&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/elgin-feature.jpg?fit=1200%2C699&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/elgin-feature.jpg?fit=1200%2C699&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.hostnic.id\/blog\/wp-content\/uploads\/2020\/09\/elgin-feature.jpg?fit=1200%2C699&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/3976","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/comments?post=3976"}],"version-history":[{"count":1,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/3976\/revisions"}],"predecessor-version":[{"id":3978,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/posts\/3976\/revisions\/3978"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media\/3977"}],"wp:attachment":[{"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/media?parent=3976"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/categories?post=3976"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostnic.id\/blog\/wp-json\/wp\/v2\/tags?post=3976"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}