{"id":59538,"date":"2020-12-22T09:50:03","date_gmt":"2020-12-22T04:50:03","guid":{"rendered":"https:\/\/uzsoft.uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/"},"modified":"2020-12-22T09:50:03","modified_gmt":"2020-12-22T04:50:03","slug":"kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda","status":"publish","type":"post","link":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/","title":{"rendered":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda"},"content":{"rendered":"<p style=\"text-align: justify;\">Axborot xavfsizligi bo&#8217;yicha xalqaro ekspert <a href=\"https:\/\/www.esetnod32.ru\/\" target=\"_blank\" rel=\"noopener\">ESET kibermakondagi<\/a> eng keng tarqalgan tovlamachilik sxemalarini tasvirlab berdi. Ushbu turdagi onlayn jinoyat ham jismoniy, ham yuridik shaxslarga qaratilgan. Ommaviy axborot vositalarida sarlavhalarga aylangan va to&#8217;lov to&#8217;lashga majbur bo&#8217;lgan Garmin ishi tovlamachilikning jiddiyligi va xavfini tasdiqlaydi.  <\/p>\n<p style=\"text-align: justify;\">Jinoyatchilar orasida mashhur sxema bu to&#8217;lov dasturi viruslarini tarqatishdir. Ular foydalanuvchi qurilmasidagi ma&#8217;lumotlarni shifrlaydi va kirishni tiklash uchun to&#8217;lovni talab qiladi. Biroq, hatto xakerning o&#8217;zi ham buni har doim ham qila olmaydi, shuning uchun ko&#8217;p hollarda to&#8217;lovni to&#8217;lash natijaga olib kelmaydi. Endi bunday zararli dastur yangi funksiyalarning paydo bo&#8217;lishi tufayli yanada xavfli bo&#8217;lib qoldi. Ular orasida jabrlanuvchini yanada shantaj qilish maqsadida maxfiy ma\u2019lumotlarni yig\u2018ish va olingan ma\u2019lumotlarni oshkor etmaganlik uchun to\u2018lov olishni nazarda tutuvchi \u201cdoksing\u201d kiradi. Buni ikki tomonlama tovlamachilik shakli deb hisoblash mumkin.     <\/p>\n<p style=\"text-align: justify;\">Hisob ma&#8217;lumotlarining ommaviy ravishda sizib chiqishi jinoyatchilarning akkauntlarni buzib kirishini osonlashtirdi, bu esa jabrlanuvchining qurilmasiga kirish va shantaj uchun ishlatilishi mumkin bo&#8217;lgan maxfiy ma&#8217;lumotlarni o&#8217;g&#8217;irlash uchun ko&#8217;proq imkoniyatlarga ega bo&#8217;ldi. <\/p>\n<p style=\"text-align: justify;\">Intim mazmundagi shantaj &#8211; sextortion kabi tovlamachilik usuli ham mashhur emas. <a href=\"https:\/\/www.esetnod32.ru\/company\/press\/center\/eset-kazhdyy-desyatyy-polzovatel-v-rossii-stal-zhertvoy-shantazha-vzroslym-kontentom-vo-vremya-samoizolyatsii\/\">ESET ma\u02bclumotlariga ko\u02bbra<\/a>, Rossiyadagi har o\u02bbninchi foydalanuvchi o\u02bbzini izolyatsiya qilish vaqtida shantaj qurboniga aylangan. Bundan tashqari, tovlamachilar intim videolarni tomosha qilgani uchun foydalanuvchilarni COVID-19 infektsiyasi bilan tahdid qilishgan.  <\/p>\n<p style=\"text-align: justify;\">Korxonalar ko&#8217;pincha DDoS hujumlaridan aziyat chekmoqda. Tovlamachilar hujumni to&#8217;xtatishga va&#8217;da berib, to&#8217;lov talab qilmoqdalar. Ushbu turdagi kiber tahdid kompaniyalarga yuz minglab dollar zarar keltirishi mumkin.  <\/p>\n<p style=\"text-align: justify;\"><i>&laquo;Kiberjinoyatchilar o&#8217;z usullarini doimiy ravishda takomillashtirmoqdalar. Ular ko&#8217;pincha ijtimoiy muhandislik vositalariga murojaat qilishadi, ochiq manbalardan va yopiq ma&#8217;lumotlar bazalaridan foydalanuvchilar haqida ma&#8217;lumot to&#8217;playdilar.  <\/i>\u2014 sharhlaydi <strong>Ruslan Shlegel<\/strong>, ESET MDH hamkorlari menejeri. <i>\u2014 ESET o\u02bbzining maqsadi sifatida foydalanuvchilarga onlayn maxfiylikni saqlash, o\u02bbz faoliyatini begona ko\u02bbzlardan yashirish va o\u02bbzlarini tovlamachilikdan himoya qilishda yordam berishni tanladi\u201d.<\/i><\/p>\n<p style=\"text-align: justify;\">ESET <a href=\"https:\/\/www.welivesecurity.com\/2020\/09\/18\/five-cybercriminals-extortion-schemes\/\">blogida<\/a> ransomware usullari haqida ko&#8217;proq o&#8217;qing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Axborot xavfsizligi bo&#8217;yicha xalqaro ekspert ESET kibermakondagi eng keng tarqalgan tovlamachilik sxemalarini tasvirlab berdi. Ushbu turdagi onlayn jinoyat ham jismoniy, ham yuridik shaxslarga qaratilgan. Ommaviy axborot vositalarida sarlavhalarga aylangan va to&#8217;lov to&#8217;lashga majbur bo&#8217;lgan Garmin ishi tovlamachilikning jiddiyligi va xavfini tasdiqlaydi. Jinoyatchilar orasida mashhur sxema bu to&#8217;lov dasturi viruslarini tarqatishdir. Ular foydalanuvchi qurilmasidagi ma&#8217;lumotlarni shifrlaydi [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":54335,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_yoast_wpseo_focuskw":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"%%title%% Axborot xavfsizligi bo'yicha xalqaro ekspert ESET kibermakondagi eng keng tarqalgan tovlamachilik sxemalarini oshkor qildi.","_yoast_wpseo_meta-robots-noindex":"","_yoast_wpseo_meta-robots-nofollow":"","_yoast_wpseo_canonical":"","_yoast_wpseo_opengraph-title":"","_yoast_wpseo_opengraph-description":"","_yoast_wpseo_opengraph-image":"","_yoast_wpseo_opengraph-image-id":"","_yoast_wpseo_twitter-title":"","_yoast_wpseo_twitter-description":"","_yoast_wpseo_twitter-image":"","_yoast_wpseo_schema_page_type":"","_yoast_wpseo_schema_article_type":"","footnotes":""},"categories":[52855],"tags":[53529,53535,53526,53528,53534,53531,53530,53532,53533,53527],"class_list":["post-59538","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-yangiliklar","tag-eset-endpoint-antivirus-uz","tag-eset-key-2020-uz","tag-eset-nod32-uz-2","tag-eset-nod32-antivirus-uz-2","tag-eset-nod32-antivirus-4-uz","tag-eset-nod32-antivirus-8-uz","tag-eset-nod32-antivirus-skachat-uz","tag-eset-nod32-baza-uz","tag-eset-nod32-baza-skachat-uz","tag-eset-smart-security-uz"],"featured_image_src":{"landsacpe":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2020\/12\/777777-800x420-1.jpg",800,420,false],"list":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2020\/12\/777777-800x420-1.jpg",463,243,false],"medium":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2020\/12\/777777-800x420-1-300x158.jpg",300,158,true],"full":["https:\/\/uzsoft.uz\/wp-content\/uploads\/2020\/12\/777777-800x420-1.jpg",800,420,false]},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz<\/title>\n<meta name=\"description\" content=\"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda Axborot xavfsizligi bo&#039;yicha xalqaro ekspert ESET kibermakondagi eng keng tarqalgan tovlamachilik sxemalarini oshkor qildi.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/\" \/>\n<meta property=\"og:locale\" content=\"uz_UZ\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda | \u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u0434\u043b\u044f \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0430 \u2014 Uzsoft.uz\" \/>\n<meta property=\"og:description\" content=\"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda \u2014 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u0437\u043e\u0440\u044b \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u041d\u0430\u0434\u0451\u0436\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u044b Uzsoft.uz.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/\" \/>\n<meta property=\"og:site_name\" content=\"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b: \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Windows, Office - \u041e\u043d\u043b\u0430\u0439\u043d \u043c\u0430\u0433\u0430\u0437\u0438\u043d\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/uzsoft.uz\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-22T04:50:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/uzsoft.uz\/wp-content\/uploads\/2020\/12\/777777-800x420-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"420\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"BWS.Uz IT Technoligies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@bws_info\" \/>\n<meta name=\"twitter:site\" content=\"@bws_info\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"BWS.Uz IT Technoligies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 daqiqa\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/\"},\"author\":{\"name\":\"BWS.Uz IT Technoligies\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#\\\/schema\\\/person\\\/b4211fdbf4859a7db7358ea60755f54a\"},\"headline\":\"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda\",\"datePublished\":\"2020-12-22T04:50:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/\"},\"wordCount\":327,\"publisher\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/777777-800x420-1.jpg\",\"keywords\":[\"eset endpoint antivirus\",\"eset key 2020\",\"eset nod32\",\"eset nod32 antivirus\",\"eset nod32 antivirus 4\",\"eset nod32 antivirus 8\",\"eset nod32 antivirus \u0441\u043a\u0430\u0447\u0430\u0442\u044c\",\"eset nod32 baza\",\"eset nod32 baza skachat\",\"eset smart security\"],\"articleSection\":[\"Yangiliklar\"],\"inLanguage\":\"uz-UZ\",\"copyrightYear\":\"2020\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/\",\"name\":\"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/777777-800x420-1.jpg\",\"datePublished\":\"2020-12-22T04:50:03+00:00\",\"description\":\"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda Axborot xavfsizligi bo'yicha xalqaro ekspert ESET kibermakondagi eng keng tarqalgan tovlamachilik sxemalarini oshkor qildi.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#breadcrumb\"},\"inLanguage\":\"uz-UZ\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"uz-UZ\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#primaryimage\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/777777-800x420-1.jpg\",\"contentUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2020\\\/12\\\/777777-800x420-1.jpg\",\"width\":800,\"height\":420,\"caption\":\"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u0413\u043b\u0430\u0432\u043d\u0430\u044f\",\"item\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/bosh-sahifa\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438\",\"item\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/category\\\/bez-kategorii\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#website\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/\",\"name\":\"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f Windows \u0438 Android | \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Office \u2014 Uzsoft.uz\",\"description\":\"Uzsoft.uz \u2014 \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b ESET, Kaspersky, Bitdefender, Microsoft Office, Windows, VPN \u0438 \u0434\u0440\u0443\u0433\u043e\u0435.\",\"publisher\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\"},\"alternateName\":\"Uzsoft.uz \u2014 \u0441\u043e\u0444\u0442 \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u043d\u043b\u0430\u0439\u043d\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"uz-UZ\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#organization\",\"name\":\"\u041e\u041e\u041e Starlab\",\"alternateName\":\"Uzsoft.uz\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/\",\"logo\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#local-main-organization-logo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/uzsoft.uz\",\"https:\\\/\\\/x.com\\\/bws_info\",\"https:\\\/\\\/www.instagram.com\\\/uzsoft.uz\",\"https:\\\/\\\/www.pinterest.com\\\/starlabuz\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCqshldoZsm4jd9DScHqZhdQ\"],\"description\":\"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438: \u041e\u041e\u041e Starlab \u0422\u0438\u043f \u0431\u0438\u0437\u043d\u0435\u0441\u0430: \u041e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u041e\u0431\u0437\u043e\u0440: Uzsoft.uz \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0435\u0434\u0443\u0449\u0438\u043c \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d\u043e\u043c \u0434\u043b\u044f \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0433\u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f. \u041d\u0430\u0448\u0430 \u043c\u0438\u0441\u0441\u0438\u044f - \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u044f\u043c \u0438 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f\u043c \u043b\u0451\u0433\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0443 \u0441\u043f\u0435\u043a\u0442\u0440\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0437\u0430\u043a\u043e\u043d\u043d\u044b\u0445, \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439. \u041e\u0442 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0438 \u043e\u0444\u0438\u0441\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0434\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0442\u0432\u043e\u0440\u0447\u0435\u0441\u0442\u0432\u0430 \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0438\u0437\u043d\u0435\u0441\u043e\u043c - \u043c\u044b \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u044f\u0435\u043c \u0432\u0441\u0435 \u0432\u0430\u0448\u0438 \u043f\u043e\u0442\u0440\u0435\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e, \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u0430\u0447\u0438\u0432\u0430\u044f\u0441\u044c \u043d\u0430 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432. \u041f\u0440\u043e\u0434\u0443\u043a\u0442\u044b: \u041d\u0430\u0448 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438: \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b: \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0438 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows, macOS \u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Linux. \u041e\u0444\u0438\u0441\u043d\u043e\u0435 \u041f\u041e: Microsoft Office, Adobe Suite \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u044b, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0435 \u0442\u0430\u0431\u043b\u0438\u0446\u044b \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0439. \u0422\u0432\u043e\u0440\u0447\u0435\u0441\u043a\u043e\u0435 \u041f\u041e: \u041f\u0440\u043e\u0444\u0435\u0441\u0441\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u0438\u0437\u0430\u0439\u043d\u0430, \u0432\u0438\u0434\u0435\u043e\u043c\u043e\u043d\u0442\u0430\u0436\u0430, \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043c\u0443\u0437\u044b\u043a\u0438 \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435 \u043e\u0442 \u0432\u0435\u0434\u0443\u0449\u0438\u0445 \u0431\u0440\u0435\u043d\u0434\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Adobe, Corel \u0438 Autodesk. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c: \u041a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 Norton, McAfee, Kaspersky \u0438 \u0434\u0440\u0443\u0433\u0438\u0445, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0438\u0442\u044c \u0432\u0430\u0448\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043e\u0442 \u043a\u0438\u0431\u0435\u0440\u0443\u0433\u0440\u043e\u0437. \u0411\u0438\u0437\u043d\u0435\u0441 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u044b: \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0431\u0443\u0445\u0433\u0430\u043b\u0442\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u0447\u0435\u0442\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u043c\u0438, CRM \u0438 ERP-\u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0442\u0430\u043a\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432, \u043a\u0430\u043a QuickBooks, Microsoft Dynamics \u0438 SAP. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438: \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043e\u043d\u043b\u0430\u0439\u043d: \u041d\u0430\u0441\u043b\u0430\u0436\u0434\u0430\u0439\u0442\u0435\u0441\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u0441 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u0430\u043c\u0438 \u043e\u043f\u043b\u0430\u0442\u044b \u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c SSL. \u041c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430: \u0426\u0438\u0444\u0440\u043e\u0432\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u0439 \u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0438 \u0441\u0441\u044b\u043b\u043e\u043a \u0434\u043b\u044f \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438. \u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432: \u041e\u0442\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u043e\u043d\u043b\u0430\u0439\u043d-\u0447\u0430\u0442, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443 \u0438 \u0442\u0435\u043b\u0435\u0444\u043e\u043d \u0434\u043b\u044f \u043f\u043e\u043c\u043e\u0449\u0438 \u0441 \u043b\u044e\u0431\u044b\u043c\u0438 \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c\u0438 \u0438\u043b\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438. \u0413\u0430\u0440\u0430\u043d\u0442\u0438\u044f \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433: \u0423\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0432 \u043d\u0430\u0448\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043f\u043e\u0434\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0430 30-\u0434\u043d\u0435\u0432\u043d\u043e\u0439 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0435\u0439 \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433.\",\"legalName\":\"Starlab MCHJ\",\"foundingDate\":\"2016-11-15\",\"duns\":\"537716592\",\"leiCode\":\"894500IR5ZAAEGVJ4D53\",\"naics\":\"454110\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"},\"publishingPrinciples\":\"https:\\\/\\\/uzsoft.uz\\\/principy-publikatsii\\\/\",\"ownershipFundingInfo\":\"https:\\\/\\\/uzsoft.uz\\\/sobstvennost-i-finansirovanie\\\/\",\"actionableFeedbackPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-obratnoy-svyazi\\\/\",\"correctionsPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-ispravleniy\\\/\",\"ethicsPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-etiki\\\/\",\"diversityPolicy\":\"https:\\\/\\\/uzsoft.uz\\\/politika-raznoobraziya\\\/\",\"diversityStaffingReport\":\"https:\\\/\\\/uzsoft.uz\\\/otchet-o-kadrovom-raznoobrazii\\\/\",\"hasMerchantReturnPolicy\":{\"@type\":\"MerchantReturnPolicy\",\"applicableCountry\":\"UZ\",\"returnPolicyCategory\":\"https:\\\/\\\/schema.org\\\/MerchantReturnNotPermitted\",\"merchantReturnLink\":\"https:\\\/\\\/uzsoft.uz\\\/refund_returns\\\/\"},\"address\":{\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"41.289614319763196\",\"longitude\":\"69.22166103901668\"},\"telephone\":[\"+998712001999\",\"+998712031999\"],\"contactPoint\":{\"@type\":\"ContactPoint\",\"telephone\":\"+998712001999\",\"email\":\"info@starlab.uz\"},\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"18:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Saturday\",\"Sunday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"}],\"email\":\"info@starlab.uz\",\"faxNumber\":\"+998712001999\",\"areaServed\":\"\u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\",\"vatID\":\"326060121141\",\"taxID\":\"304426154\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/#\\\/schema\\\/person\\\/b4211fdbf4859a7db7358ea60755f54a\",\"name\":\"BWS.Uz IT Technoligies\",\"description\":\"\u042d\u0442\u043e\u0442 \u0430\u043a\u043a\u0430\u0443\u043d\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441\u0430\u0439\u0442\u043e\u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Starlab\",\"sameAs\":[\"https:\\\/\\\/starlab.uz\"]},{\"@type\":\"PostalAddress\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#local-main-place-address\",\"streetAddress\":\"\u0427\u0438\u043b\u0430\u043d\u0437\u0430\u0440 \u0415, \u0434\u043e\u043c 9.\",\"addressLocality\":\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\",\"postalCode\":\"100043\",\"addressRegion\":\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\",\"addressCountry\":\"UZ\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"uz-UZ\",\"@id\":\"https:\\\/\\\/uzsoft.uz\\\/uz\\\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\\\/#local-main-organization-logo\",\"url\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/uzsoft-logo.png\",\"contentUrl\":\"https:\\\/\\\/uzsoft.uz\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/uzsoft-logo.png\",\"width\":233,\"height\":54,\"caption\":\"\u041e\u041e\u041e Starlab\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"\u0422\u0430\u0448\u043a\u0435\u043d\u0442\" \/>\n<meta name=\"geo.position\" content=\"41.289614319763196;69.22166103901668\" \/>\n<meta name=\"geo.region\" content=\"O&#039;zbekiston\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz","description":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda Axborot xavfsizligi bo'yicha xalqaro ekspert ESET kibermakondagi eng keng tarqalgan tovlamachilik sxemalarini oshkor qildi.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/","og_locale":"uz_UZ","og_type":"article","og_title":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda | \u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0438 \u043e\u0431\u0437\u043e\u0440\u044b \u0434\u043b\u044f \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0430 \u2014 Uzsoft.uz","og_description":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda \u2014 \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u043e\u0431\u0437\u043e\u0440\u044b \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043a\u0446\u0438\u0438 \u0434\u043b\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u041d\u0430\u0434\u0451\u0436\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u0442 \u043a\u043e\u043c\u0430\u043d\u0434\u044b Uzsoft.uz.","og_url":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/","og_site_name":"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b: \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Windows, Office - \u041e\u043d\u043b\u0430\u0439\u043d \u043c\u0430\u0433\u0430\u0437\u0438\u043d","article_publisher":"https:\/\/www.facebook.com\/uzsoft.uz","article_published_time":"2020-12-22T04:50:03+00:00","og_image":[{"width":800,"height":420,"url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2020\/12\/777777-800x420-1.jpg","type":"image\/jpeg"}],"author":"BWS.Uz IT Technoligies","twitter_card":"summary_large_image","twitter_creator":"@bws_info","twitter_site":"@bws_info","twitter_misc":{"Written by":"BWS.Uz IT Technoligies","Est. reading time":"1 daqiqa"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#article","isPartOf":{"@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/"},"author":{"name":"BWS.Uz IT Technoligies","@id":"https:\/\/uzsoft.uz\/uz\/#\/schema\/person\/b4211fdbf4859a7db7358ea60755f54a"},"headline":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda","datePublished":"2020-12-22T04:50:03+00:00","mainEntityOfPage":{"@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/"},"wordCount":327,"publisher":{"@id":"https:\/\/uzsoft.uz\/uz\/#organization"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#primaryimage"},"thumbnailUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2020\/12\/777777-800x420-1.jpg","keywords":["eset endpoint antivirus","eset key 2020","eset nod32","eset nod32 antivirus","eset nod32 antivirus 4","eset nod32 antivirus 8","eset nod32 antivirus \u0441\u043a\u0430\u0447\u0430\u0442\u044c","eset nod32 baza","eset nod32 baza skachat","eset smart security"],"articleSection":["Yangiliklar"],"inLanguage":"uz-UZ","copyrightYear":"2020","copyrightHolder":{"@id":"https:\/\/uzsoft.uz\/#organization"}},{"@type":"WebPage","@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/","url":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/","name":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda | Yangiliklar | \u0423\u0437\u0431\u0435\u043a\u0441\u043a\u0438\u0439 \u0440\u044b\u043d\u043e\u043a | Uzsoft.uz","isPartOf":{"@id":"https:\/\/uzsoft.uz\/uz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#primaryimage"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#primaryimage"},"thumbnailUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2020\/12\/777777-800x420-1.jpg","datePublished":"2020-12-22T04:50:03+00:00","description":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda Axborot xavfsizligi bo'yicha xalqaro ekspert ESET kibermakondagi eng keng tarqalgan tovlamachilik sxemalarini oshkor qildi.","breadcrumb":{"@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#breadcrumb"},"inLanguage":"uz-UZ","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/"]}]},{"@type":"ImageObject","inLanguage":"uz-UZ","@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#primaryimage","url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2020\/12\/777777-800x420-1.jpg","contentUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2020\/12\/777777-800x420-1.jpg","width":800,"height":420,"caption":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda"},{"@type":"BreadcrumbList","@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u0413\u043b\u0430\u0432\u043d\u0430\u044f","item":"https:\/\/uzsoft.uz\/uz\/bosh-sahifa\/"},{"@type":"ListItem","position":2,"name":"\u0411\u0435\u0437 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438","item":"https:\/\/uzsoft.uz\/uz\/category\/bez-kategorii\/"},{"@type":"ListItem","position":3,"name":"Kiberjinoyatchilar foydalanuvchilarni shantaj qilishning yangi usullarini izlamoqda"}]},{"@type":"WebSite","@id":"https:\/\/uzsoft.uz\/uz\/#website","url":"https:\/\/uzsoft.uz\/uz\/","name":"\u041b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f Windows \u0438 Android | \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b, Office \u2014 Uzsoft.uz","description":"Uzsoft.uz \u2014 \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0432 \u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d\u0435. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b ESET, Kaspersky, Bitdefender, Microsoft Office, Windows, VPN \u0438 \u0434\u0440\u0443\u0433\u043e\u0435.","publisher":{"@id":"https:\/\/uzsoft.uz\/uz\/#organization"},"alternateName":"Uzsoft.uz \u2014 \u0441\u043e\u0444\u0442 \u0438 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u043e\u043d\u043b\u0430\u0439\u043d","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uzsoft.uz\/uz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"uz-UZ"},{"@type":["Organization","Place"],"@id":"https:\/\/uzsoft.uz\/uz\/#organization","name":"\u041e\u041e\u041e Starlab","alternateName":"Uzsoft.uz","url":"https:\/\/uzsoft.uz\/uz\/","logo":{"@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#local-main-organization-logo"},"image":{"@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#local-main-organization-logo"},"sameAs":["https:\/\/www.facebook.com\/uzsoft.uz","https:\/\/x.com\/bws_info","https:\/\/www.instagram.com\/uzsoft.uz","https:\/\/www.pinterest.com\/starlabuz","https:\/\/www.youtube.com\/channel\/UCqshldoZsm4jd9DScHqZhdQ"],"description":"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438: \u041e\u041e\u041e Starlab \u0422\u0438\u043f \u0431\u0438\u0437\u043d\u0435\u0441\u0430: \u041e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u041e\u0431\u0437\u043e\u0440: Uzsoft.uz \u044f\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0432\u0435\u0434\u0443\u0449\u0438\u043c \u043e\u043d\u043b\u0430\u0439\u043d-\u043c\u0430\u0433\u0430\u0437\u0438\u043d\u043e\u043c \u0434\u043b\u044f \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0433\u043e \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u043e\u043d\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f. \u041d\u0430\u0448\u0430 \u043c\u0438\u0441\u0441\u0438\u044f - \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u0438\u0442\u044c \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u044f\u043c \u0438 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u044f\u0442\u0438\u044f\u043c \u043b\u0451\u0433\u043a\u0438\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0443 \u0441\u043f\u0435\u043a\u0442\u0440\u0443 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432, \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0440\u0443\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0435 \u0437\u0430\u043a\u043e\u043d\u043d\u044b\u0445, \u043f\u043e\u043b\u043d\u043e\u0441\u0442\u044c\u044e \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u0438\u0432\u0430\u0435\u043c\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439. \u041e\u0442 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u0438 \u043e\u0444\u0438\u0441\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u0434\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u0434\u043b\u044f \u0442\u0432\u043e\u0440\u0447\u0435\u0441\u0442\u0432\u0430 \u0438 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0438\u0437\u043d\u0435\u0441\u043e\u043c - \u043c\u044b \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u044f\u0435\u043c \u0432\u0441\u0435 \u0432\u0430\u0448\u0438 \u043f\u043e\u0442\u0440\u0435\u0431\u043d\u043e\u0441\u0442\u0438 \u0432 \u041f\u041e, \u0441\u043e\u0441\u0440\u0435\u0434\u043e\u0442\u0430\u0447\u0438\u0432\u0430\u044f\u0441\u044c \u043d\u0430 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0441\u0442\u0438 \u0438 \u0443\u0434\u043e\u0432\u043b\u0435\u0442\u0432\u043e\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u0438 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432. \u041f\u0440\u043e\u0434\u0443\u043a\u0442\u044b: \u041d\u0430\u0448 \u043a\u0430\u0442\u0430\u043b\u043e\u0433 \u043f\u0440\u043e\u0434\u0443\u043a\u0446\u0438\u0438 \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0432 \u0441\u0435\u0431\u044f \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u043a\u0430\u0442\u0435\u0433\u043e\u0440\u0438\u0438: \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0435 \u0441\u0438\u0441\u0442\u0435\u043c\u044b: \u041f\u043e\u0441\u043b\u0435\u0434\u043d\u0438\u0435 \u0438 \u043f\u0440\u0435\u0434\u044b\u0434\u0443\u0449\u0438\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 Windows, macOS \u0438 \u0434\u0438\u0441\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0432\u044b Linux. \u041e\u0444\u0438\u0441\u043d\u043e\u0435 \u041f\u041e: Microsoft Office, Adobe Suite \u0438 \u0434\u0440\u0443\u0433\u0438\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0438\u0432\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0442\u0435\u043a\u0441\u0442\u043e\u0432\u044b\u0435 \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u044b, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u044b\u0435 \u0442\u0430\u0431\u043b\u0438\u0446\u044b \u0438 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u0434\u043b\u044f \u043f\u0440\u0435\u0437\u0435\u043d\u0442\u0430\u0446\u0438\u0439. \u0422\u0432\u043e\u0440\u0447\u0435\u0441\u043a\u043e\u0435 \u041f\u041e: \u041f\u0440\u043e\u0444\u0435\u0441\u0441\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u044b\u0435 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0434\u043b\u044f \u0433\u0440\u0430\u0444\u0438\u0447\u0435\u0441\u043a\u043e\u0433\u043e \u0434\u0438\u0437\u0430\u0439\u043d\u0430, \u0432\u0438\u0434\u0435\u043e\u043c\u043e\u043d\u0442\u0430\u0436\u0430, \u0441\u043e\u0437\u0434\u0430\u043d\u0438\u044f \u043c\u0443\u0437\u044b\u043a\u0438 \u0438 \u043c\u043d\u043e\u0433\u043e\u0435 \u0434\u0440\u0443\u0433\u043e\u0435 \u043e\u0442 \u0432\u0435\u0434\u0443\u0449\u0438\u0445 \u0431\u0440\u0435\u043d\u0434\u043e\u0432, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a Adobe, Corel \u0438 Autodesk. \u0410\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u044b \u0438 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u044c: \u041a\u043e\u043c\u043f\u043b\u0435\u043a\u0441\u043d\u044b\u0435 \u0440\u0435\u0448\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u043e\u0442 Norton, McAfee, Kaspersky \u0438 \u0434\u0440\u0443\u0433\u0438\u0445, \u0447\u0442\u043e\u0431\u044b \u043e\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u0438\u0442\u044c \u0432\u0430\u0448\u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043e\u0442 \u043a\u0438\u0431\u0435\u0440\u0443\u0433\u0440\u043e\u0437. \u0411\u0438\u0437\u043d\u0435\u0441 \u0438 \u0444\u0438\u043d\u0430\u043d\u0441\u044b: \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0434\u043b\u044f \u0431\u0443\u0445\u0433\u0430\u043b\u0442\u0435\u0440\u0441\u043a\u043e\u0433\u043e \u0443\u0447\u0435\u0442\u0430, \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0435\u043a\u0442\u0430\u043c\u0438, CRM \u0438 ERP-\u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0442 \u0442\u0430\u043a\u0438\u0445 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432, \u043a\u0430\u043a QuickBooks, Microsoft Dynamics \u0438 SAP. \u041e\u0441\u043e\u0431\u0435\u043d\u043d\u043e\u0441\u0442\u0438: \u0411\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u043e\u043d\u043b\u0430\u0439\u043d: \u041d\u0430\u0441\u043b\u0430\u0436\u0434\u0430\u0439\u0442\u0435\u0441\u044c \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u043c \u043f\u043e\u043a\u0443\u043f\u043a\u0438 \u0441 \u0437\u0430\u0449\u0438\u0449\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u043f\u043e\u0441\u043e\u0431\u0430\u043c\u0438 \u043e\u043f\u043b\u0430\u0442\u044b \u0438 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u0435\u043c SSL. \u041c\u0433\u043d\u043e\u0432\u0435\u043d\u043d\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430: \u0426\u0438\u0444\u0440\u043e\u0432\u0430\u044f \u0434\u043e\u0441\u0442\u0430\u0432\u043a\u0430 \u043b\u0438\u0446\u0435\u043d\u0437\u0438\u0439 \u043d\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0438 \u0441\u0441\u044b\u043b\u043e\u043a \u0434\u043b\u044f \u0441\u043a\u0430\u0447\u0438\u0432\u0430\u043d\u0438\u044f \u0441\u0440\u0430\u0437\u0443 \u043f\u043e\u0441\u043b\u0435 \u043f\u043e\u043a\u0443\u043f\u043a\u0438. \u041f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0430 \u043a\u043b\u0438\u0435\u043d\u0442\u043e\u0432: \u041e\u0442\u0434\u0435\u043b\u044c\u043d\u0430\u044f \u043a\u043e\u043c\u0430\u043d\u0434\u0430 \u043f\u043e\u0434\u0434\u0435\u0440\u0436\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u0430 \u0447\u0435\u0440\u0435\u0437 \u043e\u043d\u043b\u0430\u0439\u043d-\u0447\u0430\u0442, \u044d\u043b\u0435\u043a\u0442\u0440\u043e\u043d\u043d\u0443\u044e \u043f\u043e\u0447\u0442\u0443 \u0438 \u0442\u0435\u043b\u0435\u0444\u043e\u043d \u0434\u043b\u044f \u043f\u043e\u043c\u043e\u0449\u0438 \u0441 \u043b\u044e\u0431\u044b\u043c\u0438 \u0432\u043e\u043f\u0440\u043e\u0441\u0430\u043c\u0438 \u0438\u043b\u0438 \u043f\u0440\u043e\u0431\u043b\u0435\u043c\u0430\u043c\u0438. \u0413\u0430\u0440\u0430\u043d\u0442\u0438\u044f \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433: \u0423\u0432\u0435\u0440\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u0432 \u043d\u0430\u0448\u0438\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430\u0445 \u043f\u043e\u0434\u043a\u0440\u0435\u043f\u043b\u0435\u043d\u0430 30-\u0434\u043d\u0435\u0432\u043d\u043e\u0439 \u0433\u0430\u0440\u0430\u043d\u0442\u0438\u0435\u0439 \u0432\u043e\u0437\u0432\u0440\u0430\u0442\u0430 \u0434\u0435\u043d\u0435\u0433.","legalName":"Starlab MCHJ","foundingDate":"2016-11-15","duns":"537716592","leiCode":"894500IR5ZAAEGVJ4D53","naics":"454110","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"},"publishingPrinciples":"https:\/\/uzsoft.uz\/principy-publikatsii\/","ownershipFundingInfo":"https:\/\/uzsoft.uz\/sobstvennost-i-finansirovanie\/","actionableFeedbackPolicy":"https:\/\/uzsoft.uz\/politika-obratnoy-svyazi\/","correctionsPolicy":"https:\/\/uzsoft.uz\/politika-ispravleniy\/","ethicsPolicy":"https:\/\/uzsoft.uz\/politika-etiki\/","diversityPolicy":"https:\/\/uzsoft.uz\/politika-raznoobraziya\/","diversityStaffingReport":"https:\/\/uzsoft.uz\/otchet-o-kadrovom-raznoobrazii\/","hasMerchantReturnPolicy":{"@type":"MerchantReturnPolicy","applicableCountry":"UZ","returnPolicyCategory":"https:\/\/schema.org\/MerchantReturnNotPermitted","merchantReturnLink":"https:\/\/uzsoft.uz\/refund_returns\/"},"address":{"@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"41.289614319763196","longitude":"69.22166103901668"},"telephone":["+998712001999","+998712031999"],"contactPoint":{"@type":"ContactPoint","telephone":"+998712001999","email":"info@starlab.uz"},"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"18:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Saturday","Sunday"],"opens":"00:00","closes":"00:00"}],"email":"info@starlab.uz","faxNumber":"+998712001999","areaServed":"\u0423\u0437\u0431\u0435\u043a\u0438\u0441\u0442\u0430\u043d","vatID":"326060121141","taxID":"304426154"},{"@type":"Person","@id":"https:\/\/uzsoft.uz\/uz\/#\/schema\/person\/b4211fdbf4859a7db7358ea60755f54a","name":"BWS.Uz IT Technoligies","description":"\u042d\u0442\u043e\u0442 \u0430\u043a\u043a\u0430\u0443\u043d\u0442 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430 \u0441\u0430\u0439\u0442\u043e\u0432 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Starlab","sameAs":["https:\/\/starlab.uz"]},{"@type":"PostalAddress","@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#local-main-place-address","streetAddress":"\u0427\u0438\u043b\u0430\u043d\u0437\u0430\u0440 \u0415, \u0434\u043e\u043c 9.","addressLocality":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","postalCode":"100043","addressRegion":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","addressCountry":"UZ"},{"@type":"ImageObject","inLanguage":"uz-UZ","@id":"https:\/\/uzsoft.uz\/uz\/kiberjinoyatchilar-foydalanuvchilarni-shantaj-qilishning-yangi-usullarini-izlamoqda\/#local-main-organization-logo","url":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2017\/12\/uzsoft-logo.png","contentUrl":"https:\/\/uzsoft.uz\/wp-content\/uploads\/2017\/12\/uzsoft-logo.png","width":233,"height":54,"caption":"\u041e\u041e\u041e Starlab"}]},"geo.placename":"\u0422\u0430\u0448\u043a\u0435\u043d\u0442","geo.position":{"lat":"41.289614319763196","long":"69.22166103901668"},"geo.region":"O'zbekiston"},"_links":{"self":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts\/59538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/comments?post=59538"}],"version-history":[{"count":0,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/posts\/59538\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/media\/54335"}],"wp:attachment":[{"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/media?parent=59538"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/categories?post=59538"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uzsoft.uz\/uz\/wp-json\/wp\/v2\/tags?post=59538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}