{"id":2096,"date":"2022-06-05T09:50:41","date_gmt":"2022-06-05T15:50:41","guid":{"rendered":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=2096"},"modified":"2022-06-05T09:50:41","modified_gmt":"2022-06-05T15:50:41","slug":"las-estafas-mas-comunes-en-internet-i","status":"publish","type":"post","link":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=2096","title":{"rendered":"Las estafas m\u00e1s comunes en internet (I)"},"content":{"rendered":"<p><div id=\"attachment_2098\" style=\"width: 310px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2098\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2022\/06\/pharming-300x157.png\" alt=\"Pharming. Ciberdelito.\" width=\"300\" height=\"157\" class=\"size-medium wp-image-2098\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2022\/06\/pharming-300x157.png 300w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2022\/06\/pharming-1024x536.png 1024w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2022\/06\/pharming-768x402.png 768w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2022\/06\/pharming-1536x804.png 1536w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2022\/06\/pharming-2048x1072.png 2048w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><p id=\"caption-attachment-2098\" class=\"wp-caption-text\"><\/p>\n<p align=\"justify\">La redirecci\u00f3n maliciosa hacia una web falsa que simula ser igual a la leg\u00edtima se conoce como pharming. Ilustraci\u00f3n: Tomada de Nord VPN<\/p><\/div>La informaci\u00f3n que se pone a disposici\u00f3n hoy apareci\u00f3 en <strong>Juventud Rebelde<\/strong> en la edici\u00f3n impresa del 2 de junio de 2022 dando tratamiento a algunos delitos cuya esencia transita a trav\u00e9s del robo de datos personales, para lo que los ciberdelincuentes utilizan la estafa, la ingenier\u00eda social y otros subterfugios.<\/p>\n<p align=\"justify\">Entre los delitos que se explican en esta primera partedel art\u00edculo, est\u00e1 el phishing en algunas de sus variantes. Por la importancia que merece esta informaci\u00f3n y sin importar que parezca una reiteraci\u00f3n innecesaria, se pone a su disposici\u00f3n el v\u00ednculo.<\/p>\n<p align=\"justify\"><a href=\"http:\/\/Las estafas m\u00e1s comunes en internet (I)\" rel=\"noopener\" target=\"_blank\">Las estafas m\u00e1s comunes en internet. (I)<\/a><\/p>\n<h3>Im\u00e1genes Relacionadas:<\/h3>","protected":false},"excerpt":{"rendered":"<p>La informaci\u00f3n que se pone a disposici\u00f3n hoy apareci\u00f3 en Juventud Rebelde en la edici\u00f3n impresa del 2 de junio de 2022 dando tratamiento a algunos delitos cuya esencia transita a trav\u00e9s del robo de datos personales, para lo que &hellip; <a href=\"https:\/\/blogs.uo.edu.cu\/seginf\/?p=2096\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[2,6,8,10,57,13,14,15,58,20,21],"tags":[],"class_list":["post-2096","post","type-post","status-publish","format-standard","hentry","category-amenazas","category-codigos-malignos","category-contrasenas","category-correo-spam","category-educacion-de-usuarios","category-hackers","category-incidentes","category-informaciones","category-noticias","category-phishing","category-piratas-informaticos"],"_links":{"self":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/2096","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2096"}],"version-history":[{"count":1,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/2096\/revisions"}],"predecessor-version":[{"id":2100,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/2096\/revisions\/2100"}],"wp:attachment":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}