{"id":4343,"date":"2025-04-15T08:43:46","date_gmt":"2025-04-15T14:43:46","guid":{"rendered":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=4343"},"modified":"2025-04-15T08:45:56","modified_gmt":"2025-04-15T14:45:56","slug":"phishing-el-conocimiento-evita-ser-victima","status":"publish","type":"post","link":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=4343","title":{"rendered":"Phishing. El conocimiento evita ser v\u00edctima."},"content":{"rendered":"<p align=\"justify\">El impacto del phishing en los usuarios alcanza cada vez mayores niveles por la apetencia de los ciberdelincuentes de obtener cuentas leg\u00edtimas para ampliar sus actividades delictivas.<\/p>\n<p align=\"justify\">La mayor parte de los ataques de phishing, son el resultado de las carencias formativas y de informaci\u00f3n de muchas de las v\u00edctimas, de ah\u00ed la importancia de conocer qu\u00e9 es, c\u00f3mo se realiza y c\u00f3mo prevenirlo, lo que puede conocer en el v\u00eddeo \u00ab<a href=\"https:\/\/www.picta.cu\/medias\/phisihing-yli1cm7rzjldyggv\" target=\"_blank\">Phishing. El conocimiento evita ser v\u00edctima<\/a>\u00ab, con unos 8 minutos de duraci\u00f3n. <\/p>\n<h3>Im\u00e1genes Relacionadas:<\/h3>","protected":false},"excerpt":{"rendered":"<p>El impacto del phishing en los usuarios alcanza cada vez mayores niveles por la apetencia de los ciberdelincuentes de obtener cuentas leg\u00edtimas para ampliar sus actividades delictivas. La mayor parte de los ataques de phishing, son el resultado de las &hellip; <a href=\"https:\/\/blogs.uo.edu.cu\/seginf\/?p=4343\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[8,57,18,19,20,60],"tags":[],"class_list":["post-4343","post","type-post","status-publish","format-standard","hentry","category-contrasenas","category-educacion-de-usuarios","category-password","category-percepcion-de-riesgo","category-phishing","category-saber-tic"],"_links":{"self":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/4343","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4343"}],"version-history":[{"count":3,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/4343\/revisions"}],"predecessor-version":[{"id":4346,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/4343\/revisions\/4346"}],"wp:attachment":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4343"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4343"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4343"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}