{"id":5219,"date":"2026-04-22T16:10:42","date_gmt":"2026-04-22T22:10:42","guid":{"rendered":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=5219"},"modified":"2026-04-22T16:44:07","modified_gmt":"2026-04-22T22:44:07","slug":"vishing-el-engano-en-una-llamada-telefonica","status":"publish","type":"post","link":"https:\/\/blogs.uo.edu.cu\/seginf\/?p=5219","title":{"rendered":"Vishing. El enga\u00f1o en una llamada telef\u00f3nica"},"content":{"rendered":"<p align=\"justify\">En una \u00e9poca donde las estafas usando las TIC son cada vez m\u00e1s frecuentes, se muestra muy activa en los \u00faltimos tiempos realizar llamadas telef\u00f3nicas simulando ser entidades oficiales y lanzando un gancho para por medio de la ingenier\u00eda social doblegar a las posibles v\u00edctimas. En los \u00faltimos d\u00edas se ha mencionado en las redes este tipo de ataque para robar efectivo mediante transfermovil. La siguiente infograf\u00eda ilustra sobre este tipo de estafa.<br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776882478148-1024x506.png\" alt=\"VISHING. EL ENGA\u00d1O EN UNA LLAMADA TELEF\u00d3NICA \" width=\"640\" height=\"316\" class=\"aligncenter size-large wp-image-5221\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776882478148-1024x506.png 1024w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776882478148-300x148.png 300w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776882478148-768x380.png 768w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776882478148.png 1456w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776895065167-1024x506.png\" alt=\"La falsa autoridad \" width=\"640\" height=\"316\" class=\"aligncenter size-large wp-image-5233\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776895065167-1024x506.png 1024w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776895065167-300x148.png 300w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776895065167-768x380.png 768w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776895065167.png 1456w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776886497280-1024x506.png\" alt=\"Truco t\u00e9cnico \" width=\"640\" height=\"316\" class=\"aligncenter size-large wp-image-5245\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776886497280-1024x506.png 1024w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776886497280-300x148.png 300w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776886497280-768x380.png 768w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776886497280.png 1456w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776895285304-1024x506.png\" alt=\"La presi\u00f3n del enga\u00f1o\" width=\"640\" height=\"316\" class=\"aligncenter size-large wp-image-5241\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776895285304-1024x506.png 1024w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776895285304-300x148.png 300w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776895285304-768x380.png 768w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776895285304.png 1456w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776889434938-1024x506.png\" alt=\"La detecci\u00f3n del enga\u00f1o\" width=\"640\" height=\"316\" class=\"aligncenter size-large wp-image-5225\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776889434938-1024x506.png 1024w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776889434938-300x148.png 300w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776889434938-768x380.png 768w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776889434938.png 1456w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><br \/>\n<img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776889591241-1024x506.png\" alt=\"La Regla de Oro. Reflexionar y Verificar antes de Actuar\" width=\"640\" height=\"316\" class=\"aligncenter size-large wp-image-5227\" srcset=\"https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776889591241-1024x506.png 1024w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776889591241-300x148.png 300w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776889591241-768x380.png 768w, https:\/\/blogs.uo.edu.cu\/seginf\/wp-content\/uploads\/sites\/4\/2026\/04\/1776889591241.png 1456w\" sizes=\"auto, (max-width: 640px) 100vw, 640px\" \/><\/p>\n<h3>Im\u00e1genes Relacionadas:<\/h3>","protected":false},"excerpt":{"rendered":"<p>En una \u00e9poca donde las estafas usando las TIC son cada vez m\u00e1s frecuentes, se muestra muy activa en los \u00faltimos tiempos realizar llamadas telef\u00f3nicas simulando ser entidades oficiales y lanzando un gancho para por medio de la ingenier\u00eda social &hellip; <a href=\"https:\/\/blogs.uo.edu.cu\/seginf\/?p=5219\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[2,56,49,5,36,8,57,13,14,18,19,20],"tags":[],"class_list":["post-5219","post","type-post","status-publish","format-standard","hentry","category-amenazas","category-buenas-practicas","category-ciberataque","category-claves-de-acceso","category-competencia-informatica","category-contrasenas","category-educacion-de-usuarios","category-hackers","category-incidentes","category-password","category-percepcion-de-riesgo","category-phishing"],"_links":{"self":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/5219","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5219"}],"version-history":[{"count":5,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/5219\/revisions"}],"predecessor-version":[{"id":5249,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=\/wp\/v2\/posts\/5219\/revisions\/5249"}],"wp:attachment":[{"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5219"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=5219"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uo.edu.cu\/seginf\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=5219"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}