{"id":10043,"date":"2017-03-10T12:42:20","date_gmt":"2017-03-10T18:42:20","guid":{"rendered":"https:\/\/la-uno.com\/blog\/?p=10043"},"modified":"2017-03-10T12:42:20","modified_gmt":"2017-03-10T18:42:20","slug":"ahora-hay-que-cuidarse-hasta-de-que-los-spammers-no-tengan-fugas","status":"publish","type":"post","link":"https:\/\/la-uno.com\/blog\/2017\/03\/10\/ahora-hay-que-cuidarse-hasta-de-que-los-spammers-no-tengan-fugas\/","title":{"rendered":"Ahora hay que cuidarse hasta de que los Spammers no tengan fugas."},"content":{"rendered":"<p><a href=\"http:\/\/fortune.com\/2017\/03\/06\/spammer-leaks-data\/\"><img decoding=\"async\" class=\"size-full aligncenter\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2017\/03\/544197293.jpg\" alt=\"\" \/><\/a><\/p>\n<p>Por si fuera poco el tener que estar pendiente que las compa\u00f1\u00edas que tienen \u00a0nuestros datos no tengan fugas y tomar las medidas necesarias cuando las hay, tambi\u00e9n hay que preocuparnos por esas compa\u00f1\u00edas que obtuvieron nuestros datos de forma dudosa, porque son muchos los afectados.<\/p>\n<p>Recientemente, una compa\u00f1\u00eda de mercadeo &#8220;River City Media&#8221; fall\u00f3 en mantener seguros estos datos permitiendo el acceso a 1.34 billones de direcciones de correo electr\u00f3nico.<\/p>\n<p>El descubrimiento fue hecho por Chris Vickery, un investigador de seguridad de MacKeeper, quien escribi\u00f3 el lunes que hab\u00eda descubierto datos de un usuario &#8220;inseguro&#8221; y trabaj\u00f3 con la organizaci\u00f3n &#8220;Spamhaus&#8221; y el sitio de noticias de seguridad CSO Online para investigar la fuga de datos.<\/p>\n<p>Los datos filtrados forman parte de una operaci\u00f3n de Spam enmascarados por una compa\u00f1\u00eda de marketing de acuerdo a su propia documentaci\u00f3n, siendo River City Media responsable de enviar un billon de correos electr\u00f3nicos por d\u00eda.<\/p>\n<p>River City Media fue capaz de obtener mas que la pura direcci\u00f3n de correo electr\u00f3nico, tambi\u00e9n tenia en su poder Nombres completos, direcciones IP y en algunos casos hasta direcciones postales de mas de un billon de personas a trav\u00e9s de su operaci\u00f3n de Spam que promete &#8220;Cheques de cr\u00e9dito, oportunidades de educaci\u00f3n, etc.&#8221;<\/p>\n<p>&nbsp;<\/p>\n<p>Que podemos hacer nosotros como usuarios?. Comenta!<\/p>\n<blockquote><p>The gist of the data breach is that River City Media workers failed to properly configure its backup system, which led to Vickery discovering the user data.<\/p><\/blockquote>\n<p>Source: <em><a href=\"http:\/\/fortune.com\/2017\/03\/06\/spammer-leaks-data\/\">Spamming Operation River City Media Leaks Data on 1.34 Billion People | Fortune.com<\/a><\/em><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_10043\" class=\"pvc_stats all  \" data-element-id=\"10043\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Por si fuera poco el tener que estar pendiente que las compa\u00f1\u00edas que tienen \u00a0nuestros datos no tengan fugas y tomar las medidas necesarias cuando las hay, tambi\u00e9n hay que preocuparnos por esas compa\u00f1\u00edas que obtuvieron nuestros datos de forma dudosa, porque son muchos los afectados. Recientemente, una compa\u00f1\u00eda de mercadeo &#8220;River City Media&#8221; fall\u00f3&hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_10043\" class=\"pvc_stats all  \" data-element-id=\"10043\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":10045,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[37],"tags":[810,699,808,806,807,805,330,809,804],"class_list":["post-10043","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad","tag-datos","tag-filtraciones","tag-investigacion","tag-mackeeper","tag-research","tag-river-city-media","tag-seguridad","tag-sguridad","tag-spam"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2017\/03\/544197293.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p529Uq-2BZ","jetpack-related-posts":[{"id":5700,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/17\/datos-sobre-la-seguridad-empresarial-revelados-por-oracle\/","url_meta":{"origin":10043,"position":0},"title":"Datos sobre la seguridad empresarial revelados por Oracle","author":"marco","date":"December 17, 2014","format":false,"excerpt":"La intrusi\u00f3n no autorizada a servidores de cualquier compa\u00f1\u00eda u organizaci\u00f3n siempre termina en perdidas de millones, y a\u00fan a eso se le suma la perdida de clientes, confianza y oportunidades de negocios, hace poco se hablaba sobre el mas grande ataque registrado a Sony Pictures y las perdidas que\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/Finger-print.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5680,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/02\/todo-lo-que-tienes-que-saber-sobre-un-data-center\/","url_meta":{"origin":10043,"position":1},"title":"Todo lo que tienes que saber sobre un Data Center","author":"marco","date":"December 2, 2014","format":false,"excerpt":"\u00bfAlguna vez te has preguntado a d\u00f3nde va toda esa informaci\u00f3n que guardas en la nube?, es decir, la \u201cnube\u201d es s\u00f3lo una expresi\u00f3n, la realidad es que hay un lugar f\u00edsico en el que las empresas o personas,\u00a0guardan toda la informaci\u00f3n\u00a0que no pueden almacenar en dispositivos. A continuaci\u00f3n, te\u2026","rel":"","context":"In &quot;almacenamiento&quot;","block_context":{"text":"almacenamiento","link":"https:\/\/la-uno.com\/blog\/category\/almacenamiento\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/dc.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/dc.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/dc.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/dc.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/dc.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/dc.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":5717,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/21\/2014-el-ano-de-la-infraccion-de-datos-2015-peor\/","url_meta":{"origin":10043,"position":2},"title":"2014 el a\u00f1o de la infracci\u00f3n de datos, 2015 peor.","author":"marco","date":"December 21, 2014","format":false,"excerpt":"El tiempo va avanzando y as\u00ed como las acciones policiales para atrapar y penalizar a autores de malware se van visto m\u00e1s efectivas las medidas que adquieren los hackers igual van en aumento. Se estima que para 2015 los hackers tambi\u00e9n implementen nuevas medidas de amenazas que podr\u00edan complicar la\u2026","rel":"","context":"In &quot;Seguridad&quot;","block_context":{"text":"Seguridad","link":"https:\/\/la-uno.com\/blog\/category\/seguridad\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/Jarrod_Hacker.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/Jarrod_Hacker.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/Jarrod_Hacker.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":5853,"url":"https:\/\/la-uno.com\/blog\/2015\/01\/29\/cuidado-con-el-phishing-usuarios-de-apple\/","url_meta":{"origin":10043,"position":3},"title":"Cuidado con el phishing usuarios de Apple","author":"marco","date":"January 29, 2015","format":false,"excerpt":"Parece que los intentos de hacerse con datos importantes de los usuarios no cesan, y una vez mas es contra los que cuentan con un Apple ID, el Apple ID es importante para los servicios de Apple como las compras en el Apple Store, iTunes y el correo electr\u00f3nico de\u2026","rel":"","context":"In &quot;email&quot;","block_context":{"text":"email","link":"https:\/\/la-uno.com\/blog\/category\/email\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/IMG_0758-0.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5815,"url":"https:\/\/la-uno.com\/blog\/2015\/01\/23\/secuestro-de-datos-por-correo-electronico\/","url_meta":{"origin":10043,"position":4},"title":"Secuestro de datos por correo electr\u00f3nico","author":"marco","date":"January 23, 2015","format":false,"excerpt":"Gran impacto esta causando CTB-Locker, un ransomware que se propaga a trav\u00e9s de un falso correo electr\u00f3nico que dice contener un fax o desde la propia web al descargar archivos de dudosa procedencia, pero cuyo objetivo es cifrar los arhivos de sus victimas y pedir un rescate en bitcoins para\u2026","rel":"","context":"In &quot;email&quot;","block_context":{"text":"email","link":"https:\/\/la-uno.com\/blog\/category\/email\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/malware.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/malware.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/malware.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":6072,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/05\/los-megaservidores-de-amazon-el-negocio-poco-conocido-de-la-tienda-online\/","url_meta":{"origin":10043,"position":5},"title":"Los megaservidores de Amazon, el negocio poco conocido de la tienda online","author":"marco","date":"December 5, 2014","format":false,"excerpt":"La lista de productos de Amazon en internet parece interminable y a\u00fan as\u00ed contin\u00faa creciendo. Por algo se ha ganado el apodo de \"la tienda de todo\". Y sin embargo, un brazo menos conocido de esta misma compa\u00f1\u00eda ofrece bienes menos tangibles pero quiz\u00e1s m\u00e1s importantes para el futuro de\u2026","rel":"","context":"In &quot;almacenamiento&quot;","block_context":{"text":"almacenamiento","link":"https:\/\/la-uno.com\/blog\/category\/almacenamiento\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/amazon-webservices-reception1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/amazon-webservices-reception1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/amazon-webservices-reception1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/amazon-webservices-reception1.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/amazon-webservices-reception1.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/amazon-webservices-reception1.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/10043","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/comments?post=10043"}],"version-history":[{"count":2,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/10043\/revisions"}],"predecessor-version":[{"id":10046,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/10043\/revisions\/10046"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media\/10045"}],"wp:attachment":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media?parent=10043"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/categories?post=10043"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/tags?post=10043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}