{"id":5636,"date":"2014-11-16T23:48:27","date_gmt":"2014-11-16T23:48:27","guid":{"rendered":"http:\/\/la-uno.com\/blog\/index.php\/2014\/11\/16\/sin-correo-electronico-en-la-casa-blanca\/"},"modified":"2015-02-18T14:46:16","modified_gmt":"2015-02-18T20:46:16","slug":"sin-correo-electronico-en-la-casa-blanca","status":"publish","type":"post","link":"https:\/\/la-uno.com\/blog\/2014\/11\/16\/sin-correo-electronico-en-la-casa-blanca\/","title":{"rendered":"Sin correo electr\u00f3nico en la Casa Blanca"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-495\" src=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/block-email.jpg\" alt=\"block email\" width=\"980\" height=\"605\" \/><\/p>\n<h5>Seg\u00fan un \u00a0alto funcionario del Departamento de Estado se ha adoptado una medida sin precedentes de interrumpir todo su sistema de correo electr\u00f3nico confidencial mientras los t\u00e9cnicos reparan una posible falla en lo que se piensa es un ataque cibernetico.<\/h5>\n<h5>ademas dijo que\u00a0fue detectada &#8220;actividad preocupante&#8221; en el sistema aproximadamente a la misma hora que ocurri\u00f3 un incidente en la red inform\u00e1tica de la Casa Blanca, y que ninguno de los sistemas clasificados del Departamento de Estado fue afectado.<\/h5>\n<h5>Sin embargo, la fuente se\u00f1al\u00f3 que el Departamento de Estado apag\u00f3 el viernes a altas horas de la noche su correo electr\u00f3nico mundial como parte de una interrupci\u00f3n programada de algunos de sus sistemas conectados con Internet para hacer mejoras de seguridad.<\/h5>\n<h5>Pidiendo no ser identificado pues la informaci\u00f3n aun no es oficial, dijo que el departamento preve\u00e9 que a la brevedad posible sus sistemas funcionen con normalidad, y tambi\u00e9n se abstuvo de precisar quien podr\u00eda estar detr\u00e1s\u00a0de esta anomal\u00eda inform\u00e1tica.<\/h5>\n<h5>Estados Unidos ha atribuido ataques inform\u00e1ticos previos a piratas cibern\u00e9ticos rusos o chinos, aunque nunca ha confirmado el origen p\u00fablicamente.<\/h5>\n<p>&nbsp;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_5636\" class=\"pvc_stats all  \" data-element-id=\"5636\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Seg\u00fan un \u00a0alto funcionario del Departamento de Estado se ha adoptado una medida sin precedentes de interrumpir todo su sistema de correo electr\u00f3nico confidencial mientras los t\u00e9cnicos reparan una posible falla en lo que se piensa es un ataque cibernetico. ademas dijo que\u00a0fue detectada &#8220;actividad preocupante&#8221; en el sistema aproximadamente a la misma hora que&hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_5636\" class=\"pvc_stats all  \" data-element-id=\"5636\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":5637,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[181,34,37,179],"tags":[],"class_list":["post-5636","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email","category-internet","category-seguridad","category-servidores"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/block-email.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p529Uq-1sU","jetpack-related-posts":[{"id":5800,"url":"https:\/\/la-uno.com\/blog\/2015\/01\/19\/el-correo-electronico-cifrado-de-extremo-a-extremo\/","url_meta":{"origin":5636,"position":0},"title":"El correo electr\u00f3nico cifrado de extremo a extremo.","author":"marco","date":"January 19, 2015","format":false,"excerpt":"La desconfianza crece a medida que los gobiernos se introducen en la privacidad de los usuarios de correo electr\u00f3nico, el espionaje masivo de la NSA revelaci\u00f3n de\u00a0Edward Snowden\u00a0nos ense\u00f1aba que en Estados Unidos los servidores se encontraban mas inseguros, as\u00ed que la atenci\u00f3n se empez\u00f3 a dirigir a servicios alternativos\u2026","rel":"","context":"In &quot;email&quot;","block_context":{"text":"email","link":"https:\/\/la-uno.com\/blog\/category\/email\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/Arquitectura-DIME_EDIIMA20150110_0273_13.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/Arquitectura-DIME_EDIIMA20150110_0273_13.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/Arquitectura-DIME_EDIIMA20150110_0273_13.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":5736,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/23\/multan-a-google-por-negarse-a-espiar-correos-electronicos\/","url_meta":{"origin":5636,"position":1},"title":"Multan a Google por negarse a espiar correos electr\u00f3nicos","author":"marco","date":"December 23, 2014","format":false,"excerpt":"Y ah\u00ed lo tienen, Google se neg\u00f3 a interceptar 4 correos electr\u00f3nicos por una investigaci\u00f3n que derivo en el caso de corrupci\u00f3n en la petrolera estatal Petrobas en Brasil. La orden fue emitida por un juez federal y ahora el gigante de Internet deber\u00e1 pagar una multa de unos 200.000\u2026","rel":"","context":"In &quot;email&quot;","block_context":{"text":"email","link":"https:\/\/la-uno.com\/blog\/category\/email\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/gmail-logo.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/gmail-logo.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/gmail-logo.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/gmail-logo.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5725,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/22\/nasa-envio-una-herramienta-a-la-estacion-espacial-internacional-por-email\/","url_meta":{"origin":5636,"position":2},"title":"NASA envi\u00f3 una herramienta a la Estaci\u00f3n Espacial Internacional por email","author":"marco","date":"December 22, 2014","format":false,"excerpt":"Utilizando el correo electr\u00f3nico la tripulaci\u00f3n de la Estaci\u00f3n Espacial Internacional (ISS) recibi\u00f3 un dise\u00f1o de una herramienta que gracias a una impresora 3D pudieron traer a la luz. Desde hace un mes que la estaci\u00f3n cuenta con su propia impresora 3D que es capaz de funcionar en condiciones de\u2026","rel":"","context":"In &quot;Curiosidades&quot;","block_context":{"text":"Curiosidades","link":"https:\/\/la-uno.com\/blog\/category\/curiosidades\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/tierra.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/tierra.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/tierra.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":5714,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/21\/inception-malware-de-pelicula\/","url_meta":{"origin":5636,"position":3},"title":"Inception, malware \u201cde pel\u00edcula\u201d","author":"marco","date":"December 21, 2014","format":false,"excerpt":"Malware por aqu\u00ed, malware por all\u00e1, muy constantes son las apariciones de estos c\u00f3digos da\u00f1inos, conocidos por ser programas que tienen como \u00fanico prop\u00f3sito el da\u00f1ar nuestro ordenador o para simplemente espiar al usuario llevando la cuenta desde que iniciamos en \u00e9l, las p\u00e1ginas que visitamos, siguiendo toda la rutina\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5730,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/22\/sera-el-momento-para-volvernos-anti-digitales-empresas-replantean-su-dependencia-al-correo-electronico\/","url_meta":{"origin":5636,"position":4},"title":"\u00bfSera el momento para volvernos anti-digitales? Empresas replantean su dependencia al correo electr\u00f3nico","author":"marco","date":"December 22, 2014","format":false,"excerpt":"Tras las noticias relacionadas al espionaje y al reciente hackeo de la divisi\u00f3n cinematogr\u00e1fica de Sony ejecutivos estadounidenses se est\u00e1n asustando lo que motiva a revisar sus medidas de seguridad y pensar 2 veces en lo que se dicen por email. Desde el auge de las nuevas tecnolog\u00edas las empresas\u2026","rel":"","context":"In &quot;email&quot;","block_context":{"text":"email","link":"https:\/\/la-uno.com\/blog\/category\/email\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/web-needs.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/web-needs.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/web-needs.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/web-needs.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/web-needs.jpg?resize=1050%2C600&ssl=1 3x"},"classes":[]},{"id":5904,"url":"https:\/\/la-uno.com\/blog\/2015\/02\/16\/los-hackers-siguen-haciendo-de-las-suyas\/","url_meta":{"origin":5636,"position":5},"title":"Los Hackers siguen haciendo de las suyas","author":"marco","date":"February 16, 2015","format":false,"excerpt":"Un grupo de la ciber-delincuencia conocido como Alexandre Normand, CC BY 2.0 utilizando un software malicioso han podido robar por lo menos US$300 millones a instituciones financieras, bancos, entre otros, y en el tema se ha llegado a considerar el mayor robo hasta ahora seg\u00fan un informe en The New\u2026","rel":"","context":"In &quot;Seguridad&quot;","block_context":{"text":"Seguridad","link":"https:\/\/la-uno.com\/blog\/category\/seguridad\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/hacker_delit_dfa.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/hacker_delit_dfa.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/02\/hacker_delit_dfa.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/5636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/comments?post=5636"}],"version-history":[{"count":1,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/5636\/revisions"}],"predecessor-version":[{"id":5638,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/5636\/revisions\/5638"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media\/5637"}],"wp:attachment":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media?parent=5636"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/categories?post=5636"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/tags?post=5636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}