{"id":5810,"date":"2015-01-21T21:39:45","date_gmt":"2015-01-21T21:39:45","guid":{"rendered":"http:\/\/la-uno.com\/blog\/index.php\/2015\/01\/21\/sufre-el-internet-frances\/"},"modified":"2015-02-18T14:46:12","modified_gmt":"2015-02-18T20:46:12","slug":"sufre-el-internet-frances","status":"publish","type":"post","link":"https:\/\/la-uno.com\/blog\/2015\/01\/21\/sufre-el-internet-frances\/","title":{"rendered":"Sufre el Internet franc\u00e9s"},"content":{"rendered":"<h3><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-688\" src=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/89cf435ceb11223d04a085da27fbc0f3_article.jpg\" alt=\"89cf435ceb11223d04a085da27fbc0f3_article\" width=\"681\" height=\"383\" \/><\/h3>\n<h3>Desde aquellos terribles atentados sucedidos en francia a\u00a0Charlie Hebdo el seminario sat\u00edrico, en Francia se enfrentan a constantes ataques inform\u00e1ticos, cerca de 20 mil webs han sido blancos de ataques seg\u00fan fuentes oficiales, tanto en instituciones publicas como en peque\u00f1as y medianas empresas.<\/h3>\n<h3>Lorenzo Mart\u00ednez, especialista en temas de seguridad inform\u00e1tica explica que &#8220;<em>Lo que se hace en estos casos es buscar alguna vulnerabilidad en un sitio web que permita modificar la p\u00e1gina o su contenido<\/em>&#8221; Agrega que puede tratarse de gobiernos tanto como de indiv\u00edduos. &#8220;<em>Dado lo f\u00e1cil que es saltar de un sitio a otro desde Internet, es realmente dif\u00edcil tracear, llegar a la autor\u00eda inicial de los ataquantes<\/em>&#8220;, dijo Mart\u00ednez.<\/h3>\n<h3>Se trata de ataques relativamente &#8220;<em>sencillos de realizar<\/em>&#8221; seg\u00fan Miguel Rego, director del Instituto nacional de c\u00edberdefensa espa\u00f1ol (Incibe)<\/h3>\n<p>&nbsp;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_5810\" class=\"pvc_stats all  \" data-element-id=\"5810\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Desde aquellos terribles atentados sucedidos en francia a\u00a0Charlie Hebdo el seminario sat\u00edrico, en Francia se enfrentan a constantes ataques inform\u00e1ticos, cerca de 20 mil webs han sido blancos de ataques seg\u00fan fuentes oficiales, tanto en instituciones publicas como en peque\u00f1as y medianas empresas. Lorenzo Mart\u00ednez, especialista en temas de seguridad inform\u00e1tica explica que &#8220;Lo que&hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_5810\" class=\"pvc_stats all  \" data-element-id=\"5810\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":5811,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[34,37],"tags":[],"class_list":["post-5810","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","category-seguridad"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/ataques-informaticos.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p529Uq-1vI","jetpack-related-posts":[{"id":5853,"url":"https:\/\/la-uno.com\/blog\/2015\/01\/29\/cuidado-con-el-phishing-usuarios-de-apple\/","url_meta":{"origin":5810,"position":0},"title":"Cuidado con el phishing usuarios de Apple","author":"marco","date":"January 29, 2015","format":false,"excerpt":"Parece que los intentos de hacerse con datos importantes de los usuarios no cesan, y una vez mas es contra los que cuentan con un Apple ID, el Apple ID es importante para los servicios de Apple como las compras en el Apple Store, iTunes y el correo electr\u00f3nico de\u2026","rel":"","context":"In &quot;email&quot;","block_context":{"text":"email","link":"https:\/\/la-uno.com\/blog\/category\/email\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2015\/01\/IMG_0758-0.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5625,"url":"https:\/\/la-uno.com\/blog\/2014\/11\/04\/subdominios-abandonados-representan-un-riesgo-de-seguridad-para-las-empresas\/","url_meta":{"origin":5810,"position":1},"title":"Subdominios abandonados representan un riesgo de seguridad para las empresas","author":"marco","date":"November 4, 2014","format":false,"excerpt":"Cuando las empresas olvidan desactivar los subdominios que ya no est\u00e1n siendo usados en sus servicios, \u00e9stas crean un vaci\u00f3 legal a explotar por los atacantes. Y debido a que muchos proveedores de servicios no validan correctamente la propiedad de los subdominios se\u00f1alados en sus servidores, los atacantes pueden crear\u2026","rel":"","context":"In &quot;Certificados&quot;","block_context":{"text":"Certificados","link":"https:\/\/la-uno.com\/blog\/category\/certificados\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/seguridad-empresarial.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":11149,"url":"https:\/\/la-uno.com\/blog\/2018\/05\/17\/chrome-da-un-empujon-mas-hacia-ssl\/","url_meta":{"origin":5810,"position":2},"title":"Chrome da un empuj\u00f3n mas hacia SSL","author":"marco","date":"May 17, 2018","format":false,"excerpt":"Si llevas mas de 1 mes navegando en internet te habr\u00e1s dado cuenta que hay sitios con \"un candidato\" o un sello verde, y otros no. Esto es porque unos usan HTTPS y otros HTTP. HTTPS es el mismo protocolo HTTP para transportar los datos desde el servidor a tu\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/05\/Screen_Shot_2018_02_08_at_12.01.48_PM.png.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/05\/Screen_Shot_2018_02_08_at_12.01.48_PM.png.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/05\/Screen_Shot_2018_02_08_at_12.01.48_PM.png.jpeg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2018\/05\/Screen_Shot_2018_02_08_at_12.01.48_PM.png.jpeg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5714,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/21\/inception-malware-de-pelicula\/","url_meta":{"origin":5810,"position":3},"title":"Inception, malware \u201cde pel\u00edcula\u201d","author":"marco","date":"December 21, 2014","format":false,"excerpt":"Malware por aqu\u00ed, malware por all\u00e1, muy constantes son las apariciones de estos c\u00f3digos da\u00f1inos, conocidos por ser programas que tienen como \u00fanico prop\u00f3sito el da\u00f1ar nuestro ordenador o para simplemente espiar al usuario llevando la cuenta desde que iniciamos en \u00e9l, las p\u00e1ginas que visitamos, siguiendo toda la rutina\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/malware-1.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5636,"url":"https:\/\/la-uno.com\/blog\/2014\/11\/16\/sin-correo-electronico-en-la-casa-blanca\/","url_meta":{"origin":5810,"position":4},"title":"Sin correo electr\u00f3nico en la Casa Blanca","author":"marco","date":"November 16, 2014","format":false,"excerpt":"Seg\u00fan un \u00a0alto funcionario del Departamento de Estado se ha adoptado una medida sin precedentes de interrumpir todo su sistema de correo electr\u00f3nico confidencial mientras los t\u00e9cnicos reparan una posible falla en lo que se piensa es un ataque cibernetico. ademas dijo que\u00a0fue detectada \"actividad preocupante\" en el sistema aproximadamente\u2026","rel":"","context":"In &quot;email&quot;","block_context":{"text":"email","link":"https:\/\/la-uno.com\/blog\/category\/email\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/block-email.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/block-email.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/block-email.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/11\/block-email.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10582,"url":"https:\/\/la-uno.com\/blog\/2017\/10\/16\/que-es-krack-como-es-que-soy-vulnerable-como-me-puedo-proteger\/","url_meta":{"origin":5810,"position":5},"title":"Que es KRACK? como es que soy vulnerable? como me puedo proteger?","author":"marco","date":"October 16, 2017","format":false,"excerpt":"EL dia de ayer se di\u00f3 la noticia sobre la vulnerabilidad presente en pr\u00e1cticamente todo dispositivo que use WiFi, la raz\u00f3n?, es que el protocolo WPA2 que se usa no solo para cifrar la contrase\u00f1a sino todo el tr\u00e1fico entre el Access Point y el cliente (celular, tablet, computadora, smartwatch)\u2026","rel":"","context":"In &quot;Android&quot;","block_context":{"text":"Android","link":"https:\/\/la-uno.com\/blog\/category\/mobile\/android\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/10\/KRACK-attack-780x551.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/10\/KRACK-attack-780x551.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/10\/KRACK-attack-780x551.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/10\/KRACK-attack-780x551.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/5810","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/comments?post=5810"}],"version-history":[{"count":2,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/5810\/revisions"}],"predecessor-version":[{"id":5814,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/5810\/revisions\/5814"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media\/5811"}],"wp:attachment":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media?parent=5810"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/categories?post=5810"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/tags?post=5810"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}