{"id":939,"date":"2014-09-10T12:22:44","date_gmt":"2014-09-10T18:22:44","guid":{"rendered":"http:\/\/la-uno.com\/blog\/?p=939"},"modified":"2015-02-18T14:46:21","modified_gmt":"2015-02-18T20:46:21","slug":"5-millones-de-contrasenas-de-gmail-han-sido-filtradas-checa-la-tuya","status":"publish","type":"post","link":"https:\/\/la-uno.com\/blog\/2014\/09\/10\/5-millones-de-contrasenas-de-gmail-han-sido-filtradas-checa-la-tuya\/","title":{"rendered":"5 millones de contrase\u00f1as de GMail han sido filtradas, checa la tuya!"},"content":{"rendered":"<p><a href=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/acf0v41uhapq51bmqoge.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-941 size-full\" src=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/acf0v41uhapq51bmqoge.jpg\" alt=\"acf0v41uhapq51bmqoge\" width=\"636\" height=\"358\" srcset=\"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/acf0v41uhapq51bmqoge.jpg 636w, https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/acf0v41uhapq51bmqoge-300x168.jpg 300w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/a><\/p>\n<p>De acuerdo al Daily Dot, cerca de 5 millones de nombres de usuario y contrase\u00f1as de cuentas de GMail han sido filtradas en un foro ruso de Bitcoin. Aqu\u00ed est\u00e1 lo que debe saber.<\/p>\n<p>La lista ya ha sido tumbada y muchas de las fuentes dicen que mucha de esa informaci\u00f3n es vieja, aunque algunos otros dicen que el 60% de las contrase\u00f1as a\u00fan son v\u00e1lidas.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-940 size-full\" src=\"http:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/vr4yiljhdocvisyqkheq.jpg\" alt=\"vr4yiljhdocvisyqkheq\" width=\"636\" height=\"358\" srcset=\"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/vr4yiljhdocvisyqkheq.jpg 636w, https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/vr4yiljhdocvisyqkheq-300x168.jpg 300w\" sizes=\"auto, (max-width: 636px) 100vw, 636px\" \/><\/p>\n<p>Para checar si tu contrase\u00f1a es una de las que se han filtrado\u00a0puedes usar\u00a0<a href=\"https:\/\/isleaked.com\/en.php\" target=\"_blank\">esta herramienta<\/a>.\u00a0Si est\u00e1s en modo paran\u00f3ico entonces te recomentamos cambiar tu contrase\u00f1a. Siempre asegurate que sea una <a href=\"https:\/\/strongpasswordgenerator.com\/\" target=\"_blank\">contrase\u00f1a fuerte<\/a> y por el amor de tu deidad favorita, activa la <a href=\"https:\/\/support.google.com\/a\/answer\/175197?hl=es\" target=\"_blank\">autenticaci\u00f3n de dos v\u00edas<\/a>.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_939\" class=\"pvc_stats all  \" data-element-id=\"939\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>De acuerdo al Daily Dot, cerca de 5 millones de nombres de usuario y contrase\u00f1as de cuentas de GMail han sido filtradas en un foro ruso de Bitcoin. Aqu\u00ed est\u00e1 lo que debe saber. La lista ya ha sido tumbada y muchas de las fuentes dicen que mucha de esa informaci\u00f3n es vieja, aunque algunos&hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_939\" class=\"pvc_stats all  \" data-element-id=\"939\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/la-uno.com\/blog\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":941,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[34,37],"tags":[38,39],"class_list":["post-939","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet","category-seguridad","tag-gmail","tag-google"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/la-uno.com\/blog\/wp-content\/uploads\/2014\/09\/acf0v41uhapq51bmqoge.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p529Uq-f9","jetpack-related-posts":[{"id":5080,"url":"https:\/\/la-uno.com\/blog\/2014\/10\/14\/cientos-de-contasenas-de-dropbox-filtradas-hora-de-cambiar-el-password\/","url_meta":{"origin":939,"position":0},"title":"Cientos de contase\u00f1as de Dropbox filtradas, hora de cambiar el password","author":"marco","date":"October 14, 2014","format":false,"excerpt":"Un hackear an\u00f3nimo clama tener unos cuantos cientos fe nombres de usuario ybcontrase\u00f1a de Dropbox. Aunque al parecer el problema no es que hayn hackeado Dropbox sino que las contrase\u00f1as se han obtenido desde otros servicios. Dropbox lo ha hecho saber en un comunicado y aunque la lista de usuarios\u2026","rel":"","context":"In &quot;Seguridad&quot;","block_context":{"text":"Seguridad","link":"https:\/\/la-uno.com\/blog\/category\/seguridad\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/10\/dropbox.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/10\/dropbox.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/10\/dropbox.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/10\/dropbox.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":10552,"url":"https:\/\/la-uno.com\/blog\/2017\/09\/21\/que-sencillo-es-robarte-la-cuenta-de-icloud-2fa-no-te-servira-de-nada\/","url_meta":{"origin":939,"position":1},"title":"Que sencillo es robarte la cuenta de iCloud, 2FA no te servir\u00e1 de nada","author":"marco","date":"September 21, 2017","format":false,"excerpt":"Y lo peor de todo, lo hacen con toda la intensi\u00f3n de robarte el tel\u00e9fono. Se podr\u00eda decir que Apple esta facilitando el Ramsonware, puesto que el iDevice ya est\u00e1 encriptado. El m\u00e9todo para hacer esto es reportar el dispositivo como perdido haciendo uso de tu cuenta de iCloud. La\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/09\/fear9j6rbkyg8irdonmw.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/09\/fear9j6rbkyg8irdonmw.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/09\/fear9j6rbkyg8irdonmw.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2017\/09\/fear9j6rbkyg8irdonmw.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":9213,"url":"https:\/\/la-uno.com\/blog\/2016\/07\/07\/usuarios-quedan-sin-poder-usar-su-cuenta-de-icloud-al-instalar-la-segunda-beta-de-ios-10\/","url_meta":{"origin":939,"position":2},"title":"Usuarios quedan sin poder usar su cuenta de iCloud al instalar la segunda beta de iOS 10","author":"marco","date":"July 7, 2016","format":false,"excerpt":"Algunos usuarios han sido sacados de su Apple ID despues de instalar la segunda beta de iOS 10. El bug ha causado que los testers sean \"sacados\" de su cuenta \"por razones de seguridad\" lo que les previene resetear su contrase\u00f1a. \"Todos mis dispositivos me han pedido que introduzca la\u2026","rel":"","context":"In &quot;Apple&quot;","block_context":{"text":"Apple","link":"https:\/\/la-uno.com\/blog\/category\/apple\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/07\/iOS-10.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/07\/iOS-10.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/07\/iOS-10.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/07\/iOS-10.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/07\/iOS-10.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/07\/iOS-10.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":9734,"url":"https:\/\/la-uno.com\/blog\/2016\/12\/15\/le-han-volado-mil-millones-de-cuentas-a-yahoo\/","url_meta":{"origin":939,"position":3},"title":"Le han volado mil millones de cuentas a Yahoo","author":"marco","date":"December 15, 2016","format":false,"excerpt":"Hace apenas unos meses ya le habia pasado, porque esto es nuevo. A Yahoo le han volado mil millones de cuentas. Yahoo ha tenido que reconocer que le han hackeado un servidor y que ha habido fuga de datos sobre cuentas de usuarios, solo unas cuantas: mil millones. Yahoo se\u2026","rel":"","context":"In &quot;Seguridad&quot;","block_context":{"text":"Seguridad","link":"https:\/\/la-uno.com\/blog\/category\/seguridad\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/12\/Yahoo-passwords.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/12\/Yahoo-passwords.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/12\/Yahoo-passwords.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/12\/Yahoo-passwords.jpg?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":5670,"url":"https:\/\/la-uno.com\/blog\/2014\/12\/02\/intel-adquiere-password-box-poderoso-gestor-de-contrasenas\/","url_meta":{"origin":939,"position":4},"title":"Intel adquiere Password Box poderoso gestor de contrase\u00f1as","author":"marco","date":"December 2, 2014","format":false,"excerpt":"La firma canadiense especializada en gesti\u00f3n de identidades digitales,\u00a0PasswordBox, ha sido adquirida por Intel en un esfuerzo de expansi\u00f3n en torno a los servicios de seguridad y m\u00e1s all\u00e1 de su negocio de venta de chips. El lunes se dio la noticia por parte de Intel que adquiri\u00f3 el gestor\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/intel-building.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/intel-building.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/intel-building.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/intel-building.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/intel-building.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2014\/12\/intel-building.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":9737,"url":"https:\/\/la-uno.com\/blog\/2016\/12\/15\/como-mantener-nuestras-contrasenas-seguras\/","url_meta":{"origin":939,"position":5},"title":"COMO MANTENER NUESTRAS CONTRASE\u00d1AS SEGURAS.","author":"marco","date":"December 15, 2016","format":false,"excerpt":"consejos_seguridad_informatica.jpg Uno de los principales problemas de internet hoy en dia es la seguridad. Normalmente se hace uso de un juego de nombre de usuario y contrase\u00f1a para poder acceder a los servicios. Lo malo es que es com\u00fan que el mismo nombre de usuario y contrase\u00f1a sea el mismo.\u2026","rel":"","context":"In &quot;Internet&quot;","block_context":{"text":"Internet","link":"https:\/\/la-uno.com\/blog\/category\/internet\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/12\/consejos_seguridad_informatica.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/12\/consejos_seguridad_informatica.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/la-uno.com\/blog\/wp-content\/uploads\/2016\/12\/consejos_seguridad_informatica.jpg?resize=525%2C300&ssl=1 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/comments?post=939"}],"version-history":[{"count":1,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/939\/revisions"}],"predecessor-version":[{"id":942,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/posts\/939\/revisions\/942"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media\/941"}],"wp:attachment":[{"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/media?parent=939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/categories?post=939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/la-uno.com\/blog\/wp-json\/wp\/v2\/tags?post=939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}