
{"id":112,"date":"2007-03-26T12:17:59","date_gmt":"2007-03-26T15:17:59","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=112"},"modified":"2007-03-26T12:22:05","modified_gmt":"2007-03-26T15:22:05","slug":"los-blogs-ya-tienen-su-propia-amenaza-informatica","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/","title":{"rendered":"Los blogs ya tienen su propia amenaza inform\u00c3\u00a1tica"},"content":{"rendered":"<p>Trend Micro alerta respecto de una nueva amenaza que recibe el nombre de splog y que ataca s\u00c3\u00b3lo a los blogs. Estos tambi\u00c3\u00a9n reciben el nombre de cuadernos de bit\u00c3\u00a1cora (listado de sucesos) y son sitios web peri\u00c3\u00b3dicamente actualizados que recopilan cronol\u00c3\u00b3gicamente textos o art\u00c3\u00adculos de uno o varios autores donde el autor conserva siempre la libertad de dejar publicado lo que crea pertinente.<\/p>\n<p>Los splogs, muy comunes en \u00e2\u20ac\u0153redes sociales\u00e2\u20ac\u009d como Youtube y MySpace, son blogs usados por spammers para promover sitios web 100% comerciales. Los sploggers logran sus fines utilizando un software que rastrea por Internet palabras o frases claves que ellos creen que los usuarios escribir\u00c3\u00a1n en sus motores de b\u00c3\u00basqueda. El software pega estas frases clave en el sitio real y de mucha concurrencia. Por ejemplo, entrando a un blog real uno se puede encontrar, al pie de cada art\u00c3\u00adculo, con textos posteados (publicados) haciendo referencia a un sitio web e invitando al lector a que lo visite. As\u00c3\u00ad, los internautas desprevenidos se ven atra\u00c3\u00addos por la invitaci\u00c3\u00b3n y son dirigidos a estos splogs o falsos blogs en los que predominan los avisos comerciales. Por cada clic que se da sobre el anuncio, los sploggers reciben dinero del anunciante. \u00e2\u20ac\u0153Adem\u00c3\u00a1s de crear redes de blogs falsos, los sploggers tambi\u00c3\u00a9n asumen el control de blogs inactivos. Debido a la relativamente reciente creaci\u00c3\u00b3n de blogs, un n\u00c3\u00bamero muy grande de blogs son abandonados, ofreciendo un campo de juego para los sploggers\u00e2\u20ac\u009d, afirma Maximiliano Cittadini, Team Leader de Servicios Enterprise de Trend Argentina.<\/p>\n<p>\u00e2\u20ac\u0153Adem\u00c3\u00a1s de los sploggers, nadie gana en esta actividad ileg\u00c3\u00adtima. Motores de b\u00c3\u00basqueda como Google no quieren proveer resultados in\u00c3\u00batiles a sus visitantes y, por su lado, los usuarios tambi\u00c3\u00a9n se ven frustrados debido a que la avalancha de splogs perjudica su capacidad de encontrar la informaci\u00c3\u00b3n que buscan\u00e2\u20ac\u009d, detalla el ejecutivo.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.infonews.info\/portal\/\">Infonews<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trend Micro alerta respecto de una nueva amenaza que recibe el nombre de splog y que ataca s\u00c3\u00b3lo a los blogs. Estos tambi\u00c3\u00a9n reciben el nombre de cuadernos de bit\u00c3\u00a1cora (listado de sucesos) y son sitios web peri\u00c3\u00b3dicamente actualizados que recopilan cronol\u00c3\u00b3gicamente textos o art\u00c3\u00adculos de uno o varios autores donde el autor conserva siempre [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-112","post","type-post","status-publish","format-standard","hentry","category-noticias"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Los blogs ya tienen su propia amenaza inform\u00c3\u00a1tica<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Los blogs ya tienen su propia amenaza inform\u00c3\u00a1tica\",\"datePublished\":\"2007-03-26T15:17:59+00:00\",\"dateModified\":\"2007-03-26T15:22:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/\"},\"wordCount\":337,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Noticias\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los blogs ya tienen su propia amenaza inform\u00c3\u00a1tica\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2007-03-26T15:17:59+00:00\",\"dateModified\":\"2007-03-26T15:22:05+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los blogs ya tienen su propia amenaza inform\u00c3\u00a1tica","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Los blogs ya tienen su propia amenaza inform\u00c3\u00a1tica","datePublished":"2007-03-26T15:17:59+00:00","dateModified":"2007-03-26T15:22:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/"},"wordCount":337,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Noticias"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/","url":"https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los blogs ya tienen su propia amenaza inform\u00c3\u00a1tica","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2007-03-26T15:17:59+00:00","dateModified":"2007-03-26T15:22:05+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/los-blogs-ya-tienen-su-propia-amenaza-informatica\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/112","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=112"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/112\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=112"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=112"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=112"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}