
{"id":126,"date":"2007-04-05T08:15:06","date_gmt":"2007-04-05T11:15:06","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=126"},"modified":"2007-04-05T08:15:06","modified_gmt":"2007-04-05T11:15:06","slug":"hackers-crean-su-propio-programa-de-mensajeria-instantanea","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/","title":{"rendered":"Hackers crean su propio programa de mensajer\u00c3\u00ada instant\u00c3\u00a1nea"},"content":{"rendered":"<p><img decoding=\"async\" hspace=\"5\" src=\"http:\/\/www.diarioti.com\/sisimg\/13747b_hacker.gif\" align=\"left\" border=\"1\" \/>\u00c2\u00a0<span class=\"titulo-head\"><br \/>\nGrupo de hackers anuncia la creaci\u00c3\u00b3n de la herramienta de comunicaci\u00c3\u00b3n &#8220;interna&#8221; CarderIM. Se trata de un programa de mensajer\u00c3\u00ada instant\u00c3\u00a1nea dise\u00c3\u00b1ado espec\u00c3\u00adficamente para evitar la monitorizaci\u00c3\u00b3n e intervenci\u00c3\u00b3n de las autoridades. <\/span><span class=\"texto-detalle\"><\/p>\n<p>Diario Ti: Hackers de todo el mundo intentan crear programas de comunicaci\u00c3\u00b3n que les permitan dialogar sin temor a las escuchas policiales. Con tal objetivo han creado el programa CarderIM.<br \/>\nCarderIM funciona como todos los dem\u00c3\u00a1s programas de mensajer\u00c3\u00ada instant\u00c3\u00a1nea, explica Andrew Moloney, del departamento de criminalidad TI de EMC Corporation. La gran diferencia es que cada mensaje enviado es objeto de un proceso de cifrado de alto nivel. Las comunicaciones son enrutadas adem\u00c3\u00a1s v\u00c3\u00ada servidores fuera del control de las autoridades, por lo que la desconexi\u00c3\u00b3n de los mismos es imposible. Los servidores en cuesti\u00c3\u00b3n no almacenan los mensajes enviados y eliminan autom\u00c3\u00a1ticamente todas las huellas electr\u00c3\u00b3nicas.<\/p>\n<p>Maloney present\u00c3\u00b3 el software durante un congreso internacional sobre ciberdelincuencia realizado recientemente en Londres, Inglaterra. El expertp indic\u00c3\u00b3 que la distribuci\u00c3\u00b3n de la herramienta es bastante reducida, ya que para obtenerla es necesario ser miembro de un grupo de hackers reconocido.<\/p>\n<p>&#8220;Carder&#8221; es una expresi\u00c3\u00b3n usada por los hackers dedicados a hurtar informaci\u00c3\u00b3n sobre tarjetas de cr\u00c3\u00a9dito o similares.<br \/>\nDisse informationer s\u00c3\u00a6lges ofte videre og derfor er behovet for CarderIm opst\u00c3\u00a5et. Almindelige IM-programmer sender oftest beskederne i ren tekst, som let kan afl\u00c3\u00a6ses.<\/p>\n<p>A menudo, esta informaci\u00c3\u00b3n es vendida posteriormente en el submundo de Internet. Este tipo de ciberdelincuencia requiere de sistemas de comunicaci\u00c3\u00b3n impenetrables para las autoridades. As\u00c3\u00ad, mientras que los programas normales de mensajer\u00c3\u00ada instant\u00c3\u00a1nea env\u00c3\u00adan la informaci\u00c3\u00b3n en formato de texto corriente, CarderIm env\u00c3\u00ada todos los datos cifrados.<br \/>\nFuente:<a title=\"http:\/\/www.diarioti.com\/\" href=\"http:\/\/www.diarioti.com\/\" target=\"_blank\">http:\/\/www.diarioti.com\/<\/a> <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c2\u00a0 Grupo de hackers anuncia la creaci\u00c3\u00b3n de la herramienta de comunicaci\u00c3\u00b3n &#8220;interna&#8221; CarderIM. Se trata de un programa de mensajer\u00c3\u00ada instant\u00c3\u00a1nea dise\u00c3\u00b1ado espec\u00c3\u00adficamente para evitar la monitorizaci\u00c3\u00b3n e intervenci\u00c3\u00b3n de las autoridades. Diario Ti: Hackers de todo el mundo intentan crear programas de comunicaci\u00c3\u00b3n que les permitan dialogar sin temor a las escuchas policiales. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-126","post","type-post","status-publish","format-standard","hentry","category-noticias"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Hackers crean su propio programa de mensajer\u00c3\u00ada instant\u00c3\u00a1nea<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Hackers crean su propio programa de mensajer\u00c3\u00ada instant\u00c3\u00a1nea\",\"datePublished\":\"2007-04-05T11:15:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/\"},\"wordCount\":318,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.diarioti.com\/sisimg\/13747b_hacker.gif\",\"articleSection\":[\"Noticias\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Hackers crean su propio programa de mensajer\u00c3\u00ada instant\u00c3\u00a1nea\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.diarioti.com\/sisimg\/13747b_hacker.gif\",\"datePublished\":\"2007-04-05T11:15:06+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#primaryimage\",\"url\":\"http:\/\/www.diarioti.com\/sisimg\/13747b_hacker.gif\",\"contentUrl\":\"http:\/\/www.diarioti.com\/sisimg\/13747b_hacker.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Hackers crean su propio programa de mensajer\u00c3\u00ada instant\u00c3\u00a1nea","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Hackers crean su propio programa de mensajer\u00c3\u00ada instant\u00c3\u00a1nea","datePublished":"2007-04-05T11:15:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/"},"wordCount":318,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#primaryimage"},"thumbnailUrl":"http:\/\/www.diarioti.com\/sisimg\/13747b_hacker.gif","articleSection":["Noticias"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/","url":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Hackers crean su propio programa de mensajer\u00c3\u00ada instant\u00c3\u00a1nea","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#primaryimage"},"thumbnailUrl":"http:\/\/www.diarioti.com\/sisimg\/13747b_hacker.gif","datePublished":"2007-04-05T11:15:06+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/hackers-crean-su-propio-programa-de-mensajeria-instantanea\/#primaryimage","url":"http:\/\/www.diarioti.com\/sisimg\/13747b_hacker.gif","contentUrl":"http:\/\/www.diarioti.com\/sisimg\/13747b_hacker.gif"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=126"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/126\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=126"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=126"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}