
{"id":129,"date":"2007-04-05T18:27:19","date_gmt":"2007-04-05T21:27:19","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=129"},"modified":"2007-04-05T18:31:33","modified_gmt":"2007-04-05T21:31:33","slug":"navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/","title":{"rendered":"Navegar por internet ser\u00c3\u00a1 una verdadera odiseaAgregar a mis art\u00c3\u00adculos"},"content":{"rendered":"<table width=\"100%\" cellspacing=\"0\" cellpadding=\"0\" border=\"0\">\n<tr>\n<td class=\"trebuchet t12 bold\"><\/td>\n<\/tr>\n<tr>\n<td style=\"height: 5px\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"http:\/\/www.infobae.com\/imgs\/space.gif\" \/><\/td>\n<\/tr>\n<tr>\n<td class=\"trebuchet t24 c000000\"><\/td>\n<\/tr>\n<tr>\n<td style=\"height: 10px\"><\/td>\n<\/tr>\n<tr>\n<td align=\"center\"><\/td>\n<\/tr>\n<tr>\n<td style=\"height: 15px\"><img loading=\"lazy\" decoding=\"async\" width=\"1\" height=\"1\" src=\"http:\/\/www.infobae.com\/imgs\/space.gif\" \/><\/td>\n<\/tr>\n<tr>\n<td>\n<table cellspacing=\"0\" cellpadding=\"0\" border=\"0\">\n<tr>\n<td valign=\"top\"><!-- HERRAMIENTAS --><\/p>\n<table width=\"117\" cellspacing=\"0\" cellpadding=\"0\" border=\"0\" align=\"left\" style=\"padding: 5px 10px 0px 0px\">\n<tr>\n<td class=\"t11\"><\/td>\n<\/tr>\n<tr>\n<td style=\"padding: 5px 10px 5px 0px\"><!-- Foto --><\/p>\n<table cellspacing=\"0\" cellpadding=\"0\" border=\"0\">\n<tr>\n<td><img decoding=\"async\" width=\"117\" border=\"0\" alt=\"Virus computadora\" src=\"http:\/\/www.infobae.com\/adjuntos\/imagenes\/74\/0067490.jpg\" \/><\/td>\n<\/tr>\n<tr>\n<td class=\"c000000 t11\"><\/td>\n<\/tr>\n<\/table>\n<p><!-- Fin Foto --><\/td>\n<\/tr>\n<\/table>\n<div class=\"trebuchet t15 c000000\" id=\"texto\" style=\"font-size: 15px\">Las compa\u00c3\u00b1\u00c3\u00adas encargadas de brindar seguridad en las redes advierten que se pueden incremetar las actividades maliciosas. Seg\u00c3\u00ban indicaron, los ataques estar\u00c3\u00a1n apuntados principalmente a redes sociales, es decir, las que son compartidas por una gran cantidad de usuarios para descargar archivos gratuitos o multimedia.Cabe recordar que el 2006 fue calificado como el a\u00c3\u00b1o del crimen organizado en delitos como el robo de identidad, espionaje corporativo y extorsi\u00c3\u00b3n. Los expertos en inform\u00c3\u00a1tica tambi\u00c3\u00a9n confirmaron que se extienden los peque\u00c3\u00b1os ataques dirigidos y con alcance regional, y la obtenci\u00c3\u00b3n de dinero sigue siendo el principal objetivo de los ataques.Las estad\u00c3\u00adsticas indican que las amenazas basadas en Web crecieron alrededor de 15 por ciento desde finales de 2005.<\/p>\n<p>La lucha contra el spyware parece haber alcanzado una c\u00c3\u00baspide y algunos ejemplares de adware est\u00c3\u00a1n en la frontera de ser considerados malware, con la llegada del fraude en un clic. Los bots tambi\u00c3\u00a9n crecieron significativamente.<\/p>\n<p>Los troyanos de tipo bancario, es decir, dise\u00c3\u00b1ados para robar informaci\u00c3\u00b3n financiera, est\u00c3\u00a1n experimentando una r\u00c3\u00a1pida evoluci\u00c3\u00b3n en cuanto a las t\u00c3\u00a9cnicas empleadas para robar datos.<\/p>\n<p>Seg\u00c3\u00ban datos de PandaLabs, un 53,6% de los nuevos ejemplares de malware aparecidos en 2006 era de tipo troyano. Adem\u00c3\u00a1s, el 20% del total de troyanos detectados en 2006 por Panda ActiveScan, la soluci\u00c3\u00b3n antimalware online y gratuita, eran troyanos bancarios. De hecho, dentro de las diferentes categor\u00c3\u00adas de troyanos existentes, fue la m\u00c3\u00a1s detectada.<\/p>\n<p>La r\u00c3\u00a1pida evoluci\u00c3\u00b3n de los troyanos bancarios se debe en gran parte al empleo de medidas de seguridad por parte de las entidades financieras. Un ejemplo es el uso de \u00e2\u20ac\u0153teclados virtuales\u00e2\u20ac\u009d que se manejan con el puntero del rat\u00c3\u00b3n para evitar que los tradicionales keylogger puedan robar informaci\u00c3\u00b3n que se introduce a trav\u00c3\u00a9s del teclado.<\/p><\/div>\n<div class=\"trebuchet t15 c000000\" id=\"texto\" style=\"font-size: 15px\" \/>\n<div class=\"trebuchet t15 c000000\" id=\"texto\" style=\"font-size: 15px\">Fuente: <a href=\"http:\/\/www.infobae.com\/\">infobae<\/a><\/div>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p>Las compa\u00c3\u00b1\u00c3\u00adas encargadas de brindar seguridad en las redes advierten que se pueden incremetar las actividades maliciosas. Seg\u00c3\u00ban indicaron, los ataques estar\u00c3\u00a1n apuntados principalmente a redes sociales, es decir, las que son compartidas por una gran cantidad de usuarios para descargar archivos gratuitos o multimedia.Cabe recordar que el 2006 fue calificado como el a\u00c3\u00b1o del [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[3,4],"tags":[],"class_list":["post-129","post","type-post","status-publish","format-standard","hentry","category-articulos","category-noticias"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Navegar por internet ser\u00c3\u00a1 una verdadera odiseaAgregar a mis art\u00c3\u00adculos<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Navegar por internet ser\u00c3\u00a1 una verdadera odiseaAgregar a mis art\u00c3\u00adculos\",\"datePublished\":\"2007-04-05T21:27:19+00:00\",\"dateModified\":\"2007-04-05T21:31:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/\"},\"wordCount\":326,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.infobae.com\/imgs\/space.gif\",\"articleSection\":[\"Art\u00c3\u00adculos\",\"Noticias\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Navegar por internet ser\u00c3\u00a1 una verdadera odiseaAgregar a mis art\u00c3\u00adculos\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.infobae.com\/imgs\/space.gif\",\"datePublished\":\"2007-04-05T21:27:19+00:00\",\"dateModified\":\"2007-04-05T21:31:33+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#primaryimage\",\"url\":\"http:\/\/www.infobae.com\/imgs\/space.gif\",\"contentUrl\":\"http:\/\/www.infobae.com\/imgs\/space.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Navegar por internet ser\u00c3\u00a1 una verdadera odiseaAgregar a mis art\u00c3\u00adculos","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Navegar por internet ser\u00c3\u00a1 una verdadera odiseaAgregar a mis art\u00c3\u00adculos","datePublished":"2007-04-05T21:27:19+00:00","dateModified":"2007-04-05T21:31:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/"},"wordCount":326,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#primaryimage"},"thumbnailUrl":"http:\/\/www.infobae.com\/imgs\/space.gif","articleSection":["Art\u00c3\u00adculos","Noticias"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/","url":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Navegar por internet ser\u00c3\u00a1 una verdadera odiseaAgregar a mis art\u00c3\u00adculos","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#primaryimage"},"thumbnailUrl":"http:\/\/www.infobae.com\/imgs\/space.gif","datePublished":"2007-04-05T21:27:19+00:00","dateModified":"2007-04-05T21:31:33+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/navegar-por-internet-sera-una-verdadera-odiseaagregar-a-mis-articulos\/#primaryimage","url":"http:\/\/www.infobae.com\/imgs\/space.gif","contentUrl":"http:\/\/www.infobae.com\/imgs\/space.gif"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=129"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/129\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}