
{"id":1305,"date":"2011-04-06T12:52:06","date_gmt":"2011-04-06T15:52:06","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1305"},"modified":"2011-04-06T12:52:06","modified_gmt":"2011-04-06T15:52:06","slug":"tu-informacion-al-mejor-postor","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/","title":{"rendered":"Tu informaci\u00f3n al mejor postor"},"content":{"rendered":"<p>Facebook a\u00fan tiene fallas de seguridad<\/p>\n<table border=\"0\" cellspacing=\"0\" cellpadding=\"0\" align=\"right\">\n<tbody>\n<tr>\n<td width=\"10\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/u.univision.com\/images\/spacer.gif\" alt=\"\" width=\"10\" height=\"10\" \/><\/td>\n<td width=\"250\" align=\"right\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/u.univision.com\/contentroot\/uol\/art\/images\/especial\/portada\/tecnologia\/computadoras\/110401_facesec_03.jpg\" alt=\"\" width=\"250\" height=\"190\" \/><br \/>\nGetty Images<br \/>\nMark Zuckerberg no se ha destacado por respetar mucho la privacidad y seguridad.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00bfConf\u00edas en la seguridad de Facebook?, de ser as\u00ed tal vez seas parte del 70% de los usuarios de la red social que no saben que pueden ser infectados por alg\u00fan virus inform\u00e1tico, esto lo revel\u00f3 un estudio recientemente publicado por una empresa de seguridad inform\u00e1tica (BitDefender).<\/p>\n<p>Facebook no es tan seguro como todos piensan y muy  a pesar de sus &#8220;medidas de seguridad&#8221; hay aplicaciones que podr\u00edan  vender tu informaci\u00f3n o tu identidad.<br \/>\nAplicaciones famosas como  &#8220;descubre qui\u00e9n te elimin\u00f3 de Facebook&#8221; es una de las miles que abundan  en la p\u00e1gina azul, que resulta un fraude al contar con miles de formas  de robar tu informaci\u00f3n.<\/p>\n<p>Esto sucede al momento que das click en  &#8220;permitir&#8221; a alguna de las apps que se ubican en el marketplace, mandan  tu informaci\u00f3n a varios receptores, quienes vender\u00e1n dicho contenido al  mejor postor, obteniendo as\u00ed ganancias enormes.<br \/>\nEstas aplicaciones te llevan a mensajes de promociones, que robar\u00e1n tu  identidad con tal de facilitarle la informaci\u00f3n de tu tarjeta de  cr\u00e9dito; algo alarmante es el hecho de que cas\u00ed el 93% de los  participantes en el estudio dijeron que no era necesario disponer de un  software de seguridad para protegerse de los ataques que aguardan en  Facebook. Por lo cual te recomendamos que cuentes con un antivirus  actualizado.<\/p>\n<p>Con estos datos, es muy probable que ya hayas  eliminado esa aplicaci\u00f3n de tu lista, sin embargo advi\u00e9rteles a tus  amigos y conocidos del riesgo que corren al tener una app como esa.<\/p>\n<p>Fuente: Univision.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facebook a\u00fan tiene fallas de seguridad Getty Images Mark Zuckerberg no se ha destacado por respetar mucho la privacidad y seguridad. \u00bfConf\u00edas en la seguridad de Facebook?, de ser as\u00ed tal vez seas parte del 70% de los usuarios de la red social que no saben que pueden ser infectados por alg\u00fan virus inform\u00e1tico, esto [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1305","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Tu informaci\u00f3n al mejor postor<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Tu informaci\u00f3n al mejor postor\",\"datePublished\":\"2011-04-06T15:52:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/\"},\"wordCount\":293,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/u.univision.com\/images\/spacer.gif\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Tu informaci\u00f3n al mejor postor\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/u.univision.com\/images\/spacer.gif\",\"datePublished\":\"2011-04-06T15:52:06+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/#primaryimage\",\"url\":\"http:\/\/u.univision.com\/images\/spacer.gif\",\"contentUrl\":\"http:\/\/u.univision.com\/images\/spacer.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Tu informaci\u00f3n al mejor postor","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Tu informaci\u00f3n al mejor postor","datePublished":"2011-04-06T15:52:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/"},"wordCount":293,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/#primaryimage"},"thumbnailUrl":"http:\/\/u.univision.com\/images\/spacer.gif","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/","url":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Tu informaci\u00f3n al mejor postor","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/#primaryimage"},"thumbnailUrl":"http:\/\/u.univision.com\/images\/spacer.gif","datePublished":"2011-04-06T15:52:06+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/tu-informacion-al-mejor-postor\/#primaryimage","url":"http:\/\/u.univision.com\/images\/spacer.gif","contentUrl":"http:\/\/u.univision.com\/images\/spacer.gif"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1305"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1305\/revisions"}],"predecessor-version":[{"id":1306,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1305\/revisions\/1306"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}