
{"id":1319,"date":"2011-04-19T15:44:48","date_gmt":"2011-04-19T18:44:48","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1319"},"modified":"2011-04-19T15:44:48","modified_gmt":"2011-04-19T18:44:48","slug":"4-nuevas-amenazas-por-segundo","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/","title":{"rendered":"4 nuevas amenazas por segundo"},"content":{"rendered":"<div>\n<div id=\"_mcePaste\">Seg\u00fan un estudio de la empresa <strong>Trend Micro<\/strong>, se lanzan <strong>4 <\/strong>amenazas  inform\u00e1ticas por segundo. En relaci\u00f3n con esto, los especialistas de  Trend Micro advierten que una de las t\u00e1cticas que podr\u00edan emplear los  ciberdelincuentes podr\u00eda consistir en dar un nuevo giro a la ingenier\u00eda  social a trav\u00e9s de campa\u00f1as de malware m\u00e1s inteligentes: dirigidas a  targets espec\u00edficos mediante correos electr\u00f3nicos que contengan malware o  links a p\u00e1ginas maliciosas de redes sociales.<\/div>\n<div id=\"_mcePaste\">Seg\u00fan el informe, las predicciones para este 2011 en lo que a amenazas refiere son las siguientes:<\/div>\n<div id=\"_mcePaste\">*Aumentar\u00e1n las demandas de seguridad de los proveedores de servicios de Internet.<\/div>\n<div id=\"_mcePaste\">*M\u00e1s ataques orientados y espionaje cibern\u00e9tico. El  espionaje cibern\u00e9tico se orientar\u00e1 a las empresas de tama\u00f1o mediano; el  ataque a grandes firmas se mantendr\u00e1.<\/div>\n<div id=\"_mcePaste\">*Mayor consolidaci\u00f3n de la ciberdelincuencia  clandestina. *Campa\u00f1as de malware m\u00e1s inteligentes. Las campa\u00f1as de  malware se asegurar\u00e1n de propagarse con rapidez y fiabilidad. Este, por  su parte, descargar\u00e1 c\u00f3digos binarios generados aleatoriamente para  evitar la detecci\u00f3n.<\/div>\n<div id=\"_mcePaste\">*Evoluci\u00f3n de los ataques de malware. Aumentar\u00e1 el  uso de certificados digitales robados o leg\u00edtimos en los ataques de  malware para evitar la detecci\u00f3n.<\/div>\n<div id=\"_mcePaste\">*Evoluci\u00f3n en el uso de las vulnerabilidades y las explotaciones.<\/div>\n<div id=\"_mcePaste\">*Orientaci\u00f3n a las marcas de los proveedores de  seguridad. Los delincuentes que deseen causar confusi\u00f3n e inseguridad  entre los usuarios, orientar\u00e1n los ataques cada vez m\u00e1s a las marcas de  los proveedores de seguridad.<\/div>\n<div id=\"_mcePaste\">*M\u00e1s ataques a dispositivos m\u00f3viles.<\/div>\n<div id=\"_mcePaste\">*Infecciones de malware antiguo. Algunos proveedores  de seguridad tendr\u00e1n problemas con las firmas locales, ya que no podr\u00e1n  almacenar toda la informaci\u00f3n de amenazas. Ello les llevar\u00e1 a retirar  firmas antiguas, lo cual provocar\u00e1 infecciones de malware antiguo u  obsoleto.<\/div>\n<div id=\"_mcePaste\">*Sistemas heredados vulnerables. Se producir\u00e1n  ataques orientados en sistemas heredados en los que no se pueden  utilizar parches pero que son de uso extendido como Windows 2000\/Windows  XP SP2.<\/div>\n<\/div>\n<div><\/div>\n<div>Fuente: <a href=\"http:\/\/www.redusers.com\/\">RedUser<\/a>s<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Seg\u00fan un estudio de la empresa Trend Micro, se lanzan 4 amenazas inform\u00e1ticas por segundo. En relaci\u00f3n con esto, los especialistas de Trend Micro advierten que una de las t\u00e1cticas que podr\u00edan emplear los ciberdelincuentes podr\u00eda consistir en dar un nuevo giro a la ingenier\u00eda social a trav\u00e9s de campa\u00f1as de malware m\u00e1s inteligentes: dirigidas [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1319","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - 4 nuevas amenazas por segundo<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"4 nuevas amenazas por segundo\",\"datePublished\":\"2011-04-19T18:44:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/\"},\"wordCount\":347,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - 4 nuevas amenazas por segundo\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2011-04-19T18:44:48+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - 4 nuevas amenazas por segundo","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"4 nuevas amenazas por segundo","datePublished":"2011-04-19T18:44:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/"},"wordCount":347,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/","url":"https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - 4 nuevas amenazas por segundo","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2011-04-19T18:44:48+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/4-nuevas-amenazas-por-segundo\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1319"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1319\/revisions"}],"predecessor-version":[{"id":1320,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1319\/revisions\/1320"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}