
{"id":1423,"date":"2011-06-28T08:23:31","date_gmt":"2011-06-28T11:23:31","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1423"},"modified":"2011-06-28T08:23:31","modified_gmt":"2011-06-28T11:23:31","slug":"wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/","title":{"rendered":"Wi-Fi (Wi-phishing): robo de informaci\u00f3n v\u00eda redes inal\u00e1mbricas"},"content":{"rendered":"<p>Seg\u00fan un estudio publicado por Norton, el <a href=\"http:\/\/us.norton.com\/products\/library\/article.jsp?aid=secure_public_hotspot#wiphishing\">Wi-phishing (o Evil Twin)<\/a>,  sustracci\u00f3n de datos personales a trav\u00e9s de falsas redes p\u00fablicas de  acceso Wi-Fi, se convierte en una especial amenaza en verano, dado que  aumentan las conexiones desde hoteles y establecimientos p\u00fablicos.<\/p>\n<p>Las redes inal\u00e1mbricas p\u00fablicas, que nos encontramos en hoteles,  aeropuertos, cafeter\u00edas, restaurantes e incluso aparcamientos nos  permiten estar conectados mientras viajamos en verano, pero tambi\u00e9n trae  consigo m\u00e1s riesgo de ser v\u00edctimas de un ataque de Wi-phishing, de  acuerdo a un informe publicado por Norton.<\/p>\n<p>Las redes WiFi p\u00fablicas son redes inal\u00e1mbricas establecidas para ofrecer  acceso compartido a Internet a m\u00faltiples usuarios, por lo que cualquier  persona con un dispositivo inal\u00e1mbrico dentro del alcance del punto de  acceso del dispositivo puede conectarse a la red y utilizar Internet.  Los propietarios de los establecimientos facilitan as\u00ed el uso de  Internet a sus clientes, pero para minimizar los requisitos de acceso y  para evitar problemas de compatibilidad entre dispositivos y sistemas  operativos, suelen inhabilitar gran parte de las funciones de seguridad  en sus dispositivos y, por ello, los mensajes de texto privados,  confidenciales y personales se transmiten sin protecci\u00f3n ni codificaci\u00f3n  alguna a trav\u00e9s de la Web.<\/p>\n<p>Esto permite a los hackers capturar las contrase\u00f1as y los n\u00fameros de las  tarjetas de cr\u00e9dito e incluso las comunicaciones que pudieran estar  cifradas, mediante lo que se conoce como Wi-phishing. Frente al  Wi-phishing los ciberdelincuentes pueden acceder a trav\u00e9s de las redes  inal\u00e1mbricas a nuestra informaci\u00f3n confidencial gracias a la creaci\u00f3n de  un punto de acceso inal\u00e1mbrico falso al que nos podemos conectar sin  saber quien es el propietario real de la red, ya que suelen ser nombres  muy parecidos al del hotel o restaurante donde se encuentra la v\u00edctima.  Al intentar acceder a la red ficticia, se nos solicita un n\u00famero de  tarjeta de cr\u00e9dito y cierta informaci\u00f3n personal para poder conectarnos a  Internet.<\/p>\n<p>En cuanto a los tel\u00e9fonos m\u00f3viles, los virus elaborados para este tipo  de sistemas operativos, especialmente para smartphones o agendas  electr\u00f3nicas, ya se est\u00e1n utilizando aunque todav\u00eda no sean muy  habituales. Las actividades de phishing mediante mensajes de texto ya  representan un gran problema. Pero Norton alerta de que el mayor peligro  para nuestra informaci\u00f3n alojada en los dispositivos m\u00f3viles no es m\u00e1s  que la p\u00e9rdida f\u00edsica o el robo, dos fen\u00f3menos muy habituales en fechas  veraniegas, como las que est\u00e1n a punto de llegar.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.csospain.es\/El-robo-de-informacion-via-redes-Wi-Fi-%28Wi-phishing%29-aumenta\/seccion-actualidad\/noticia-111167\">CSO Espa\u00f1a<\/a><\/p>\n<p>Visto en :<a href=\"http:\/\/blog.segu-info.com.ar\/\"> Segu-Info<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seg\u00fan un estudio publicado por Norton, el Wi-phishing (o Evil Twin), sustracci\u00f3n de datos personales a trav\u00e9s de falsas redes p\u00fablicas de acceso Wi-Fi, se convierte en una especial amenaza en verano, dado que aumentan las conexiones desde hoteles y establecimientos p\u00fablicos. Las redes inal\u00e1mbricas p\u00fablicas, que nos encontramos en hoteles, aeropuertos, cafeter\u00edas, restaurantes e [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1423","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Wi-Fi (Wi-phishing): robo de informaci\u00f3n v\u00eda redes inal\u00e1mbricas<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Wi-Fi (Wi-phishing): robo de informaci\u00f3n v\u00eda redes inal\u00e1mbricas\",\"datePublished\":\"2011-06-28T11:23:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/\"},\"wordCount\":458,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Wi-Fi (Wi-phishing): robo de informaci\u00f3n v\u00eda redes inal\u00e1mbricas\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2011-06-28T11:23:31+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Wi-Fi (Wi-phishing): robo de informaci\u00f3n v\u00eda redes inal\u00e1mbricas","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Wi-Fi (Wi-phishing): robo de informaci\u00f3n v\u00eda redes inal\u00e1mbricas","datePublished":"2011-06-28T11:23:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/"},"wordCount":458,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/","url":"https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Wi-Fi (Wi-phishing): robo de informaci\u00f3n v\u00eda redes inal\u00e1mbricas","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2011-06-28T11:23:31+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/wi-fi-wi-phishing-robo-de-informacion-via-redes-inalambricas\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1423"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1423\/revisions"}],"predecessor-version":[{"id":1424,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1423\/revisions\/1424"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1423"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}