
{"id":1452,"date":"2011-07-19T11:01:25","date_gmt":"2011-07-19T14:01:25","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1452"},"modified":"2011-07-19T11:01:25","modified_gmt":"2011-07-19T14:01:25","slug":"nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/","title":{"rendered":"Nueva caracter\u00edstica de Hotmail para luchar contra cuentas robadas"},"content":{"rendered":"<div>Si Gmail <a href=\"http:\/\/mail.google.com\/support\/bin\/answer.py?hl=es&amp;ctx=mail&amp;answer=1311182\">hace poco<\/a> introduc\u00eda medidas para luchar contra la suplantaci\u00f3n de direcciones de email, ahora Microsoft <a href=\"http:\/\/windowsteamblog.com\/windows_live\/b\/windowslive\/archive\/2011\/07\/14\/hey-my-friend-s-account-was-hacked.aspx\">ha anunciado<\/a> una nueva funci\u00f3n muy curiosa para usuarios de Hotmail que deber\u00eda ayudar a luchar contra spammers y fraudes v\u00eda email.<\/div>\n<div>Seguro que todos hemos recibido alguna vez un email de un amigo que no ten\u00edamos muy claro si era ver\u00eddico o, por el contrario, hab\u00eda sido enviado por alguien que ha obtenido el control sobre su cuenta.<\/div>\n<div>En muchas ocasiones ocurre lo segundo, bien porque usaba una contrase\u00f1a d\u00e9bil, bien porque usaba la misma contrase\u00f1a en m\u00faltiples servicios y han comprometido su cuenta en alguno de ellos, o bien porque no le importaba mucho la seguridad de su ordenador.<\/div>\n<div>Por ejemplo, fue sonado un caso de hace unos a\u00f1os, cuando una cuenta de Hotmail de Jack Straw, pol\u00edtico del Reino Unido, <a href=\"http:\/\/nakedsecurity.sophos.com\/2009\/02\/24\/nigerian-scammers-hack-jack-straws-email-account\/\">fue comprometida y envi\u00f3 cientos de emails<\/a> intentando enga\u00f1ar a sus contactos.<\/div>\n<div>La nueva caracter\u00edstica de Hotmail est\u00e1 dise\u00f1ada para hacer m\u00e1s r\u00e1pida y f\u00e1cil la restauraci\u00f3n de la cuenta para su due\u00f1o.<\/div>\n<div>Cuando un usuario reciba un email de un contacto que indique que la cuenta ha sido comprometida, podr\u00e1 <strong>reportar directamente a Hotmail<\/strong> que la cuenta de su contacto ha sido pirateada.<\/div>\n<p>&nbsp;<\/p>\n<div><a href=\"http:\/\/4.bp.blogspot.com\/-r5lUPopSkkE\/TiNo1dlng_I\/AAAAAAAAA_0\/YFSlNaRu47Q\/s1600\/piratearon_la_cuenta_de_mi_amigo.png\"><img decoding=\"async\" src=\"http:\/\/4.bp.blogspot.com\/-r5lUPopSkkE\/TiNo1dlng_I\/AAAAAAAAA_0\/YFSlNaRu47Q\/s1600\/piratearon_la_cuenta_de_mi_amigo.png\" alt=\"\" border=\"0\" \/><\/a><\/div>\n<p>&nbsp;<\/p>\n<div>Adem\u00e1s, si se marca un mensaje como basura, tambi\u00e9n permite reportar que la cuenta parece haber sido comprometida.<\/div>\n<p>&nbsp;<\/p>\n<div><a href=\"http:\/\/2.bp.blogspot.com\/-zpxw_BUl5kM\/TiNpDbWh82I\/AAAAAAAAA_4\/42b0FqoEFdk\/s1600\/3250.clip_image002_2DD4D8DF.png\"><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/2.bp.blogspot.com\/-zpxw_BUl5kM\/TiNpDbWh82I\/AAAAAAAAA_4\/42b0FqoEFdk\/s320\/3250.clip_image002_2DD4D8DF.png\" alt=\"\" width=\"320\" height=\"133\" border=\"0\" \/><\/a><\/div>\n<p>&nbsp;<\/p>\n<div>Con esta acci\u00f3n, se avisa a Hotmail de que tiene que tomar acciones sobre esa cuenta, al menos para determinar si ha sido comprometida, y en este caso tomar medidas.<\/div>\n<div>Puede pasar que el email llegue desde otro servicio como Gmail o Yahoo!, en ese caso Hotmail promete que enviar\u00e1 el aviso al otro proveedor.<\/div>\n<div>Todo \u00e9sto se combina con el sistema de detecci\u00f3n que tiene Microsoft aparte, y que intenta detectar comportamientos extra\u00f1os en las cuentas. Esta informaci\u00f3n y el reporte se combinan para verificar que, efectivamente, el reporte es ver\u00eddico. La acci\u00f3n de los usuarios puede ser importante ya que pueden dar una respuesta m\u00e1s r\u00e1pida que el sistema autom\u00e1tico.<\/div>\n<div>Seg\u00fan Microsoft la funcionalidad lleva habilitada s\u00f3lo durante unas pocas semanas, y ya ha ayudado a identificar y recuperar cientas de cuentas comprometidas.<\/div>\n<div>Adem\u00e1s de curiosa, parece una buena idea, siempre que Hotmail tome las medidas adecuadas sobre la cuenta, y siempre verificando que la intrusi\u00f3n se ha realizado y tus amigos no te est\u00e1n gastando una peque\u00f1a &#8220;broma&#8221;.<\/div>\n<div>Fuente: <a href=\"http:\/\/www.securitybydefault.com\/\">Security By Default<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Si Gmail hace poco introduc\u00eda medidas para luchar contra la suplantaci\u00f3n de direcciones de email, ahora Microsoft ha anunciado una nueva funci\u00f3n muy curiosa para usuarios de Hotmail que deber\u00eda ayudar a luchar contra spammers y fraudes v\u00eda email. Seguro que todos hemos recibido alguna vez un email de un amigo que no ten\u00edamos muy [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1452","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Nueva caracter\u00edstica de Hotmail para luchar contra cuentas robadas<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Nueva caracter\u00edstica de Hotmail para luchar contra cuentas robadas\",\"datePublished\":\"2011-07-19T14:01:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/\"},\"wordCount\":450,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/4.bp.blogspot.com\/-r5lUPopSkkE\/TiNo1dlng_I\/AAAAAAAAA_0\/YFSlNaRu47Q\/s1600\/piratearon_la_cuenta_de_mi_amigo.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Nueva caracter\u00edstica de Hotmail para luchar contra cuentas robadas\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/4.bp.blogspot.com\/-r5lUPopSkkE\/TiNo1dlng_I\/AAAAAAAAA_0\/YFSlNaRu47Q\/s1600\/piratearon_la_cuenta_de_mi_amigo.png\",\"datePublished\":\"2011-07-19T14:01:25+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/#primaryimage\",\"url\":\"http:\/\/4.bp.blogspot.com\/-r5lUPopSkkE\/TiNo1dlng_I\/AAAAAAAAA_0\/YFSlNaRu47Q\/s1600\/piratearon_la_cuenta_de_mi_amigo.png\",\"contentUrl\":\"http:\/\/4.bp.blogspot.com\/-r5lUPopSkkE\/TiNo1dlng_I\/AAAAAAAAA_0\/YFSlNaRu47Q\/s1600\/piratearon_la_cuenta_de_mi_amigo.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Nueva caracter\u00edstica de Hotmail para luchar contra cuentas robadas","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Nueva caracter\u00edstica de Hotmail para luchar contra cuentas robadas","datePublished":"2011-07-19T14:01:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/"},"wordCount":450,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/#primaryimage"},"thumbnailUrl":"http:\/\/4.bp.blogspot.com\/-r5lUPopSkkE\/TiNo1dlng_I\/AAAAAAAAA_0\/YFSlNaRu47Q\/s1600\/piratearon_la_cuenta_de_mi_amigo.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/","url":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Nueva caracter\u00edstica de Hotmail para luchar contra cuentas robadas","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/#primaryimage"},"thumbnailUrl":"http:\/\/4.bp.blogspot.com\/-r5lUPopSkkE\/TiNo1dlng_I\/AAAAAAAAA_0\/YFSlNaRu47Q\/s1600\/piratearon_la_cuenta_de_mi_amigo.png","datePublished":"2011-07-19T14:01:25+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/nueva-caracteristica-de-hotmail-para-luchar-contra-cuentas-robadas\/#primaryimage","url":"http:\/\/4.bp.blogspot.com\/-r5lUPopSkkE\/TiNo1dlng_I\/AAAAAAAAA_0\/YFSlNaRu47Q\/s1600\/piratearon_la_cuenta_de_mi_amigo.png","contentUrl":"http:\/\/4.bp.blogspot.com\/-r5lUPopSkkE\/TiNo1dlng_I\/AAAAAAAAA_0\/YFSlNaRu47Q\/s1600\/piratearon_la_cuenta_de_mi_amigo.png"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1452","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1452"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1452\/revisions"}],"predecessor-version":[{"id":1453,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1452\/revisions\/1453"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1452"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1452"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1452"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}