
{"id":186,"date":"2007-05-19T18:20:17","date_gmt":"2007-05-19T21:20:17","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=186"},"modified":"2007-05-19T18:20:17","modified_gmt":"2007-05-19T21:20:17","slug":"expertos-advierten-contra-hotspots-falsos","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/","title":{"rendered":"Expertos advierten contra hotspots falsos"},"content":{"rendered":"<p><img decoding=\"async\" vspace=\"0\" hspace=\"5\" border=\"1\" align=\"left\" src=\"http:\/\/www.diarioti.com\/sisimg\/14241b_wifi_120.jpg\" \/> <span class=\"fecha-detalle\" \/><span class=\"titulo-head\"><\/p>\n<p>Expertos se\u00c3\u00b1alan que es f\u00c3\u00a1cil crear puntos de acceso inal\u00c3\u00a1mbrico de acceso a Internet con el fin de sustraer informaci\u00c3\u00b3n personal a los usuarios.<\/span> <span class=\"texto-detalle\"><\/p>\n<p>Diario Ti: Los ciberdelincuentes tienen predilecci\u00c3\u00b3n por inducir a los usuarios de Internet a entregarles informaci\u00c3\u00b3n confidencial personal, que posteriormente es usada en intentos de fraude inform\u00c3\u00a1tico. Una de las t\u00c3\u00a1cticas usadas por los delincuentes es crear &#8220;hotspots&#8221; falsos. Cuando el usuario se conecta, el intruso puede captar todas las informaciones aquel env\u00c3\u00ada a trav\u00c3\u00a9s de la red inal\u00c3\u00a1mbrica, incluyendo datos de inicio de sesiones, n\u00c3\u00bameros de tarjetas de cr\u00c3\u00a9dito y contrase\u00c3\u00b1as.<\/span><\/p>\n<p><span class=\"texto-detalle\">La compa\u00c3\u00b1\u00c3\u00ada de seguridad inform\u00c3\u00a1tica Watchcom escribe que &#8220;crear un punto de acceso f\u00c3\u00a1cil a Internet es muy f\u00c3\u00a1cil, y si se hace bien, es casi imposible de detectar&#8221;.<\/p>\n<p>Los puntos de acceso falsos son encontrados con mayor frecuencia en Estados Unidos, Portugal e Inglaterra. En Portugal, por ejemplo, se detect\u00c3\u00b3 una red inal\u00c3\u00a1mbrica donde se ped\u00c3\u00ada a los usuarios pagar por el acceso con su tarjeta de cr\u00c3\u00a9dito, de la forma en que suele hacerse en los hotspots leg\u00c3\u00adtimos. Sin embargo, los usuarios que entregaban los datos de sus tarjetas de cr\u00c3\u00a9dito eran posteriormente v\u00c3\u00adctimas de estafas, en que los delincuentes usaban la informaci\u00c3\u00b3n para comprar nuevos productos que eran cargados a la cuenta del usuario. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Expertos se\u00c3\u00b1alan que es f\u00c3\u00a1cil crear puntos de acceso inal\u00c3\u00a1mbrico de acceso a Internet con el fin de sustraer informaci\u00c3\u00b3n personal a los usuarios. Diario Ti: Los ciberdelincuentes tienen predilecci\u00c3\u00b3n por inducir a los usuarios de Internet a entregarles informaci\u00c3\u00b3n confidencial personal, que posteriormente es usada en intentos de fraude inform\u00c3\u00a1tico. Una de las t\u00c3\u00a1cticas [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,1],"tags":[],"class_list":["post-186","post","type-post","status-publish","format-standard","hentry","category-noticias","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Expertos advierten contra hotspots falsos<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Expertos advierten contra hotspots falsos\",\"datePublished\":\"2007-05-19T21:20:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/\"},\"wordCount\":243,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.diarioti.com\/sisimg\/14241b_wifi_120.jpg\",\"articleSection\":[\"Noticias\",\"Profesional\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Expertos advierten contra hotspots falsos\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.diarioti.com\/sisimg\/14241b_wifi_120.jpg\",\"datePublished\":\"2007-05-19T21:20:17+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#primaryimage\",\"url\":\"http:\/\/www.diarioti.com\/sisimg\/14241b_wifi_120.jpg\",\"contentUrl\":\"http:\/\/www.diarioti.com\/sisimg\/14241b_wifi_120.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Expertos advierten contra hotspots falsos","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Expertos advierten contra hotspots falsos","datePublished":"2007-05-19T21:20:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/"},"wordCount":243,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#primaryimage"},"thumbnailUrl":"http:\/\/www.diarioti.com\/sisimg\/14241b_wifi_120.jpg","articleSection":["Noticias","Profesional"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/","url":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Expertos advierten contra hotspots falsos","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#primaryimage"},"thumbnailUrl":"http:\/\/www.diarioti.com\/sisimg\/14241b_wifi_120.jpg","datePublished":"2007-05-19T21:20:17+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/expertos-advierten-contra-hotspots-falsos\/#primaryimage","url":"http:\/\/www.diarioti.com\/sisimg\/14241b_wifi_120.jpg","contentUrl":"http:\/\/www.diarioti.com\/sisimg\/14241b_wifi_120.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=186"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/186\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}