
{"id":2493,"date":"2014-08-01T08:39:58","date_gmt":"2014-08-01T11:39:58","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=2493"},"modified":"2014-08-01T08:39:58","modified_gmt":"2014-08-01T11:39:58","slug":"los-10-enganos-mas-difundidos-y-peligrosos-en-facebook","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/","title":{"rendered":"Los 10 enga\u00f1os m\u00e1s difundidos y peligrosos en Facebook"},"content":{"rendered":"<div style=\"color: #111111;\">Los enga\u00f1os que llegan al mail con ofertas y premios incre\u00edbles se mudaron hace a\u00f1os a\u00a0<a class=\"agrupador\" style=\"font-weight: inherit; font-style: inherit; color: #0a85d7;\" href=\"http:\/\/www.infobae.com\/facebook-a784\" rel=\"784\">Facebook<\/a>. Dise\u00f1ados para instalar alguna amenaza inform\u00e1tica y robar informaci\u00f3n personal, se valen de la ingenier\u00eda social, es decir, ofrecer algo pr\u00e1cticamente imposible de rechazar para los usuarios.<\/div>\n<div style=\"color: #111111;\"><\/div>\n<div style=\"color: #111111;\">Este a\u00f1o, de acuerdo con la firma de seguridad inform\u00e1tica\u00a0<a class=\"agrupador\" style=\"font-weight: inherit; font-style: inherit; color: #0a85d7;\" href=\"http:\/\/www.infobae.com\/bitdefender-a7011\" rel=\"7011\">Bitdefender<\/a>, un video sexual de Rihanna, develar qui\u00e9nes visitan el perfil del usuario y cambiar el color azul de Facebook son los principales enga\u00f1os que emplean los atacantes para atrapar a sus v\u00edctimas.<\/div>\n<div style=\"color: #111111;\"><\/div>\n<div style=\"color: #111111;\">No existe un video sexual de Rihanna y Facebook no revela esa informaci\u00f3n y menos permite cambiar el azul que lo caracteriza.<\/div>\n<div style=\"color: #111111;\"><\/div>\n<div style=\"color: #111111;\">Sin embargo, una sola de las apps dentro de Facebook que ofrece conocer qui\u00e9n visit\u00f3 un perfil se lleva el 30,2% de los links dentro del top ten de enga\u00f1os que detall\u00f3 Bitdefender, report\u00f3\u00a0<i style=\"font-weight: inherit;\"><a style=\"font-weight: inherit; font-style: inherit; color: #0a85d7;\" href=\"http:\/\/www.theguardian.com\/technology\/2014\/jul\/31\/rihanna-sex-tape-facebook-malware\" target=\"_new\">The Guardian<\/a><\/i>.<\/div>\n<div style=\"color: #111111;\"><\/div>\n<div style=\"color: #111111;\">En realidad, al clickear en los links para tratar de instalar esas &#8220;apps milagrosas&#8221;, los usuarios descargan en su computadora alg\u00fan tipo de\u00a0<a class=\"agrupador\" style=\"font-weight: inherit; font-style: inherit; color: #0a85d7;\" href=\"http:\/\/www.infobae.com\/malware-a2292\" rel=\"2292\">malware<\/a>.<\/div>\n<div style=\"color: #111111;\"><\/div>\n<div style=\"color: #111111;\">Ya instaladas por el usuario en su perfil de Facebook, las apps obtienen adem\u00e1s permiso para seguir esparci\u00e9ndose entre los contactos.<\/div>\n<div style=\"color: #111111;\"><\/div>\n<div style=\"color: #111111;\"><b style=\"font-style: inherit;\">El top ten de las amenazas<\/b><\/div>\n<div style=\"color: #111111;\">1- Total de visitas al perfil\/visitantes (30,2% de los links)<\/div>\n<div style=\"color: #111111;\">2- Cambia el color de tu Facebook (7,38%)<\/div>\n<div style=\"color: #111111;\">3- Video sexual de Rihanna con su novio (4,76%)<\/div>\n<div style=\"color: #111111;\">4- Mira mi Estado para ganar una remera de Facebook (4,21%)<\/div>\n<div style=\"color: #111111;\">5- Dile adi\u00f3s al Facebook azul (2,76%)<\/div>\n<div style=\"color: #111111;\">6- Productos sin vender gratuitos (2,41%)<\/div>\n<div style=\"color: #111111;\">7- Mira si un amigo te borr\u00f3 (2,27%)<\/div>\n<div style=\"color: #111111;\">8- Mira las 10 personas que m\u00e1s revisan tu perfil (1,74%)<\/div>\n<div style=\"color: #111111;\">9- Averigua qui\u00e9n revisa tu perfil (1,55%)<\/div>\n<div style=\"color: #111111;\">10- Acabo de cambiar el tema de mi Facebook (1,50%)<\/div>\n<div style=\"color: #111111;\"><\/div>\n<div style=\"color: #111111;\">Fuente:\u00a0<a href=\"http:\/\/www.infobae.com\/\">http:\/\/www.infobae.com\/<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Los enga\u00f1os que llegan al mail con ofertas y premios incre\u00edbles se mudaron hace a\u00f1os a\u00a0Facebook. Dise\u00f1ados para instalar alguna amenaza inform\u00e1tica y robar informaci\u00f3n personal, se valen de la ingenier\u00eda social, es decir, ofrecer algo pr\u00e1cticamente imposible de rechazar para los usuarios. Este a\u00f1o, de acuerdo con la firma de seguridad inform\u00e1tica\u00a0Bitdefender, un video [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-2493","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Los 10 enga\u00f1os m\u00e1s difundidos y peligrosos en Facebook<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Los 10 enga\u00f1os m\u00e1s difundidos y peligrosos en Facebook\",\"datePublished\":\"2014-08-01T11:39:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/\"},\"wordCount\":309,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los 10 enga\u00f1os m\u00e1s difundidos y peligrosos en Facebook\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2014-08-01T11:39:58+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los 10 enga\u00f1os m\u00e1s difundidos y peligrosos en Facebook","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Los 10 enga\u00f1os m\u00e1s difundidos y peligrosos en Facebook","datePublished":"2014-08-01T11:39:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/"},"wordCount":309,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/","url":"https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los 10 enga\u00f1os m\u00e1s difundidos y peligrosos en Facebook","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2014-08-01T11:39:58+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/los-10-enganos-mas-difundidos-y-peligrosos-en-facebook\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2493","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=2493"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2493\/revisions"}],"predecessor-version":[{"id":2494,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/2493\/revisions\/2494"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=2493"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=2493"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=2493"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}