
{"id":284,"date":"2007-11-28T21:19:56","date_gmt":"2007-11-29T00:19:56","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=284"},"modified":"2007-11-28T21:19:56","modified_gmt":"2007-11-29T00:19:56","slug":"troyanos-son-el-codigo-malicioso-de-uso-mas-popular","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/","title":{"rendered":"Troyanos son el c\u00c3\u00b3digo malicioso de uso m\u00c3\u00a1s popular"},"content":{"rendered":"<p><img decoding=\"async\" hspace=\"5\" src=\"http:\/\/www.diarioti.com\/sisimg\/15934b_ibm.gif\" align=\"left\" border=\"1\" \/>\u00c2\u00a0<span class=\"titulo-head\"><\/p>\n<p>El equipo de IBM X-Force para investigaci\u00c3\u00b3n y desarrollo de ISS ha identificado y analizado m\u00c3\u00a1s de 210 mil nuevas muestras de c\u00c3\u00b3digos maliciosos, excediendo el n\u00c3\u00bamero total de muestras de malware observados en la totalidad de 2006.<\/span> <span class=\"texto-detalle\"><\/p>\n<p>Diario Ti: De acuerdo con el informe, los troyanos abarcan la m\u00c3\u00a1s voluminosa categor\u00c3\u00ada de malware en 2007, representando un 28%, en contraste con 2006, cuando la m\u00c3\u00a1s com\u00c3\u00ban categor\u00c3\u00ada era la de downloaders.<\/span><\/p>\n<p><span class=\"texto-detalle\">El uso de explotaci\u00c3\u00b3n por ofuscaci\u00c3\u00b3n contin\u00c3\u00baa en alza en 2007, en una tentativa por dificultar la detecci\u00c3\u00b3n de intrusiones basadas en firma y productos de prevenci\u00c3\u00b3n para detectar ataques. En 2006, X-Force report\u00c3\u00b3 que aproximadamente el 50% del material de los hostings de sitios web estaba dise\u00c3\u00b1ado para infectar navegadores, los cuales eran ofuscados o \u00e2\u20ac\u0153camuflaban&#8221; sus ataques. En la primera mitad de 2007, ese n\u00c3\u00bamero ha alcanzado el 80%.<\/p>\n<p>Considerando tendencias hist\u00c3\u00b3ricas, X-Force reporta un leve descenso en el n\u00c3\u00bamero total de vulnerabilidades descubiertas en la primera mitad de 2007 versus la primera mitad de 2006. Un total de 3.273 vulnerabilidades fueron identificadas en la primera mitad de este a\u00c3\u00b1o, marcando un descenso de 3,3% comparado con igual per\u00c3\u00adodo de 2006.<\/p>\n<p>Esta es la primera vez en la historia que el n\u00c3\u00bamero de acceso a esas vulnerabilidades ha descendido en la primera mitad del a\u00c3\u00b1o de acuerdo a los registros de X-Force, que fueron creados en 1997. Como siempre, el porcentaje de vulnerabilidades de alto impacto se ha elevado desde 2006 de un 16% a un 21% en la primera mitad de 2007.<\/span><\/p>\n<p><span class=\"texto-detalle\">Fuente: <a href=\"http:\/\/www.diarioti.com\/\">http:\/\/www.diarioti.com\/<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00c2\u00a0 El equipo de IBM X-Force para investigaci\u00c3\u00b3n y desarrollo de ISS ha identificado y analizado m\u00c3\u00a1s de 210 mil nuevas muestras de c\u00c3\u00b3digos maliciosos, excediendo el n\u00c3\u00bamero total de muestras de malware observados en la totalidad de 2006. Diario Ti: De acuerdo con el informe, los troyanos abarcan la m\u00c3\u00a1s voluminosa categor\u00c3\u00ada de malware [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-284","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Troyanos son el c\u00c3\u00b3digo malicioso de uso m\u00c3\u00a1s popular<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Troyanos son el c\u00c3\u00b3digo malicioso de uso m\u00c3\u00a1s popular\",\"datePublished\":\"2007-11-29T00:19:56+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/\"},\"wordCount\":275,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.diarioti.com\/sisimg\/15934b_ibm.gif\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Troyanos son el c\u00c3\u00b3digo malicioso de uso m\u00c3\u00a1s popular\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.diarioti.com\/sisimg\/15934b_ibm.gif\",\"datePublished\":\"2007-11-29T00:19:56+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/#primaryimage\",\"url\":\"http:\/\/www.diarioti.com\/sisimg\/15934b_ibm.gif\",\"contentUrl\":\"http:\/\/www.diarioti.com\/sisimg\/15934b_ibm.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Troyanos son el c\u00c3\u00b3digo malicioso de uso m\u00c3\u00a1s popular","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Troyanos son el c\u00c3\u00b3digo malicioso de uso m\u00c3\u00a1s popular","datePublished":"2007-11-29T00:19:56+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/"},"wordCount":275,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/#primaryimage"},"thumbnailUrl":"http:\/\/www.diarioti.com\/sisimg\/15934b_ibm.gif","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/","url":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Troyanos son el c\u00c3\u00b3digo malicioso de uso m\u00c3\u00a1s popular","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/#primaryimage"},"thumbnailUrl":"http:\/\/www.diarioti.com\/sisimg\/15934b_ibm.gif","datePublished":"2007-11-29T00:19:56+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/troyanos-son-el-codigo-malicioso-de-uso-mas-popular\/#primaryimage","url":"http:\/\/www.diarioti.com\/sisimg\/15934b_ibm.gif","contentUrl":"http:\/\/www.diarioti.com\/sisimg\/15934b_ibm.gif"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/284","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=284"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/284\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=284"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=284"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=284"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}