
{"id":306,"date":"2008-01-08T07:07:33","date_gmt":"2008-01-08T10:07:33","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=306"},"modified":"2008-01-08T07:07:33","modified_gmt":"2008-01-08T10:07:33","slug":"los-codigos-de-barras-tienen-agujeros-de-seguridad","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/","title":{"rendered":"Los c\u00c3\u00b3digos de barras tienen agujeros de seguridad"},"content":{"rendered":"<p><img decoding=\"async\" border=\"1\" align=\"left\" src=\"http:\/\/www.diarioti.com\/sisimg\/16253b_codigobarras_120.jpg\" hspace=\"5\" \/><span class=\"titulo-head\">Seg\u00c3\u00ban investigaci\u00c3\u00b3n, los antiguos y generalizados c\u00c3\u00b3digos de barras tienen agujeros de seguridad que pueden ser aprovechados con fines delictivos, concluye investigaci\u00c3\u00b3n.<\/span>\u00c2\u00a0<span class=\"texto-detalle\"><br \/>\nA menudo, los delitos inform\u00c3\u00a1ticos son relacionados con usurpaci\u00c3\u00b3n de identidad, suplantaci\u00c3\u00b3n de instituciones financieras y robos de n\u00c3\u00bameros de tarjetas de cr\u00c3\u00a9dito. Sin embargo, tambi\u00c3\u00a9n es posible intervenir tecnolog\u00c3\u00adas m\u00c3\u00a1s anticuadas, como los conocidos c\u00c3\u00b3digos de barras negras.<\/span><\/p>\n<p><span class=\"texto-detalle\">En una conferencia de seguridad realizada en Berl\u00c3\u00adn, el denominado grupo Phenoelit present\u00c3\u00b3 diversos ejemplos que confirman que en muchos casos es posible copiar los c\u00c3\u00b3digos de barra originales, y alterarlos para obtener un beneficio econ\u00c3\u00b3mico. Los c\u00c3\u00b3digos de barra unidimensionales fueron inventados en la d\u00c3\u00a9cada de 1940, y los primeros lectores de c\u00c3\u00b3digos de barras fueron lanzados en la d\u00c3\u00a9cada de 1970. No sorprende entonces que sea posible alterar tales c\u00c3\u00b3digos. La tecnolog\u00c3\u00ada es usada en muchos lugares, especialmente en supermercados y estacionamientox. Por ejemplo, el grupo Phenoelit inform\u00c3\u00b3 sobre un centro de estacionamiento en Alemania donde era posible obtener estacionamiento gratuito debido a que el pago con c\u00c3\u00b3digo de barras no incorporaba un sistema de comprobaci\u00c3\u00b3n.<\/p>\n<p>Un sistema similar podr\u00c3\u00ada ser usado para alterar los precios en supermercados, con el fin de pagar por ellos un precio inferior al real.<\/p>\n<p>Los representantes del grupo Phenoelit declararon que su propia empresa hab\u00c3\u00ada sido v\u00c3\u00adctima de falsificaci\u00c3\u00b3n de c\u00c3\u00b3digos de barras. En efecto, la organizaci\u00c3\u00b3n emple\u00c3\u00b3 en una oportunidad c\u00c3\u00b3digos de barras en el billete de acceso, que pod\u00c3\u00ada ser canjeado por una bebida gratuita en la barra del sal\u00c3\u00b3n de eventos. Seg\u00c3\u00ban relataron, uno de los invitados sencillamente fotocopi\u00c3\u00b3 los c\u00c3\u00b3digos de barra e intent\u00c3\u00b3 canjearlo por un trago. La \u00c3\u00banica raz\u00c3\u00b3n de que no pudo hacerlo fue porque copi\u00c3\u00b3 la tarjeta de una persona que ya hab\u00c3\u00ada canjeado el cup\u00c3\u00b3n.<\/p>\n<p>Fuente: Cert &#8211; DiarioTi<\/p>\n<p><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seg\u00c3\u00ban investigaci\u00c3\u00b3n, los antiguos y generalizados c\u00c3\u00b3digos de barras tienen agujeros de seguridad que pueden ser aprovechados con fines delictivos, concluye investigaci\u00c3\u00b3n.\u00c2\u00a0 A menudo, los delitos inform\u00c3\u00a1ticos son relacionados con usurpaci\u00c3\u00b3n de identidad, suplantaci\u00c3\u00b3n de instituciones financieras y robos de n\u00c3\u00bameros de tarjetas de cr\u00c3\u00a9dito. Sin embargo, tambi\u00c3\u00a9n es posible intervenir tecnolog\u00c3\u00adas m\u00c3\u00a1s anticuadas, como [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-306","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Los c\u00c3\u00b3digos de barras tienen agujeros de seguridad<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Los c\u00c3\u00b3digos de barras tienen agujeros de seguridad\",\"datePublished\":\"2008-01-08T10:07:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/\"},\"wordCount\":342,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.diarioti.com\/sisimg\/16253b_codigobarras_120.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los c\u00c3\u00b3digos de barras tienen agujeros de seguridad\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.diarioti.com\/sisimg\/16253b_codigobarras_120.jpg\",\"datePublished\":\"2008-01-08T10:07:33+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/#primaryimage\",\"url\":\"http:\/\/www.diarioti.com\/sisimg\/16253b_codigobarras_120.jpg\",\"contentUrl\":\"http:\/\/www.diarioti.com\/sisimg\/16253b_codigobarras_120.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los c\u00c3\u00b3digos de barras tienen agujeros de seguridad","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Los c\u00c3\u00b3digos de barras tienen agujeros de seguridad","datePublished":"2008-01-08T10:07:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/"},"wordCount":342,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/#primaryimage"},"thumbnailUrl":"http:\/\/www.diarioti.com\/sisimg\/16253b_codigobarras_120.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/","url":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los c\u00c3\u00b3digos de barras tienen agujeros de seguridad","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/#primaryimage"},"thumbnailUrl":"http:\/\/www.diarioti.com\/sisimg\/16253b_codigobarras_120.jpg","datePublished":"2008-01-08T10:07:33+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/los-codigos-de-barras-tienen-agujeros-de-seguridad\/#primaryimage","url":"http:\/\/www.diarioti.com\/sisimg\/16253b_codigobarras_120.jpg","contentUrl":"http:\/\/www.diarioti.com\/sisimg\/16253b_codigobarras_120.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=306"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/306\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=306"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=306"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}