
{"id":33,"date":"2007-01-23T11:10:41","date_gmt":"2007-01-23T14:10:41","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=33"},"modified":"2007-01-23T11:10:41","modified_gmt":"2007-01-23T14:10:41","slug":"aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/","title":{"rendered":"Aparece un sofisticado \u00e2\u20ac\u02dckit para defraudadores\u00e2\u20ac\u2122 en la Red"},"content":{"rendered":"<div class=\"storycontent\"><strong>RSA, la divisi\u00c3\u00b3n de seguridad de la compa\u00c3\u00b1\u00c3\u00ada EMC, ha alertado sobre la aparici\u00c3\u00b3n de un sofisticado \u00e2\u20ac\u02dckit para el defraudador\u00e2\u20ac\u2122 por Internet que permite lanzar de manera sencilla ataques de \u00e2\u20ac\u02dcpishing\u00e2\u20ac\u2122, que permiten acceder a los datos bancarios de los clientes.<\/strong><\/p>\n<p>Este producto, seg\u00c3\u00ban precis\u00c3\u00b3 la empresa, se puede probar gratis a trav\u00c3\u00a9s de ciertos foros de Internet, y su precio final alcanza los 1.000 d\u00c3\u00b3lares (772 euros), lo que \u00e2\u20ac\u0153refleja las capacidades de la herramienta y lo convierte en realmente peligroso\u00e2\u20ac\u009d.<\/p>\n<p>RSA afirm\u00c3\u00b3 que se trata de un producto \u00e2\u20ac\u0153universal\u00e2\u20ac\u009d que permite \u00e2\u20ac\u0153f\u00c3\u00a1cilmente\u00e2\u20ac\u009d configurar ataques a objetivos concretos sin tener que dise\u00c3\u00b1ar un sistema concreto para cada entidad.<\/p>\n<p>El <strong>Universal Man-in-the-Middle Pishing Kit<\/strong>, que as\u00c3\u00ad se llama el producto, se pone en contacto en tiempo real con la p\u00c3\u00a1gina web leg\u00c3\u00adtima de cada entidad financiera, o con la de cualquier compa\u00c3\u00b1\u00c3\u00ada de comercio electr\u00c3\u00b3nico, de forma que el cliente interact\u00c3\u00baa con informaci\u00c3\u00b3n leg\u00c3\u00adtima sin percibir irregularidad alguna.<\/p>\n<p>Durante la visita de los usuarios a la p\u00c3\u00a1gina falsa, los estafadores no solo recogen la informaci\u00c3\u00b3n bancaria de cada cliente sino que procesan cualquier tipo de informaci\u00c3\u00b3n personal que haya sido registrada.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.jbex.net\/\">http:\/\/www.jbex.net\/<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>RSA, la divisi\u00c3\u00b3n de seguridad de la compa\u00c3\u00b1\u00c3\u00ada EMC, ha alertado sobre la aparici\u00c3\u00b3n de un sofisticado \u00e2\u20ac\u02dckit para el defraudador\u00e2\u20ac\u2122 por Internet que permite lanzar de manera sencilla ataques de \u00e2\u20ac\u02dcpishing\u00e2\u20ac\u2122, que permiten acceder a los datos bancarios de los clientes. Este producto, seg\u00c3\u00ban precis\u00c3\u00b3 la empresa, se puede probar gratis a trav\u00c3\u00a9s de [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-33","post","type-post","status-publish","format-standard","hentry","category-noticias"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Aparece un sofisticado \u00e2\u20ac\u02dckit para defraudadores\u00e2\u20ac\u2122 en la Red<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-\u2018kit-para-defraudadores\u2019-en-la-red\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Aparece un sofisticado \u00e2\u20ac\u02dckit para defraudadores\u00e2\u20ac\u2122 en la Red\",\"datePublished\":\"2007-01-23T14:10:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/\"},\"wordCount\":222,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Noticias\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Aparece un sofisticado \u00e2\u20ac\u02dckit para defraudadores\u00e2\u20ac\u2122 en la Red\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2007-01-23T14:10:41+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Aparece un sofisticado \u00e2\u20ac\u02dckit para defraudadores\u00e2\u20ac\u2122 en la Red","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-\u2018kit-para-defraudadores\u2019-en-la-red\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Aparece un sofisticado \u00e2\u20ac\u02dckit para defraudadores\u00e2\u20ac\u2122 en la Red","datePublished":"2007-01-23T14:10:41+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/"},"wordCount":222,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Noticias"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/","url":"https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Aparece un sofisticado \u00e2\u20ac\u02dckit para defraudadores\u00e2\u20ac\u2122 en la Red","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2007-01-23T14:10:41+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/aparece-un-sofisticado-%e2%80%98kit-para-defraudadores%e2%80%99-en-la-red\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/33","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=33"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/33\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=33"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=33"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=33"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}