
{"id":361,"date":"2008-07-24T08:16:07","date_gmt":"2008-07-24T11:16:07","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=361"},"modified":"2008-07-24T08:16:07","modified_gmt":"2008-07-24T11:16:07","slug":"redes-sociales-y-sms-propagan-spam","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/","title":{"rendered":"Redes sociales y SMS propagan spam"},"content":{"rendered":"<p>Sophos ha publicado su \u00c3\u00baltimo informe sobre las tendencias de spam. La investigaci\u00c3\u00b3n ha revelado un preocupante incremento de correos electr\u00c3\u00b3nicos que viajan a trav\u00c3\u00a9s de Internet entre Abril \u00e2\u20ac\u201c Junio de 2008, y c\u00c3\u00b3mo los spammers est\u00c3\u00a1n ahora utilizando Facebook y tel\u00c3\u00a9fonos m\u00c3\u00b3viles para extender sus mensajes.<br \/>\nEn junio de 2008, el estudio demuestra que el nivel de correos basura se ha elevado hasta un 96,5% en mensajes corporativos, frente al 92,3% registrado durante el primer trimestre del a\u00c3\u00b1o, lo que supone que las empresas se enfrentan al hecho de que tan s\u00c3\u00b3lo 1 correo de 28, es leg\u00c3\u00adtimo.<\/p>\n<p>\u00e2\u20ac\u0153Si su compa\u00c3\u00b1\u00c3\u00ada est\u00c3\u00a1 presente en Internet, va a ser dif\u00c3\u00adcil hacer negocio a menos que se tenga una soluci\u00c3\u00b3n anti-spam eficaz en la empresa. De otro modo, la cantidad de basura por correo afectar\u00c3\u00a1 a la comunicaci\u00c3\u00b3n leg\u00c3\u00adtima con sus clientes y proveedores&#8221;, afirma Graham Cluley, Consultor de Tecnolog\u00c3\u00ada de Sophos. \u00e2\u20ac\u0153Deber\u00c3\u00ada recordarse que el bombardeo publicitario no s\u00c3\u00b3lo es molesto, sino que tambi\u00c3\u00a9n puede ser malicioso, tratando de que el usuario abra un archivo adjunto infectado con un Troyano o llevarle a un sitio web peligroso&#8221;.<\/p>\n<p>Este tipo de correos no deseados casi siempre se env\u00c3\u00adan desde ordenadores secuestrados por los hackers y por tanto, sin que sus due\u00c3\u00b1os hayan percibido nada. Estos ordenadores, que act\u00c3\u00baan como botnets, pertenecen a gente inocente que no es consciente de que los cibercriminales los est\u00c3\u00a1n utilizando para fines delictivos de car\u00c3\u00a1cter financiero. Por regla general, ellos son usuarios dom\u00c3\u00a9sticos que no han protegido apropiadamente sus PCs con un software antivirus actualizado, cortafuegos y parches de seguridad.<br \/>\nEl Spam busca nuevas v\u00c3\u00ada de propagaci\u00c3\u00b3n<\/p>\n<p>Sophos ha descubierto que los spammers usan cada vez m\u00c3\u00a1s los sitios sociales tales como Facebook y LinkedIn para enviar enlaces no deseados de tiendas online, estafas de loter\u00c3\u00ada y fraudes financieros.<\/p>\n<p>\u00e2\u20ac\u0153Los spammers se encuentran que cada vez tienen m\u00c3\u00a1s dif\u00c3\u00adcil burlar la protecci\u00c3\u00b3n corporativa frente a este tipo de correo basura. En un entorno controlado y delimitado estamos parando a los spammers y evitando que sus mensajes lleguen a la audiencia que ellos pensaban&#8221;, afirma Cluley. \u00e2\u20ac\u0153Por eso, ahora utilizan otras v\u00c3\u00adas, explotando redes sociales tales como Facebook para enviar sus correos a otros perfiles \u00e2\u20ac\u201c ya que \u00c3\u00a9stos no s\u00c3\u00b3lo los lee el propietario del perfil, sino tambi\u00c3\u00a9n todos aquellos que visiten su p\u00c3\u00a1gina&#8221;.<\/p>\n<p>Fuente: DiarioTi<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sophos ha publicado su \u00c3\u00baltimo informe sobre las tendencias de spam. La investigaci\u00c3\u00b3n ha revelado un preocupante incremento de correos electr\u00c3\u00b3nicos que viajan a trav\u00c3\u00a9s de Internet entre Abril \u00e2\u20ac\u201c Junio de 2008, y c\u00c3\u00b3mo los spammers est\u00c3\u00a1n ahora utilizando Facebook y tel\u00c3\u00a9fonos m\u00c3\u00b3viles para extender sus mensajes. En junio de 2008, el estudio demuestra [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-361","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Redes sociales y SMS propagan spam<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Redes sociales y SMS propagan spam\",\"datePublished\":\"2008-07-24T11:16:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/\"},\"wordCount\":425,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Redes sociales y SMS propagan spam\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2008-07-24T11:16:07+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Redes sociales y SMS propagan spam","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Redes sociales y SMS propagan spam","datePublished":"2008-07-24T11:16:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/"},"wordCount":425,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/","url":"https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Redes sociales y SMS propagan spam","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2008-07-24T11:16:07+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/redes-sociales-y-sms-propagan-spam\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=361"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/361\/revisions"}],"predecessor-version":[{"id":362,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/361\/revisions\/362"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}