
{"id":392,"date":"2008-09-09T08:15:23","date_gmt":"2008-09-09T11:15:23","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=392"},"modified":"2008-09-09T08:15:23","modified_gmt":"2008-09-09T11:15:23","slug":"expertos-desaconsejan-el-uso-de-chrome-en-empresas","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/","title":{"rendered":"Expertos desaconsejan el uso de Chrome en empresas"},"content":{"rendered":"<p>Si usted ha sido una de las numerosas personas que descargaron el nuevo navegador de Google, quiz\u00c3\u00a1s haya puesto su computadora a disposici\u00c3\u00b3n de intrusos. La versi\u00c3\u00b3n Build 0.2.149.28, que hasta el viernes 5 de septiembre era la \u00c3\u00baltima, contiene una vulnerabilidad cr\u00c3\u00adtica, que hace que su PC sea id\u00c3\u00b3neo para ataques de tipo drive-by. Google ha confirmado la vulnerabilidad y publicado una actualizaci\u00c3\u00b3n del navegador.<br \/>\nSin embargo, los problemas de seguridad no terminan all\u00c3\u00ad. La compa\u00c3\u00b1\u00c3\u00ada danesa de seguridad inform\u00c3\u00a1tica CSIS ha estudiado detenidamente el navegador Chrome concluyendo que \u00e2\u20ac\u0153incorpora funcionalidad de tipo esp\u00c3\u00ada, que le dan el car\u00c3\u00a1cter de rootkit&#8221;. En un comunicado, CSIS escribe que \u00e2\u20ac\u0153hemos probado el navegador Chrome y confirmado que \u00e2\u20ac\u02dcllama a casa\u00c2\u00b4 incluso cuando el programa no est\u00c3\u00a1 activo. Chrome usa una \u00e2\u20ac\u02dcAPI hooking\u00c2\u00b4, con el fin de limitar la funcionalidad. Es algo as\u00c3\u00ad como una sandbox, que m\u00c3\u00a1s bien recuerda funcionalidad de rootkit&#8221;, indica CSIS en un comunicado.<\/p>\n<p>El agujero de seguridad que deja el navegador a merced de intrusos, ha sido documentado en un denominado Proof of Concept que demuestra la forma en que es posible para un sitio maligno ejecutar c\u00c3\u00b3digo en el sistema sin mediar interacci\u00c3\u00b3n del usuario, con los mismos derechos que \u00c3\u00a9ste.<\/p>\n<p>\u00e2\u20ac\u0153Un escenario de este tipo es perfecto para los ataques de tipo drive-by&#8221;, escribe CSIS. La vulnerabilidad en cuesti\u00c3\u00b3n est\u00c3\u00a1 presente \u00c3\u00banicamente en el build 0.2.149.28 de Chrome. En t\u00c3\u00a9rminos t\u00c3\u00a9cnicos se trata de un stack en el rengl\u00c3\u00b3n de t\u00c3\u00adtulo al activarse la funci\u00c3\u00b3n \u00e2\u20ac\u0153guardar archivo como&#8221;.<\/p>\n<p>\u00e2\u20ac\u0153El software beta no debe ser instalado ni probado en ambientes de producci\u00c3\u00b3n ni en empresas. Desaconsejamos el uso del navegador Chrome hasta que exista una versi\u00c3\u00b3n m\u00c3\u00a1s estable&#8221;, indica CSIS en un comunicado.<br \/>\nFuente:<a href=\"http:\/\/www.diarioti.com\"> http:\/\/www.diarioti.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Si usted ha sido una de las numerosas personas que descargaron el nuevo navegador de Google, quiz\u00c3\u00a1s haya puesto su computadora a disposici\u00c3\u00b3n de intrusos. La versi\u00c3\u00b3n Build 0.2.149.28, que hasta el viernes 5 de septiembre era la \u00c3\u00baltima, contiene una vulnerabilidad cr\u00c3\u00adtica, que hace que su PC sea id\u00c3\u00b3neo para ataques de tipo drive-by. [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-392","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Expertos desaconsejan el uso de Chrome en empresas<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Expertos desaconsejan el uso de Chrome en empresas\",\"datePublished\":\"2008-09-09T11:15:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/\"},\"wordCount\":319,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Expertos desaconsejan el uso de Chrome en empresas\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2008-09-09T11:15:23+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Expertos desaconsejan el uso de Chrome en empresas","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Expertos desaconsejan el uso de Chrome en empresas","datePublished":"2008-09-09T11:15:23+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/"},"wordCount":319,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/","url":"https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Expertos desaconsejan el uso de Chrome en empresas","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2008-09-09T11:15:23+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/expertos-desaconsejan-el-uso-de-chrome-en-empresas\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=392"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/392\/revisions"}],"predecessor-version":[{"id":393,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/392\/revisions\/393"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}