
{"id":394,"date":"2008-09-13T09:37:11","date_gmt":"2008-09-13T12:37:11","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=394"},"modified":"2008-09-13T09:37:11","modified_gmt":"2008-09-13T12:37:11","slug":"un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/","title":{"rendered":"Un grupo de &#8216;hackers&#8217; burla el sistema de seguridad del LHC"},"content":{"rendered":"<p>Mientras los primeros protones recorr\u00c3\u00adan los 27 kil\u00c3\u00b3metros del anillo subterr\u00c3\u00a1neo del CERN, un grupo griego de ciberpiratas se col\u00c3\u00b3 en el sistema inform\u00c3\u00a1tico del LHC para publicar una advertencia sobre la debilidad de la infraestructura.<br \/>\nMadrid.- \u00c2\u00bfEstamos seguros? Un grupo de piratas inform\u00c3\u00a1ticos se han infiltrado en el sistema del Gran Colisionador de Hadrones (LHC), lo que ha despertado la preocupaci\u00c3\u00b3n por la seguridad del mayor experimento de la historia, seg\u00c3\u00ban informa el diario brit\u00c3\u00a1nico Telegraph. Mientras los primeros protones recorr\u00c3\u00adan el mi\u00c3\u00a9rcoles los 27 kil\u00c3\u00b3metros del anillo subterr\u00c3\u00a1neo del CERN, situado cerca de Ginebra (Suiza), un grupo griego de ciberpiratas se col\u00c3\u00b3 en el sistema inform\u00c3\u00a1tico del LHC para publicar una advertencia sobre la debilidad de la infraestructura. Los piratas, que se identificaron como Equipo de Seguridad Griego, lograron burlar el sistema utilizado en el proyecto y calificaron a los t\u00c3\u00a9cnicos responsables de la seguridad de &#8220;pu\u00c3\u00b1ado de escolares&#8221;.    <\/p>\n<p>Sin embargo, los intrusos dejaron escrito que no ten\u00c3\u00adan intenci\u00c3\u00b3n de boicotear el experimento del acelerador de part\u00c3\u00adculas. &#8220;Les bajamos los pantalones porque no queremos verlos correr a esconderse cuando cunda el p\u00c3\u00a1nico&#8221;, afirmaron en griego en una nota en la red del LHC.<\/p>\n<p>Fuente: http:\/\/www.gaceta.es\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mientras los primeros protones recorr\u00c3\u00adan los 27 kil\u00c3\u00b3metros del anillo subterr\u00c3\u00a1neo del CERN, un grupo griego de ciberpiratas se col\u00c3\u00b3 en el sistema inform\u00c3\u00a1tico del LHC para publicar una advertencia sobre la debilidad de la infraestructura. Madrid.- \u00c2\u00bfEstamos seguros? Un grupo de piratas inform\u00c3\u00a1ticos se han infiltrado en el sistema del Gran Colisionador de Hadrones [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-394","post","type-post","status-publish","format-standard","hentry","category-noticias"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Un grupo de &#039;hackers&#039; burla el sistema de seguridad del LHC<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Un grupo de &#8216;hackers&#8217; burla el sistema de seguridad del LHC\",\"datePublished\":\"2008-09-13T12:37:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/\"},\"wordCount\":229,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Noticias\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Un grupo de 'hackers' burla el sistema de seguridad del LHC\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2008-09-13T12:37:11+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Un grupo de 'hackers' burla el sistema de seguridad del LHC","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Un grupo de &#8216;hackers&#8217; burla el sistema de seguridad del LHC","datePublished":"2008-09-13T12:37:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/"},"wordCount":229,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Noticias"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/","url":"https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Un grupo de 'hackers' burla el sistema de seguridad del LHC","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2008-09-13T12:37:11+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/un-grupo-de-hackers-burla-el-sistema-de-seguridad-del-lhc\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=394"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/394\/revisions"}],"predecessor-version":[{"id":395,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/394\/revisions\/395"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}