
{"id":451,"date":"2009-01-14T07:16:27","date_gmt":"2009-01-14T10:16:27","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=451"},"modified":"2009-01-14T07:16:27","modified_gmt":"2009-01-14T10:16:27","slug":"presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/","title":{"rendered":"Presentan lista de los 25 errores de programaci\u00c3\u00b3n m\u00c3\u00a1s peligrosos"},"content":{"rendered":"<p><span class=\"texto-detalle\">La mayor parte de los agujeros de seguridad en programas inform\u00c3\u00a1ticos se debe a errores de programaci\u00c3\u00b3n, que podr\u00c3\u00adan ser evitados si los programadores fueran m\u00c3\u00a1s cautelosos con su trabajo.<br \/>\nAnte tal situaci\u00c3\u00b3n, un grupo internacional de expertos ha elaborado <a href=\"http:\/\/www.sans.org\/top25errors\/\" target=\"_blank\">una lista con los 25 peores errores de programaci\u00c3\u00b3n  que ocasionan vulnerabilidades<\/a>. El grupo incluye, entre otros, al ministerio de seguridad interior de EEUU y NSA, la organizaci\u00c3\u00b3n japonesa IPA y empresas privadas como Microsoft y Symantec.<\/span><\/p>\n<p><span class=\"texto-detalle\">entre los propios programadores. No forman parte de los estudios de los desarrolladores, y un m\u00c3\u00adnimo de los fabricantes de software no prueban sus productos en busca de errores antes de lanzarlos comercialmente.<\/p>\n<p>Las consecuencias pueden ser nefastas. Por ejemplo, dos de tales errores fueron explotados en 2008 para instalar c\u00c3\u00b3digo maligno en 1,5 millones de sitios web, que luego propagaron malware entre sus visitantes.<\/p>\n<p>Aunque ya existen listas con las vulnerabilidades y agujeros de seguridad m\u00c3\u00a1s graves y conocidos, la nueva lista se concentra en los errores de programaci\u00c3\u00b3n en los que tienen su origen.<\/p>\n<p>El grupo de expertos conf\u00c3\u00ada en que la lista sea usada por compradores de software, educadores, programadores y sus empleadores.<\/span><\/p>\n<p><span class=\"texto-detalle\">Fuente: DiarioTi<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La mayor parte de los agujeros de seguridad en programas inform\u00c3\u00a1ticos se debe a errores de programaci\u00c3\u00b3n, que podr\u00c3\u00adan ser evitados si los programadores fueran m\u00c3\u00a1s cautelosos con su trabajo. Ante tal situaci\u00c3\u00b3n, un grupo internacional de expertos ha elaborado una lista con los 25 peores errores de programaci\u00c3\u00b3n que ocasionan vulnerabilidades. El grupo incluye, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-451","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Presentan lista de los 25 errores de programaci\u00c3\u00b3n m\u00c3\u00a1s peligrosos<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Presentan lista de los 25 errores de programaci\u00c3\u00b3n m\u00c3\u00a1s peligrosos\",\"datePublished\":\"2009-01-14T10:16:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/\"},\"wordCount\":215,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Presentan lista de los 25 errores de programaci\u00c3\u00b3n m\u00c3\u00a1s peligrosos\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-01-14T10:16:27+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Presentan lista de los 25 errores de programaci\u00c3\u00b3n m\u00c3\u00a1s peligrosos","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Presentan lista de los 25 errores de programaci\u00c3\u00b3n m\u00c3\u00a1s peligrosos","datePublished":"2009-01-14T10:16:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/"},"wordCount":215,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/","url":"https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Presentan lista de los 25 errores de programaci\u00c3\u00b3n m\u00c3\u00a1s peligrosos","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-01-14T10:16:27+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/presentan-lista-de-los-25-errores-de-programacion-mas-peligrosos\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/451","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=451"}],"version-history":[{"count":2,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/451\/revisions"}],"predecessor-version":[{"id":453,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/451\/revisions\/453"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=451"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=451"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=451"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}