
{"id":503,"date":"2009-03-29T20:00:25","date_gmt":"2009-03-29T23:00:25","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=503"},"modified":"2009-03-29T20:00:25","modified_gmt":"2009-03-29T23:00:25","slug":"los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/","title":{"rendered":"Los constantes agujeros en la &#8220;nube&#8221; de Google causan preocupaci\u00c3\u00b3n"},"content":{"rendered":"<p><span class=\"texto-detalle\">En lo que va del a\u00c3\u00b1o, los servicios en l\u00c3\u00adnea de Google han presentado diversos episodios inquietantes, que al parecer distan mucho de ser superados.<\/p>\n<p>Hace algunas semanas los documentos subidos a Google Docs quedaron involuntariamente a disposici\u00c3\u00b3n de otros usuarios. Luego, a fines de febrero, Gmail experiment\u00c3\u00b3 la peor interrupci\u00c3\u00b3n de servicio que ha tenido desde su creaci\u00c3\u00b3n.<\/p>\n<p>El experto en seguridad inform\u00c3\u00a1tica Ade Barkah anunci\u00c3\u00b3 la v\u00c3\u00adspera que el paquete ofim\u00c3\u00a1tico en l\u00c3\u00adnea de Google, Google Docs &amp; Spreadsheets presenta nuevos agujeros de seguridad.<\/p>\n<p>En su blog, Barkah cuestiona la seguridad del servicio. A modo de ejemplo, menciona que si alguien incorpora una imagen en un documento no compartido, otros usuarios pueden de todas formas ver la imagen si conocen la URL. En el ejemplo concreto que menciona Barkah, la imagen sigui\u00c3\u00b3 estando disponible para terceros, incluso despu\u00c3\u00a9s que el documento que la incorporaba hab\u00c3\u00ada sido borrado.<\/p>\n<p>El experto menciona adem\u00c3\u00a1s un agujero que permite a alguien que ha sido eliminado como participante en un documento recuperar el acceso a este sin que el propietario se entere.<\/p>\n<p>Barkah ha descubierto adem\u00c3\u00a1s que existe la posibilidad de que terceros vean versiones anteriores de diagramas insertos, incluso despu\u00c3\u00a9s de haber sido sobrescritos. Para hacerlo, el procedimiento es tan sencillo como cambiar los n\u00c3\u00bameros en la URL. <\/span><\/p>\n<p><span class=\"texto-detalle\">Fuente: DiarioTi<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En lo que va del a\u00c3\u00b1o, los servicios en l\u00c3\u00adnea de Google han presentado diversos episodios inquietantes, que al parecer distan mucho de ser superados. Hace algunas semanas los documentos subidos a Google Docs quedaron involuntariamente a disposici\u00c3\u00b3n de otros usuarios. Luego, a fines de febrero, Gmail experiment\u00c3\u00b3 la peor interrupci\u00c3\u00b3n de servicio que ha [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-503","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Los constantes agujeros en la &quot;nube&quot; de Google causan preocupaci\u00c3\u00b3n<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Los constantes agujeros en la &#8220;nube&#8221; de Google causan preocupaci\u00c3\u00b3n\",\"datePublished\":\"2009-03-29T23:00:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/\"},\"wordCount\":244,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los constantes agujeros en la \\\"nube\\\" de Google causan preocupaci\u00c3\u00b3n\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-03-29T23:00:25+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los constantes agujeros en la \"nube\" de Google causan preocupaci\u00c3\u00b3n","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Los constantes agujeros en la &#8220;nube&#8221; de Google causan preocupaci\u00c3\u00b3n","datePublished":"2009-03-29T23:00:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/"},"wordCount":244,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/","url":"https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Los constantes agujeros en la \"nube\" de Google causan preocupaci\u00c3\u00b3n","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-03-29T23:00:25+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/los-constantes-agujeros-en-la-nube-de-google-causan-preocupacion\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=503"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/503\/revisions"}],"predecessor-version":[{"id":504,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/503\/revisions\/504"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}