
{"id":567,"date":"2009-08-06T15:34:29","date_gmt":"2009-08-06T18:34:29","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=567"},"modified":"2009-08-06T15:34:29","modified_gmt":"2009-08-06T18:34:29","slug":"denegacion-de-servicio-distribuido-en-twitter-com","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/","title":{"rendered":"Denegaci\u00f3n de servicio distribuido en Twitter.com"},"content":{"rendered":"<p>El popular servicio de microblogging Twitter estuvo fuera de l\u00ednea durante un periodo prolongado de la ma\u00f1ana por lo que parece ser un gran ataque de Denegaci\u00f3n de Servicio Distribuido (<a href=\"http:\/\/blog.segu-info.com.ar\/search\/label\/DoS\">DDoS<\/a>).<\/p>\n<p><a href=\"http:\/\/status.twitter.com\/post\/157191978\/ongoing-denial-of-service-attack\">Twitter confirm\u00f3<\/a> el ataque y si bien el mismo coincide con la aparici\u00f3n de una nueva variante de <a href=\"http:\/\/blog.segu-info.com.ar\/search\/?q=koobface\">Kookface<\/a> que utiliza la plataforma para propagarse, no est\u00e1 confirmado que ambos hecho est\u00e9n relacionados.<\/p>\n<p>M\u00e1s informaci\u00f3n puede ser obtenida <a href=\"http:\/\/blogs.zdnet.com\/security\/?p=3953\">Zdnet<\/a> y <a href=\"http:\/\/www.viruslist.com\/en\/weblog?weblogid=208187803\">Viruslist<\/a>.<\/p>\n<p><span style=\"font-weight: bold;\">Cristian de la Redacci\u00f3n de <a href=\"http:\/\/www.segu-info.com.ar\/\">Segu-Info<\/a><\/span><\/p>\n<p><a rel=\"cc:attributionURL\" href=\"http:\/\/blog.segu-info.com.ar\/\"><img decoding=\"async\" style=\"border-width: 0pt;\" src=\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\" alt=\"Creative Commons License\" \/><\/a><br \/>\n<a rel=\"license\" href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/2.5\/ar\/\">Creative Commons Atribuci\u00f3n-No Comercial-Compartir Obras Derivadas Igual 2.5<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El popular servicio de microblogging Twitter estuvo fuera de l\u00ednea durante un periodo prolongado de la ma\u00f1ana por lo que parece ser un gran ataque de Denegaci\u00f3n de Servicio Distribuido (DDoS). Twitter confirm\u00f3 el ataque y si bien el mismo coincide con la aparici\u00f3n de una nueva variante de Kookface que utiliza la plataforma para [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-567","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Denegaci\u00f3n de servicio distribuido en Twitter.com<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Denegaci\u00f3n de servicio distribuido en Twitter.com\",\"datePublished\":\"2009-08-06T18:34:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/\"},\"wordCount\":102,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Denegaci\u00f3n de servicio distribuido en Twitter.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"datePublished\":\"2009-08-06T18:34:29+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/#primaryimage\",\"url\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\",\"contentUrl\":\"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Denegaci\u00f3n de servicio distribuido en Twitter.com","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/","twitter_misc":{"Written by":"Leandro Ferrari"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Denegaci\u00f3n de servicio distribuido en Twitter.com","datePublished":"2009-08-06T18:34:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/"},"wordCount":102,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/#primaryimage"},"thumbnailUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/","url":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Denegaci\u00f3n de servicio distribuido en Twitter.com","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/#primaryimage"},"thumbnailUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","datePublished":"2009-08-06T18:34:29+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/denegacion-de-servicio-distribuido-en-twitter-com\/#primaryimage","url":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg","contentUrl":"http:\/\/farm4.static.flickr.com\/3050\/3526947370_769503475f_o.jpg"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/567","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=567"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/567\/revisions"}],"predecessor-version":[{"id":568,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/567\/revisions\/568"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=567"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=567"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=567"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}