
{"id":654,"date":"2009-11-14T07:53:07","date_gmt":"2009-11-14T10:53:07","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=654"},"modified":"2009-11-14T07:53:07","modified_gmt":"2009-11-14T10:53:07","slug":"informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/","title":{"rendered":"Informe de McAfee sobre amenazas: Segundo trimestre de 2009"},"content":{"rendered":"<div><\/div>\n<div>Este n\u00famero del \u201c<strong>Informe de McAfee sobre amenazas<\/strong>\u201d presenta las \u00faltimas estad\u00edsticas y an\u00e1lisis acerca de las amenazas que llegan a trav\u00e9s del correo electr\u00f3nico y la Web. Este informe trimestral ha sido elaborado por los investigadores de <strong><span style=\"color: #006600;\">McAfee Avert Labs<\/span><\/strong>, cuyo personal, repartido por toda la geograf\u00eda mundial, ofrece una perspectiva \u00fanica del panorama de las amenazas, desde consumidores a empresas y desde Estados Unidos a pa\u00edses de todo el mundo. Examine con nosotros los problemas principales relacionados con la seguridad de los \u00faltimos tres meses. Y, cuando haya concluido estos art\u00edculos, encontrar\u00e1 m\u00e1s informaci\u00f3n en el Centro de amenazas de McAfee.<\/div>\n<p>En el segundo trimestre de 2009, observamos que, tras el rev\u00e9s sufrido recientemente, la producci\u00f3n de spam se recuper\u00f3 r\u00e1pidamente alcanzando niveles sin precedentes.<strong> El n\u00famero de zombis, u ordenadores secuestrados por remitentes de spam para el env\u00edo de mensajes, tambi\u00e9n llegaba a cifras nunca vistas.<br \/>\n<\/strong>Desglosaremos la producci\u00f3n de spam por pa\u00eds y por asunto.<br \/>\nEn la Web, <strong>el malware, tanto de sitios leg\u00edtimos como de sitios maliciosos, sigue atacando los navegadores.<br \/>\n<\/strong><br \/>\nLas redes de robots \u201ccapturan\u201d los equipos y se hacen con su control para apoderarse de datos ajenos y enviar mensajes de spam. Twitter se ha convertido en un objetivo frecuente de los agresores. En la actualidad, es sin duda la preferida entre las herramientas de redes sociales y los autores de malware saben bien cu\u00e1l es su potencial y c\u00f3mo explotarlo. Cuando tu herramienta favorita para tu nuevo estilo de vida virtual tenga planificado un mes de errores (\u201cMes de los errores de Twitter\u201d) sabr\u00e1s que se ha hecho realmente famosa. Twitter ha jugado tambi\u00e9n un papel de \u201chacktivista\u201d (o pirata inform\u00e1tico-activista) en las elecciones iran\u00edes y las revueltas que les han seguido.<\/p>\n<p>En el mundo del malware, <strong>hemos observado un r\u00e1pido crecimiento de los troyanos ladrones de contrase\u00f1as, cuyo objetivo principal es apoderarse de los datos bancarios de los usuarios<\/strong>. Estos programas son sencillos, dif\u00edciles de detectar y, ahora, m\u00e1s f\u00e1ciles que nunca de crear. Hay sitios Web, alojados principalmente en Rusia, que ofrecen herramientas de generaci\u00f3n de troyanos que facilitan a cualquier agresor sin experiencia los medios para robar datos confidenciales. <strong>Tambi\u00e9n, gracias a la disponibilidad de herramientas gratuitas o freeware para compilar y comprimir, es muy f\u00e1cil crear malware AutoRun.<\/strong><\/p>\n<p><a href=\"http:\/\/www.mcafee.com\/us\/local_content\/reports\/6623rpt_avert_threat_0709_es.pdf\"><strong><span style=\"font-size: 130%;\">Descarga del Informe<\/span><\/strong><\/a><span style=\"font-size: 130%;\"> <\/span><\/p>\n<p><span style=\"font-size: 130%;\">Fuente: Cryptex<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Este n\u00famero del \u201cInforme de McAfee sobre amenazas\u201d presenta las \u00faltimas estad\u00edsticas y an\u00e1lisis acerca de las amenazas que llegan a trav\u00e9s del correo electr\u00f3nico y la Web. Este informe trimestral ha sido elaborado por los investigadores de McAfee Avert Labs, cuyo personal, repartido por toda la geograf\u00eda mundial, ofrece una perspectiva \u00fanica del panorama [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-654","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Informe de McAfee sobre amenazas: Segundo trimestre de 2009<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Informe de McAfee sobre amenazas: Segundo trimestre de 2009\",\"datePublished\":\"2009-11-14T10:53:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/\"},\"wordCount\":425,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Informe de McAfee sobre amenazas: Segundo trimestre de 2009\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2009-11-14T10:53:07+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Informe de McAfee sobre amenazas: Segundo trimestre de 2009","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Informe de McAfee sobre amenazas: Segundo trimestre de 2009","datePublished":"2009-11-14T10:53:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/"},"wordCount":425,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/","url":"https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Informe de McAfee sobre amenazas: Segundo trimestre de 2009","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2009-11-14T10:53:07+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/informe-de-mcafee-sobre-amenazas-segundo-trimestre-de-2009\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=654"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/654\/revisions"}],"predecessor-version":[{"id":655,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/654\/revisions\/655"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}