
{"id":728,"date":"2010-05-27T09:51:33","date_gmt":"2010-05-27T12:51:33","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=728"},"modified":"2010-05-27T09:51:33","modified_gmt":"2010-05-27T12:51:33","slug":"bots-conversacionales-que-son-y-como-protegerse","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/","title":{"rendered":"Bots conversacionales, qu\u00e9 son y c\u00f3mo protegerse"},"content":{"rendered":"<p>Detr\u00e1s de un contacto de un programa de mensajer\u00eda instant\u00e1nea, como  Messenger o IRC, en ocasiones se encuentra un programa inform\u00e1tico que  trata de ganarse la confianza de su interlocutor para conseguir  informaci\u00f3n confidencial, enviar spam o instalar programas maliciosos.  Estos riesgos pueden evitarse tomando unas sencillas medidas.<\/p>\n<p>Los bots conversacionales son programas inform\u00e1ticos que se hacen pasar  por una persona real en un programa de mensajer\u00eda instant\u00e1nea. Son  capaces de mantener una conversaci\u00f3n con alguno de los siguientes fines:<\/p>\n<ul>\n<li>Recopilar informaci\u00f3n confidencial como datos bancarios.<\/li>\n<li>Instalar programas maliciosos.<\/li>\n<li>Enviar publicidad no deseada.<\/li>\n<li>Conseguir im\u00e1genes del usuario solicitando que se active la c\u00e1mara  web.<\/li>\n<\/ul>\n<p>En el <a href=\"http:\/\/www.youtube.com\/watch?v=4W2HeV9wAIk\">siguiente  v\u00eddeo<\/a> publicado en el canal de Youtube de INTECO-CERT se puede ver  un bot conversacional en acci\u00f3n.<\/p>\n<p>Para evitarlos, se recomienda seguir los siguientes consejos:<\/p>\n<ul>\n<li>Limitar la difusi\u00f3n de la direcci\u00f3n de correo electr\u00f3nico. No  s\u00f3lo para evitar los bots conversacionales, sino tambi\u00e9n, para evitar el  spam.<\/li>\n<li>Desconfiar y eliminar los contactos e invitaciones cuya conversaci\u00f3n  no sea coherente, est\u00e9 orientada a un tema concreto o que se encuentre  en un idioma que no se espera.<\/li>\n<li>Sospechar de los enlaces a p\u00e1ginas web o a programas que aparezcan  en las conversaciones, aunque sean de amigos de confianza, sobre todo,  si se tratan de enlaces o archivos que no se han solicitado.<\/li>\n<\/ul>\n<p>Algunos clientes de mensajer\u00eda instant\u00e1nea avisan al usuario del  peligro de visitar estos enlaces.<\/p>\n<p>Si a\u00fan as\u00ed se desea acceder al enlace, se recomienda utilizar un  analizador de URLs (se abre en nueva ventana) para conocer la  confiabilidad del enlace y analizar con un antivirus (se abre en nueva  ventana) actualizado el fichero recibido.<\/p>\n<p>Fuente: <a href=\"http:\/\/cert.inteco.es\/cert\/Notas_Actualidad\/que_son_y_como_protegerse_bots_conversacionales\">INTECO <\/a>y Segu-Info<a href=\"http:\/\/cert.inteco.es\/cert\/Notas_Actualidad\/que_son_y_como_protegerse_bots_conversacionales\"><br \/>\n<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Detr\u00e1s de un contacto de un programa de mensajer\u00eda instant\u00e1nea, como Messenger o IRC, en ocasiones se encuentra un programa inform\u00e1tico que trata de ganarse la confianza de su interlocutor para conseguir informaci\u00f3n confidencial, enviar spam o instalar programas maliciosos. Estos riesgos pueden evitarse tomando unas sencillas medidas. Los bots conversacionales son programas inform\u00e1ticos que [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-728","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Bots conversacionales, qu\u00e9 son y c\u00f3mo protegerse<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Bots conversacionales, qu\u00e9 son y c\u00f3mo protegerse\",\"datePublished\":\"2010-05-27T12:51:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/\"},\"wordCount\":308,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Bots conversacionales, qu\u00e9 son y c\u00f3mo protegerse\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2010-05-27T12:51:33+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Bots conversacionales, qu\u00e9 son y c\u00f3mo protegerse","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Bots conversacionales, qu\u00e9 son y c\u00f3mo protegerse","datePublished":"2010-05-27T12:51:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/"},"wordCount":308,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/","url":"https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Bots conversacionales, qu\u00e9 son y c\u00f3mo protegerse","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2010-05-27T12:51:33+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/bots-conversacionales-que-son-y-como-protegerse\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/728","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=728"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/728\/revisions"}],"predecessor-version":[{"id":729,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/728\/revisions\/729"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}