{"id":883,"date":"2017-02-22T23:40:59","date_gmt":"2017-02-23T05:40:59","guid":{"rendered":"http:\/\/aguilarsoluciones.com\/portal\/blogs\/?p=883"},"modified":"2020-07-22T17:36:54","modified_gmt":"2020-07-22T23:36:54","slug":"video-ransomware-anatomia-de-un-ataque-hacker","status":"publish","type":"post","link":"https:\/\/aguilarsoluciones.com\/network\/video-ransomware-anatomia-de-un-ataque-hacker\/","title":{"rendered":"[Video] Ransomware: Anatom\u00eda de un ataque hacker"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text css_animation=\u00bbfadeIn\u00bb]<\/p>\n<blockquote><p><em><strong>Hoy les compartimos un interesante video de CISCO sobre la anatom\u00eda de un ataque hacker, en el cual, la joven hacker, tras hacer algunos trabajos rutinarios de hacking de ingenier\u00eda social, consigue implantar un ransomware a sus v\u00edctimas objetivo. Tristemente, As\u00ed de f\u00e1cil sucede d\u00eda tras d\u00eda en nuestra actualidad<\/strong><\/em><\/p><\/blockquote>\n<p style=\"text-align: justify;\">Hoy en d\u00eda, el secuestro de informaci\u00f3n es uno de los peores peligros que existen para los usuarios de la web<\/p>\n<p style=\"text-align: justify;\">Y es que, como mucho se ha explicado desde la evoluci\u00f3n del Internet, el eslab\u00f3n m\u00e1s d\u00e9bil en una cadena de seguridad de datos son los usuarios no capacitados<\/p>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column][vc_column_text css_animation=\u00bbfadeIn\u00bb]<\/p>\n<div style=\"width: 1280px;\" class=\"wp-video\"><video class=\"wp-video-shortcode\" id=\"video-883-1\" width=\"1280\" height=\"720\" preload=\"metadata\" controls=\"controls\"><source type=\"video\/mp4\" src=\"https:\/\/blog.aguilarsoluciones.com\/wp-content\/uploads\/cisco-anatomy-of-an-attack-inside-the-mind-of-a-hacker.mp4?_=1\" \/><a href=\"https:\/\/blog.aguilarsoluciones.com\/wp-content\/uploads\/cisco-anatomy-of-an-attack-inside-the-mind-of-a-hacker.mp4\">https:\/\/blog.aguilarsoluciones.com\/wp-content\/uploads\/cisco-anatomy-of-an-attack-inside-the-mind-of-a-hacker.mp4<\/a><\/video><\/div>\n<p>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>[vc_row][vc_column][vc_column_text css_animation=\u00bbfadeIn\u00bb] Hoy les compartimos un interesante video de CISCO sobre la anatom\u00eda de un ataque hacker, en el cual, la joven hacker, tras hacer <a class=\"mh-excerpt-more\" href=\"https:\/\/aguilarsoluciones.com\/network\/video-ransomware-anatomia-de-un-ataque-hacker\/\" title=\"[Video] Ransomware: Anatom\u00eda de un ataque hacker\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":2,"featured_media":2397,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"csbAdvScrollBarCursor":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[7,13,14,28,31],"tags":[104,215,353],"class_list":["post-883","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-e-learning","category-general","category-hackers","category-seguridad","category-tecnologia","tag-cisco","tag-hackers","tag-ransomware"],"jetpack_featured_media_url":"https:\/\/aguilarsoluciones.com\/network\/wp-content\/uploads\/post-header-ransomware-anatomia-de-un-ataque-777x437-1.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/posts\/883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/comments?post=883"}],"version-history":[{"count":4,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/posts\/883\/revisions"}],"predecessor-version":[{"id":2399,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/posts\/883\/revisions\/2399"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/media\/2397"}],"wp:attachment":[{"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/media?parent=883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/categories?post=883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aguilarsoluciones.com\/network\/wp-json\/wp\/v2\/tags?post=883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}