{"id":1421,"date":"2019-02-05T13:05:48","date_gmt":"2019-02-05T19:05:48","guid":{"rendered":"http:\/\/intelisis.com\/blog\/?p=1421"},"modified":"2022-08-11T15:32:49","modified_gmt":"2022-08-11T20:32:49","slug":"tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad","status":"publish","type":"post","link":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/","title":{"rendered":"Tesla te pagar\u00e1 por poder hackear su sistema de seguridad"},"content":{"rendered":"\n<p>Entre el pr\u00f3ximo 20 y 22 de marzo 2019 se llevar\u00e1 a cabo en la ciudad Vancouver el concurso de hacking Pwn2own, en donde la compa\u00f1\u00eda automotriz Tesla, dar\u00e1 un premio a aquel que logre descubrir un fallo en su nuevo modelo. El ganador podr\u00e1 llevarse desde un nuevo autom\u00f3vil de esta compa\u00f1\u00eda, hasta una gran cantidad de dinero. Esta ser\u00e1 la primera vez que la categor\u00eda automotriz se integre a este concurso de hacking. <\/p>\n\n\n\n<p>El concurso consta de encontrar la vulnerabilidad del autom\u00f3vil de Tesla, el Model 3. El ganador ser\u00e1 recompensado con premios de 35,000 d\u00f3lares, hasta 300,000 d\u00f3lares, todo dependiendo de la forma en que se encuentre el error. <\/p>\n\n\n\n<p>Tesla no es extra\u00f1o a este tipo de eventos, previamente\nha participado en eventos de bug bounty, esto debido a que la integraci\u00f3n de\nsoftware es un elemento muy importante para sus autom\u00f3viles. En esta ocasi\u00f3n\nesperan encontrar y resolver problemas que surjan en su nuevo modelo. <\/p>\n\n\n\n<p>Gracias a su participaci\u00f3n en eventos de esta \u00edndole, Tesla ha podido estar a la vanguardia en cuanto a seguridad de software automotriz se refiere. Esta es una de las principales razones por la cuales la compa\u00f1\u00eda se posiciona como una de las m\u00e1s exitosas a nivel mundial. <\/p>\n\n\n\n<p>Adem\u00e1s de la categor\u00eda automotriz habr\u00e1 otras cuatro m\u00e1s, como son: navegadores web, software de virtualizaci\u00f3n, aplicaciones empresariales y software del lado del servidor. Los blancos elegidos para el certamen incluyen software de productos como Apple, Microsoft, Google, Oracle, entre otros. <\/p>\n\n\n\n<p>\u00bfUstedes qu\u00e9 opinan? \u00bfParticiparan en el pr\u00f3ximo concurso\nde hacking? \u00bfQu\u00e9 opinan de Tesla?<\/p>\n\n\n<div class=\"kk-star-ratings kksr-auto kksr-align-center kksr-valign-bottom\"\n    data-payload='{&quot;align&quot;:&quot;center&quot;,&quot;id&quot;:&quot;1421&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;bottom&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;0&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;0&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;5&quot;,&quot;greet&quot;:&quot;Califica post&quot;,&quot;legend&quot;:&quot;0\\\/5 - (0 votes)&quot;,&quot;size&quot;:&quot;15&quot;,&quot;title&quot;:&quot;Tesla te pagar\u00e1 por poder hackear su sistema de seguridad&quot;,&quot;width&quot;:&quot;0&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n            \n<div class=\"kksr-stars\">\n    \n<div class=\"kksr-stars-inactive\">\n            <div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n    <\/div>\n    \n<div class=\"kksr-stars-active\" style=\"width: 0px;\">\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>\n                \n\n<div class=\"kksr-legend\" style=\"font-size: 12px;\">\n            <span class=\"kksr-muted\">Califica post<\/span>\n    <\/div>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Entre el pr\u00f3ximo 20 y 22 de marzo 2019 se llevar\u00e1 a cabo en la ciudad Vancouver el concurso de hacking Pwn2own, en donde la compa\u00f1\u00eda automotriz Tesla, dar\u00e1 un premio a aquel que logre descubrir un fallo en su nuevo modelo. El ganador podr\u00e1 llevarse desde un nuevo autom\u00f3vil de esta compa\u00f1\u00eda, hasta una gran cantidad de dinero.<\/p>\n","protected":false},"author":19,"featured_media":2873,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1421","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Tesla te pagar\u00e1 por poder hackear su sistema de seguridad - Intelisis Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tesla te pagar\u00e1 por poder hackear su sistema de seguridad\" \/>\n<meta property=\"og:description\" content=\"Entre el pr\u00f3ximo 20 y 22 de marzo 2019 se llevar\u00e1 a cabo en la ciudad Vancouver el concurso de hacking Pwn2own, en donde la compa\u00f1\u00eda automotriz Tesla, dar\u00e1 un premio a aquel que logre descubrir un fallo en su nuevo modelo. El ganador podr\u00e1 llevarse desde un nuevo autom\u00f3vil de esta compa\u00f1\u00eda, hasta una gran cantidad de dinero.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"Intelisis Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Intelisis\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-05T19:05:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-11T20:32:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/dfghnm-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"314\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Intelisis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IntelisisCorp\" \/>\n<meta name=\"twitter:site\" content=\"@IntelisisCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Intelisis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/\"},\"author\":{\"name\":\"Intelisis\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/person\\\/00d44b0c56ac865a77583094112e890b\"},\"headline\":\"Tesla te pagar\u00e1 por poder hackear su sistema de seguridad\",\"datePublished\":\"2019-02-05T19:05:48+00:00\",\"dateModified\":\"2022-08-11T20:32:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/\"},\"wordCount\":287,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/dfghnm-1.png\",\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/\",\"name\":\"Tesla te pagar\u00e1 por poder hackear su sistema de seguridad - Intelisis Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/dfghnm-1.png\",\"datePublished\":\"2019-02-05T19:05:48+00:00\",\"dateModified\":\"2022-08-11T20:32:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/dfghnm-1.png\",\"contentUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/dfghnm-1.png\",\"width\":600,\"height\":314,\"caption\":\"Testa seguridad\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tesla te pagar\u00e1 por poder hackear su sistema de seguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\",\"name\":\"Blog Intelisis Software\",\"description\":\"Informaci&oacute;n de valor sobre ERP y tendencias tecnol&oacute;gicas\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\",\"name\":\"Intelisis Software\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo_intelisis_.png\",\"contentUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo_intelisis_.png\",\"width\":1133,\"height\":326,\"caption\":\"Intelisis Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Intelisis\\\/\",\"https:\\\/\\\/x.com\\\/IntelisisCorp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/intelisis-sa-de-cv\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRFKIq10T-foPWN4hN2Jhrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/person\\\/00d44b0c56ac865a77583094112e890b\",\"name\":\"Intelisis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g\",\"caption\":\"Intelisis\"},\"sameAs\":[\"https:\\\/\\\/www.intelisis.com\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tesla te pagar\u00e1 por poder hackear su sistema de seguridad - Intelisis Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/","og_locale":"es_MX","og_type":"article","og_title":"Tesla te pagar\u00e1 por poder hackear su sistema de seguridad","og_description":"Entre el pr\u00f3ximo 20 y 22 de marzo 2019 se llevar\u00e1 a cabo en la ciudad Vancouver el concurso de hacking Pwn2own, en donde la compa\u00f1\u00eda automotriz Tesla, dar\u00e1 un premio a aquel que logre descubrir un fallo en su nuevo modelo. El ganador podr\u00e1 llevarse desde un nuevo autom\u00f3vil de esta compa\u00f1\u00eda, hasta una gran cantidad de dinero.","og_url":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/","og_site_name":"Intelisis Blog","article_publisher":"https:\/\/www.facebook.com\/Intelisis\/","article_published_time":"2019-02-05T19:05:48+00:00","article_modified_time":"2022-08-11T20:32:49+00:00","og_image":[{"width":600,"height":314,"url":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/dfghnm-1.png","type":"image\/png"}],"author":"Intelisis","twitter_card":"summary_large_image","twitter_creator":"@IntelisisCorp","twitter_site":"@IntelisisCorp","twitter_misc":{"Escrito por":"Intelisis","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/#article","isPartOf":{"@id":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/"},"author":{"name":"Intelisis","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/person\/00d44b0c56ac865a77583094112e890b"},"headline":"Tesla te pagar\u00e1 por poder hackear su sistema de seguridad","datePublished":"2019-02-05T19:05:48+00:00","dateModified":"2022-08-11T20:32:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/"},"wordCount":287,"commentCount":0,"publisher":{"@id":"https:\/\/www.intelisis.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/dfghnm-1.png","articleSection":["Tecnolog\u00eda"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/","url":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/","name":"Tesla te pagar\u00e1 por poder hackear su sistema de seguridad - Intelisis Blog","isPartOf":{"@id":"https:\/\/www.intelisis.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/#primaryimage"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/dfghnm-1.png","datePublished":"2019-02-05T19:05:48+00:00","dateModified":"2022-08-11T20:32:49+00:00","breadcrumb":{"@id":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/#primaryimage","url":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/dfghnm-1.png","contentUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/dfghnm-1.png","width":600,"height":314,"caption":"Testa seguridad"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intelisis.com\/blog\/tesla-te-pagara-por-poder-hackear-su-sistema-de-seguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.intelisis.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Tesla te pagar\u00e1 por poder hackear su sistema de seguridad"}]},{"@type":"WebSite","@id":"https:\/\/www.intelisis.com\/blog\/#website","url":"https:\/\/www.intelisis.com\/blog\/","name":"Blog Intelisis Software","description":"Informaci&oacute;n de valor sobre ERP y tendencias tecnol&oacute;gicas","publisher":{"@id":"https:\/\/www.intelisis.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intelisis.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.intelisis.com\/blog\/#organization","name":"Intelisis Software","url":"https:\/\/www.intelisis.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2023\/08\/logo_intelisis_.png","contentUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2023\/08\/logo_intelisis_.png","width":1133,"height":326,"caption":"Intelisis Software"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Intelisis\/","https:\/\/x.com\/IntelisisCorp","https:\/\/www.linkedin.com\/company\/intelisis-sa-de-cv\/","https:\/\/www.youtube.com\/channel\/UCRFKIq10T-foPWN4hN2Jhrg"]},{"@type":"Person","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/person\/00d44b0c56ac865a77583094112e890b","name":"Intelisis","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9b992b67a8defa2dc50cc9be029a3f9d992af431fb4fa84bdec8767de82fe367?s=96&d=mm&r=g","caption":"Intelisis"},"sameAs":["https:\/\/www.intelisis.com"]}]}},"amp_enabled":true,"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1421","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/comments?post=1421"}],"version-history":[{"count":3,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1421\/revisions"}],"predecessor-version":[{"id":2874,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1421\/revisions\/2874"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/media\/2873"}],"wp:attachment":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/media?parent=1421"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/categories?post=1421"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/tags?post=1421"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}