{"id":1453,"date":"2019-02-14T09:54:14","date_gmt":"2019-02-14T15:54:14","guid":{"rendered":"http:\/\/intelisis.com\/blog\/?p=1453"},"modified":"2022-12-22T10:54:49","modified_gmt":"2022-12-22T16:54:49","slug":"5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse","status":"publish","type":"post","link":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/","title":{"rendered":"5 tipos de software maliciosos del que hay que cuidarse"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"314\" src=\"http:\/\/intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/ransomware.jpg\" alt=\"\" class=\"wp-image-1454\" srcset=\"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/ransomware.jpg 600w, https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/ransomware-500x262.jpg 500w, https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/ransomware-300x157.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>Cada d\u00eda nos exponemos a cientos de oportunidades para ser atacados por internet, as\u00ed que la firma cibernautita Eset identific\u00f3 cinco tipos de programas de software malicioso, conocidos como ransomware, los cuales trabajan con ciertas diferencias pero que tienen como prop\u00f3sito da\u00f1ar a los usuarios de internet.<\/p>\n\n\n\n<p>Los ransomware usados actualmente en Latinoam\u00e9rica son:\nFilecoder, Lockscreen, Virus de la Polic\u00eda, Wiper y Hoax ransomware, inform\u00f3 la\nempresa en un comunicado. \u201cHay diferentes formas en las que puede comportarse\nel ransomware al infectar un sistema, las distintas familias de este tipo de\nc\u00f3digo malicioso presenta sus propias caracter\u00edsticas\u201d, asegur\u00f3 el jefe del\nLaboratorio de Investigaci\u00f3n de Eset Latinoam\u00e9rica, Camilo Guti\u00e9rrez.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Filecoder<\/li><\/ul>\n\n\n\n<p>Este se dedica a secuestrar archivos en un equipo y pide un rescate por ellos, por lo general los delincuentes exigen bitcoins para entregar una clave que permita descifrar los archivos secuestrados.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Loockscreen<\/li><\/ul>\n\n\n\n<p>Act\u00faa de manera similar a filecoder, s\u00f3lo que este ransomware bloquea el acceso al equipo completo que ha infectado, y una vez que ha sido secuestrado, se debe pagar un rescate para poder usarlo nuevamente..<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Virus de la polic\u00eda<\/li><\/ul>\n\n\n\n<p>Se trata de un troyano que bloquea a los equipos cuando se inician al mismo tiempo que muestra un mensaje falso en el que alguna autoridad se\u00f1ala que se detect\u00f3 acceso a p\u00e1ginas ilegales. La v\u00edctima debe pagar un rescate que es denominado multa para poder acceder de nuevo al equipo, aunque aqu\u00ed no suele haber cifrado de datos.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Wiper<\/li><\/ul>\n\n\n\n<p>Es\nsimilar al Filecoder, s\u00f3lo que nunca devuelve el acceso a los archivos que\nsecuestr\u00f3, de hecho los corrompe y en algunos casos impide el acceso al sistema\noperativo.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Hoax ransomware<\/li><\/ul>\n\n\n\n<p>Combina el secuestro\nde datos con el enga\u00f1o a la v\u00edctima, ya que s\u00f3lo usa t\u00e9cnicas de ingenier\u00eda\nsocial para asustar a la persona que \u00e9sta env\u00ede un pago.<\/p>\n\n\n\n<p>Hay que tener extremo cuidado con nuestra informaci\u00f3n,\nprotegerse en contra de estos ransomwares y buscar ayuda profesional en caso de\nser sometidos a un ataque de este tipo.<\/p>\n\n\n<div class=\"kk-star-ratings kksr-auto kksr-align-center kksr-valign-bottom\"\n    data-payload='{&quot;align&quot;:&quot;center&quot;,&quot;id&quot;:&quot;1453&quot;,&quot;slug&quot;:&quot;default&quot;,&quot;valign&quot;:&quot;bottom&quot;,&quot;ignore&quot;:&quot;&quot;,&quot;reference&quot;:&quot;auto&quot;,&quot;class&quot;:&quot;&quot;,&quot;count&quot;:&quot;0&quot;,&quot;legendonly&quot;:&quot;&quot;,&quot;readonly&quot;:&quot;&quot;,&quot;score&quot;:&quot;0&quot;,&quot;starsonly&quot;:&quot;&quot;,&quot;best&quot;:&quot;5&quot;,&quot;gap&quot;:&quot;5&quot;,&quot;greet&quot;:&quot;Califica post&quot;,&quot;legend&quot;:&quot;0\\\/5 - (0 votes)&quot;,&quot;size&quot;:&quot;15&quot;,&quot;title&quot;:&quot;5 tipos de software maliciosos del que hay que cuidarse&quot;,&quot;width&quot;:&quot;0&quot;,&quot;_legend&quot;:&quot;{score}\\\/{best} - ({count} {votes})&quot;,&quot;font_factor&quot;:&quot;1.25&quot;}'>\n            \n<div class=\"kksr-stars\">\n    \n<div class=\"kksr-stars-inactive\">\n            <div class=\"kksr-star\" data-star=\"1\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"2\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"3\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"4\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" data-star=\"5\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n    <\/div>\n    \n<div class=\"kksr-stars-active\" style=\"width: 0px;\">\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n            <div class=\"kksr-star\" style=\"padding-right: 5px\">\n            \n\n<div class=\"kksr-icon\" style=\"width: 15px; height: 15px;\"><\/div>\n        <\/div>\n    <\/div>\n<\/div>\n                \n\n<div class=\"kksr-legend\" style=\"font-size: 12px;\">\n            <span class=\"kksr-muted\">Califica post<\/span>\n    <\/div>\n    <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cada d\u00eda nos exponemos a cientos de oportunidades para ser atacados por internet, as\u00ed que la firma cibernautita Eset identific\u00f3 cinco tipos de programas de software malicioso, conocidos como ransomware, los cuales trabajan con ciertas diferencias pero que tienen como prop\u00f3sito da\u00f1ar a los usuarios de internet.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,751],"tags":[760,761,759],"class_list":["post-1453","post","type-post","status-publish","format-standard","hentry","category-otras","category-tecnologia-nube","tag-almacenamiento-de-archivos","tag-servicios-en-la-nube","tag-software-remoto"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>5 tipos de software maliciosos del que hay que cuidarse - Intelisis Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/\" \/>\n<meta property=\"og:locale\" content=\"es_MX\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 tipos de software maliciosos del que hay que cuidarse\" \/>\n<meta property=\"og:description\" content=\"Cada d\u00eda nos exponemos a cientos de oportunidades para ser atacados por internet, as\u00ed que la firma cibernautita Eset identific\u00f3 cinco tipos de programas de software malicioso, conocidos como ransomware, los cuales trabajan con ciertas diferencias pero que tienen como prop\u00f3sito da\u00f1ar a los usuarios de internet.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/\" \/>\n<meta property=\"og:site_name\" content=\"Intelisis Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Intelisis\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-14T15:54:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-22T16:54:49+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/ransomware.jpg\" \/>\n<meta name=\"author\" content=\"IntelisisMx\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IntelisisCorp\" \/>\n<meta name=\"twitter:site\" content=\"@IntelisisCorp\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"IntelisisMx\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/\"},\"author\":{\"name\":\"IntelisisMx\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6b0fe69076f2e97113f967cfc2f385f\"},\"headline\":\"5 tipos de software maliciosos del que hay que cuidarse\",\"datePublished\":\"2019-02-14T15:54:14+00:00\",\"dateModified\":\"2022-12-22T16:54:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/\"},\"wordCount\":364,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/ransomware.jpg\",\"keywords\":[\"Almacenamiento de archivos\",\"Servicios en la NUBE\",\"Software remoto\"],\"articleSection\":[\"Otras\",\"Tecnolog\u00eda en la NUBE\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/\",\"name\":\"5 tipos de software maliciosos del que hay que cuidarse - Intelisis Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/ransomware.jpg\",\"datePublished\":\"2019-02-14T15:54:14+00:00\",\"dateModified\":\"2022-12-22T16:54:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/#primaryimage\",\"url\":\"http:\\\/\\\/intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/ransomware.jpg\",\"contentUrl\":\"http:\\\/\\\/intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/ransomware.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 tipos de software maliciosos del que hay que cuidarse\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\",\"name\":\"Blog Intelisis Software\",\"description\":\"Informaci&oacute;n de valor sobre ERP y tendencias tecnol&oacute;gicas\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#organization\",\"name\":\"Intelisis Software\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo_intelisis_.png\",\"contentUrl\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/08\\\/logo_intelisis_.png\",\"width\":1133,\"height\":326,\"caption\":\"Intelisis Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Intelisis\\\/\",\"https:\\\/\\\/x.com\\\/IntelisisCorp\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/intelisis-sa-de-cv\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRFKIq10T-foPWN4hN2Jhrg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.intelisis.com\\\/blog\\\/#\\\/schema\\\/person\\\/f6b0fe69076f2e97113f967cfc2f385f\",\"name\":\"IntelisisMx\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g\",\"caption\":\"IntelisisMx\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"5 tipos de software maliciosos del que hay que cuidarse - Intelisis Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/","og_locale":"es_MX","og_type":"article","og_title":"5 tipos de software maliciosos del que hay que cuidarse","og_description":"Cada d\u00eda nos exponemos a cientos de oportunidades para ser atacados por internet, as\u00ed que la firma cibernautita Eset identific\u00f3 cinco tipos de programas de software malicioso, conocidos como ransomware, los cuales trabajan con ciertas diferencias pero que tienen como prop\u00f3sito da\u00f1ar a los usuarios de internet.","og_url":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/","og_site_name":"Intelisis Blog","article_publisher":"https:\/\/www.facebook.com\/Intelisis\/","article_published_time":"2019-02-14T15:54:14+00:00","article_modified_time":"2022-12-22T16:54:49+00:00","og_image":[{"url":"http:\/\/intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/ransomware.jpg","type":"","width":"","height":""}],"author":"IntelisisMx","twitter_card":"summary_large_image","twitter_creator":"@IntelisisCorp","twitter_site":"@IntelisisCorp","twitter_misc":{"Escrito por":"IntelisisMx","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/#article","isPartOf":{"@id":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/"},"author":{"name":"IntelisisMx","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/person\/f6b0fe69076f2e97113f967cfc2f385f"},"headline":"5 tipos de software maliciosos del que hay que cuidarse","datePublished":"2019-02-14T15:54:14+00:00","dateModified":"2022-12-22T16:54:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/"},"wordCount":364,"commentCount":0,"publisher":{"@id":"https:\/\/www.intelisis.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/#primaryimage"},"thumbnailUrl":"http:\/\/intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/ransomware.jpg","keywords":["Almacenamiento de archivos","Servicios en la NUBE","Software remoto"],"articleSection":["Otras","Tecnolog\u00eda en la NUBE"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/","url":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/","name":"5 tipos de software maliciosos del que hay que cuidarse - Intelisis Blog","isPartOf":{"@id":"https:\/\/www.intelisis.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/#primaryimage"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/#primaryimage"},"thumbnailUrl":"http:\/\/intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/ransomware.jpg","datePublished":"2019-02-14T15:54:14+00:00","dateModified":"2022-12-22T16:54:49+00:00","breadcrumb":{"@id":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/#primaryimage","url":"http:\/\/intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/ransomware.jpg","contentUrl":"http:\/\/intelisis.com\/blog\/wp-content\/uploads\/2019\/02\/ransomware.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.intelisis.com\/blog\/5-tipos-de-software-maliciosos-del-que-hay-que-cuidarse\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/www.intelisis.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 tipos de software maliciosos del que hay que cuidarse"}]},{"@type":"WebSite","@id":"https:\/\/www.intelisis.com\/blog\/#website","url":"https:\/\/www.intelisis.com\/blog\/","name":"Blog Intelisis Software","description":"Informaci&oacute;n de valor sobre ERP y tendencias tecnol&oacute;gicas","publisher":{"@id":"https:\/\/www.intelisis.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intelisis.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.intelisis.com\/blog\/#organization","name":"Intelisis Software","url":"https:\/\/www.intelisis.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2023\/08\/logo_intelisis_.png","contentUrl":"https:\/\/www.intelisis.com\/blog\/wp-content\/uploads\/2023\/08\/logo_intelisis_.png","width":1133,"height":326,"caption":"Intelisis Software"},"image":{"@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Intelisis\/","https:\/\/x.com\/IntelisisCorp","https:\/\/www.linkedin.com\/company\/intelisis-sa-de-cv\/","https:\/\/www.youtube.com\/channel\/UCRFKIq10T-foPWN4hN2Jhrg"]},{"@type":"Person","@id":"https:\/\/www.intelisis.com\/blog\/#\/schema\/person\/f6b0fe69076f2e97113f967cfc2f385f","name":"IntelisisMx","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3a62493c8f0a6cbeb44a5e9891b59832a8bb99768ef172a0b427705b1b2c0fb4?s=96&d=mm&r=g","caption":"IntelisisMx"}}]}},"amp_enabled":true,"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1453","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/comments?post=1453"}],"version-history":[{"count":2,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1453\/revisions"}],"predecessor-version":[{"id":1458,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/posts\/1453\/revisions\/1458"}],"wp:attachment":[{"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/media?parent=1453"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/categories?post=1453"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.intelisis.com\/blog\/wp-json\/wp\/v2\/tags?post=1453"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}