{"id":63884,"date":"2017-09-29T14:46:26","date_gmt":"2017-09-29T12:46:26","guid":{"rendered":"https:\/\/internetrepublica.com\/?p=63884"},"modified":"2017-10-23T13:21:58","modified_gmt":"2017-10-23T11:21:58","slug":"phishing-pescando-victimas","status":"publish","type":"post","link":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/","title":{"rendered":"Phishing: pescando v\u00edctimas"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">El comportamiento de compra del consumidor ha evolucionado much\u00edsimo en las \u00faltimas d\u00e9cadas. En los 80 los consumidores compraban en las tiendas tradicionales, en los 90 se fueron incrementando las franquicias y a partir del a\u00f1o 2.000 se centralizan todas las posibles necesidades del consumidor en un mismo punto de venta.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Actualmente, no hay duda de que ha habido una evoluci\u00f3n importante. Ahora gran parte de los consumidores realizan compras desde su dispositivo digital. Del 2016 al 2020 se espera que el volumen de ventas globales alcance el 12%. Concretamente, en Espa\u00f1a, en 10 a\u00f1os ha aumentado un 36% el volumen de espa\u00f1oles que realizan operaciones a trav\u00e9s de internet.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Con todo esto queremos decir, que la evoluci\u00f3n de una lleva consigo la parte negativa de esto. Hablamos de las nuevas t\u00e9cnicas de hackeo en internet, concretamente del <em>phishing<\/em>, que ha ido \u201cmejorando\u201d en sus t\u00e9cnicas con el tiempo. Se aprovechan de esta nueva conexi\u00f3n entre cliente y empresa que utiliza un dispositivo, para poder as\u00ed robar o recopilar datos personales, contrase\u00f1as y hacerse con la cuenta de un usuario.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Por ello, el <em>phishing<\/em> se define como una suplantaci\u00f3n de identidad a consecuencia del enga\u00f1o disfrazado de la confianza que tienes de una empresa o persona, que se presenta desde un simple correo electr\u00f3nico (la manera m\u00e1s habitual), hasta una llamada telef\u00f3nica.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Todo el mundo es vulnerable ante esta amenaza, aunque tengas un <em>software<\/em> de seguridad. Porque todo el mundo puede recibir, por ejemplo, un correo de una \u201centidad oficial\u201d y picar el anzuelo.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>\u00bfC\u00f3mo evitar el phishing?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Para no caer en sus redes, te contamos qu\u00e9 debes hacer:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>En primer lugar, verifica la autenticidad del correo electr\u00f3nico<\/b><span style=\"font-weight: 400;\">. Tienes que tener en cuenta que una empresa seria no te va a pedir datos personales a trav\u00e9s del correo, as\u00ed que no hagas clic en el enlace que env\u00edan. Observa tambi\u00e9n posibles errores ortogr\u00e1ficos, las compa\u00f1\u00edas no suelen cometerlos. Otra se\u00f1al clara es si falta tu nombre propio en el encabezado, si este campo est\u00e1 vac\u00edo, \u00a1huye!<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>La p\u00e1gina web:<\/b><span style=\"font-weight: 400;\"> Si por error has hecho clic en los enlaces, puede que haya soluci\u00f3n si no se han introducidos a\u00fan datos. Debes fijarte entonces que la p\u00e1gina tenga habilitado el \u201chttps\u201d en su URL. Tampoco te f\u00edes si el enlace est\u00e1 acortado porque pueden disfrazar la web falsa. Puedes acceder a <\/span><a href=\"https:\/\/www.unshorten.it\"><span style=\"font-weight: 400;\">https:\/\/www.unshorten.it<\/span><\/a><span style=\"font-weight: 400;\"> para comprobar la veracidad de estos. F\u00edjate bien, adem\u00e1s, porque puede contener caracteres <em>Unicode<\/em> enmascarando as\u00ed la web falsa.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Tener sentido com\u00fan:<\/b><span style=\"font-weight: 400;\"> Lo m\u00e1s recomendable es que guardes en la \u2018barra de favoritos\u2019 aquellos enlaces que utilices habitualmente y nunca acceder desde otros enlaces externos. F\u00edjate bien en todos los detalles.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><b>\u00daltimos casos de<em> phishing<\/em><\/b><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"><strong>Whatsapp:<\/strong> Cuantos m\u00e1s peces haya en el mar, m\u00e1s posibilidades hay de pescar a alguno. Y es que, es la aplicaci\u00f3n de mensajer\u00eda utilizada por millones de usuarios. La Polic\u00eda Nacional y de Madrid en Twitter han informado que hay nuevo bulo que est\u00e1 recorriendo las conversaciones de Whatsapp.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Nos avisan de unos bonos y promociones que son fraudulentas para no caer en la trampa.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-63885\" src=\"https:\/\/internetrepublica.com\/wp-content\/uploads\/2017\/09\/Captura.png\" alt=\"\" width=\"473\" height=\"456\" srcset=\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/Captura.png 578w, https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/Captura-300x289.png 300w\" sizes=\"auto, (max-width: 473px) 100vw, 473px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-63886\" src=\"https:\/\/internetrepublica.com\/wp-content\/uploads\/2017\/09\/Captura-1.png\" alt=\"phishing\" width=\"575\" height=\"382\" srcset=\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/Captura-1.png 579w, https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/Captura-1-300x199.png 300w\" sizes=\"auto, (max-width: 575px) 100vw, 575px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"><strong>Netflix:<\/strong>\u00a0Otro ejemplo de <em>phishing<\/em> reciente se ha podido ver en la plataforma de entretenimiento en <em>streaming<\/em> multimedia. En este caso, el fraude en el correo electr\u00f3nico simula la ca\u00edda del servicio por la p\u00e9rdida de datos personales del due\u00f1o de la cuenta. En el correo puede leerse: \u201c<\/span><i><span style=\"font-weight: 400;\">Estimado cliente: lamentamos informarle que su cuenta est\u00e1 temporalmente suspendida debido a un problema de facturaci\u00f3n\u201d<\/span><\/i><span style=\"font-weight: 400;\">, enviado por \u201c<\/span><i><span style=\"font-weight: 400;\">Netflix <\/span><\/i><a href=\"mailto:Netflix@infoclientes.com\"><span style=\"font-weight: 400;\">Netflix@infoclientes.com<\/span><\/a><i><span style=\"font-weight: 400;\">\u201d<\/span><\/i><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Lo que pretenden es que la v\u00edctima, una vez en la p\u00e1gina falsa, introduzca su usuario y contrase\u00f1a y posteriormente los datos de la tarjeta de cr\u00e9dito. La extensi\u00f3n de la p\u00e1gina acababa en \u201c.uy\u201d que se parece a Netflix. Si se ha ca\u00eddo en la trampa, lo mejor es rechazar el pago y cambiar la contrase\u00f1a de tu cuenta de Netflix.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-63887\" src=\"https:\/\/internetrepublica.com\/wp-content\/uploads\/2017\/09\/tecnologia-2539461w620.jpg\" alt=\"phishing\" width=\"620\" height=\"348\" srcset=\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/tecnologia-2539461w620.jpg 620w, https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/tecnologia-2539461w620-300x168.jpg 300w\" sizes=\"auto, (max-width: 620px) 100vw, 620px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; El comportamiento de compra del consumidor ha evolucionado much\u00edsimo en las \u00faltimas d\u00e9cadas. En los 80 los consumidores compraban en las tiendas tradicionales, en&#8230;<\/p>\n","protected":false},"author":46,"featured_media":63889,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[110],"tags":[36,281,1010,1027],"class_list":["post-63884","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-marketing","tag-digital-marketing","tag-ecommerce","tag-email-marketing","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing: pescando v\u00edctimas - Internet Rep\u00fablica<\/title>\n<meta name=\"description\" content=\"&nbsp; El comportamiento de compra del consumidor ha evolucionado much\u00edsimo en las \u00faltimas d\u00e9cadas. En los 80 los consumidores compraban en las tiendas\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing: pescando v\u00edctimas - Internet Rep\u00fablica\" \/>\n<meta property=\"og:description\" content=\"&nbsp; El comportamiento de compra del consumidor ha evolucionado much\u00edsimo en las \u00faltimas d\u00e9cadas. En los 80 los consumidores compraban en las tiendas\" \/>\n<meta property=\"og:url\" content=\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/\" \/>\n<meta property=\"og:site_name\" content=\"Internet Rep\u00fablica\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-29T12:46:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-23T11:21:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/hannah-wei-84051_opt.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Natalia Garrido Garc\u00eda\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Natalia Garrido Garc\u00eda\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/\"},\"author\":{\"name\":\"Natalia Garrido Garc\u00eda\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/25e6d076890105e20de3331fd8a19da9\"},\"headline\":\"Phishing: pescando v\u00edctimas\",\"datePublished\":\"2017-09-29T12:46:26+00:00\",\"dateModified\":\"2017-10-23T11:21:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/\"},\"wordCount\":707,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/hannah-wei-84051_opt.jpg\",\"keywords\":[\"Digital Marketing\",\"ecommerce\",\"email marketing\",\"malware\"],\"articleSection\":[\"Marketing\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/\",\"url\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/\",\"name\":\"Phishing: pescando v\u00edctimas - Internet Rep\u00fablica\",\"isPartOf\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/hannah-wei-84051_opt.jpg\",\"datePublished\":\"2017-09-29T12:46:26+00:00\",\"dateModified\":\"2017-10-23T11:21:58+00:00\",\"author\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/25e6d076890105e20de3331fd8a19da9\"},\"description\":\"&nbsp; El comportamiento de compra del consumidor ha evolucionado much\u00edsimo en las \u00faltimas d\u00e9cadas. En los 80 los consumidores compraban en las tiendas\",\"breadcrumb\":{\"@id\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#primaryimage\",\"url\":\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/hannah-wei-84051_opt.jpg\",\"contentUrl\":\"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/hannah-wei-84051_opt.jpg\",\"width\":\"750\",\"height\":\"500\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Agencia Marketing Digital\",\"item\":\"https:\/\/internetrepublica.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Marketing\",\"item\":\"https:\/\/internetrepublica.com\/blog\/marketing\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Phishing: pescando v\u00edctimas\",\"item\":\"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/#website\",\"url\":\"https:\/\/internetrepublica.com\/blog\/\",\"name\":\"Internet Rep\u00fablica\",\"description\":\"Agencia SEO y Marketing Digital\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/internetrepublica.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/25e6d076890105e20de3331fd8a19da9\",\"name\":\"Natalia Garrido Garc\u00eda\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/1b35b2960093eeb9325c1671af2d68682522510fdf094db3f254a577e03d4e5c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b35b2960093eeb9325c1671af2d68682522510fdf094db3f254a577e03d4e5c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b35b2960093eeb9325c1671af2d68682522510fdf094db3f254a577e03d4e5c?s=96&d=mm&r=g\",\"caption\":\"Natalia Garrido Garc\u00eda\"},\"url\":\"https:\/\/internetrepublica.com\/blog\/author\/natalia-garrido\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing: pescando v\u00edctimas - Internet Rep\u00fablica","description":"&nbsp; El comportamiento de compra del consumidor ha evolucionado much\u00edsimo en las \u00faltimas d\u00e9cadas. En los 80 los consumidores compraban en las tiendas","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/","og_locale":"es_ES","og_type":"article","og_title":"Phishing: pescando v\u00edctimas - Internet Rep\u00fablica","og_description":"&nbsp; El comportamiento de compra del consumidor ha evolucionado much\u00edsimo en las \u00faltimas d\u00e9cadas. En los 80 los consumidores compraban en las tiendas","og_url":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/","og_site_name":"Internet Rep\u00fablica","article_published_time":"2017-09-29T12:46:26+00:00","article_modified_time":"2017-10-23T11:21:58+00:00","og_image":[{"width":750,"height":500,"url":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/hannah-wei-84051_opt.jpg","type":"image\/jpeg"}],"author":"Natalia Garrido Garc\u00eda","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Natalia Garrido Garc\u00eda","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#article","isPartOf":{"@id":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/"},"author":{"name":"Natalia Garrido Garc\u00eda","@id":"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/25e6d076890105e20de3331fd8a19da9"},"headline":"Phishing: pescando v\u00edctimas","datePublished":"2017-09-29T12:46:26+00:00","dateModified":"2017-10-23T11:21:58+00:00","mainEntityOfPage":{"@id":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/"},"wordCount":707,"commentCount":0,"image":{"@id":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#primaryimage"},"thumbnailUrl":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/hannah-wei-84051_opt.jpg","keywords":["Digital Marketing","ecommerce","email marketing","malware"],"articleSection":["Marketing"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/","url":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/","name":"Phishing: pescando v\u00edctimas - Internet Rep\u00fablica","isPartOf":{"@id":"https:\/\/internetrepublica.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#primaryimage"},"image":{"@id":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#primaryimage"},"thumbnailUrl":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/hannah-wei-84051_opt.jpg","datePublished":"2017-09-29T12:46:26+00:00","dateModified":"2017-10-23T11:21:58+00:00","author":{"@id":"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/25e6d076890105e20de3331fd8a19da9"},"description":"&nbsp; El comportamiento de compra del consumidor ha evolucionado much\u00edsimo en las \u00faltimas d\u00e9cadas. En los 80 los consumidores compraban en las tiendas","breadcrumb":{"@id":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#primaryimage","url":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/hannah-wei-84051_opt.jpg","contentUrl":"https:\/\/internetrepublica.com\/blog\/wp-content\/uploads\/2017\/09\/hannah-wei-84051_opt.jpg","width":"750","height":"500"},{"@type":"BreadcrumbList","@id":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Agencia Marketing Digital","item":"https:\/\/internetrepublica.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Marketing","item":"https:\/\/internetrepublica.com\/blog\/marketing\/"},{"@type":"ListItem","position":3,"name":"Phishing: pescando v\u00edctimas","item":"https:\/\/internetrepublica.com\/blog\/phishing-pescando-victimas\/"}]},{"@type":"WebSite","@id":"https:\/\/internetrepublica.com\/blog\/#website","url":"https:\/\/internetrepublica.com\/blog\/","name":"Internet Rep\u00fablica","description":"Agencia SEO y Marketing Digital","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/internetrepublica.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/internetrepublica.com\/blog\/#\/schema\/person\/25e6d076890105e20de3331fd8a19da9","name":"Natalia Garrido Garc\u00eda","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/1b35b2960093eeb9325c1671af2d68682522510fdf094db3f254a577e03d4e5c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/1b35b2960093eeb9325c1671af2d68682522510fdf094db3f254a577e03d4e5c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b35b2960093eeb9325c1671af2d68682522510fdf094db3f254a577e03d4e5c?s=96&d=mm&r=g","caption":"Natalia Garrido Garc\u00eda"},"url":"https:\/\/internetrepublica.com\/blog\/author\/natalia-garrido\/"}]}},"_links":{"self":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts\/63884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/comments?post=63884"}],"version-history":[{"count":4,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts\/63884\/revisions"}],"predecessor-version":[{"id":63892,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/posts\/63884\/revisions\/63892"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/media\/63889"}],"wp:attachment":[{"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/media?parent=63884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/categories?post=63884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/internetrepublica.com\/blog\/wp-json\/wp\/v2\/tags?post=63884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}