{"id":3690,"date":"2022-12-07T16:38:17","date_gmt":"2022-12-07T16:38:17","guid":{"rendered":"http:\/\/defensoriaparana.com.ar\/?p=3690"},"modified":"2022-12-07T16:39:03","modified_gmt":"2022-12-07T16:39:03","slug":"phishin-recomendaciones-para-prevenir-estafas","status":"publish","type":"post","link":"https:\/\/defensoriaparana.com.ar\/index.php\/2022\/12\/07\/phishin-recomendaciones-para-prevenir-estafas\/","title":{"rendered":"Phishing: recomendaciones para prevenir estafas"},"content":{"rendered":"<p style=\"background: white; margin: 0cm 0cm 18.0pt 0cm;\"><span style=\"font-family: 'Arial','sans-serif'; color: #333333;\">\u00a0<\/span><span style=\"font-family: 'Arial','sans-serif'; color: #333333;\">Qu\u00e9 es el\u00a0<em style=\"box-sizing: border-box;\"><span style=\"font-family: 'Arial','sans-serif';\">phishing? <\/span><\/em>\u00a0La palabra quiere decir suplantaci\u00f3n de identidad.<\/span><\/p>\n<p style=\"background: white; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 0cm 0cm 18.0pt 0cm;\"><span style=\"font-family: 'Arial','sans-serif'; color: #333333;\">Es una t\u00e9cnica de\u00a0ingenier\u00eda social que usan los ciberdelincuentes para obtener informaci\u00f3n confidencial de los usuarios de forma fraudulenta y as\u00ed apropiarse de la identidad de esas personas.<\/span><\/p>\n<p style=\"background: white; box-sizing: border-box; font-variant-ligatures: normal; font-variant-caps: normal; orphans: 2; text-align: start; widows: 2; -webkit-text-stroke-width: 0px; text-decoration-thickness: initial; text-decoration-style: initial; text-decoration-color: initial; word-spacing: 0px; margin: 0cm 0cm 18.0pt 0cm;\"><span style=\"font-family: 'Arial','sans-serif'; color: #333333;\">Los\u00a0ciberdelincuentes env\u00edan correos electr\u00f3nicos falsos como anzuelo para \u201cpescar\u201d contrase\u00f1as y datos personales valiosos, se informa desde Argentina. gob.ar.<\/span><\/p>\n<p style=\"background: white; margin: 0cm 0cm 18.0pt 0cm;\"><span style=\"font-family: 'Arial','sans-serif'; color: #333333;\">A continuaci\u00f3n, consejos \u00fatiles del \u00e1rea Delitos Econ\u00f3micos de la Polic\u00eda de Entre R\u00edos.<\/span><\/p>\n<p><img loading=\"lazy\" class=\"alignnone size-medium wp-image-3691\" src=\"http:\/\/defensoriaparana.com.ar\/wp-content\/uploads\/2022\/12\/estafas-218x300.jpg\" alt=\"\" width=\"218\" height=\"300\" srcset=\"https:\/\/defensoriaparana.com.ar\/wp-content\/uploads\/2022\/12\/estafas-218x300.jpg 218w, https:\/\/defensoriaparana.com.ar\/wp-content\/uploads\/2022\/12\/estafas.jpg 463w\" sizes=\"(max-width: 218px) 100vw, 218px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Qu\u00e9 es el\u00a0phishing? \u00a0La palabra quiere decir suplantaci\u00f3n de identidad. Es una t\u00e9cnica de\u00a0ingenier\u00eda social que usan los ciberdelincuentes para obtener informaci\u00f3n confidencial de los usuarios de forma fraudulenta y as\u00ed apropiarse de la identidad de esas personas. Los\u00a0ciberdelincuentes env\u00edan correos electr\u00f3nicos falsos como anzuelo para \u201cpescar\u201d contrase\u00f1as y datos personales valiosos, se informa desde [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3691,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/posts\/3690"}],"collection":[{"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/comments?post=3690"}],"version-history":[{"count":2,"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/posts\/3690\/revisions"}],"predecessor-version":[{"id":3693,"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/posts\/3690\/revisions\/3693"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/media\/3691"}],"wp:attachment":[{"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/media?parent=3690"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/categories?post=3690"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/defensoriaparana.com.ar\/index.php\/wp-json\/wp\/v2\/tags?post=3690"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}