{"id":4371,"date":"2016-10-05T16:00:02","date_gmt":"2016-10-05T16:00:02","guid":{"rendered":"https:\/\/xelere.com\/?p=4371"},"modified":"2016-10-27T20:13:09","modified_gmt":"2016-10-27T20:13:09","slug":"arte-del-hacking-personal","status":"publish","type":"post","link":"https:\/\/xelere.com\/en\/arte-del-hacking-personal\/","title":{"rendered":"Arte del hacking personal"},"content":{"rendered":"<h5><strong>Autor: Mariano Amoroso, <\/strong><em>Consultor de Seguridad Inform\u00e1tica<\/em><\/h5>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Es sabido que las personas son consideradas el eslab\u00f3n m\u00e1s d\u00e9bil de la seguridad de la informaci\u00f3n de las organizaciones. La<\/span><b> ingenier\u00eda social<\/b><span style=\"font-weight: 400;\"> es el arte de manipular psicol\u00f3gicamente a las personas para obtener informaci\u00f3n confidencial como nombres de usuarios, contrase\u00f1as, correos electr\u00f3nicos, home-banking, accesos a sistemas o dispositivos finales. \u00a0\u00a0<\/span><\/p>\n<p><b>\u00bfCu\u00e1les son las t\u00e9cnicas de ingenier\u00eda social m\u00e1s comunes?<\/b><\/p>\n<ul>\n<li><b>Phishing<\/b><\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\">Se trata de obtener informaci\u00f3n a trav\u00e9s de un mensaje de correo electr\u00f3nico, enviado desde una fuente que aparenta ser leg\u00edtima, como un proveedor de servicios o instituci\u00f3n confiable. El objeto de esta t\u00e9cnica, es inducir al usuario a acceder a los enlaces acompa\u00f1ados en el mensaje e introducir all\u00ed sus datos personales.<\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/phishing-04.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4375 aligncenter\" src=\"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/phishing-04.png\" alt=\"phishing-04\" width=\"267\" height=\"237\" \/><\/a><\/p>\n<ul>\n<li><b>Malvertising<\/b><\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\"><span style=\"font-weight: 400;\">Este es el acto de incorporar programas maliciosos en publicidades de sitios web. Actualmente no hace falta que un usuario descargue ni seleccione un anuncio para ser infectado, basta con tener<\/span> <span style=\"font-weight: 400;\">plugins o<\/span> <span style=\"font-weight: 400;\">software desactualizados (y no contar con una soluci\u00f3n de seguridad apropiada) y visitar una p\u00e1gina infectada.<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-weight: 400;\">Si un atacante tiene acceso a los datos de navegaci\u00f3n de la v\u00edctima, tratar\u00e1 de<\/span> <span style=\"font-weight: 400;\">explotar eventuales vulnerabilidades en nuestro sistema operativo.<\/span><\/p>\n<p style=\"padding-left: 30px;\"><span style=\"font-weight: 400;\">Quiz\u00e1s la modalidad m\u00e1s novedosa en el creciente mercado de <\/span><i><span style=\"font-weight: 400;\">malvertising<\/span><\/i><span style=\"font-weight: 400;\"> es la subasta en tiempo real, proceso en el cual se ofrece la informaci\u00f3n del usuario a m\u00faltiples empresas de publicidad, que hacen sus ofertas seg\u00fan el perfil del entorno.<\/span><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/malvertising.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4378 aligncenter\" src=\"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/malvertising.png\" alt=\"malvertising\" width=\"267\" height=\"236\" \/><\/a><\/p>\n<ul>\n<li><b>Phone scams<\/b><\/li>\n<\/ul>\n<p style=\"padding-left: 30px;\"><span style=\"font-weight: 400;\">Las estafas telef\u00f3nicas fueron las primeras t\u00e9cnicas conocidas como ingenier\u00eda social. Son llamadas telef\u00f3nicas para convencer a los individuos a divulgar informaci\u00f3n sobre ellos mismos u otras personas. \u00a0A medida que la tecnolog\u00eda va evolucionando, \u00e9stas metodolog\u00edas van quedando fuera de uso y los nuevos atacantes prefieren otros tipos de ataques m\u00e1s modernos.<\/span><\/p>\n<p style=\"padding-left: 30px;\"><a href=\"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/phonescam-06.png\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4380 aligncenter\" src=\"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/phonescam-06.png\" alt=\"phonescam-06\" width=\"267\" height=\"237\" \/><\/a><\/p>\n<p><b>\u00bfC\u00f3mo podemos protegernos?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">La mejor manera de protegernos es estar informados. La <\/span><b>cultura <\/b><span style=\"font-weight: 400;\">y la <\/span><b>educaci\u00f3n <\/b><span style=\"font-weight: 400;\">continua <\/span><b>\u00a0<\/b><span style=\"font-weight: 400;\">nos permiten aprender sobre posibles amenazas y a su vez concientizar a nuestro entorno. Un buen ejercicio, que deber\u00eda ser parte de la estrategia de seguridad corporativa, es capacitar a sus empleados acerca de las \u00faltimas amenazas, \u00a0pol\u00edticas y procedimientos que reflejan la visi\u00f3n y misi\u00f3n de seguridad de la informaci\u00f3n. De esta forma aumentar\u00e1 la conciencia sobre los riesgos de seguridad, estar\u00e1n m\u00e1s prevenidos sobre posibles ataques y comprender\u00e1n su rol dentro de la seguridad de la informaci\u00f3n.<\/span><\/p>\n<p>A continuaci\u00f3n enumeramos algunas recomendaciones importantes que deber\u00edamos tener en cuenta:<\/p>\n<ol>\n<li><span style=\"font-weight: 400;\">Mantener nuestro sistema operativo actualizado.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Disponer de antivirus y antispyware.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Nunca responder solicitudes de informaci\u00f3n personal a trav\u00e9s de correos electr\u00f3nicos.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">No ejecutar archivos adjuntos de correos electr\u00f3nicos hasta analizarlos previamente con un antivirus.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Tener precauci\u00f3n con aquellas entidades con las que se intercambie informaci\u00f3n sensible y que no dispongan de certificados de autentificaci\u00f3n.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Comunicar al \u00e1rea correspondiente cada vez que hayamos sido v\u00edctimas de un ataque.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Usar el sentido com\u00fan, es la mejor herramienta de protecci\u00f3n frente a cualquier tipo de ataque de seguridad.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">En este art\u00edculo hemos visto algunos de los tipos de ingenier\u00eda social m\u00e1s conocidos y c\u00f3mo protegernos en contra de ellos. Este tipo de <\/span><b>amenazas<\/b><span style=\"font-weight: 400;\"> siempre est\u00e1n presentes en Internet, y tenemos que analizar el escenario para no ser v\u00edctimas de una estafa.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">La <\/span><b>educaci\u00f3n <\/b><span style=\"font-weight: 400;\">y <\/span><b>cultura <\/b><span style=\"font-weight: 400;\">del usuario son elementos necesarios para poder protegernos ante posibles amenazas. La continua actualizaci\u00f3n de conceptos permite estar preparados ante escenarios de ingenier\u00eda social. Asimismo, es necesario complementar dicha pr\u00e1ctica con soluciones de seguridad a fin de establecer la integridad, autenticidad y confidencialidad de la informaci\u00f3n.<\/span><\/p>\n<p style=\"text-align: center;\"><a href='https:\/\/xelere.com\/en\/seguridad-de-it\/' class='big-button bigblue' target=\"_blank\">Conoce m\u00e1s<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Autor: Mariano Amoroso, Consultor de Seguridad Inform\u00e1tica &nbsp; Es sabido que las personas son consideradas el eslab\u00f3n m\u00e1s d\u00e9bil de la seguridad de la informaci\u00f3n de las organizaciones. La ingenier\u00eda social es el arte de manipular psicol\u00f3gicamente a las personas para obtener informaci\u00f3n confidencial como nombres de usuarios, contrase\u00f1as, correos electr\u00f3nicos, home-banking, accesos a sistemas [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4372,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[78,16],"tags":[],"class_list":["post-4371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","category-novedades"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Arte del Hacking Personal<\/title>\n<meta name=\"description\" content=\"Autor: Mariano Amoroso, Consultor de Seguridad Inform\u00e1tica \u00bfQu\u00e9 es la Ingenier\u00eda social, cu\u00e1les son las t\u00e9cnicas m\u00e1s comunes y c\u00f3mo protegerse?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xelere.com\/en\/arte-del-hacking-personal\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Arte del Hacking Personal\" \/>\n<meta property=\"og:description\" content=\"Autor: Mariano Amoroso, Consultor de Seguridad Inform\u00e1tica \u00bfQu\u00e9 es la Ingenier\u00eda social, cu\u00e1les son las t\u00e9cnicas m\u00e1s comunes y c\u00f3mo protegerse?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xelere.com\/en\/arte-del-hacking-personal\/\" \/>\n<meta property=\"og:site_name\" content=\"Xelere\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XelereSA\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-05T16:00:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-10-27T20:13:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/Seguridad.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1438\" \/>\n\t<meta property=\"og:image:height\" content=\"960\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"xelere\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Xelere\" \/>\n<meta name=\"twitter:site\" content=\"@Xelere\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"xelere\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/\"},\"author\":{\"name\":\"xelere\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/person\\\/44f8c086c18d61177e921f90bf758f1d\"},\"headline\":\"Arte del hacking personal\",\"datePublished\":\"2016-10-05T16:00:02+00:00\",\"dateModified\":\"2016-10-27T20:13:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/\"},\"wordCount\":664,\"publisher\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Seguridad.jpg\",\"articleSection\":[\"Ciberseguridad\",\"Novedades\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/\",\"url\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/\",\"name\":\"Arte del Hacking Personal\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Seguridad.jpg\",\"datePublished\":\"2016-10-05T16:00:02+00:00\",\"dateModified\":\"2016-10-27T20:13:09+00:00\",\"description\":\"Autor: Mariano Amoroso, Consultor de Seguridad Inform\u00e1tica \u00bfQu\u00e9 es la Ingenier\u00eda social, cu\u00e1les son las t\u00e9cnicas m\u00e1s comunes y c\u00f3mo protegerse?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Seguridad.jpg\",\"contentUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2016\\\/10\\\/Seguridad.jpg\",\"width\":1438,\"height\":960},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xelere.com\\\/arte-del-hacking-personal\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/xelere.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Arte del hacking personal\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#website\",\"url\":\"https:\\\/\\\/xelere.com\\\/\",\"name\":\"Xelere\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xelere.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#organization\",\"name\":\"Xelere\",\"url\":\"https:\\\/\\\/xelere.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/Marca-Xelere-031.png\",\"contentUrl\":\"https:\\\/\\\/xelere.com\\\/wp-content\\\/uploads\\\/2015\\\/09\\\/Marca-Xelere-031.png\",\"width\":810,\"height\":283,\"caption\":\"Xelere\"},\"image\":{\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XelereSA\\\/\",\"https:\\\/\\\/x.com\\\/Xelere\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/xelere\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCq796T-Uv9WHCogZPJ8uXaQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xelere.com\\\/#\\\/schema\\\/person\\\/44f8c086c18d61177e921f90bf758f1d\",\"name\":\"xelere\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g\",\"caption\":\"xelere\"},\"url\":\"https:\\\/\\\/xelere.com\\\/en\\\/author\\\/lalonso\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Arte del Hacking Personal","description":"Autor: Mariano Amoroso, Consultor de Seguridad Inform\u00e1tica \u00bfQu\u00e9 es la Ingenier\u00eda social, cu\u00e1les son las t\u00e9cnicas m\u00e1s comunes y c\u00f3mo protegerse?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xelere.com\/en\/arte-del-hacking-personal\/","og_locale":"en_US","og_type":"article","og_title":"Arte del Hacking Personal","og_description":"Autor: Mariano Amoroso, Consultor de Seguridad Inform\u00e1tica \u00bfQu\u00e9 es la Ingenier\u00eda social, cu\u00e1les son las t\u00e9cnicas m\u00e1s comunes y c\u00f3mo protegerse?","og_url":"https:\/\/xelere.com\/en\/arte-del-hacking-personal\/","og_site_name":"Xelere","article_publisher":"https:\/\/www.facebook.com\/XelereSA\/","article_published_time":"2016-10-05T16:00:02+00:00","article_modified_time":"2016-10-27T20:13:09+00:00","og_image":[{"width":1438,"height":960,"url":"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/Seguridad.jpg","type":"image\/jpeg"}],"author":"xelere","twitter_card":"summary_large_image","twitter_creator":"@Xelere","twitter_site":"@Xelere","twitter_misc":{"Written by":"xelere","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xelere.com\/arte-del-hacking-personal\/#article","isPartOf":{"@id":"https:\/\/xelere.com\/arte-del-hacking-personal\/"},"author":{"name":"xelere","@id":"https:\/\/xelere.com\/#\/schema\/person\/44f8c086c18d61177e921f90bf758f1d"},"headline":"Arte del hacking personal","datePublished":"2016-10-05T16:00:02+00:00","dateModified":"2016-10-27T20:13:09+00:00","mainEntityOfPage":{"@id":"https:\/\/xelere.com\/arte-del-hacking-personal\/"},"wordCount":664,"publisher":{"@id":"https:\/\/xelere.com\/#organization"},"image":{"@id":"https:\/\/xelere.com\/arte-del-hacking-personal\/#primaryimage"},"thumbnailUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/Seguridad.jpg","articleSection":["Ciberseguridad","Novedades"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/xelere.com\/arte-del-hacking-personal\/","url":"https:\/\/xelere.com\/arte-del-hacking-personal\/","name":"Arte del Hacking Personal","isPartOf":{"@id":"https:\/\/xelere.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xelere.com\/arte-del-hacking-personal\/#primaryimage"},"image":{"@id":"https:\/\/xelere.com\/arte-del-hacking-personal\/#primaryimage"},"thumbnailUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/Seguridad.jpg","datePublished":"2016-10-05T16:00:02+00:00","dateModified":"2016-10-27T20:13:09+00:00","description":"Autor: Mariano Amoroso, Consultor de Seguridad Inform\u00e1tica \u00bfQu\u00e9 es la Ingenier\u00eda social, cu\u00e1les son las t\u00e9cnicas m\u00e1s comunes y c\u00f3mo protegerse?","breadcrumb":{"@id":"https:\/\/xelere.com\/arte-del-hacking-personal\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xelere.com\/arte-del-hacking-personal\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xelere.com\/arte-del-hacking-personal\/#primaryimage","url":"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/Seguridad.jpg","contentUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2016\/10\/Seguridad.jpg","width":1438,"height":960},{"@type":"BreadcrumbList","@id":"https:\/\/xelere.com\/arte-del-hacking-personal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xelere.com\/"},{"@type":"ListItem","position":2,"name":"Arte del hacking personal"}]},{"@type":"WebSite","@id":"https:\/\/xelere.com\/#website","url":"https:\/\/xelere.com\/","name":"Xelere","description":"","publisher":{"@id":"https:\/\/xelere.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xelere.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xelere.com\/#organization","name":"Xelere","url":"https:\/\/xelere.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xelere.com\/#\/schema\/logo\/image\/","url":"https:\/\/xelere.com\/wp-content\/uploads\/2015\/09\/Marca-Xelere-031.png","contentUrl":"https:\/\/xelere.com\/wp-content\/uploads\/2015\/09\/Marca-Xelere-031.png","width":810,"height":283,"caption":"Xelere"},"image":{"@id":"https:\/\/xelere.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XelereSA\/","https:\/\/x.com\/Xelere","https:\/\/www.linkedin.com\/company\/xelere","https:\/\/www.youtube.com\/channel\/UCq796T-Uv9WHCogZPJ8uXaQ"]},{"@type":"Person","@id":"https:\/\/xelere.com\/#\/schema\/person\/44f8c086c18d61177e921f90bf758f1d","name":"xelere","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/883b24fd669ccbd52ef87aa21126d9a9dd9637d642294f361aaac40ad88e8923?s=96&d=mm&r=g","caption":"xelere"},"url":"https:\/\/xelere.com\/en\/author\/lalonso\/"}]}},"_links":{"self":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/4371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/comments?post=4371"}],"version-history":[{"count":8,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/4371\/revisions"}],"predecessor-version":[{"id":4527,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/posts\/4371\/revisions\/4527"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/media\/4372"}],"wp:attachment":[{"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/media?parent=4371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/categories?post=4371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xelere.com\/en\/wp-json\/wp\/v2\/tags?post=4371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}