{"id":1052,"date":"2010-07-04T11:24:42","date_gmt":"2010-07-04T10:24:42","guid":{"rendered":"http:\/\/seguridadeninternet.wordpress.com\/?p=1052"},"modified":"2010-07-04T11:24:42","modified_gmt":"2010-07-04T10:24:42","slug":"pandalabs-reporta-nueva-modalidad-de-phishing","status":"publish","type":"post","link":"https:\/\/www.montejo.biz\/blog\/2010\/07\/04\/pandalabs-reporta-nueva-modalidad-de-phishing\/","title":{"rendered":"PandaLabs reporta nueva modalidad de Phishing"},"content":{"rendered":"<div id=\"post-entry-excerpt-1052\" class=\"entry-part\"><p>En el informe trimestral de amenazas inform\u00e1ticas presentado por PandaLabs, para el reci\u00e9n finalizado segundo trimestre del a\u00f1o, destaca la presencia de una nueva modalidad de ataque inform\u00e1tico del g\u00e9nero Phishing, denominada Tabnabbing. Este nuevo tipo de ataque aprovecha el sistema de navegaci\u00f3n por pesta\u00f1as que utilizan la mayor\u00eda de los navegadores web, para enga\u00f1ar a los usuarios y hacerles creer que se encuentran en la p\u00e1gina web de alg\u00fan servicio conocido, con el objetivo de robar las contrase\u00f1as de acceso del usuario afectado.<\/p>\n<p><a href=\"http:\/\/www.rompecadenas.com.ar\/articulos\/pandalabs-reporta-nueva.php\" target=\"_blank\">Enlace<\/a><\/p>\n\n\t\t\t\t\t\t\t<p style=\" color: #999999;\">If you found an error, highlight it and press <strong>Shift + E<\/strong> or <a href=\"#\" class=\"enp-report\"><strong>pulsa aqu\u00ed<\/strong><\/a> to inform us.<\/p>\n\t\t\t\t\t\t<\/div><div id=\"post-footer-1052\" class=\"post-footer clear\"><\/div>","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>En el informe trimestral de amenazas inform\u00e1ticas presentado por PandaLabs, para el reci\u00e9n finalizado segundo trimestre del a\u00f1o, destaca la presencia de una nueva modalidad <a class=\"mh-excerpt-more\" href=\"https:\/\/www.montejo.biz\/blog\/2010\/07\/04\/pandalabs-reporta-nueva-modalidad-de-phishing\/\" title=\"PandaLabs reporta nueva modalidad de Phishing\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[11],"tags":[119],"class_list":["post-1052","post","type-post","status-publish","format-standard","hentry","category-ciberataques","tag-ciberataques"],"_links":{"self":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/1052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/comments?post=1052"}],"version-history":[{"count":0,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/1052\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/media?parent=1052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/categories?post=1052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/tags?post=1052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}