{"id":1408,"date":"2011-09-18T21:22:14","date_gmt":"2011-09-18T20:22:14","guid":{"rendered":"http:\/\/seguridadeninternet.wordpress.com\/?p=1408"},"modified":"2011-09-18T21:22:14","modified_gmt":"2011-09-18T20:22:14","slug":"dominio-de-softonic-falso-utilizado-para-infectar","status":"publish","type":"post","link":"https:\/\/www.montejo.biz\/blog\/2011\/09\/18\/dominio-de-softonic-falso-utilizado-para-infectar\/","title":{"rendered":"Dominio de Softonic falso utilizado para infectar"},"content":{"rendered":"<div id=\"post-entry-excerpt-1408\" class=\"entry-part\"><p>Softonic.com es uno de los portales de descargas m\u00e1s conocidos en espa\u00f1ol, tan solo en el mes de agosto m\u00e1s de 100 millones de personas lo visitaron en busca de programas, por lo que no resulta extra\u00f1o que algunos atacantes aprovechen su marca para infectar.<\/p>\n<p><a title=\"Softonic\" href=\"http:\/\/spamloco.net\/2011\/09\/dominio-de-softonic-falso-utilizado.html\" target=\"_blank\">Enlace<\/a><\/p>\n\n\t\t\t\t\t\t\t<p style=\" color: #999999;\">If you found an error, highlight it and press <strong>Shift + E<\/strong> or <a href=\"#\" class=\"enp-report\"><strong>pulsa aqu\u00ed<\/strong><\/a> to inform us.<\/p>\n\t\t\t\t\t\t<\/div><div id=\"post-footer-1408\" class=\"post-footer clear\"><\/div>","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Softonic.com es uno de los portales de descargas m\u00e1s conocidos en espa\u00f1ol, tan solo en el mes de agosto m\u00e1s de 100 millones de personas <a class=\"mh-excerpt-more\" href=\"https:\/\/www.montejo.biz\/blog\/2011\/09\/18\/dominio-de-softonic-falso-utilizado-para-infectar\/\" title=\"Dominio de Softonic falso utilizado para infectar\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[11],"tags":[119],"class_list":["post-1408","post","type-post","status-publish","format-standard","hentry","category-ciberataques","tag-ciberataques"],"_links":{"self":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/1408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/comments?post=1408"}],"version-history":[{"count":0,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/1408\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/media?parent=1408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/categories?post=1408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/tags?post=1408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}