{"id":263,"date":"2009-02-06T08:00:51","date_gmt":"2009-02-06T07:00:51","guid":{"rendered":"http:\/\/seguridadeninternet.wordpress.com\/?p=263"},"modified":"2009-02-06T08:00:51","modified_gmt":"2009-02-06T07:00:51","slug":"telefonos-moviles-en-la-mira-de-los-cibercriminales","status":"publish","type":"post","link":"https:\/\/www.montejo.biz\/blog\/2009\/02\/06\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/","title":{"rendered":"Tel\u00e9fonos m\u00f3viles en la mira de los cibercriminales"},"content":{"rendered":"<div id=\"post-entry-excerpt-263\" class=\"entry-part\"><p><span class=\"titulo-head\">Los usuarios de tel\u00e9fonos m\u00f3viles nunca hab\u00edan sido el principal objetivo de los cibercriminales. Sin embargo, el periodo de tranquilidad ya ha terminado y, desde hace alg\u00fan tiempo, programas maliciosos como troyanos, virus y spam est\u00e1n ganando terreno en el mundo m\u00f3vil.<\/span><\/p>\n<p><a href=\"http:\/\/www.diarioti.com\/gate\/n.php?id=21192\" target=\"_blank\">Enlace<\/a><\/p>\n\n\t\t\t\t\t\t\t<p style=\" color: #999999;\">If you found an error, highlight it and press <strong>Shift + E<\/strong> or <a href=\"#\" class=\"enp-report\"><strong>pulsa aqu\u00ed<\/strong><\/a> to inform us.<\/p>\n\t\t\t\t\t\t<\/div><div id=\"post-footer-263\" class=\"post-footer clear\"><\/div>","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Los usuarios de tel\u00e9fonos m\u00f3viles nunca hab\u00edan sido el principal objetivo de los cibercriminales. Sin embargo, el periodo de tranquilidad ya ha terminado y, desde <a class=\"mh-excerpt-more\" href=\"https:\/\/www.montejo.biz\/blog\/2009\/02\/06\/telefonos-moviles-en-la-mira-de-los-cibercriminales\/\" title=\"Tel\u00e9fonos m\u00f3viles en la mira de los cibercriminales\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[55],"tags":[162],"class_list":["post-263","post","type-post","status-publish","format-standard","hentry","category-seguridad","tag-seguridad"],"_links":{"self":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/263","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/comments?post=263"}],"version-history":[{"count":0,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/263\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/media?parent=263"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/categories?post=263"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/tags?post=263"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}