{"id":365,"date":"2009-03-22T08:00:55","date_gmt":"2009-03-22T07:00:55","guid":{"rendered":"http:\/\/seguridadeninternet.wordpress.com\/?p=365"},"modified":"2009-03-22T08:00:55","modified_gmt":"2009-03-22T07:00:55","slug":"el-ciberdelito-as-a-service","status":"publish","type":"post","link":"https:\/\/www.montejo.biz\/blog\/2009\/03\/22\/el-ciberdelito-as-a-service\/","title":{"rendered":"El ciberdelito \u00abas a service\u00bb"},"content":{"rendered":"<div id=\"post-entry-excerpt-365\" class=\"entry-part\"><p>Aquellos sujetos interesados en probar suerte -y arriesgar una temporada en la c\u00e1rcel- mediante la ciberdelincuencia, pero que desconocen los procedimientos t\u00e9cnicos para lograrlo, pueden contratar los servicios de profesionales.<\/p>\n<p>En efecto, ciberdelincuentes venden cada vez m\u00e1s servicios delictivos v\u00eda Internet, escribe ITnews. Ya no solo es posible comprar herramientas de hacking para intervenir PC de usuarios de Internet, sino tambi\u00e9n es posible contratar servicios de mantenimiento a los delincuentes. La tarifa por tres meses de mantenimiento es de USD 50.<\/p>\n<p><a href=\"http:\/\/www.diarioti.com\/gate\/n.php?id=21661\" target=\"_blank\">Enlace<\/a><\/p>\n\n\t\t\t\t\t\t\t<p style=\" color: #999999;\">If you found an error, highlight it and press <strong>Shift + E<\/strong> or <a href=\"#\" class=\"enp-report\"><strong>pulsa aqu\u00ed<\/strong><\/a> to inform us.<\/p>\n\t\t\t\t\t\t<\/div><div id=\"post-footer-365\" class=\"post-footer clear\"><\/div>","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Aquellos sujetos interesados en probar suerte -y arriesgar una temporada en la c\u00e1rcel- mediante la ciberdelincuencia, pero que desconocen los procedimientos t\u00e9cnicos para lograrlo, pueden <a class=\"mh-excerpt-more\" href=\"https:\/\/www.montejo.biz\/blog\/2009\/03\/22\/el-ciberdelito-as-a-service\/\" title=\"El ciberdelito \u00abas a service\u00bb\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[13],"tags":[121],"class_list":["post-365","post","type-post","status-publish","format-standard","hentry","category-ciberdelitos","tag-ciberdelitos"],"_links":{"self":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/365","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/comments?post=365"}],"version-history":[{"count":0,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/365\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/media?parent=365"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/categories?post=365"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/tags?post=365"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}