{"id":883,"date":"2010-02-10T13:40:35","date_gmt":"2010-02-10T12:40:35","guid":{"rendered":"http:\/\/seguridadeninternet.wordpress.com\/?p=883"},"modified":"2010-02-10T13:40:35","modified_gmt":"2010-02-10T12:40:35","slug":"smishing","status":"publish","type":"post","link":"https:\/\/www.montejo.biz\/blog\/2010\/02\/10\/smishing\/","title":{"rendered":"Smishing"},"content":{"rendered":"<div id=\"post-entry-excerpt-883\" class=\"entry-part\"><p>Smishing, o Phishing a trav\u00e9s de SMS, consiste en el env\u00edo de SMS a tel\u00e9fonos m\u00f3viles con el fin de obtener informaci\u00f3n privada de los usuarios. Como en el caso del Phishing, un ataque de smishing est\u00e1 dise\u00f1ado para que la v\u00edctima se vea obligada a dar una respuesta inmediata a un problema que le afecta directamente.<\/p>\n<p>El Smishing es un problema creciente para todos los sectores bancarios, y se est\u00e1 volviendo una metodolog\u00eda de preferencia para los criminales porque cada vez es m\u00e1s frecuente conectarse a Internet a trav\u00e9s del tel\u00e9fono m\u00f3vil.<\/p>\n<p><a href=\"http:\/\/blog.s21sec.com\/2010\/02\/smishing.html\" target=\"_blank\">Enlace<\/a><\/p>\n\n\t\t\t\t\t\t\t<p style=\" color: #999999;\">If you found an error, highlight it and press <strong>Shift + E<\/strong> or <a href=\"#\" class=\"enp-report\"><strong>pulsa aqu\u00ed<\/strong><\/a> to inform us.<\/p>\n\t\t\t\t\t\t<\/div><div id=\"post-footer-883\" class=\"post-footer clear\"><\/div>","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Smishing, o Phishing a trav\u00e9s de SMS, consiste en el env\u00edo de SMS a tel\u00e9fonos m\u00f3viles con el fin de obtener informaci\u00f3n privada de los <a class=\"mh-excerpt-more\" href=\"https:\/\/www.montejo.biz\/blog\/2010\/02\/10\/smishing\/\" title=\"Smishing\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[40],"tags":[147],"class_list":["post-883","post","type-post","status-publish","format-standard","hentry","category-malware","tag-malware"],"_links":{"self":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/883","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/comments?post=883"}],"version-history":[{"count":0,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/883\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/media?parent=883"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/categories?post=883"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/tags?post=883"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}