{"id":474,"date":"2015-01-11T09:43:07","date_gmt":"2015-01-11T09:43:07","guid":{"rendered":"http:\/\/www.jcmontejo.es\/cursos\/revista\/?p=474"},"modified":"2015-01-11T09:43:07","modified_gmt":"2015-01-11T09:43:07","slug":"explican-como-evitar-wiper-el-malware-utilizado-en-el-ataque-a-sony-pictures","status":"publish","type":"post","link":"https:\/\/www.montejo.biz\/revista\/2015\/01\/11\/explican-como-evitar-wiper-el-malware-utilizado-en-el-ataque-a-sony-pictures\/","title":{"rendered":"Explican c\u00f3mo evitar \u201cWiper\u201d, el malware utilizado en el ataque a Sony Pictures"},"content":{"rendered":"<p>Check Point\u00ae Software Technologies Ltd. (NASDAQ: CHKP), proveedor mundial de soluciones de seguridad para Internet, ha hecho p\u00fablicas una serie de informaciones y consideraciones en torno al destructivo gusano \u201cWiper\u201d, utilizado en el reciente \u201cciberataque\u201d contra Sony Pictures Entertainment, y que supone un nuevo nivel de amenaza para empresas y gobiernos.<\/p>\n<p><a title=\"Wiper\" href=\"http:\/\/diarioti.com\/explican-como-evitar-wiper-el-malware-utilizado-en-el-ataque-a-sony-pictures\/84933\" target=\"_blank\" rel=\"noopener\">Leer m\u00e1s&#8230;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>Check Point\u00ae Software Technologies Ltd. (NASDAQ: CHKP), proveedor mundial de soluciones de seguridad para Internet, ha hecho p\u00fablicas una serie de informaciones y consideraciones en <a class=\"mh-excerpt-more\" href=\"https:\/\/www.montejo.biz\/revista\/2015\/01\/11\/explican-como-evitar-wiper-el-malware-utilizado-en-el-ataque-a-sony-pictures\/\" title=\"Explican c\u00f3mo evitar \u201cWiper\u201d, el malware utilizado en el ataque a Sony Pictures\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":475,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,12],"tags":[42,203,339],"class_list":["post-474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos","category-seguridad","tag-ataque-sony","tag-medidas-preventivas","tag-wiper"],"_links":{"self":[{"href":"https:\/\/www.montejo.biz\/revista\/wp-json\/wp\/v2\/posts\/474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montejo.biz\/revista\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montejo.biz\/revista\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/revista\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/revista\/wp-json\/wp\/v2\/comments?post=474"}],"version-history":[{"count":0,"href":"https:\/\/www.montejo.biz\/revista\/wp-json\/wp\/v2\/posts\/474\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/revista\/wp-json\/wp\/v2\/media\/475"}],"wp:attachment":[{"href":"https:\/\/www.montejo.biz\/revista\/wp-json\/wp\/v2\/media?parent=474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montejo.biz\/revista\/wp-json\/wp\/v2\/categories?post=474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montejo.biz\/revista\/wp-json\/wp\/v2\/tags?post=474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}