{"id":2160,"date":"2019-05-27T23:24:11","date_gmt":"2019-05-28T04:24:11","guid":{"rendered":"https:\/\/www.capa8.com\/blog\/?p=2160"},"modified":"2019-05-27T23:24:12","modified_gmt":"2019-05-28T04:24:12","slug":"instagram-se-cuela-entre-las-principales-amenazas-de-phishing","status":"publish","type":"post","link":"https:\/\/www.capa8.com\/blog\/instagram-se-cuela-entre-las-principales-amenazas-de-phishing\/","title":{"rendered":"Instagram se cuela entre las principales amenazas de phishing."},"content":{"rendered":"\n<p>El phishing ha traspasado los l\u00edmites del correo electr\u00f3nico\ny los atacantes a menudo usan la popular red social Instagram: no solo dejan\nenlaces a sus recursos en los comentarios, sino que tambi\u00e9n registran cuentas,\npagan publicaciones publicitarias y hasta contratan celebridades para que\ndistribuyan contenido.<\/p>\n\n\n\n<p><a href=\"http:\/\/Instagram se cuela entre las principales amenazas de phishing.\">M\u00e1s informaci\u00f3n<\/a><\/p>\n\n\n\n<p>#HablemosDeSeguridad<\/p>\n\n\n\n<p>V\u00eda @cybersecurityES<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El phishing ha traspasado los l\u00edmites del correo electr\u00f3nico y los atacantes a menudo usan la popular red social Instagram: no solo dejan enlaces a sus recursos en los comentarios, sino que tambi\u00e9n registran cuentas, pagan publicaciones publicitarias y hasta contratan celebridades para que distribuyan contenido. M\u00e1s informaci\u00f3n #HablemosDeSeguridad V\u00eda @cybersecurityES<\/p>\n","protected":false},"author":2,"featured_media":2161,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,6],"tags":[75,189,249],"_links":{"self":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/2160"}],"collection":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/comments?post=2160"}],"version-history":[{"count":1,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/2160\/revisions"}],"predecessor-version":[{"id":2162,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/2160\/revisions\/2162"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media\/2161"}],"wp:attachment":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media?parent=2160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/categories?post=2160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/tags?post=2160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}