{"id":475,"date":"2018-07-19T09:27:04","date_gmt":"2018-07-19T14:27:04","guid":{"rendered":"http:\/\/capa8.blog\/?p=475"},"modified":"2018-07-19T09:27:04","modified_gmt":"2018-07-19T14:27:04","slug":"hackers-utilizan-una-solucion-mdm-maliciosa-para-espiar-usuarios-de-iphone","status":"publish","type":"post","link":"https:\/\/www.capa8.com\/blog\/hackers-utilizan-una-solucion-mdm-maliciosa-para-espiar-usuarios-de-iphone\/","title":{"rendered":"Hackers utilizan una soluci\u00f3n MDM maliciosa para espiar usuarios de iPhone"},"content":{"rendered":"<p>Investigadores descubrieron una campa\u00f1a de malware dirigida a dispositivos m\u00f3viles que esp\u00edan a 13 usuarios seleccionados en la India. Los hackers hacen uso del protocolo MDM para controlar e instalar aplicaciones maliciosas de manera remota.<\/p>\n<p>#HablemosdeSeguridad<br \/>\nURL: <a href=\"https:\/\/thehackernews.com\/2018\/07\/mobile-device-management-hacking.html\">https:\/\/thehackernews.com\/2018\/07\/mobile-device-management-hacking.html<\/a><br \/>\nV\u00eda @thehackernews<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Investigadores descubrieron una campa\u00f1a de malware dirigida a dispositivos m\u00f3viles que esp\u00edan a 13 usuarios seleccionados en la India. Los hackers hacen uso del protocolo MDM para controlar e instalar aplicaciones maliciosas de manera remota. #HablemosdeSeguridad URL: https:\/\/thehackernews.com\/2018\/07\/mobile-device-management-hacking.html V\u00eda @thehackernews<\/p>\n","protected":false},"author":2,"featured_media":476,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[4],"tags":[67,75,185,198,216,219],"_links":{"self":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/475"}],"collection":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/comments?post=475"}],"version-history":[{"count":0,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/475\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media\/476"}],"wp:attachment":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media?parent=475"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/categories?post=475"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/tags?post=475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}