{"id":548,"date":"2018-07-28T14:12:00","date_gmt":"2018-07-28T19:12:00","guid":{"rendered":"http:\/\/capa8.blog\/?p=548"},"modified":"2018-07-28T14:12:00","modified_gmt":"2018-07-28T19:12:00","slug":"fabricantes-de-dispositivos-emiten-parches-para-la-vulnerabilidad-de-bluetooth","status":"publish","type":"post","link":"https:\/\/www.capa8.com\/blog\/fabricantes-de-dispositivos-emiten-parches-para-la-vulnerabilidad-de-bluetooth\/","title":{"rendered":"Fabricantes de dispositivos emiten parches para la vulnerabilidad de Bluetooth"},"content":{"rendered":"<p>Varios fabricantes de dispositivos han comenzado a liberar parches y correcciones para abordar una vulnerabilidad especifica en Bluetooth que podr\u00eda aprovecharse para interceptar y alterar datos inal\u00e1mbricos, a trav\u00e9s de un ataque man-in-the-middle. El defecto radica en las caracter\u00edsticas Secure Simple Pairing y LE Secure Connections, y permite a los atacantes \u00abobligar a los dispositivos a utilizar una clave de descifrado conocida\u00bb. La falla ha existido por m\u00e1s de 10 a\u00f1os.<\/p>\n<p>#HablemosDeSeguridad<br \/>\n<a href=\"https:\/\/arstechnica.com\/information-technology\/2018\/07\/decade-old-bluetooth-flaw-lets-hackers-steal-data-passing-between-devices\/\" target=\"_blank\" rel=\"noopener\">M\u00e1s informaci\u00f3n<\/a><br \/>\nV\u00eda ArsTechnica<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Varios fabricantes de dispositivos han comenzado a liberar parches y correcciones para abordar una vulnerabilidad especifica en Bluetooth que podr\u00eda aprovecharse para interceptar y alterar datos inal\u00e1mbricos, a trav\u00e9s de un ataque man-in-the-middle. El defecto radica en las caracter\u00edsticas Secure Simple Pairing y LE Secure Connections, y permite a los atacantes \u00abobligar a los dispositivos [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":549,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"aside","meta":{"footnotes":""},"categories":[4],"tags":[47,75,328],"_links":{"self":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/548"}],"collection":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/comments?post=548"}],"version-history":[{"count":0,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/548\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media\/549"}],"wp:attachment":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media?parent=548"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/categories?post=548"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/tags?post=548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}