{"id":733,"date":"2018-11-03T17:05:00","date_gmt":"2018-11-03T23:05:00","guid":{"rendered":"http:\/\/capa8.blog\/?p=733"},"modified":"2018-11-03T17:05:00","modified_gmt":"2018-11-03T23:05:00","slug":"muchos-sistemas-de-agua-y-energia-son-vulnerables-a-un-importante-riesgo-cibernetico","status":"publish","type":"post","link":"https:\/\/www.capa8.com\/blog\/muchos-sistemas-de-agua-y-energia-son-vulnerables-a-un-importante-riesgo-cibernetico\/","title":{"rendered":"Muchos sistemas de agua y energ\u00eda son vulnerables a un importante riesgo cibern\u00e9tico."},"content":{"rendered":"<p><span style=\"margin:0;color:#222222;font-family:'Arial', sans-serif;\">Investigaci\u00f3n de Trend Micro revel\u00f3 c\u00f3mo se podr\u00edan explotar los sistemas de interfaz hombre-m\u00e1quina expuestos en miles de organizaciones cr\u00edticas de agua y energ\u00eda en todo el mundo, lo que causar\u00eda impactos significativos en el mundo real, como la contaminaci\u00f3n del suministro de agua.<\/span><\/p>\n<p><span style=\"margin:0;color:#333333;font-family:'&amp;quot', serif;font-size:13.5pt;\"><a href=\"https:\/\/www.helpnetsecurity.com\/2018\/10\/31\/vulnerable-critical-systems\/\" target=\"_blank\" rel=\"noopener\">M\u00e1s Informaci\u00f3n<\/a><\/span><br \/>\n<span style=\"margin:0;color:#333333;font-family:'&amp;quot', serif;font-size:13.5pt;\">#HablemosDeSeguridad<\/span><br \/>\n<span style=\"margin:0;color:#333333;font-family:'&amp;quot', serif;font-size:13.5pt;\">Via @helpnetsecurity<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Investigaci\u00f3n de Trend Micro revel\u00f3 c\u00f3mo se podr\u00edan explotar los sistemas de interfaz hombre-m\u00e1quina expuestos en miles de organizaciones cr\u00edticas de agua y energ\u00eda en todo el mundo, lo que causar\u00eda impactos significativos en el mundo real, como la contaminaci\u00f3n del suministro de agua. M\u00e1s Informaci\u00f3n #HablemosDeSeguridad Via @helpnetsecurity<\/p>\n","protected":false},"author":3,"featured_media":734,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[75,273,328],"_links":{"self":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/733"}],"collection":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/comments?post=733"}],"version-history":[{"count":0,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/733\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media\/734"}],"wp:attachment":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media?parent=733"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/categories?post=733"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/tags?post=733"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}