{"id":774,"date":"2018-11-14T17:14:09","date_gmt":"2018-11-14T23:14:09","guid":{"rendered":"http:\/\/capa8.blog\/?p=774"},"modified":"2018-11-14T17:14:09","modified_gmt":"2018-11-14T23:14:09","slug":"hackear-manipular-y-robar-la-memoria-humana-la-tecnologia-existe-y-es-vulnerable","status":"publish","type":"post","link":"https:\/\/www.capa8.com\/blog\/hackear-manipular-y-robar-la-memoria-humana-la-tecnologia-existe-y-es-vulnerable\/","title":{"rendered":"Hackear, manipular y robar la memoria humana: la tecnolog\u00eda existe y es vulnerable."},"content":{"rendered":"<p><span style=\"color:#000000;font-family:Calibri;\">En el futuro, los ciberataques podr\u00e1n explotar los implantes de memoria para robar, espiar, modificar o controlar memorias humanas. <\/span><span style=\"color:#000000;font-family:Calibri;\">Y mientras que las amenazas m\u00e1s radicales est\u00e1n todav\u00eda bastante lejos, la tecnolog\u00eda base ya existe en forma de dispositivos de estimulaci\u00f3n cerebral profunda.<\/span><br \/>\n<span style=\"color:#000000;font-family:Calibri;\">\u00a0<\/span><span style=\"color:#000000;font-family:Calibri;\"><a href=\"https:\/\/cybersecuritynews.es\/hackear-manipular-y-robar-la-memoria-humana-la-tecnologia-existe-y-es-vulnerable\/\" target=\"_blank\" rel=\"noopener\">M\u00e1s informaci\u00f3n<\/a><\/span><br \/>\n<span style=\"color:#000000;font-family:Calibri;\">#HablemosDeSeguridad<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>En el futuro, los ciberataques podr\u00e1n explotar los implantes de memoria para robar, espiar, modificar o controlar memorias humanas. Y mientras que las amenazas m\u00e1s radicales est\u00e1n todav\u00eda bastante lejos, la tecnolog\u00eda base ya existe en forma de dispositivos de estimulaci\u00f3n cerebral profunda. \u00a0M\u00e1s informaci\u00f3n #HablemosDeSeguridad<\/p>\n","protected":false},"author":3,"featured_media":775,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[69,75,169],"_links":{"self":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/774"}],"collection":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/comments?post=774"}],"version-history":[{"count":0,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/posts\/774\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media\/775"}],"wp:attachment":[{"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/media?parent=774"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/categories?post=774"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.capa8.com\/blog\/wp-json\/wp\/v2\/tags?post=774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}