{"id":407,"date":"2020-09-25T11:31:41","date_gmt":"2020-09-25T16:31:41","guid":{"rendered":"http:\/\/redsegura.indexcol.net\/?page_id=407"},"modified":"2023-03-02T14:47:17","modified_gmt":"2023-03-02T19:47:17","slug":"malware","status":"publish","type":"page","link":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/malware\/","title":{"rendered":"Malware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"407\" class=\"elementor elementor-407\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f99359c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f99359c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4fa4e74\" data-id=\"4fa4e74\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4a07a3f elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-phone elementor-aspect-ratio-169 elementor-widget elementor-widget-video\" data-id=\"4a07a3f\" data-element_type=\"widget\" data-settings=\"{&quot;aspect_ratio&quot;:&quot;169&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-wrapper elementor-fit-aspect-ratio elementor-open-inline\">\n\t\t\t<iframe class=\"elementor-video-iframe\" allowfullscreen title=\"Reproductor de v\u00eddeo youtube\" src=\"https:\/\/www.youtube.com\/embed\/dQ0u2EAHJkA?feature=oembed&amp;start&amp;end&amp;wmode=opaque&amp;loop=0&amp;controls=1&amp;mute=0&amp;rel=0&amp;modestbranding=0\"><\/iframe>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9619ab2 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9619ab2\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3265c5d\" data-id=\"3265c5d\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86af784 elementor-widget elementor-widget-heading\" data-id=\"86af784\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h3 class=\"elementor-heading-title elementor-size-medium\">El malware (del ingl\u00e9s malicious software), programa malicioso o programa maligno<\/h3>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bd91981 elementor-widget elementor-widget-text-editor\" data-id=\"bd91981\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><p>Modalidad para el robo de informaci\u00f3n personal o financiera por medio de correos fraudulentos con archivos adjuntos que al descargarlos infectan el dispositivo con un software malicioso.<\/p><p>Los delincuentes buscan enga\u00f1ar a las personas mediante correos electr\u00f3nicos falsos que suplantan a alguna entidad conocida, para que descarguen archivos que contienen malware. Al infectar un dispositivo con malware, los delincuentes podr\u00e1n acceder a toda la informaci\u00f3n en este como credenciales de acceso (usuario y contrase\u00f1a).<\/p><p>El Centro Cibern\u00e9tico Policial de la Polic\u00eda Nacional de Colombia, Asobancaria e Incocr\u00e9dito recomiendan tomar las siguientes medidas preventivas para protegerse ante modalidades delictivas como el MALWARE:<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e2a9bf9 elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"e2a9bf9\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-608f252\" data-id=\"608f252\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-db679ab elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"db679ab\" data-element_type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-9bb3644\" data-id=\"9bb3644\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-8d4f42d elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"8d4f42d\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img src=\"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/elementor\/thumbs\/uno-qip6rz3aqtuolkaia5jo1inx07ne8qvurghxn42724.png\" title=\"uno\" alt=\"uno\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">No abrir correos sospechosos, ni mucho menos sus adjuntos.\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e67f82 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"1e67f82\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img src=\"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/elementor\/thumbs\/tres-qip6rz3aqtuolkaia5jo1inx07ne8qvurghxn42724.png\" title=\"tres\" alt=\"tres\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Dude de cualquier correo que parezca sospechoso, aunque conozca al remitente. Existen programas maliciosos que se distribuyen a trav\u00e9s de email y que simulan ser enviados por nuestros amigos, por ejemplo, su m\u00e1quina puede estar infectada y manda correos con virus a su libreta de direcciones.\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e63d2d8 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"e63d2d8\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img src=\"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/elementor\/thumbs\/cinco-qip6rz3aqtuolkaia5jo1inx07ne8qvurghxn42724.png\" title=\"cinco\" alt=\"cinco\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Bajo ning\u00fan concepto instalar programas pirateados, cracks, modificaciones, etc. Muchos programas de este tipo incluyen c\u00f3digos maliciosos que infectar\u00e1n su dispositivo.\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-015fda8\" data-id=\"015fda8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-78e73f8 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"78e73f8\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img src=\"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/elementor\/thumbs\/dos-qip6rz3aqtuolkaia5jo1inx07ne8qvurghxn42724.png\" title=\"dos\" alt=\"dos\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Tener instalado y actualizado el antivirus original. Casi todos los antivirus disponibles realizan una labor aceptable.\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82fe1e3 elementor-position-left elementor-vertical-align-middle elementor-widget elementor-widget-image-box\" data-id=\"82fe1e3\" data-element_type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img src=\"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/elementor\/thumbs\/4-qip6rz3aqtuolkaia5jo1inx07ne8qvurghxn42724.png\" title=\"4\" alt=\"4\" \/><\/figure><div class=\"elementor-image-box-content\"><p class=\"elementor-image-box-description\">Tenga cuidado con los correos que le llegan con supuestas notificaciones del \u201cbanco\u201d diciendo que su cuenta ha sido desactivada o embargada, presuntos reportes a centrales de riesgo o autoridades, pagos fraudulentos o sospechosos, etc. Generalmente son \u201cganchos\u201d del delincuente para que se abra el archivo adjunto que contiene el malware.\n<\/p><\/div><\/div>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-9255755 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9255755\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2db4ae3\" data-id=\"2db4ae3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5f2b6dc elementor-widget elementor-widget-image\" data-id=\"5f2b6dc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t<img width=\"1920\" height=\"1080\" src=\"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2023\/03\/20-11-ASO-infografias-seguridad-malware-2.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2023\/03\/20-11-ASO-infografias-seguridad-malware-2.jpg 1920w, https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2023\/03\/20-11-ASO-infografias-seguridad-malware-2-300x169.jpg 300w, https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2023\/03\/20-11-ASO-infografias-seguridad-malware-2-1024x576.jpg 1024w, https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2023\/03\/20-11-ASO-infografias-seguridad-malware-2-768x432.jpg 768w, https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2023\/03\/20-11-ASO-infografias-seguridad-malware-2-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-aa95fe0 elementor-hidden-desktop elementor-hidden-tablet elementor-hidden-phone elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"aa95fe0\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cfc08de\" data-id=\"cfc08de\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ca80095 elementor-widget elementor-widget-image\" data-id=\"ca80095\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image\">\n\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/redsegura.indexcol.net\/wp-content\/uploads\/2020\/09\/MALWARE_INFOGRAFIA.jpg\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"MALWARE_INFOGRAFIA\">\n\t\t\t\t\t\t\t<img width=\"1920\" height=\"1080\" src=\"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2020\/09\/MALWARE_INFOGRAFIA.jpg\" class=\"attachment-full size-full\" alt=\"\" loading=\"lazy\" srcset=\"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2020\/09\/MALWARE_INFOGRAFIA.jpg 1920w, https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2020\/09\/MALWARE_INFOGRAFIA-300x169.jpg 300w, https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2020\/09\/MALWARE_INFOGRAFIA-1024x576.jpg 1024w, https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2020\/09\/MALWARE_INFOGRAFIA-768x432.jpg 768w, https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-content\/uploads\/2020\/09\/MALWARE_INFOGRAFIA-1536x864.jpg 1536w\" sizes=\"(max-width: 1920px) 100vw, 1920px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>El malware (del ingl\u00e9s malicious software), programa malicioso o programa maligno Modalidad para el robo de informaci\u00f3n personal o financiera por medio de correos fraudulentos con archivos adjuntos que al descargarlos infectan el dispositivo con un software malicioso. Los delincuentes buscan enga\u00f1ar a las personas mediante correos electr\u00f3nicos falsos que suplantan a alguna entidad conocida, [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":35,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-personalizado.php","meta":[],"categories":[],"tags":[],"_links":{"self":[{"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/pages\/407"}],"collection":[{"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/comments?post=407"}],"version-history":[{"count":7,"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/pages\/407\/revisions"}],"predecessor-version":[{"id":1206,"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/pages\/407\/revisions\/1206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/media\/35"}],"wp:attachment":[{"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/media?parent=407"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/categories?post=407"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sabermassermas.com\/por-una-red-segura\/wp-json\/wp\/v2\/tags?post=407"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}