{"id":1526,"date":"2011-06-07T12:05:33","date_gmt":"2011-06-07T10:05:33","guid":{"rendered":"https:\/\/blogs.ua.es\/si\/?p=1526"},"modified":"2011-06-07T12:05:33","modified_gmt":"2011-06-07T10:05:33","slug":"ataque-de-phising-contra-gmail","status":"publish","type":"post","link":"https:\/\/blogs.ua.es\/si\/2011\/06\/07\/ataque-de-phising-contra-gmail\/","title":{"rendered":"Ataque de phising contra Gmail"},"content":{"rendered":"<p>La semana pasada se difundi\u00f3 la noticia de un ataque contra las cuentas de correo de Gmail de usuarios como \u00abmiembros del Gobierno de EEUU, militares, miembros de gobiernos  asi\u00e1ticos (sobre todo de Corea del Sur), disidentes chinos, personal  militar y periodistas\u00bb. Uno de los detalles m\u00e1s relevantes es que se trat\u00f3 de una estrategia basada en <strong>t\u00e9cnicas de phising<\/strong>, en la que <strong>el propio usuario facilita los datos para el ataque<\/strong>.<\/p>\n<p>&#8212;<\/p>\n<p>Entre otros consejos, Google recomienda:<!--more--><\/p>\n<p>&#8211; Activar la <strong>verificaci\u00f3n en dos pasos<\/strong>,<\/p>\n<p><iframe loading=\"lazy\" title=\"Using 2-step verification\" width=\"525\" height=\"295\" src=\"https:\/\/www.youtube.com\/embed\/zMabEyrtPRg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&#8212;<\/p>\n<p>&#8211; Utilizar una <strong>contrase\u00f1a fuerte<\/strong>,<\/p>\n<p><iframe loading=\"lazy\" title=\"How to create a strong password\" width=\"525\" height=\"295\" src=\"https:\/\/www.youtube.com\/embed\/0RCsHJfHL_4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&#8212;<\/p>\n<p>&#8211; Recordar que <strong>nunca pedir\u00e1n sus datos<\/strong> y contrase\u00f1as por correo,<\/p>\n<p><iframe loading=\"lazy\" title=\"How to know if an email is real\" width=\"525\" height=\"295\" src=\"https:\/\/www.youtube.com\/embed\/3vcLyvoKYZc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>&#8212;<\/p>\n<p>&#8230; y finalmente, facilita los siguientes consejos b\u00e1sicos de seguridad en la red<\/p>\n<p>http:\/\/www.youtube.com\/watch?v=nOgsXdB67Pc<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&#8212;<\/p>\n<p><a title=\"Intentan piratear cuentas de Gmail\" href=\"http:\/\/www.elmundo.es\/elmundo\/2011\/06\/01\/navegante\/1306960668.html\" target=\"_blank\">Intentan piratear las cuentas de Gmail de militares,             periodistas y altos cargos de EEUU<\/a>, <strong>elmundo.es<\/strong>, 01\/06\/2011.<\/p>\n<p><a title=\"Ensuring your information is safe online\" href=\"http:\/\/googleblog.blogspot.com\/2011\/06\/ensuring-your-information-is-safe.html\" target=\"_blank\">Ensuring your information is safe online<\/a>, <strong>Official Google Blog<\/strong>, 01\/06\/2011.<\/p>\n<p>&#8212;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La semana pasada se difundi\u00f3 la noticia de un ataque contra las cuentas de correo de Gmail de usuarios como \u00abmiembros del Gobierno de EEUU, militares, miembros de gobiernos asi\u00e1ticos (sobre todo de Corea del Sur), disidentes chinos, personal militar y periodistas\u00bb. Uno de los detalles m\u00e1s relevantes es que se trat\u00f3 de una estrategia &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blogs.ua.es\/si\/2011\/06\/07\/ataque-de-phising-contra-gmail\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Ataque de phising contra Gmail&#8221;<\/span><\/a><\/p>\n","protected":false},"author":797,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2956,5464],"tags":[222,4022,488],"class_list":["post-1526","post","type-post","status-publish","format-standard","hentry","category-noticias-de-especial-interes","category-recomendaciones-y-guias","tag-correo","tag-phising","tag-seguridad"],"_links":{"self":[{"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/posts\/1526","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/users\/797"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/comments?post=1526"}],"version-history":[{"count":11,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/posts\/1526\/revisions"}],"predecessor-version":[{"id":1541,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/posts\/1526\/revisions\/1541"}],"wp:attachment":[{"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/media?parent=1526"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/categories?post=1526"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/tags?post=1526"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}