{"id":3259,"date":"2013-11-18T15:06:52","date_gmt":"2013-11-18T13:06:52","guid":{"rendered":"https:\/\/blogs.ua.es\/si\/?p=3259"},"modified":"2013-11-18T15:06:52","modified_gmt":"2013-11-18T13:06:52","slug":"ataque-a-correos-electronicos-de-la-ua-2","status":"publish","type":"post","link":"https:\/\/blogs.ua.es\/si\/2013\/11\/18\/ataque-a-correos-electronicos-de-la-ua-2\/","title":{"rendered":"Ataque a correos electr\u00f3nicos de la UA"},"content":{"rendered":"<p>Usuarios de correo electr\u00f3nico de la UA han recibido mensajes con diversos asuntos como <strong>\u201cEstimado usuario Webmail\u201d<\/strong> o <strong>\u201cVerifique su cuenta de correo electr\u00f3nico UA\u201d<\/strong> o <strong>&#8220;Universidad de Alicante WEB- MAIL usuarios de la cuenta\u201c<\/strong>.<\/p>\n<p>Es un ataque de phising y se solicita <strong>NO CONTESTAR DICHO MENSAJE Y BORRARLO<\/strong>.<\/p>\n<p>Se recomienda hacer lo mismo en todos aquellos casos en los que se soliciten datos de car\u00e1cter personal o privado.<\/p>\n<p>Francisco Maci\u00e1 P\u00e9rez<\/p>\n<p>Vicerrector de Tecnolog\u00edas de la Informaci\u00f3n<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/blogs.ua.es\/si\/files\/2013\/11\/20131118_phising.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3260\" style=\"border: 1px solid black\" alt=\"Ataque de phising\" src=\"https:\/\/blogs.ua.es\/si\/files\/2013\/11\/20131118_phising.jpg\" width=\"518\" height=\"772\" srcset=\"https:\/\/blogs.ua.es\/si\/files\/2013\/11\/20131118_phising.jpg 518w, https:\/\/blogs.ua.es\/si\/files\/2013\/11\/20131118_phising-201x300.jpg 201w\" sizes=\"auto, (max-width: 518px) 100vw, 518px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Usuarios de correo electr\u00f3nico de la UA han recibido mensajes con diversos asuntos como \u201cEstimado usuario Webmail\u201d o \u201cVerifique su cuenta de correo electr\u00f3nico UA\u201d o &#8220;Universidad de Alicante WEB- MAIL usuarios de la cuenta\u201c. Es un ataque de phising y se solicita NO CONTESTAR DICHO MENSAJE Y BORRARLO. Se recomienda hacer lo mismo en &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blogs.ua.es\/si\/2013\/11\/18\/ataque-a-correos-electronicos-de-la-ua-2\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Ataque a correos electr\u00f3nicos de la UA&#8221;<\/span><\/a><\/p>\n","protected":false},"author":797,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2643],"tags":[222,4022],"class_list":["post-3259","post","type-post","status-publish","format-standard","hentry","category-comunicados","tag-correo","tag-phising"],"_links":{"self":[{"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/posts\/3259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/users\/797"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/comments?post=3259"}],"version-history":[{"count":1,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/posts\/3259\/revisions"}],"predecessor-version":[{"id":3261,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/posts\/3259\/revisions\/3261"}],"wp:attachment":[{"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/media?parent=3259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/categories?post=3259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ua.es\/si\/wp-json\/wp\/v2\/tags?post=3259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}