{"version":"1.0","provider_name":"Kaymera","provider_url":"https:\/\/invezt.co\/kaymera","author_name":"Kaymera","author_url":"https:\/\/invezt.co\/kaymera\/author\/kaymera\/","title":"Ataques de criptojacking - Kaymera","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ERXfCXrOAv\"><a href=\"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/\">Ataques de criptojacking<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/embed\/#?secret=ERXfCXrOAv\" width=\"600\" height=\"338\" title=\"\u00abAtaques de criptojacking\u00bb \u2014 Kaymera\" data-secret=\"ERXfCXrOAv\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/invezt.co\/kaymera\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"El cryptojacking es una importante amenaza a incluir dentro de la lista de amenazas m\u00f3viles. Se trata de un tipo de ataque en el que un tercero utiliza un dispositivo para coger criptomonedas sin que su propietario sea consciente de ello. El proceso de criptominer\u00eda beneficia a un tercero utilizando los sistemas de la empresa.&hellip;&nbsp;Leer m\u00e1s &raquo;Formulario Empleos"}