{"id":1329,"date":"2020-10-27T07:20:41","date_gmt":"2020-10-27T07:20:41","guid":{"rendered":"https:\/\/invezt.co\/kaymera\/?post_type=glossary&amp;p=1329"},"modified":"2020-10-27T07:20:41","modified_gmt":"2020-10-27T07:20:41","slug":"ataques-de-criptojacking","status":"publish","type":"glossary","link":"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/","title":{"rendered":"Ataques de criptojacking"},"content":{"rendered":"<p>El cryptojacking es una importante amenaza a incluir dentro de la lista de amenazas m\u00f3viles.<\/p>\n<p>Se trata de un tipo de ataque en el que un tercero utiliza un dispositivo para coger criptomonedas sin que su propietario sea consciente de ello. El proceso de criptominer\u00eda beneficia a un tercero utilizando los sistemas de la empresa. Los dispositivos afectados por este tipo de ataques sufrir\u00e1n una menor duraci\u00f3n de bater\u00eda e incluso pueden da\u00f1arse por un sobrecalentamiento de los componentes.<\/p>\n<p>El criptojacking tuvo su origen en los ordenadores pero con el tiempo se ha producido un importante aumento en los dispositivos m\u00f3viles.<\/p>\n<p>De momento, no existe una soluci\u00f3n para evitar estos ataques.\u00a0 \u00danicamente debemos elegir los dispositivos cuidadosamente y cumplir con una pol\u00edtica de seguridad en la que se indique que los usuarios solo puedan descargar aplicaciones desde la tienda oficial de la plataforma.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El cryptojacking es una importante amenaza a incluir dentro de la lista de amenazas m\u00f3viles. Se trata de un tipo de ataque en el que un tercero utiliza un dispositivo para coger criptomonedas sin que su propietario sea consciente de ello. El proceso de criptominer\u00eda beneficia a un tercero utilizando los sistemas de la empresa.&hellip;&nbsp;<a href=\"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/\" rel=\"bookmark\">Leer m\u00e1s &raquo;<span class=\"screen-reader-text\">Ataques de criptojacking<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"template":"","glossary-cat":[],"class_list":["post-1329","glossary","type-glossary","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ataques de criptojacking - Kaymera<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ataques de criptojacking - Kaymera\" \/>\n<meta property=\"og:description\" content=\"El cryptojacking es una importante amenaza a incluir dentro de la lista de amenazas m\u00f3viles. Se trata de un tipo de ataque en el que un tercero utiliza un dispositivo para coger criptomonedas sin que su propietario sea consciente de ello. El proceso de criptominer\u00eda beneficia a un tercero utilizando los sistemas de la empresa.&hellip;&nbsp;Leer m\u00e1s &raquo;Ataques de criptojacking\" \/>\n<meta property=\"og:url\" content=\"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/\" \/>\n<meta property=\"og:site_name\" content=\"Kaymera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/\",\"url\":\"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/\",\"name\":\"Ataques de criptojacking - Kaymera\",\"isPartOf\":{\"@id\":\"https:\/\/invezt.co\/kaymera\/#website\"},\"datePublished\":\"2020-10-27T07:20:41+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/invezt.co\/kaymera\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\",\"item\":\"https:\/\/invezt.co\/kaymera\/glosario\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ataques de criptojacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/invezt.co\/kaymera\/#website\",\"url\":\"https:\/\/invezt.co\/kaymera\/\",\"name\":\"Kaymera\",\"description\":\"High-end mobile security\",\"publisher\":{\"@id\":\"https:\/\/invezt.co\/kaymera\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/invezt.co\/kaymera\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/invezt.co\/kaymera\/#organization\",\"name\":\"Kaymera By Invezt.co\",\"url\":\"https:\/\/invezt.co\/kaymera\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/invezt.co\/kaymera\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/invezt.co\/kaymera\/wp-content\/uploads\/2022\/04\/cropped-favicon-1.png\",\"contentUrl\":\"https:\/\/invezt.co\/kaymera\/wp-content\/uploads\/2022\/04\/cropped-favicon-1.png\",\"width\":512,\"height\":512,\"caption\":\"Kaymera By Invezt.co\"},\"image\":{\"@id\":\"https:\/\/invezt.co\/kaymera\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ataques de criptojacking - Kaymera","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/","og_locale":"es_ES","og_type":"article","og_title":"Ataques de criptojacking - Kaymera","og_description":"El cryptojacking es una importante amenaza a incluir dentro de la lista de amenazas m\u00f3viles. Se trata de un tipo de ataque en el que un tercero utiliza un dispositivo para coger criptomonedas sin que su propietario sea consciente de ello. El proceso de criptominer\u00eda beneficia a un tercero utilizando los sistemas de la empresa.&hellip;&nbsp;Leer m\u00e1s &raquo;Ataques de criptojacking","og_url":"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/","og_site_name":"Kaymera","twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/","url":"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/","name":"Ataques de criptojacking - Kaymera","isPartOf":{"@id":"https:\/\/invezt.co\/kaymera\/#website"},"datePublished":"2020-10-27T07:20:41+00:00","breadcrumb":{"@id":"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/invezt.co\/kaymera\/glosario\/ataques-de-criptojacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/invezt.co\/kaymera\/"},{"@type":"ListItem","position":2,"name":"Glossary","item":"https:\/\/invezt.co\/kaymera\/glosario\/"},{"@type":"ListItem","position":3,"name":"Ataques de criptojacking"}]},{"@type":"WebSite","@id":"https:\/\/invezt.co\/kaymera\/#website","url":"https:\/\/invezt.co\/kaymera\/","name":"Kaymera","description":"High-end mobile security","publisher":{"@id":"https:\/\/invezt.co\/kaymera\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/invezt.co\/kaymera\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/invezt.co\/kaymera\/#organization","name":"Kaymera By Invezt.co","url":"https:\/\/invezt.co\/kaymera\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/invezt.co\/kaymera\/#\/schema\/logo\/image\/","url":"https:\/\/invezt.co\/kaymera\/wp-content\/uploads\/2022\/04\/cropped-favicon-1.png","contentUrl":"https:\/\/invezt.co\/kaymera\/wp-content\/uploads\/2022\/04\/cropped-favicon-1.png","width":512,"height":512,"caption":"Kaymera By Invezt.co"},"image":{"@id":"https:\/\/invezt.co\/kaymera\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/glossary\/1329","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":0,"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/glossary\/1329\/revisions"}],"wp:attachment":[{"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/media?parent=1329"}],"wp:term":[{"taxonomy":"glossary-cat","embeddable":true,"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/glossary-cat?post=1329"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}