{"id":1335,"date":"2020-10-27T07:21:57","date_gmt":"2020-10-27T07:21:57","guid":{"rendered":"https:\/\/invezt.co\/kaymera\/?post_type=glossary&amp;p=1335"},"modified":"2020-10-27T07:21:57","modified_gmt":"2020-10-27T07:21:57","slug":"ingenieria-social","status":"publish","type":"glossary","link":"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/","title":{"rendered":"Ingenier\u00eda social"},"content":{"rendered":"<p>La t\u00e1ctica probada y verdadera del enga\u00f1o es tan preocupante en los dispositivos m\u00f3viles como en los ordenadores. Aunque es sencillo evitar los perjuicios causados por los ataques de ingenier\u00eda social, estos ataques siguen siendo muy eficaces.<\/p>\n<p>La mayor\u00eda de los ciberataques empiezan en el correo electr\u00f3nico. En estos ataques se usan t\u00e9cnicas como la suplantaci\u00f3n de identidad que pretenden enga\u00f1ar a las personas para que faciliten informaci\u00f3n confidencial o entren en enlaces maliciosos.<\/p>\n<p>Es m\u00e1s f\u00e1cil caer en la trampa para los usuarios de dispositivos m\u00f3viles debido a que en el m\u00f3vil aparece solo el nombre del remitente. Esto facilita la falsificaci\u00f3n de mensajes y el enga\u00f1o a una persona haci\u00e9ndole creer que un correo electr\u00f3nico es de alguien que conoce.<\/p>\n<p>Tambi\u00e9n se producen muchos ataques de phishing fuera del correo electr\u00f3nico, a trav\u00e9s de aplicaciones como Messenger y WhatsApp o de mensajes de texto.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La t\u00e1ctica probada y verdadera del enga\u00f1o es tan preocupante en los dispositivos m\u00f3viles como en los ordenadores. Aunque es sencillo evitar los perjuicios causados por los ataques de ingenier\u00eda social, estos ataques siguen siendo muy eficaces. La mayor\u00eda de los ciberataques empiezan en el correo electr\u00f3nico. En estos ataques se usan t\u00e9cnicas como la&hellip;&nbsp;<a href=\"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/\" rel=\"bookmark\">Leer m\u00e1s &raquo;<span class=\"screen-reader-text\">Ingenier\u00eda social<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"template":"","glossary-cat":[],"class_list":["post-1335","glossary","type-glossary","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ingenier\u00eda social - Kaymera<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ingenier\u00eda social - Kaymera\" \/>\n<meta property=\"og:description\" content=\"La t\u00e1ctica probada y verdadera del enga\u00f1o es tan preocupante en los dispositivos m\u00f3viles como en los ordenadores. Aunque es sencillo evitar los perjuicios causados por los ataques de ingenier\u00eda social, estos ataques siguen siendo muy eficaces. La mayor\u00eda de los ciberataques empiezan en el correo electr\u00f3nico. En estos ataques se usan t\u00e9cnicas como la&hellip;&nbsp;Leer m\u00e1s &raquo;Ingenier\u00eda social\" \/>\n<meta property=\"og:url\" content=\"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/\" \/>\n<meta property=\"og:site_name\" content=\"Kaymera\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/\",\"url\":\"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/\",\"name\":\"Ingenier\u00eda social - Kaymera\",\"isPartOf\":{\"@id\":\"https:\/\/invezt.co\/kaymera\/#website\"},\"datePublished\":\"2020-10-27T07:21:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/invezt.co\/kaymera\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\",\"item\":\"https:\/\/invezt.co\/kaymera\/glosario\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ingenier\u00eda social\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/invezt.co\/kaymera\/#website\",\"url\":\"https:\/\/invezt.co\/kaymera\/\",\"name\":\"Kaymera\",\"description\":\"High-end mobile security\",\"publisher\":{\"@id\":\"https:\/\/invezt.co\/kaymera\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/invezt.co\/kaymera\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/invezt.co\/kaymera\/#organization\",\"name\":\"Kaymera By Invezt.co\",\"url\":\"https:\/\/invezt.co\/kaymera\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/invezt.co\/kaymera\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/invezt.co\/kaymera\/wp-content\/uploads\/2022\/04\/cropped-favicon-1.png\",\"contentUrl\":\"https:\/\/invezt.co\/kaymera\/wp-content\/uploads\/2022\/04\/cropped-favicon-1.png\",\"width\":512,\"height\":512,\"caption\":\"Kaymera By Invezt.co\"},\"image\":{\"@id\":\"https:\/\/invezt.co\/kaymera\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ingenier\u00eda social - Kaymera","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/","og_locale":"es_ES","og_type":"article","og_title":"Ingenier\u00eda social - Kaymera","og_description":"La t\u00e1ctica probada y verdadera del enga\u00f1o es tan preocupante en los dispositivos m\u00f3viles como en los ordenadores. Aunque es sencillo evitar los perjuicios causados por los ataques de ingenier\u00eda social, estos ataques siguen siendo muy eficaces. La mayor\u00eda de los ciberataques empiezan en el correo electr\u00f3nico. En estos ataques se usan t\u00e9cnicas como la&hellip;&nbsp;Leer m\u00e1s &raquo;Ingenier\u00eda social","og_url":"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/","og_site_name":"Kaymera","twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/","url":"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/","name":"Ingenier\u00eda social - Kaymera","isPartOf":{"@id":"https:\/\/invezt.co\/kaymera\/#website"},"datePublished":"2020-10-27T07:21:57+00:00","breadcrumb":{"@id":"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/invezt.co\/kaymera\/glosario\/ingenieria-social\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/invezt.co\/kaymera\/"},{"@type":"ListItem","position":2,"name":"Glossary","item":"https:\/\/invezt.co\/kaymera\/glosario\/"},{"@type":"ListItem","position":3,"name":"Ingenier\u00eda social"}]},{"@type":"WebSite","@id":"https:\/\/invezt.co\/kaymera\/#website","url":"https:\/\/invezt.co\/kaymera\/","name":"Kaymera","description":"High-end mobile security","publisher":{"@id":"https:\/\/invezt.co\/kaymera\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/invezt.co\/kaymera\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/invezt.co\/kaymera\/#organization","name":"Kaymera By Invezt.co","url":"https:\/\/invezt.co\/kaymera\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/invezt.co\/kaymera\/#\/schema\/logo\/image\/","url":"https:\/\/invezt.co\/kaymera\/wp-content\/uploads\/2022\/04\/cropped-favicon-1.png","contentUrl":"https:\/\/invezt.co\/kaymera\/wp-content\/uploads\/2022\/04\/cropped-favicon-1.png","width":512,"height":512,"caption":"Kaymera By Invezt.co"},"image":{"@id":"https:\/\/invezt.co\/kaymera\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/glossary\/1335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/users\/2"}],"version-history":[{"count":0,"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/glossary\/1335\/revisions"}],"wp:attachment":[{"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/media?parent=1335"}],"wp:term":[{"taxonomy":"glossary-cat","embeddable":true,"href":"https:\/\/invezt.co\/kaymera\/wp-json\/wp\/v2\/glossary-cat?post=1335"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}