{"id":34547,"date":"2023-12-19T18:07:02","date_gmt":"2023-12-19T18:07:02","guid":{"rendered":"https:\/\/www.cyberguru.it\/?page_id=34547"},"modified":"2024-01-04T16:46:59","modified_gmt":"2024-01-04T16:46:59","slug":"segunda-temporada-channel","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/es\/segunda-temporada-channel\/","title":{"rendered":"Segunda temporada Channel"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width=\u00bb2560px\u00bb custom_margin=\u00bb150px||||false|false\u00bb custom_padding=\u00bb|||10%|false|false\u00bb custom_padding_tablet=\u00bb|||10%|false|false\u00bb custom_padding_phone=\u00bb|5%||5%|false|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbInter|700|||||||\u00bb header_text_color=\u00bb#FFFFFF\u00bb header_font_size=\u00bb60px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb0px||||false|false\u00bb hover_enabled=\u00bb0&#8243; header_font_size_tablet=\u00bb60px\u00bb header_font_size_phone=\u00bb42px\u00bb header_font_size_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h1>Segunda temporada<br \/>\nCybersecurity Breaking News<\/span><\/span><\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_text_color=\u00bb#FFFFFF\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Formaci\u00f3n Channel \/ <span style=\"color: #f18a00;\">Episodios de la segunda temporada<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|tablet\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_color=\u00bboff\u00bb background_image=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp\u00bb custom_margin=\u00bb|||0px|false|false\u00bb custom_padding=\u00bb0px||0px||true|false\u00bb custom_padding_tablet=\u00bb0px||0px||true|false\u00bb custom_padding_phone=\u00bb0px||0px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/1-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.1&#8243; title_text=\u00bbEpisodio Channel 2.1&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">TODOS LOCOS POR LOS DESCUENTOS \/ EL ATAQUE DEL ABREVADERO <\/span><br \/>\nEn este episodio analizamos una vez m\u00e1s esa t\u00e9cnica de ciberataque copiada a la naturaleza: la t\u00e9cnica del abrevadero. El atacante, como si fuera un cocodrilo, se pone a esperar a su v\u00edctima.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/2-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.2&#8243; title_text=\u00bbEpisodio Channel 2.2&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">UNA PESCA FRUCT\u00cdFERA \/ LA ESTAFA DE WHATSAPP <\/span><br \/>\nEn este episodio, hablamos de una estafa que afecta a un directivo \u00abtecnol\u00f3gicamente poco preparado\u00bb. Se trata de una estafa basada en una manipulaci\u00f3n psicol\u00f3gica en la que el pirata inform\u00e1tico, camuflado bajo una identidad falsa, logra sus pretensiones delictivas.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/3-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.3&#8243; title_text=\u00bbEpisodio Channel 2.3&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">SI NOS LLAMAN POR TEL\u00c9FONO \/ EL \u00abVISHING\u00bb Y EL ROBO DE DATOS <\/span><br \/>\nCada vez estamos m\u00e1s acostumbrados a recibir llamadas de tel\u00e9fono de operadores que nos comunican cambios unilaterales en los contratos que hemos firmado. La percepci\u00f3n del riesgo en estas llamadas telef\u00f3nicas ha disminuido hasta el punto de proporcionar los datos sensibles de la tarjeta de cr\u00e9dito.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb10px||10px||true|false\u00bb custom_padding_tablet=\u00bb10px||10px||true|false\u00bb custom_padding_phone=\u00bb10px||10px||true|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/4-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.4&#8243; title_text=\u00bbEpisodio Channel 2.4&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">APARCAMIENTOS \u00abPELIGROSOS\u00bb \/ EL \u00abQUISHING\u00bb <\/span><br \/>En este episodio exploramos una estafa difundida recientemente que se basa en un c\u00f3digo que se utiliza cada vez m\u00e1s: el c\u00f3digo QR. El mecanismo enga\u00f1oso de base es el mismo que el adoptado para llevar a cabo el \u00abphishing\u00bb: convencer a la posible v\u00edctima de que realice una acci\u00f3n.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/5-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.5&#8243; title_text=\u00bbEpisodio Channel 2.5&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">PROBAR, PERO SIN OLVIDAR \/ LOS SITIOS WEB FALSOS <\/span><br \/>\nDistinguir lo verdadero de lo falso en la dimensi\u00f3n digital puede ser realmente complicado. Siempre existe el peligro de ser v\u00edctima de los ciberdelincuentes. \u00bfC\u00f3mo podemos protegernos? Recurriendo a comportamientos digitales adecuados.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/6-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.6&#8243; title_text=\u00bbEpisodio Channel 2.6&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">UNA R\u00c9PLICA CON DEMASIADA INFORMACI\u00d3N \/ EL FRAUDE DEL CEO <\/span><br \/>\nComprometer las cuentas empresariales e infiltrarse en los correos electr\u00f3nicos que se intercambian en las organizaciones es la amenaza con la que los ciberdelincuentes atormentan a los altos cargos, sobre todo si los intrusos saben perfectamente c\u00f3mo mimetizarse.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb10px||10px||true|false\u00bb custom_padding_tablet=\u00bb10px||10px||true|false\u00bb custom_padding_phone=\u00bb10px||10px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/7-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.7&#8243; title_text=\u00bbEpisodio Channel 2.7&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">UNA FOTO PARA EL RECUERDO&#8230; QUE ES PREFERIBLE OLVIDAR \/ LA PROTECCI\u00d3N DE DATOS <\/span><br \/>\nHoy en d\u00eda, la facilidad con la que compartimos datos e informaci\u00f3n puede generar situaciones muy cr\u00edticas para nuestra privacidad. Sin embargo, seguir algunas medidas comportamentales puede protegernos de intercambios \u00abindiscretos\u00bb.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/8-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.8&#8243; title_text=\u00bbEpisodio Channel 2.8&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">LA CULPA FUE DEL CORREO ELECTR\u00d3NICO \/ EL \u00abSPEAR PHISHING\u00bb <\/span><br \/>El \u00abphishing\u00bb es una t\u00e9cnica de ciberataque que puede adoptar diferentes formas seg\u00fan el contexto. Los ataques de \u00abspear phishing\u00bb, como el narrado en este episodio, suelen ser m\u00e1s precisos, pero es dif\u00edcil que sean \u00abperfectos\u00bb.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/9-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.9&#8243; title_text=\u00bbEpisodio Channel 2.9&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">M\u00c1S ALL\u00c1 DE LAS APARIENCIAS \/ LAS NOTICIAS FALSAS <\/span><br \/>\nEste episodio profundiza en la amenaza que se esconde detr\u00e1s de las noticias falsas, que ahora se difunden tranquilamente en la red. Antes de creerse una noticia sensacionalista encontrada en la web, debemos analizarla exhaustivamente.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb10px||10px||true|false\u00bb custom_padding_tablet=\u00bb10px||10px||true|false\u00bb custom_padding_phone=\u00bb10px||10px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider color=\u00bbgcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb2&#8243; make_equal=\u00bbon\u00bb custom_padding_last_edited=\u00bbon|desktop\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb custom_margin_tablet=\u00bb\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb custom_padding=\u00bb50px||||false|false\u00bb custom_padding_tablet=\u00bb50px||||false|false\u00bb custom_padding_phone=\u00bb50px||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/10-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.10&#8243; title_text=\u00bbEpisodio Channel 2.10&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">UNA DONACI\u00d3N \u00abERR\u00d3NEA\u00bb \/ EL \u00abPHARMING\u00bb <\/span><br \/>Este episodio pone de relieve una t\u00e9cnica de ataque particularmente sutil que, por la creatividad de los especialistas de la ciberseguridad, ha recibido un nombre particular: se trata del \u00abpharming\u00bb, la t\u00e9cnica del sitio clonado. \u00bfPero qu\u00e9 es el \u00abpharming\u00bb?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/11-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.11&#8243; title_text=\u00bbEpisodio Channel 2.11&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">PUBLICACIONES PELIGROSAS \/ LA PRIVACIDAD <\/span><br \/>\nEn la era del intercambio a trav\u00e9s de las redes sociales, \u00bfsigue existiendo la privacidad? Este episodio cuenta la historia de un candidato \u00abdescartado\u00bb de un proceso de selecci\u00f3n por una de las publicaciones de sus redes sociales. Se trata de una advertencia para los j\u00f3venes, pero tambi\u00e9n para los que no lo son tanto.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/12-1-scaled.webp\u00bb alt=\u00bbEpisodio Channel 2.12&#8243; title_text=\u00bbEpisodio Channel 2.12&#8243; _builder_version=\u00bb4.23.1&#8243; _module_preset=\u00bbdefault\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][et_pb_text _builder_version=\u00bb4.23.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik||||||||\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">UNAS VACACIONES MUY \u00abCARAS\u00bb \/ LOS DISPOSITIVOS COMPARTIDOS<\/span><br \/>La \u00abesencia\u00bb de esta historia es la importancia que nuestros dispositivos han adquirido tanto en el \u00e1mbito privado como en el profesional. Por eso, debemos estar muy atentos a c\u00f3mo usamos estas herramientas.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_enable_image=\u00bboff\u00bb background_position=\u00bbbottom_center\u00bb custom_padding=\u00bb50px||50px||true|false\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp\u00bb alt=\u00bbM\u00e1s informaci\u00f3n\u00bb title_text=\u00bbM\u00e1s informaci\u00f3n\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-200px\u00bb horizontal_offset=\u00bb85px\u00bb vertical_offset_tablet=\u00bb-55px\u00bb vertical_offset_phone=\u00bb-90px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-55px\u00bb horizontal_offset_phone=\u00bb-50px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb position_origin_a_tablet=\u00bbtop_left\u00bb position_origin_a_phone=\u00bbtop_left\u00bb position_origin_a_last_edited=\u00bbon|phone\u00bb position_origin_f_tablet=\u00bb\u00bb position_origin_f_phone=\u00bb\u00bb position_origin_f_last_edited=\u00bbon|phone\u00bb position_origin_r_tablet=\u00bb\u00bb position_origin_r_phone=\u00bb\u00bb position_origin_r_last_edited=\u00bbon|phone\u00bb width=\u00bb100%\u00bb custom_margin=\u00bb||||false|false\u00bb positioning_tablet=\u00bbabsolute\u00bb positioning_phone=\u00bbabsolute\u00bb positioning_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\u00bbon|phone\u00bb admin_label=\u00bbL\u00ednea\u00bb _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb||0px||false|false\u00bb custom_padding=\u00bb70px|170px|0px|170px|false|true\u00bb custom_padding_tablet=\u00bb|100px||100px|false|true\u00bb custom_padding_phone=\u00bb70px|20px|0px|20px|false|true\u00bb border_radii=\u00bboff|10px|10px||\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb0px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbRubik|300|||||||\u00bb text_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=\u00bb20px\u00bb header_2_font=\u00bbInter|700|||||||\u00bb header_2_text_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=\u00bb48px\u00bb header_2_line_height=\u00bb58px\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb||25px||false|false\u00bb custom_padding=\u00bb||0px||false|false\u00bb header_2_font_size_tablet=\u00bb48px\u00bb header_2_font_size_phone=\u00bb32px\u00bb header_2_font_size_last_edited=\u00bbon|phone\u00bb header_2_line_height_tablet=\u00bb58px\u00bb header_2_line_height_phone=\u00bb35px\u00bb header_2_line_height_last_edited=\u00bbon|phone\u00bb global_colors_info=\u00bb{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}\u00bb]<\/p>\n<h2 style=\"text-align: center;\">\u00bfQuieres m\u00e1s informaci\u00f3n al respecto?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; use_custom_gutter=\u00bbon\u00bb gutter_width=\u00bb1&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#FFFFFF\u00bb max_width=\u00bb1440px\u00bb custom_margin=\u00bb0px||||false|false\u00bb custom_padding=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_tablet=\u00bb0px|160px|70px|160px|false|true\u00bb custom_padding_phone=\u00bb0px|0px|70px|0px|false|true\u00bb border_radii=\u00bboff|||15px|15px\u00bb box_shadow_style=\u00bbpreset2&#8243; box_shadow_horizontal=\u00bb1px\u00bb box_shadow_vertical=\u00bb20px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyJ9fQ==@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbCONTACTA CON NOSOTROS\u00bb button_alignment=\u00bbcenter\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.23.2&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb global_module=\u00bb105&#8243; saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMyODk1In19@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbFICHA DE DATOS\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bbon|phone\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.23.2&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bb#f18a00&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:230px;||min-width:230px;||max-width:230px;||text-align:center;\u00bb global_module=\u00bb105&#8243; saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_button button_url=\u00bb@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgifX0=@\u00bb url_new_window=\u00bbon\u00bb button_text=\u00bbSOLICITA UNA DEMO\u00bb button_alignment=\u00bbcenter\u00bb button_alignment_tablet=\u00bbcenter\u00bb button_alignment_phone=\u00bbcenter\u00bb button_alignment_last_edited=\u00bboff|desktop\u00bb disabled_on=\u00bboff|off|off\u00bb _builder_version=\u00bb4.23.2&#8243; _dynamic_attributes=\u00bbbutton_url\u00bb _module_preset=\u00bbdefault\u00bb custom_button=\u00bbon\u00bb button_text_size=\u00bb14px\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=\u00bb0px\u00bb button_border_radius=\u00bb3px\u00bb button_font=\u00bbRubik|||on|||||\u00bb button_use_icon=\u00bboff\u00bb custom_margin=\u00bb10px||10px||true|false\u00bb custom_padding=\u00bb12px||12px||true|true\u00bb custom_css_main_element=\u00bbwidth:200px;||min-width:200px;||max-width:200px;||text-align:center;\u00bb global_module=\u00bb105&#8243; saved_tabs=\u00bball\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}\u00bb][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb max_width=\u00bb1440px\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.18.0&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp\u00bb alt=\u00bb\u00bfQuieres m\u00e1s informaci\u00f3n?\u00bb title_text=\u00bb\u00bfQuieres m\u00e1s informaci\u00f3n?\u00bb align=\u00bbright\u00bb _builder_version=\u00bb4.19.4&#8243; _module_preset=\u00bbdefault\u00bb positioning=\u00bbabsolute\u00bb position_origin_a=\u00bbbottom_right\u00bb vertical_offset=\u00bb-20px\u00bb horizontal_offset=\u00bb-100px\u00bb vertical_offset_tablet=\u00bb-20px\u00bb vertical_offset_phone=\u00bb-80px\u00bb vertical_offset_last_edited=\u00bbon|phone\u00bb horizontal_offset_tablet=\u00bb-100px\u00bb horizontal_offset_phone=\u00bb-130px\u00bb horizontal_offset_last_edited=\u00bbon|phone\u00bb width=\u00bb25%\u00bb width_tablet=\u00bb25%\u00bb width_phone=\u00bb25%\u00bb width_last_edited=\u00bbon|phone\u00bb custom_margin=\u00bb||||false|false\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Segunda temporada Cybersecurity Breaking NewsFormaci\u00f3n Channel \/ Episodios de la segunda temporadaTODOS LOCOS POR LOS DESCUENTOS \/ EL ATAQUE DEL ABREVADERO En este episodio analizamos una vez m\u00e1s esa t\u00e9cnica de ciberataque copiada a la naturaleza: la t\u00e9cnica del abrevadero. El atacante, como si fuera un cocodrilo, se pone a esperar a su v\u00edctima.UNA PESCA [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-34547","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Segunda temporada Channel - Cyber Guru<\/title>\n<meta name=\"description\" content=\"12 atractivos episodios en la segunda temporada de Cyber Guru Channel, el programa de formaci\u00f3n inductiva de Cyber Guru\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/segunda-temporada-channel\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Segunda temporada Channel\" \/>\n<meta property=\"og:description\" content=\"12 atractivos episodios en la segunda temporada de Cyber Guru Channel, el programa de formaci\u00f3n inductiva de Cyber Guru\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/segunda-temporada-channel\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-01-04T16:46:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/segunda-temporada-channel\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/segunda-temporada-channel\\\/\",\"name\":\"Segunda temporada Channel - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"datePublished\":\"2023-12-19T18:07:02+00:00\",\"dateModified\":\"2024-01-04T16:46:59+00:00\",\"description\":\"12 atractivos episodios en la segunda temporada de Cyber Guru Channel, el programa de formaci\u00f3n inductiva de Cyber Guru\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/segunda-temporada-channel\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/segunda-temporada-channel\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/segunda-temporada-channel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Segunda temporada Channel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Segunda temporada Channel - Cyber Guru","description":"12 atractivos episodios en la segunda temporada de Cyber Guru Channel, el programa de formaci\u00f3n inductiva de Cyber Guru","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/segunda-temporada-channel\/","og_locale":"es_ES","og_type":"article","og_title":"Segunda temporada Channel","og_description":"12 atractivos episodios en la segunda temporada de Cyber Guru Channel, el programa de formaci\u00f3n inductiva de Cyber Guru","og_url":"https:\/\/www.cyberguru.it\/es\/segunda-temporada-channel\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-01-04T16:46:59+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/segunda-temporada-channel\/","url":"https:\/\/www.cyberguru.it\/es\/segunda-temporada-channel\/","name":"Segunda temporada Channel - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"datePublished":"2023-12-19T18:07:02+00:00","dateModified":"2024-01-04T16:46:59+00:00","description":"12 atractivos episodios en la segunda temporada de Cyber Guru Channel, el programa de formaci\u00f3n inductiva de Cyber Guru","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/segunda-temporada-channel\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/segunda-temporada-channel\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/segunda-temporada-channel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"Segunda temporada Channel"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/34547","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=34547"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/34547\/revisions"}],"predecessor-version":[{"id":34963,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/pages\/34547\/revisions\/34963"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=34547"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}