{"id":26286,"date":"2019-09-10T15:11:11","date_gmt":"2019-09-10T15:11:11","guid":{"rendered":"http:\/\/35.157.126.229\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/"},"modified":"2023-03-06T16:39:52","modified_gmt":"2023-03-06T16:39:52","slug":"cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/","title":{"rendered":"Cibertarjeta n.\u00ba 4 &#8211; C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbsection\u00bb _builder_version=\u00bb4.19.4&#8243; custom_padding=\u00bb30px|30px|30px|30px|true|true\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_row admin_label=\u00bbrow\u00bb _builder_version=\u00bb4.16&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text admin_label=\u00bbText\u00bb _builder_version=\u00bb4.19.4&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]La Cibertarjeta n.\u00ba 4 se\u00f1ala algunos pasos sencillos que puedes seguir para no ser v\u00edctima de la ciberdelincuencia y, en particular, <strong>para evitar que el malware en sus m\u00faltiples formas se instale en tu ordenador<\/strong>.<\/p>\n<p>\u00bfPor qu\u00e9 es tan importante? Porque, muy a menudo, el desencadenante de una estrategia de ciberataque es precisamente el uso de \u00abmalware\u00bb. De hecho, el malware puede robar datos confidenciales de tu ordenador, ralentizarlo progresivamente o utilizar tus cuentas de correo electr\u00f3nico sin tu conocimiento para enviar correos infectados.<\/p>\n<p>Sin embargo, para instalarse en nuestros ordenadores, necesita la <strong>colaboraci\u00f3n \u00abinvoluntaria\u00bb de la v\u00edctima<\/strong>.<\/p>\n<p>Por tanto, hay trucos que pueden ayudarnos a prevenir situaciones dif\u00edciles:<\/p>\n<ol>\n<li><strong>No abras los archivos adjuntos ni los enlaces de los correos electr\u00f3nicos<\/strong> con un\u00a0 remitente desconocido\u00a0 o con un objeto o texto sospechoso<\/li>\n<li>\n<p class=\"direction-ltr align-start para-style-body\"><strong>No hagas clic \u00aba ciegas\u00bb en la \u00a0publicidad<\/strong>, los \u00abbanners\u00bb y las ventanas emergentes de internet que prometen descuentos especiales<\/p>\n<\/li>\n<li>\n<p class=\"direction-ltr align-start para-style-body\"><strong>No introduzcas datos confidenciales<\/strong>,\u00a0 como datos de inicio de sesi\u00f3n, datos de cuentas bancarias\u00a0 o contrase\u00f1as si no est\u00e1s seguro de la legitimidad de la solicitud<\/p>\n<\/li>\n<li>\n<p class=\"direction-ltr align-start para-style-body\">Descarga <strong>APLICACIONES y archivos \u00fanicamente de \u00a0fuentes fiables<\/strong> y evita descargar\u00a0 APLICACIONES o programas no deseados.<\/p>\n<\/li>\n<\/ol>\n<p>Si prestas atenci\u00f3n a nuestras tarjetas, encontrar\u00e1s numerosos consejos sencillos para defenderte de los ciberdelincuentes.<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"\/wp-content\/uploads\/2023\/02\/4ES-724x1024.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/4ES-724x1024.png\" alt=\"4 (2)\" class=\"wp-image-18994\" width=\"816\" height=\"1154\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La Cibertarjeta n.\u00ba 4 se\u00f1ala algunos pasos sencillos que puedes seguir para no ser v\u00edctima de la ciberdelincuencia y, en particular, para evitar que el malware en sus m\u00faltiples formas se instale en tu ordenador. \u00bfPor qu\u00e9 es tan importante? Porque, muy a menudo, el desencadenante de una estrategia de ciberataque es precisamente el uso [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25093,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[426],"tags":[598,603,597,600,602],"class_list":["post-26286","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tarjeta","tag-phishing-es-3","tag-cibertarjeta","tag-conciencia-cibernetica-es-2","tag-concienciacion-sobre-ciberseguridad-es-2","tag-estafas-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cibertarjeta n.\u00ba 4 - C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb -<\/title>\n<meta name=\"description\" content=\"Esta cibertarjeta est\u00e1 dedicada al \u00abmalware\u00bb, que a menudo se utiliza como desencadenante de ciberataques. \u00bfQu\u00e9 se puede hacer para evitarlo?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cibertarjeta n.\u00ba 4 - C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb\" \/>\n<meta property=\"og:description\" content=\"Esta cibertarjeta est\u00e1 dedicada al \u00abmalware\u00bb, que a menudo se utiliza como desencadenante de ciberataques. \u00bfQu\u00e9 se puede hacer para evitarlo?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-10T15:11:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T16:39:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04ES.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cibertarjeta n.\u00ba 4 &#8211; C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb\",\"datePublished\":\"2019-09-10T15:11:11+00:00\",\"dateModified\":\"2023-03-06T16:39:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/\"},\"wordCount\":346,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04ES.png\",\"keywords\":[\"\u00abPhishing\u00bb\",\"cibertarjeta\",\"Conciencia cibern\u00e9tica\",\"Concienciaci\u00f3n sobre ciberseguridad\",\"Estafas\"],\"articleSection\":[\"Tarjeta\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/\",\"name\":\"Cibertarjeta n.\u00ba 4 - C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04ES.png\",\"datePublished\":\"2019-09-10T15:11:11+00:00\",\"dateModified\":\"2023-03-06T16:39:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Esta cibertarjeta est\u00e1 dedicada al \u00abmalware\u00bb, que a menudo se utiliza como desencadenante de ciberataques. \u00bfQu\u00e9 se puede hacer para evitarlo?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04ES.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/04ES.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/09\\\/10\\\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cibertarjeta n.\u00ba 4 &#8211; C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cibertarjeta n.\u00ba 4 - C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb -","description":"Esta cibertarjeta est\u00e1 dedicada al \u00abmalware\u00bb, que a menudo se utiliza como desencadenante de ciberataques. \u00bfQu\u00e9 se puede hacer para evitarlo?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/","og_locale":"es_ES","og_type":"article","og_title":"Cibertarjeta n.\u00ba 4 - C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb","og_description":"Esta cibertarjeta est\u00e1 dedicada al \u00abmalware\u00bb, que a menudo se utiliza como desencadenante de ciberataques. \u00bfQu\u00e9 se puede hacer para evitarlo?","og_url":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2019-09-10T15:11:11+00:00","article_modified_time":"2023-03-06T16:39:52+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04ES.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"m.baciucco","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cibertarjeta n.\u00ba 4 &#8211; C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb","datePublished":"2019-09-10T15:11:11+00:00","dateModified":"2023-03-06T16:39:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/"},"wordCount":346,"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04ES.png","keywords":["\u00abPhishing\u00bb","cibertarjeta","Conciencia cibern\u00e9tica","Concienciaci\u00f3n sobre ciberseguridad","Estafas"],"articleSection":["Tarjeta"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/","url":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/","name":"Cibertarjeta n.\u00ba 4 - C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb -","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04ES.png","datePublished":"2019-09-10T15:11:11+00:00","dateModified":"2023-03-06T16:39:52+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Esta cibertarjeta est\u00e1 dedicada al \u00abmalware\u00bb, que a menudo se utiliza como desencadenante de ciberataques. \u00bfQu\u00e9 se puede hacer para evitarlo?","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04ES.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/04ES.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/2019\/09\/10\/cibertarjeta-n-o-4-como-evitar-el-malware-y-sus-malas-intenciones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"Cibertarjeta n.\u00ba 4 &#8211; C\u00f3mo evitar el malware y sus \u00abmalas intenciones\u00bb"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/es\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26286","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=26286"}],"version-history":[{"count":13,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26286\/revisions"}],"predecessor-version":[{"id":28565,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26286\/revisions\/28565"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media\/25093"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=26286"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/categories?post=26286"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/tags?post=26286"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}