{"id":26299,"date":"2019-06-13T20:22:01","date_gmt":"2019-06-13T20:22:01","guid":{"rendered":"http:\/\/35.157.126.229\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/"},"modified":"2024-03-27T13:22:31","modified_gmt":"2024-03-27T13:22:31","slug":"cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/","title":{"rendered":"Cibertarjeta n.\u00ba 1 &#8211; \u00abPhishing\u00bb: si lo reconoces, lo evitas"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbsection\u00bb _builder_version=\u00bb4.19.4&#8243; custom_padding=\u00bb30px|30px|30px|30px|true|true\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_row admin_label=\u00bbrow\u00bb _builder_version=\u00bb4.16&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text admin_label=\u00bbText\u00bb _builder_version=\u00bb4.19.4&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]Esta cCibertarjeta est\u00e1 dedicada al <strong>\u00abphishing\u00bb<\/strong>, una de las t\u00e9cnicas de ciberataque m\u00e1s extendidas y peligrosas. \u00bfQu\u00e9 se puede hacer para defenderse del <strong>\u00abphishing\u00bb por correo electr\u00f3nico<\/strong> y evitar ser v\u00edctima de estos ataques?<\/p>\n<p>El \u00abphishing\u00bb es la t\u00e9cnica de ciberataque m\u00e1s extendida y utiliza el correo electr\u00f3nico como principal veh\u00edculo de difusi\u00f3n.<\/p>\n<p>En resumen, los delincuentes env\u00edan un correo electr\u00f3nico con contenido enga\u00f1oso en el que se pide al destinatario que realice una acci\u00f3n (a menudo hacer clic en un enlace) con la perspectiva de que obtenga una ventaja o evite una situaci\u00f3n desagradable.<\/p>\n<p>Si el destinatario cae en el enga\u00f1o y realiza la acci\u00f3n solicitada, los ciberdelincuentes obtienen una ventaja \u00abfraudulenta\u00bb real, ya que puede causar da\u00f1os directamente al destinatario del correo electr\u00f3nico o a la organizaci\u00f3n en la que trabaja.<\/p>\n<p>Los principales objetivos de estas actividades delictivas se dividen en 3 tipos:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>estafas de diversa naturaleza, que a menudo provocan perjuicios econ\u00f3micos<\/li>\n<li>el robo de informaci\u00f3n sensible, necesaria para llevar a cabo un ciberataque<\/li>\n<li>la propagaci\u00f3n de \u00abmalware\u00bb que, dependiendo de su naturaleza, puede causar diversos tipos de da\u00f1os<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>\u00a1Sigue nuestras cibertarjetas y te mostraremos algunos pasos sencillos para defenderte de la ciberdelincuencia!<\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"\/wp-content\/uploads\/2023\/02\/1ES-1.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/1ES-1-724x1024.png\" alt=\"\" class=\"wp-image-25341\" width=\"821\" height=\"1161\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Esta cCibertarjeta est\u00e1 dedicada al \u00abphishing\u00bb, una de las t\u00e9cnicas de ciberataque m\u00e1s extendidas y peligrosas. \u00bfQu\u00e9 se puede hacer para defenderse del \u00abphishing\u00bb por correo electr\u00f3nico y evitar ser v\u00edctima de estos ataques? El \u00abphishing\u00bb es la t\u00e9cnica de ciberataque m\u00e1s extendida y utiliza el correo electr\u00f3nico como principal veh\u00edculo de difusi\u00f3n. En resumen, [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25105,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[426],"tags":[598,603,597,600,602],"class_list":["post-26299","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tarjeta","tag-phishing-es-3","tag-cibertarjeta","tag-conciencia-cibernetica-es-2","tag-concienciacion-sobre-ciberseguridad-es-2","tag-estafas-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cibertarjeta n.\u00ba 1 - \u00abPhishing\u00bb: si lo reconoces, lo evitas - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Prot\u00e9gete de la amenaza del phishing. Aprenda c\u00f3mo evitar ser v\u00edctima de ataques de phishing y mantenerse seguro en l\u00ednea.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cibertarjeta n.\u00ba 1 - \u00abPhishing\u00bb: si lo reconoces, lo evitas\" \/>\n<meta property=\"og:description\" content=\"Prot\u00e9gete de la amenaza del phishing. Aprenda c\u00f3mo evitar ser v\u00edctima de ataques de phishing y mantenerse seguro en l\u00ednea.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-13T20:22:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-03-27T13:22:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/01ES.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cibertarjeta n.\u00ba 1 &#8211; \u00abPhishing\u00bb: si lo reconoces, lo evitas\",\"datePublished\":\"2019-06-13T20:22:01+00:00\",\"dateModified\":\"2024-03-27T13:22:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/\"},\"wordCount\":340,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/01ES.png\",\"keywords\":[\"\u00abPhishing\u00bb\",\"cibertarjeta\",\"Conciencia cibern\u00e9tica\",\"Concienciaci\u00f3n sobre ciberseguridad\",\"Estafas\"],\"articleSection\":[\"Tarjeta\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/\",\"name\":\"Cibertarjeta n.\u00ba 1 - \u00abPhishing\u00bb: si lo reconoces, lo evitas - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/01ES.png\",\"datePublished\":\"2019-06-13T20:22:01+00:00\",\"dateModified\":\"2024-03-27T13:22:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Prot\u00e9gete de la amenaza del phishing. Aprenda c\u00f3mo evitar ser v\u00edctima de ataques de phishing y mantenerse seguro en l\u00ednea.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/01ES.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/01ES.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2019\\\/06\\\/13\\\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cibertarjeta n.\u00ba 1 &#8211; \u00abPhishing\u00bb: si lo reconoces, lo evitas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cibertarjeta n.\u00ba 1 - \u00abPhishing\u00bb: si lo reconoces, lo evitas - Cyber Guru","description":"Prot\u00e9gete de la amenaza del phishing. Aprenda c\u00f3mo evitar ser v\u00edctima de ataques de phishing y mantenerse seguro en l\u00ednea.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/","og_locale":"es_ES","og_type":"article","og_title":"Cibertarjeta n.\u00ba 1 - \u00abPhishing\u00bb: si lo reconoces, lo evitas","og_description":"Prot\u00e9gete de la amenaza del phishing. Aprenda c\u00f3mo evitar ser v\u00edctima de ataques de phishing y mantenerse seguro en l\u00ednea.","og_url":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2019-06-13T20:22:01+00:00","article_modified_time":"2024-03-27T13:22:31+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/01ES.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"m.baciucco","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cibertarjeta n.\u00ba 1 &#8211; \u00abPhishing\u00bb: si lo reconoces, lo evitas","datePublished":"2019-06-13T20:22:01+00:00","dateModified":"2024-03-27T13:22:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/"},"wordCount":340,"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/01ES.png","keywords":["\u00abPhishing\u00bb","cibertarjeta","Conciencia cibern\u00e9tica","Concienciaci\u00f3n sobre ciberseguridad","Estafas"],"articleSection":["Tarjeta"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/","url":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/","name":"Cibertarjeta n.\u00ba 1 - \u00abPhishing\u00bb: si lo reconoces, lo evitas - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/01ES.png","datePublished":"2019-06-13T20:22:01+00:00","dateModified":"2024-03-27T13:22:31+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Prot\u00e9gete de la amenaza del phishing. Aprenda c\u00f3mo evitar ser v\u00edctima de ataques de phishing y mantenerse seguro en l\u00ednea.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/01ES.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/01ES.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/2019\/06\/13\/cibertarjeta-n-o-1-phishing-si-lo-reconoces-lo-evitas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"Cibertarjeta n.\u00ba 1 &#8211; \u00abPhishing\u00bb: si lo reconoces, lo evitas"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/es\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26299","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=26299"}],"version-history":[{"count":12,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26299\/revisions"}],"predecessor-version":[{"id":36887,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26299\/revisions\/36887"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media\/25105"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=26299"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/categories?post=26299"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/tags?post=26299"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}