{"id":26424,"date":"2020-07-24T12:43:36","date_gmt":"2020-07-24T12:43:36","guid":{"rendered":"http:\/\/35.157.126.229\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/"},"modified":"2023-03-06T15:02:39","modified_gmt":"2023-03-06T15:02:39","slug":"cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/","title":{"rendered":"Cibertarjeta n.\u00ba&nbsp;12 &#8211; 5 reglas para evitar un ataque de \u00abphishing\u00bb"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbsection\u00bb _builder_version=\u00bb4.19.4&#8243; custom_padding=\u00bb30px|30px|30px|30px|true|true\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_row admin_label=\u00bbrow\u00bb _builder_version=\u00bb4.16&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text admin_label=\u00bbText\u00bb _builder_version=\u00bb4.19.4&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<p>La ciberdelincuencia sigue aprovechando cualquier oportunidad para crear nuevas campa\u00f1as de \u00abphishing\u00bb por correo electr\u00f3nico. Reconocerlas de un vistazo puede llegar a ser dif\u00edcil, sobre todo porque el nivel de sofisticaci\u00f3n ha aumentado enormemente desde las primeras campa\u00f1as con correos electr\u00f3nicos llenos de faltas.<\/p>\n<p>\u00bfQu\u00e9 se puede hacer para no ser v\u00edctima de ellas?<\/p>\n<p><span class=\"JsGRdQ\">Actuar de manera consciente y seguir las 5 buenas reglas de nuestra cibertarjeta pueden ayudarte a prevenir un ataque de \u00abphishing\u00bb y sus peligrosos efectos<\/span>:<\/p>\n<ol>\n<li>Evita los clics impulsivos.<\/li>\n<li>Sospecha de los enlaces.<\/li>\n<li>Prot\u00e9gete a ti mismo.<\/li>\n<li>No cedas ante la urgencia.<\/li>\n<li>Duda de correos electr\u00f3nicos inesperados.<\/li>\n<\/ol>\n<p>Para no convertirnos en v\u00edctimas \u00abinvoluntarias\u00bb de la ciberdelincuencia&#8230;<\/p>\n<p style=\"text-align: center;\"><em><strong>\u00a1no pierdas de vista nuestras cibertarjetas!<\/strong><\/em><\/p>\n<\/div>\n<\/div>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"\/wp-content\/uploads\/2023\/02\/12ES-2.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/12ES-2-724x1024.png\" alt=\"\" class=\"wp-image-25257\" width=\"822\" height=\"1163\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La ciberdelincuencia sigue aprovechando cualquier oportunidad para crear nuevas campa\u00f1as de \u00abphishing\u00bb por correo electr\u00f3nico. Reconocerlas de un vistazo puede llegar a ser dif\u00edcil, sobre todo porque el nivel de sofisticaci\u00f3n ha aumentado enormemente desde las primeras campa\u00f1as con correos electr\u00f3nicos llenos de faltas. \u00bfQu\u00e9 se puede hacer para no ser v\u00edctima de ellas? Actuar [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25061,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[426],"tags":[598,603,597,600],"class_list":["post-26424","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tarjeta","tag-phishing-es-3","tag-cibertarjeta","tag-conciencia-cibernetica-es-2","tag-concienciacion-sobre-ciberseguridad-es-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cibertarjeta n.\u00ba&nbsp;12 - 5 reglas para evitar un ataque de \u00abphishing\u00bb<\/title>\n<meta name=\"description\" content=\"Esta cibertarjeta destaca cinco buenas reglas que podemos seguir para prevenir los ataques de \u00abphishing\u00bb por correo electr\u00f3nico y no caer en su trampa.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cibertarjeta n.\u00ba&nbsp;12 - 5 reglas para evitar un ataque de \u00abphishing\u00bb\" \/>\n<meta property=\"og:description\" content=\"Esta cibertarjeta destaca cinco buenas reglas que podemos seguir para prevenir los ataques de \u00abphishing\u00bb por correo electr\u00f3nico y no caer en su trampa.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-24T12:43:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T15:02:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12ES-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cibertarjeta n.\u00ba&nbsp;12 &#8211; 5 reglas para evitar un ataque de \u00abphishing\u00bb\",\"datePublished\":\"2020-07-24T12:43:36+00:00\",\"dateModified\":\"2023-03-06T15:02:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/\"},\"wordCount\":249,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/12ES-1.png\",\"keywords\":[\"\u00abPhishing\u00bb\",\"cibertarjeta\",\"Conciencia cibern\u00e9tica\",\"Concienciaci\u00f3n sobre ciberseguridad\"],\"articleSection\":[\"Tarjeta\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/\",\"name\":\"Cibertarjeta n.\u00ba&nbsp;12 - 5 reglas para evitar un ataque de \u00abphishing\u00bb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/12ES-1.png\",\"datePublished\":\"2020-07-24T12:43:36+00:00\",\"dateModified\":\"2023-03-06T15:02:39+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Esta cibertarjeta destaca cinco buenas reglas que podemos seguir para prevenir los ataques de \u00abphishing\u00bb por correo electr\u00f3nico y no caer en su trampa.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/12ES-1.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/12ES-1.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/07\\\/24\\\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cibertarjeta n.\u00ba&nbsp;12 &#8211; 5 reglas para evitar un ataque de \u00abphishing\u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cibertarjeta n.\u00ba&nbsp;12 - 5 reglas para evitar un ataque de \u00abphishing\u00bb","description":"Esta cibertarjeta destaca cinco buenas reglas que podemos seguir para prevenir los ataques de \u00abphishing\u00bb por correo electr\u00f3nico y no caer en su trampa.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/","og_locale":"es_ES","og_type":"article","og_title":"Cibertarjeta n.\u00ba&nbsp;12 - 5 reglas para evitar un ataque de \u00abphishing\u00bb","og_description":"Esta cibertarjeta destaca cinco buenas reglas que podemos seguir para prevenir los ataques de \u00abphishing\u00bb por correo electr\u00f3nico y no caer en su trampa.","og_url":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2020-07-24T12:43:36+00:00","article_modified_time":"2023-03-06T15:02:39+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12ES-1.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"m.baciucco","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cibertarjeta n.\u00ba&nbsp;12 &#8211; 5 reglas para evitar un ataque de \u00abphishing\u00bb","datePublished":"2020-07-24T12:43:36+00:00","dateModified":"2023-03-06T15:02:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/"},"wordCount":249,"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12ES-1.png","keywords":["\u00abPhishing\u00bb","cibertarjeta","Conciencia cibern\u00e9tica","Concienciaci\u00f3n sobre ciberseguridad"],"articleSection":["Tarjeta"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/","url":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/","name":"Cibertarjeta n.\u00ba&nbsp;12 - 5 reglas para evitar un ataque de \u00abphishing\u00bb","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12ES-1.png","datePublished":"2020-07-24T12:43:36+00:00","dateModified":"2023-03-06T15:02:39+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Esta cibertarjeta destaca cinco buenas reglas que podemos seguir para prevenir los ataques de \u00abphishing\u00bb por correo electr\u00f3nico y no caer en su trampa.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12ES-1.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/12ES-1.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/2020\/07\/24\/cibertarjeta-n-o-12-5-reglas-para-evitar-un-ataque-de-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"Cibertarjeta n.\u00ba&nbsp;12 &#8211; 5 reglas para evitar un ataque de \u00abphishing\u00bb"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/es\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26424","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=26424"}],"version-history":[{"count":8,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26424\/revisions"}],"predecessor-version":[{"id":28528,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26424\/revisions\/28528"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media\/25061"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=26424"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/categories?post=26424"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/tags?post=26424"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}