{"id":26479,"date":"2020-05-25T12:30:07","date_gmt":"2020-05-25T12:30:07","guid":{"rendered":"http:\/\/35.157.126.229\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/"},"modified":"2023-03-06T15:05:38","modified_gmt":"2023-03-06T15:05:38","slug":"cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/","title":{"rendered":"Cibertarjeta n.\u00ba 11 &#8211; Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbsection\u00bb _builder_version=\u00bb4.19.4&#8243; custom_padding=\u00bb30px|30px|30px|30px|true|true\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_row admin_label=\u00bbrow\u00bb _builder_version=\u00bb4.16&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text admin_label=\u00bbText\u00bb _builder_version=\u00bb4.19.4&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis: 100%;\">\n<div class=\"wp-block-group\">\n<p>Aprovechando la emergencia del coronavirus, los ciberdelincuentes han incrementado sus ataques de \u00abphishing\u00bb utilizando todos los canales a su disposici\u00f3n. Los ataques no solo son m\u00e1s numerosos, sino tambi\u00e9n m\u00e1s peligrosos. Para defendernos, lo primero que necesitamos es ser capaces de reconocerlos de un vistazo.<\/p>\n<p>Por ese motivo, en esta tarjeta hemos querido incluir los <span class=\"JsGRdQ\">3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb y consejos <\/span>pr\u00e1cticos sobre c\u00f3mo reconocerlos:<\/p>\n<ol>\n<li>\u00abphishing\u00bb que utiliza el correo electr\u00f3nico<\/li>\n<li>\u00abphishing\u00bb que utiliza varios sistemas de mensajer\u00eda (\u00absmishing\u00bb)<\/li>\n<li>\u00abphishing\u00bb que utiliza el tel\u00e9fono (\u00abvishing\u00bb)<\/li>\n<\/ol>\n<p>Para no convertirnos en v\u00edctimas \u00abinvoluntarias\u00bb de la ciberdelincuencia&#8230;<\/p>\n<p style=\"text-align: center;\"><em><strong>\u00a1no pierdas de vista nuestras cibertarjetas!<\/strong><\/em><\/p>\n<\/div>\n<\/div>\n<\/div>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"\/wp-content\/uploads\/2023\/02\/11ES-1-724x1024.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"\/wp-content\/uploads\/2023\/02\/11ES-1-724x1024.png\" alt=\"11\" class=\"wp-image-19007\" width=\"820\" height=\"1160\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aprovechando la emergencia del coronavirus, los ciberdelincuentes han incrementado sus ataques de \u00abphishing\u00bb utilizando todos los canales a su disposici\u00f3n. Los ataques no solo son m\u00e1s numerosos, sino tambi\u00e9n m\u00e1s peligrosos. Para defendernos, lo primero que necesitamos es ser capaces de reconocerlos de un vistazo. Por ese motivo, en esta tarjeta hemos querido incluir los [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25065,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[426],"tags":[598,603,597,600,874],"class_list":["post-26479","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tarjeta","tag-phishing-es-3","tag-cibertarjeta","tag-conciencia-cibernetica-es-2","tag-concienciacion-sobre-ciberseguridad-es-2","tag-cyber-awareness-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cibertarjeta n.\u00ba 11 - Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb<\/title>\n<meta name=\"description\" content=\"Esta tarjeta destaca los tres tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb y consejos pr\u00e1cticos sobre c\u00f3mo reconocerlos...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cibertarjeta n.\u00ba 11 - Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb\" \/>\n<meta property=\"og:description\" content=\"Esta tarjeta destaca los tres tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb y consejos pr\u00e1cticos sobre c\u00f3mo reconocerlos...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-25T12:30:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-06T15:05:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11ES.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cibertarjeta n.\u00ba 11 &#8211; Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb\",\"datePublished\":\"2020-05-25T12:30:07+00:00\",\"dateModified\":\"2023-03-06T15:05:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/\"},\"wordCount\":239,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/11ES.png\",\"keywords\":[\"\u00abPhishing\u00bb\",\"cibertarjeta\",\"Conciencia cibern\u00e9tica\",\"Concienciaci\u00f3n sobre ciberseguridad\",\"Cyber Awareness\"],\"articleSection\":[\"Tarjeta\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/\",\"name\":\"Cibertarjeta n.\u00ba 11 - Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/11ES.png\",\"datePublished\":\"2020-05-25T12:30:07+00:00\",\"dateModified\":\"2023-03-06T15:05:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Esta tarjeta destaca los tres tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb y consejos pr\u00e1cticos sobre c\u00f3mo reconocerlos...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/11ES.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/11ES.png\",\"width\":1920,\"height\":1080,\"caption\":\"cyber-card-11-IT-attacco-phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2020\\\/05\\\/25\\\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cibertarjeta n.\u00ba 11 &#8211; Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cibertarjeta n.\u00ba 11 - Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb","description":"Esta tarjeta destaca los tres tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb y consejos pr\u00e1cticos sobre c\u00f3mo reconocerlos...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/","og_locale":"es_ES","og_type":"article","og_title":"Cibertarjeta n.\u00ba 11 - Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb","og_description":"Esta tarjeta destaca los tres tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb y consejos pr\u00e1cticos sobre c\u00f3mo reconocerlos...","og_url":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2020-05-25T12:30:07+00:00","article_modified_time":"2023-03-06T15:05:38+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11ES.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"m.baciucco","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cibertarjeta n.\u00ba 11 &#8211; Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb","datePublished":"2020-05-25T12:30:07+00:00","dateModified":"2023-03-06T15:05:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/"},"wordCount":239,"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11ES.png","keywords":["\u00abPhishing\u00bb","cibertarjeta","Conciencia cibern\u00e9tica","Concienciaci\u00f3n sobre ciberseguridad","Cyber Awareness"],"articleSection":["Tarjeta"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/","url":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/","name":"Cibertarjeta n.\u00ba 11 - Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11ES.png","datePublished":"2020-05-25T12:30:07+00:00","dateModified":"2023-03-06T15:05:38+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Esta tarjeta destaca los tres tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb y consejos pr\u00e1cticos sobre c\u00f3mo reconocerlos...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11ES.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/11ES.png","width":1920,"height":1080,"caption":"cyber-card-11-IT-attacco-phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/2020\/05\/25\/cibertarjeta-n-o-11-los-3-tipos-mas-comunes-de-ataques-de-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"Cibertarjeta n.\u00ba 11 &#8211; Los 3 tipos m\u00e1s comunes de ataques de \u00abphishing\u00bb"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/es\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26479","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=26479"}],"version-history":[{"count":6,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26479\/revisions"}],"predecessor-version":[{"id":28532,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26479\/revisions\/28532"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media\/25065"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=26479"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/categories?post=26479"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/tags?post=26479"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}