{"id":26539,"date":"2022-07-18T14:44:56","date_gmt":"2022-07-18T14:44:56","guid":{"rendered":"http:\/\/35.157.126.229\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/"},"modified":"2024-08-27T15:23:47","modified_gmt":"2024-08-27T15:23:47","slug":"cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/","title":{"rendered":"Cibertarjeta n.\u00ba\u00a023 &#8211; \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos"},"content":{"rendered":"\n<p>Il <a href=\"https:\/\/www.cyberguru.it\/2022\/08\/29\/cyber-pillola-26-qishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">Qishing <\/a>\u00e8 una tecnica di attacco basata sulla possibilit\u00e0 che l\u2019ignara vittima inquadri un QR code \u201cmalevolo\u201d.<\/p>\n\n<p>Cosa fare per non caderne vittima?\u00a0<\/p>\n\n<p>La difesa principale resta quella di non scansionare tutto ci\u00f2 che ci circonda, soprattutto se il codice QR si trova su un volantino distribuito per strada o se \u00e8 maldestramente incollato sul tavolo di un ristorante, prestando molta attenzione nel verificare che il QR code non sia stato manomesso.<\/p>\n\n<p><em><strong>Questa Infografica ti fornir\u00e0 qualche utile consiglio per evitare di cadere vittima delle truffe pi\u00f9 conosciute!<\/strong><\/em><\/p>\n\n<p><\/p>\n\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/07\/23IT-1.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23ES-1-724x1024.png\" alt=\"Qishing: attenzione ai QR code malevoli\" class=\"wp-image-25773\" style=\"width:823px;height:1164px\"\/><\/a><\/figure>","protected":false},"excerpt":{"rendered":"<p>Il Qishing \u00e8 una tecnica di attacco basata sulla possibilit\u00e0 che l\u2019ignara vittima inquadri un QR code \u201cmalevolo\u201d. Cosa fare per non caderne vittima?\u00a0 La difesa principale resta quella di non scansionare tutto ci\u00f2 che ci circonda, soprattutto se il codice QR si trova su un volantino distribuito per strada o se \u00e8 maldestramente incollato [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25780,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[426],"tags":[603,544,557,874,875,540,611,876,569],"class_list":["post-26539","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tarjeta","tag-cibertarjeta","tag-conciencia-cibernetica-es","tag-concienciacion-sobre-ciberseguridad-es","tag-cyber-awareness-es","tag-cyber-card-es","tag-cyber-security-awareness-es-2","tag-infografia","tag-infografica-es","tag-qishing-es-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cibertarjeta n.\u00ba\u00a023 - \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos<\/title>\n<meta name=\"description\" content=\"El \u00abqishing\u00bb es una t\u00e9cnica de ataque basada en la posibilidad de que una v\u00edctima desprevenida escanee un c\u00f3digo QR \u00abmalicioso\u00bb. \u00bfC\u00f3mo podemos evitarlo?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cibertarjeta n.\u00ba\u00a023 - \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos\" \/>\n<meta property=\"og:description\" content=\"El \u00abqishing\u00bb es una t\u00e9cnica de ataque basada en la posibilidad de que una v\u00edctima desprevenida escanee un c\u00f3digo QR \u00abmalicioso\u00bb. \u00bfC\u00f3mo podemos evitarlo?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-18T14:44:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-27T15:23:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23ES.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cibertarjeta n.\u00ba\u00a023 &#8211; \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos\",\"datePublished\":\"2022-07-18T14:44:56+00:00\",\"dateModified\":\"2024-08-27T15:23:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/\"},\"wordCount\":99,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/23ES.png\",\"keywords\":[\"cibertarjeta\",\"Conciencia cibern\u00e9tica\",\"Concienciaci\u00f3n sobre ciberseguridad\",\"Cyber Awareness\",\"cyber card\",\"Cyber Security Awareness\",\"infograf\u00eda\",\"infografica\",\"Qishing\"],\"articleSection\":[\"Tarjeta\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/\",\"name\":\"Cibertarjeta n.\u00ba\u00a023 - \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/23ES.png\",\"datePublished\":\"2022-07-18T14:44:56+00:00\",\"dateModified\":\"2024-08-27T15:23:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"El \u00abqishing\u00bb es una t\u00e9cnica de ataque basada en la posibilidad de que una v\u00edctima desprevenida escanee un c\u00f3digo QR \u00abmalicioso\u00bb. \u00bfC\u00f3mo podemos evitarlo?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/23ES.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/23ES.png\",\"width\":1440,\"height\":810,\"caption\":\"Qishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2022\\\/07\\\/18\\\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cibertarjeta n.\u00ba\u00a023 &#8211; \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cibertarjeta n.\u00ba\u00a023 - \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos","description":"El \u00abqishing\u00bb es una t\u00e9cnica de ataque basada en la posibilidad de que una v\u00edctima desprevenida escanee un c\u00f3digo QR \u00abmalicioso\u00bb. \u00bfC\u00f3mo podemos evitarlo?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/","og_locale":"es_ES","og_type":"article","og_title":"Cibertarjeta n.\u00ba\u00a023 - \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos","og_description":"El \u00abqishing\u00bb es una t\u00e9cnica de ataque basada en la posibilidad de que una v\u00edctima desprevenida escanee un c\u00f3digo QR \u00abmalicioso\u00bb. \u00bfC\u00f3mo podemos evitarlo?","og_url":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2022-07-18T14:44:56+00:00","article_modified_time":"2024-08-27T15:23:47+00:00","og_image":[{"width":1440,"height":810,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23ES.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"m.baciucco","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cibertarjeta n.\u00ba\u00a023 &#8211; \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos","datePublished":"2022-07-18T14:44:56+00:00","dateModified":"2024-08-27T15:23:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/"},"wordCount":99,"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23ES.png","keywords":["cibertarjeta","Conciencia cibern\u00e9tica","Concienciaci\u00f3n sobre ciberseguridad","Cyber Awareness","cyber card","Cyber Security Awareness","infograf\u00eda","infografica","Qishing"],"articleSection":["Tarjeta"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/","url":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/","name":"Cibertarjeta n.\u00ba\u00a023 - \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23ES.png","datePublished":"2022-07-18T14:44:56+00:00","dateModified":"2024-08-27T15:23:47+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"El \u00abqishing\u00bb es una t\u00e9cnica de ataque basada en la posibilidad de que una v\u00edctima desprevenida escanee un c\u00f3digo QR \u00abmalicioso\u00bb. \u00bfC\u00f3mo podemos evitarlo?","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23ES.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/23ES.png","width":1440,"height":810,"caption":"Qishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/2022\/07\/18\/cibertarjeta-n-o-23-qishing-cuidado-con-los-codigos-qr-maliciosos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"Cibertarjeta n.\u00ba\u00a023 &#8211; \u00abQishing\u00bb, cuidado con los c\u00f3digos QR maliciosos"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/es\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26539","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=26539"}],"version-history":[{"count":8,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26539\/revisions"}],"predecessor-version":[{"id":39374,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/26539\/revisions\/39374"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media\/25780"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=26539"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/categories?post=26539"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/tags?post=26539"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}