{"id":40031,"date":"2024-10-02T15:39:56","date_gmt":"2024-10-02T15:39:56","guid":{"rendered":"https:\/\/www.cyberguru.it\/?p=40031"},"modified":"2024-10-03T14:48:34","modified_gmt":"2024-10-03T14:48:34","slug":"cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/","title":{"rendered":"Cibertarjeta n\u00ba 30 &#8211; Vishing: si lo reconoces, lo evitas"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.19.4&#8243; custom_padding=\u00bb0px||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_row _builder_version=\u00bb4.19.4&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb custom_margin=\u00bb0px||0px||false|false\u00bb global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; custom_padding=\u00bb|||\u00bb global_colors_info=\u00bb{}\u00bb custom_padding__hover=\u00bb|||\u00bb theme_builder_area=\u00bbpost_content\u00bb][et_pb_text _builder_version=\u00bb4.27.2&#8243; background_size=\u00bbinitial\u00bb background_position=\u00bbtop_left\u00bb background_repeat=\u00bbrepeat\u00bb min_height=\u00bb1363.1px\u00bb hover_enabled=\u00bb0&#8243; global_colors_info=\u00bb{}\u00bb theme_builder_area=\u00bbpost_content\u00bb sticky_enabled=\u00bb0&#8243;]<\/p>\n<h2><span>Conocer los m\u00e9todos de los ciberdelincuentes <\/span><span>delincuentes <\/span><span>\u00a1para robar informaci\u00f3n sensible es el primer paso para prevenir un ataque!<\/span><\/h2>\n<p><span>El vishing es un tipo de ataque de ingenier\u00eda social similar al smishing.<\/span><\/p>\n<p><span>La diferencia con otros tipos de phishing es que en lugar de correos electr\u00f3nicos o mensajes de texto, el ataque se lleva a cabo con una llamada telef\u00f3nica, por lo que tambi\u00e9n se denomina phishing de voz. <\/span><\/p>\n<p><span>Normalmente, el vishing utiliza un mensaje de voz automatizado transmitido por una entidad que simula ser una instituci\u00f3n leg\u00edtima, como un banco, una agencia gubernamental u otra empresa que presta servicios leg\u00edtimos. <\/span><\/p>\n<p><span>Los mecanismos para inducir a las v\u00edctimas a confiar y actuar en inter\u00e9s del atacante son siempre los mismos: los atacantes informan a la v\u00edctima de deudas de dinero, p\u00f3lizas de seguro que expiran, cuentas que est\u00e1n a punto de ser bloqueadas o una tarjeta de cr\u00e9dito en la que se ha detectado una actividad sospechosa que debe resolverse inmediatamente. <\/span><\/p>\n<p><span>Aprovechando los miedos y preocupaciones de muchas personas, el delincuente se pone en contacto con nosotros precisamente para que le ayudemos a resolver el problema. Al final, la v\u00edctima incluso estar\u00e1 encantada de cooperar, facilit\u00e1ndole toda la informaci\u00f3n que le pida, incluida la personal y sensible. <\/span><\/p>\n<p><span>He aqu\u00ed <\/span><span>\u00a1algunas reglas sencillas para evitar caer en la trampa!<\/span><\/p>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard_30_ES.webp\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard_30_ES.webp\" alt=\"\" class=\"wp-image-28925\" width=\"823\" height=\"1164\" \/><\/a><\/figure>\n<p><em><strong>\u00a1Esta Cyber Card puede ayudarte a adquirir la conciencia digital adecuada!<\/strong><\/em><\/p>\n<p>&nbsp;<\/p>\n<p><!-- \/divi:image -->[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Conocer los m\u00e9todos de los ciberdelincuentes delincuentes \u00a1para robar informaci\u00f3n sensible es el primer paso para prevenir un ataque! El vishing es un tipo de ataque de ingenier\u00eda social similar al smishing. La diferencia con otros tipos de phishing es que en lugar de correos electr\u00f3nicos o mensajes de texto, el ataque se lleva a [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":40228,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[426],"tags":[598,748,560],"class_list":["post-40031","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tarjeta","tag-phishing-es-3","tag-vishing-es-3","tag-smishing-es-2"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cibertarjeta n\u00ba 30 - Vishing: si lo reconoces, lo evitas<\/title>\n<meta name=\"description\" content=\"Aprende a reconocer y evitar el Vishing, un m\u00e9todo de ataque utilizado por los ciberdelincuentes para robar tu informaci\u00f3n sensible.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cibertarjeta n\u00ba 30 - Vishing: si lo reconoces, lo evitas\" \/>\n<meta property=\"og:description\" content=\"Aprende a reconocer y evitar el Vishing, un m\u00e9todo de ataque utilizado por los ciberdelincuentes para robar tu informaci\u00f3n sensible.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-02T15:39:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-03T14:48:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_ES.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Cibertarjeta n\u00ba 30 &#8211; Vishing: si lo reconoces, lo evitas\",\"datePublished\":\"2024-10-02T15:39:56+00:00\",\"dateModified\":\"2024-10-03T14:48:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/\"},\"wordCount\":368,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_ES.webp\",\"keywords\":[\"\u00abPhishing\u00bb\",\"\u00abvishing\u00bb\",\"Smishing\"],\"articleSection\":[\"Tarjeta\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/\",\"name\":\"Cibertarjeta n\u00ba 30 - Vishing: si lo reconoces, lo evitas\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_ES.webp\",\"datePublished\":\"2024-10-02T15:39:56+00:00\",\"dateModified\":\"2024-10-03T14:48:34+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Aprende a reconocer y evitar el Vishing, un m\u00e9todo de ataque utilizado por los ciberdelincuentes para robar tu informaci\u00f3n sensible.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_ES.webp\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/CyberCard30_Preview_ES.webp\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/2024\\\/10\\\/02\\\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/pagina-de-inicio-v2-borrador\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cibertarjeta n\u00ba 30 &#8211; Vishing: si lo reconoces, lo evitas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/es\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cibertarjeta n\u00ba 30 - Vishing: si lo reconoces, lo evitas","description":"Aprende a reconocer y evitar el Vishing, un m\u00e9todo de ataque utilizado por los ciberdelincuentes para robar tu informaci\u00f3n sensible.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/","og_locale":"es_ES","og_type":"article","og_title":"Cibertarjeta n\u00ba 30 - Vishing: si lo reconoces, lo evitas","og_description":"Aprende a reconocer y evitar el Vishing, un m\u00e9todo de ataque utilizado por los ciberdelincuentes para robar tu informaci\u00f3n sensible.","og_url":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2024-10-02T15:39:56+00:00","article_modified_time":"2024-10-03T14:48:34+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_ES.webp","type":"image\/webp"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"m.baciucco","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Cibertarjeta n\u00ba 30 &#8211; Vishing: si lo reconoces, lo evitas","datePublished":"2024-10-02T15:39:56+00:00","dateModified":"2024-10-03T14:48:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/"},"wordCount":368,"commentCount":0,"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_ES.webp","keywords":["\u00abPhishing\u00bb","\u00abvishing\u00bb","Smishing"],"articleSection":["Tarjeta"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/","url":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/","name":"Cibertarjeta n\u00ba 30 - Vishing: si lo reconoces, lo evitas","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_ES.webp","datePublished":"2024-10-02T15:39:56+00:00","dateModified":"2024-10-03T14:48:34+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Aprende a reconocer y evitar el Vishing, un m\u00e9todo de ataque utilizado por los ciberdelincuentes para robar tu informaci\u00f3n sensible.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_ES.webp","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/10\/CyberCard30_Preview_ES.webp","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/es\/2024\/10\/02\/cibertarjeta-no-30-vishing-si-lo-reconoces-lo-evitas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/es\/pagina-de-inicio-v2-borrador\/"},{"@type":"ListItem","position":2,"name":"Cibertarjeta n\u00ba 30 &#8211; Vishing: si lo reconoces, lo evitas"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/es\/#website","url":"https:\/\/www.cyberguru.it\/es\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/es\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/es\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/40031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/comments?post=40031"}],"version-history":[{"count":7,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/40031\/revisions"}],"predecessor-version":[{"id":40234,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/posts\/40031\/revisions\/40234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media\/40228"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/media?parent=40031"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/categories?post=40031"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/es\/wp-json\/wp\/v2\/tags?post=40031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}