{"id":210016,"date":"2024-05-28T11:18:23","date_gmt":"2024-05-28T16:18:23","guid":{"rendered":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/?p=210016"},"modified":"2024-05-28T11:18:24","modified_gmt":"2024-05-28T16:18:24","slug":"pilas-con-las-extorsiones-digitales-asi-puedes-prevenir-ataques-por-correos-maliciosos","status":"publish","type":"post","link":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/pilas-con-las-extorsiones-digitales-asi-puedes-prevenir-ataques-por-correos-maliciosos\/","title":{"rendered":"\u00a1Pilas con las\u00a0extorsiones\u00a0digitales! &#8211; As\u00ed puedes prevenir ataques por correos maliciosos"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"889\" height=\"2185\" src=\"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-content\/uploads\/2024\/05\/extorsiones-digitales.jpg\" alt=\"\" class=\"wp-image-210017\" srcset=\"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-content\/uploads\/2024\/05\/extorsiones-digitales.jpg 889w, https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-content\/uploads\/2024\/05\/extorsiones-digitales-480x1180.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 889px, 100vw\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":2,"featured_media":209916,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-210016","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categoria"],"_links":{"self":[{"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/posts\/210016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/comments?post=210016"}],"version-history":[{"count":1,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/posts\/210016\/revisions"}],"predecessor-version":[{"id":210018,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/posts\/210016\/revisions\/210018"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/media\/209916"}],"wp:attachment":[{"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/media?parent=210016"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/categories?post=210016"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ucm.edu.co\/seguridad-de-la-informacion\/wp-json\/wp\/v2\/tags?post=210016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}