{"version":"1.0","provider_name":"OSTEC | Seguran\u00e7a digital de resultados","provider_url":"https:\/\/ostec.blog\/es\/","author_name":"Alejandra Villanueva","author_url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/","title":"C\u00f3digos QR explotados en ataques Qshing - OSTEC | Seguran\u00e7a digital de resultados","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"kItpNvHLhq\"><a href=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/codigos-qr-explotados-en-ataques-qshing\/\">C\u00f3digos QR explotados en ataques Qshing<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ostec.blog\/es\/aprendizaje-descubrimiento\/codigos-qr-explotados-en-ataques-qshing\/embed\/#?secret=kItpNvHLhq\" width=\"600\" height=\"338\" title=\"\u00abC\u00f3digos QR explotados en ataques Qshing\u00bb \u2014 OSTEC | Seguran\u00e7a digital de resultados\" data-secret=\"kItpNvHLhq\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/ostec.blog\/wp-content\/uploads\/2022\/04\/qr-code.jpg","thumbnail_width":928,"thumbnail_height":534,"description":"Casi veinte a\u00f1os despu\u00e9s de su desarrollo, la prevalencia y el uso de c\u00f3digos de respuesta r\u00e1pida (QR) se ha expandido mucho m\u00e1s all\u00e1 de su alcance original. Si bien muchos usos son leg\u00edtimos, los ciberdelincuentes tambi\u00e9n aprovechan la tecnolog\u00eda con fines maliciosos. Los c\u00f3digos QR se inventaron en 1994 y originalmente proporcionaban informaci\u00f3n de [&hellip;]"}