{"version":"1.0","provider_name":"OSTEC | Seguran\u00e7a digital de resultados","provider_url":"https:\/\/ostec.blog\/es\/","author_name":"Alejandra Villanueva","author_url":"https:\/\/ostec.blog\/es\/author\/alejandra-villanueva\/","title":"Las t\u00e9cnicas m\u00e1s comunes para invadir su computador - OSTEC | Seguran\u00e7a digital de resultados","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"BIlFlj36IF\"><a href=\"https:\/\/ostec.blog\/es\/generico\/las-tecnicas-mas-comunes-para-invadir-su-computador\/\">Las t\u00e9cnicas m\u00e1s comunes para invadir su computador<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/ostec.blog\/es\/generico\/las-tecnicas-mas-comunes-para-invadir-su-computador\/embed\/#?secret=BIlFlj36IF\" width=\"600\" height=\"338\" title=\"\u00abLas t\u00e9cnicas m\u00e1s comunes para invadir su computador\u00bb \u2014 OSTEC | Seguran\u00e7a digital de resultados\" data-secret=\"BIlFlj36IF\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/ostec.blog\/wp-content\/uploads\/2021\/02\/teclado-maos.jpg","thumbnail_width":928,"thumbnail_height":534,"description":"Detr\u00e1s de cada violaci\u00f3n de seguridad digital, hay un equipo de crackers que ha pasado d\u00edas o meses desarrollando t\u00e9cnicas de hacking distintivas. Recordemos que, la innovaci\u00f3n es una de las armas m\u00e1s usadas, ya que los medios in\u00e9ditos de ataque suelen tener \u00e9xito, precisamente por ser novedosos. Sin embargo, las t\u00e9cnicas de ataque ya [&hellip;]"}