{"id":309,"date":"2021-05-21T17:56:40","date_gmt":"2021-05-21T17:56:40","guid":{"rendered":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?p=309"},"modified":"2021-05-21T18:52:12","modified_gmt":"2021-05-21T18:52:12","slug":"como-identificar-y-evitar-un-correo-de-phishing","status":"publish","type":"post","link":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/","title":{"rendered":"C\u00f3mo identificar y evitar un correo de phishing"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>\u00bfQu\u00e9 es el phishing?<\/strong><\/h2>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>Estafa que tiene como objetivo obtener a trav\u00e9s de internet datos privados de los usuarios, especialmente para acceder a sus cuentas o datos bancarios.<\/p><cite><a href=\"https:\/\/languages.oup.com\/\">Oxford Languages dictionary<\/a><\/cite><\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Evita dar tus datos como norma general<\/strong><\/h2>\n\n\n\n<p>El objetivo del phishing es asustar al usuario y hacerle actuar r\u00e1pidamente con las acciones que indican. Para esto, te plantean una soluci\u00f3n f\u00e1cil facilitando un enlace o una descarga, y en el que una vez que accedes te piden, nombre de usuario, claves o datos de acceso a tu cuenta. Desconf\u00eda totalmente de estos correos y&nbsp;<strong>nunca facilites tus datos por correo electr\u00f3nico.&nbsp;<\/strong><\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-pixabay-60504-1024x683.jpg\" alt=\"Ciberseguridad\" class=\"wp-image-323\" width=\"768\" height=\"512\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-pixabay-60504-1024x683.jpg 1024w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-pixabay-60504-300x200.jpg 300w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-pixabay-60504-768x512.jpg 768w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-pixabay-60504-1536x1024.jpg 1536w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-pixabay-60504-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption>Mant\u00e9n tus datos seguros al navegar por internet<\/figcaption><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Revisa la escritura<\/strong><\/h2>\n\n\n\n<p>Estos tipos de correo suelen estar llenos de faltas de ortograf\u00eda, como:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Palabras sin tilde<\/li><li>\u201cn\u201d en lugar de con \u201c\u00f1\u201d<\/li><li>S\u00edmbolos de otros idiomas o lenguajes <\/li><li>Frases estructuradas de manera extra\u00f1a <\/li><li>Palabras en idiomas diferentes al texto<\/li><li>Oraciones aparentemente traducidas<\/li><\/ul>\n\n\n\n<p>Recuerda que una entidad seria, como puede ser tu banco, redes sociales o la administraci\u00f3n p\u00fablica, nunca cometer\u00edan errores gramaticales.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Urgencia<\/strong> en tr\u00e1mites o acciones usualmente son phishing<\/h2>\n\n\n\n<p>Parte de las t\u00e9cnicas de los ciberdelincuentes es solicitar acciones con urgencia o en un periodo corto de tiempo, esto lo realizan para evitemos revisar la veracidad del correo o documento. Recuerda que ninguna entidad seria te pedir\u00e1 acciones inmediatas.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-torsten-dettlaff-193003-1024x683.jpg\" alt=\"Imagen de correos frecuentes \" class=\"wp-image-329\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-torsten-dettlaff-193003-1024x683.jpg 1024w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-torsten-dettlaff-193003-300x200.jpg 300w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-torsten-dettlaff-193003-768x512.jpg 768w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-torsten-dettlaff-193003-1536x1024.jpg 1536w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/pexels-torsten-dettlaff-193003-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption>Constantes correos pidiendo por acci\u00f3n inmediata<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Comprueba que se trata de enlaces fiables<\/strong> <\/h2>\n\n\n\n<p>Estos ciberdelincuentes del phishing siempre buscan que descarguemos una p\u00e1gina web o documento o ingresar a un sitio web fraudulento. Por esto mismo siempre debemos revisar los enlaces a los que ingresamos y revisar que nos lleven a p\u00e1ginas web oficiales, recuerda que no podemos confiar \u00fanicamente en apariencias ya que estos suplantadores de identidad son expertos en crear p\u00e1ginas web est\u00edticamente iguales o muy parecidas. Recuerda nunca dar clic en un enlace que desconozca.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/http-vs-https-1-1024x640.jpg\" alt=\"Iconos del HTTP y HTTPS que demuestra que paginas son seguras para evitar phishing\" class=\"wp-image-325\" width=\"512\" height=\"320\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/http-vs-https-1-1024x640.jpg 1024w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/http-vs-https-1-300x188.jpg 300w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/http-vs-https-1-768x480.jpg 768w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/http-vs-https-1-1536x960.jpg 1536w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/http-vs-https-1.jpg 1920w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><figcaption>Diferencia entre HTTP y HTTPS<\/figcaption><\/figure><\/div>\n\n\n\n<p>\u00bfC\u00f3mo podemos&nbsp;<strong>saber a que web apunta el enlace<\/strong>? \u00a1Muy sencillo! Poniendo el puntero del rat\u00f3n encima del enlace y observando la verdadera direcci\u00f3n que se muestra a la izquierda en la parte inferior de la pantalla.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"861\" height=\"79\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/image-1.png\" alt=\"Texto donde muestra la direcci\u00f3n de un enlace de phishing en la parte inferior izquierda de la pantalla\" class=\"wp-image-311\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/image-1.png 861w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/image-1-300x28.png 300w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/image-1-768x70.png 768w\" sizes=\"auto, (max-width: 861px) 100vw, 861px\" \/><figcaption>Direcci\u00f3n que se muestra a la izquierda en la parte inferior de la pantalla<\/figcaption><\/figure>\n\n\n\n<p>Adem\u00e1s, comprueba que a la p\u00e1gina web que has accedido es una direcci\u00f3n segura y&nbsp;<strong>comienza por https:\/\/ y un peque\u00f1o candado cerrado<\/strong>&nbsp;en la barra de estado del navegador.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"248\" height=\"47\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/image.png\" alt=\"URL de P\u00e1gina segura con candado cerrado y https\" class=\"wp-image-310\"\/><figcaption><strong>Comienza por https:\/\/ y tiene un peque\u00f1o candado cerrado<\/strong><\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Revisa el remitente<\/h2>\n\n\n\n<p>Aunque nos parezca absurdo y poco importante, tenemos que&nbsp;<strong>comprobar la direcci\u00f3n del remitente.<\/strong><\/p>\n\n\n\n<p>Aqu\u00ed tenemos un ejemplo.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"515\" height=\"91\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/image-2.png\" alt=\"Direcci\u00f3n del remitente con el dominio incorrecto\" class=\"wp-image-313\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/image-2.png 515w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/image-2-300x53.png 300w\" sizes=\"auto, (max-width: 515px) 100vw, 515px\" \/><figcaption>Direcci\u00f3n del remitente enga\u00f1osa<\/figcaption><\/figure>\n\n\n\n<p>A simple vista, parece que este correo pertenece a Fax, pero si nos fijamos bien en la cuenta de correo del remitente la cuenta tiene por dominio \u201cefaCKs\u201d siendo este un remitente intentando hacernos phishing (Recuerda reportar estas direcciones con TI) .<\/p>\n\n\n\n<p>Por \u00faltimo, te dejamos un <a href=\"https:\/\/phishingquiz.withgoogle.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">quiz<\/a><a href=\"https:\/\/phishingquiz.withgoogle.com\/\"> <\/a>en el que podr\u00e1s reforzar estos conocimientos reci\u00e9n aprendidos. Ingresa <a href=\"https:\/\/phishingquiz.withgoogle.com\/\">AQUI<\/a><\/p>\n\n\n\n<p>Sigue esta serie de consejos para tu ciberseguridad en el <a href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\">blog de DTIP<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfQu\u00e9 es el phishing? Estafa que tiene como objetivo obtener a trav\u00e9s de internet datos privados de los usuarios, especialmente para acceder a sus cuentas o datos bancarios.<\/p>\n","protected":false},"author":2,"featured_media":332,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[30,31],"tags":[32,34,35,33,36],"class_list":["post-309","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","category-phishing","tag-ciberseguridad","tag-correo","tag-dtip","tag-phishing","tag-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Phishing c\u00f3mo identificarlo y evitarlo en nuestra bandeja de entrada- DTIP<\/title>\r\n<meta name=\"description\" content=\"En esta entrada del blog veremos como identificar y evitar el phishing . Ingresa para saber mas consejos de ciberseguridad!\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/\" \/>\r\n<meta property=\"og:locale\" content=\"es_MX\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Phishing c\u00f3mo identificarlo y evitarlo en nuestra bandeja de entrada- DTIP\" \/>\r\n<meta property=\"og:description\" content=\"En esta entrada del blog veremos como identificar y evitar el phishing . Ingresa para saber mas consejos de ciberseguridad!\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/\" \/>\r\n<meta property=\"og:site_name\" content=\"DTIP\" \/>\r\n<meta property=\"article:published_time\" content=\"2021-05-21T17:56:40+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2021-05-21T18:52:12+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/phishing.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"600\" \/>\r\n\t<meta property=\"og:image:height\" content=\"600\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Alejandro Navarro\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alejandro Navarro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/\",\"name\":\"Phishing c\u00f3mo identificarlo y evitarlo en nuestra bandeja de entrada- DTIP\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/phishing.jpg\",\"datePublished\":\"2021-05-21T17:56:40+00:00\",\"dateModified\":\"2021-05-21T18:52:12+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\"},\"description\":\"En esta entrada del blog veremos como identificar y evitar el phishing . Ingresa para saber mas consejos de ciberseguridad!\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/#primaryimage\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/phishing.jpg\",\"contentUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/phishing.jpg\",\"width\":600,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"C\u00f3mo identificar y evitar un correo de phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\",\"name\":\"DTIP\",\"description\":\"Direcci\u00f3n de Tecnolog\u00edas y Publicidad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\",\"name\":\"Alejandro Navarro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"caption\":\"Alejandro Navarro\"},\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing c\u00f3mo identificarlo y evitarlo en nuestra bandeja de entrada- DTIP","description":"En esta entrada del blog veremos como identificar y evitar el phishing . Ingresa para saber mas consejos de ciberseguridad!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/","og_locale":"es_MX","og_type":"article","og_title":"Phishing c\u00f3mo identificarlo y evitarlo en nuestra bandeja de entrada- DTIP","og_description":"En esta entrada del blog veremos como identificar y evitar el phishing . Ingresa para saber mas consejos de ciberseguridad!","og_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/","og_site_name":"DTIP","article_published_time":"2021-05-21T17:56:40+00:00","article_modified_time":"2021-05-21T18:52:12+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/phishing.jpg","type":"image\/jpeg"}],"author":"Alejandro Navarro","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Alejandro Navarro","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/","name":"Phishing c\u00f3mo identificarlo y evitarlo en nuestra bandeja de entrada- DTIP","isPartOf":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/#primaryimage"},"image":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/phishing.jpg","datePublished":"2021-05-21T17:56:40+00:00","dateModified":"2021-05-21T18:52:12+00:00","author":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a"},"description":"En esta entrada del blog veremos como identificar y evitar el phishing . Ingresa para saber mas consejos de ciberseguridad!","breadcrumb":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/#primaryimage","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/phishing.jpg","contentUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/phishing.jpg","width":600,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/05\/21\/como-identificar-y-evitar-un-correo-de-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/blogs.uninter.edu.mx\/DTIP\/"},{"@type":"ListItem","position":2,"name":"C\u00f3mo identificar y evitar un correo de phishing"}]},{"@type":"WebSite","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/","name":"DTIP","description":"Direcci\u00f3n de Tecnolog\u00edas y Publicidad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a","name":"Alejandro Navarro","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","caption":"Alejandro Navarro"},"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/05\/phishing.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/309","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/comments?post=309"}],"version-history":[{"count":12,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/309\/revisions"}],"predecessor-version":[{"id":406,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/309\/revisions\/406"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media\/332"}],"wp:attachment":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media?parent=309"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/categories?post=309"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/tags?post=309"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}