{"id":395,"date":"2021-06-11T19:40:11","date_gmt":"2021-06-11T19:40:11","guid":{"rendered":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?p=395"},"modified":"2021-06-11T19:40:14","modified_gmt":"2021-06-11T19:40:14","slug":"que-es-el-malware-y-cual-es-su-funcionamiento","status":"publish","type":"post","link":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/","title":{"rendered":"\u00bfQu\u00e9 es el malware y cu\u00e1l es su funcionamiento?"},"content":{"rendered":"\n<p>El malware es un t\u00e9rmino para referirse a cualquier tipo de &#8220;<strong>MAL<\/strong>icious soft<strong>WARE<\/strong>&#8221; (software malicioso) dise\u00f1ado para infiltrarse en un dispositivo electr\u00f3nico.<\/p>\n\n\n\n<p>Una vez dentro, puede ocurrir todo tipo de estragos, desde tomar el control del equipo, monitorear acciones y pulsaciones de teclas, hasta enviar silenciosamente todo tipo de datos confidenciales desde el dispositivo o red al atacante.<\/p>\n\n\n\n<div class=\"wp-block-jetpack-tiled-gallery aligncenter is-style-rectangular has-rounded-corners-4\"><div class=\"tiled-gallery__gallery\"><div class=\"tiled-gallery__row\"><div class=\"tiled-gallery__col\" style=\"flex-basis:48.74583%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-josh-sorenson-1054397-scaled.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-josh-sorenson-1054397-scaled.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-josh-sorenson-1054397-scaled.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-josh-sorenson-1054397-scaled.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-josh-sorenson-1054397-scaled.jpg?strip=info&#038;w=1707&#038;ssl=1 1707w\" alt=\"Servidores\" data-height=\"2560\" data-id=\"411\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=411#main\" data-url=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-josh-sorenson-1054397-scaled.jpg\" data-width=\"1707\" src=\"https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-josh-sorenson-1054397-scaled.jpg?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><div class=\"tiled-gallery__col\" style=\"flex-basis:51.25417%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-pixabay-60504-2-scaled.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-pixabay-60504-2-scaled.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-pixabay-60504-2-scaled.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-pixabay-60504-2-scaled.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-pixabay-60504-2-scaled.jpg?strip=info&#038;w=1800&#038;ssl=1 1800w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-pixabay-60504-2-scaled.jpg?strip=info&#038;w=2000&#038;ssl=1 2000w\" alt=\"Etiqueta de seguridad\" data-height=\"1707\" data-id=\"410\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=410#main\" data-url=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-pixabay-60504-2-scaled.jpg\" data-width=\"2560\" src=\"https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-pixabay-60504-2-scaled.jpg?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-kevin-ku-577585-scaled.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-kevin-ku-577585-scaled.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-kevin-ku-577585-scaled.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-kevin-ku-577585-scaled.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-kevin-ku-577585-scaled.jpg?strip=info&#038;w=1800&#038;ssl=1 1800w,https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-kevin-ku-577585-scaled.jpg?strip=info&#038;w=2000&#038;ssl=1 2000w\" alt=\"Monitores con c\u00f3digo\" data-height=\"1919\" data-id=\"412\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=412#main\" data-url=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-kevin-ku-577585-scaled.jpg\" data-width=\"2560\" src=\"https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-kevin-ku-577585-scaled.jpg?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><\/div><\/div><\/div>\n\n\n\n<p>Los atacantes pueden utilizar una variedad de m\u00e9todos para introducirlo en una computadora, pero en alg\u00fan momento, es necesario que el usuario realice una acci\u00f3n para instalarlo. Esto puede incluir <strong>hacer clic en un enlace para descargar un archivo o abrir un archivo adjunto que puede parecer inofensivo<\/strong> (como un documento de Word o un archivo PDF adjunto), pero que en realidad tiene un instalador de malware oculto.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo funciona el malware?<\/strong><\/h2>\n\n\n\n<p>Sin importar el tipo, siempre se sigue el mismo patr\u00f3n: <em>El usuario descarga o instala involuntariamente el malware, que infecta el dispositivo.<\/em> En otros casos, los hackers pueden extenderlo mediante servicios peer-to-peer de compartici\u00f3n de archivos y paquetes de descarga de software gratuito. Incrustar malware en un torrent o una descarga popular es una manera efectiva de extenderlo a una base de usuarios m\u00e1s amplia.<\/p>\n\n\n\n<p>Otra t\u00e9cnica es cargarlo en el firmware de una unidad USB flash. Ya que el malware est\u00e1 cargado en el hardware interno del dispositivo (y no en el almacenamiento de archivos), es improbable que el ordenador lo detecte.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5053847-1024x683.jpg\" alt=\"Descarga de software con posible malware\" class=\"wp-image-404\" width=\"768\" height=\"512\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5053847-1024x683.jpg 1024w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5053847-300x200.jpg 300w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5053847-768x512.jpg 768w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5053847-1536x1024.jpg 1536w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5053847-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption>El componente m\u00e1s importante para un ataque de malware es usted<\/figcaption><\/figure><\/div>\n\n\n\n<p>Mientras que algunos tipos de malware operan invisibles, otros son mucho m\u00e1s dif\u00edciles de observar mientras trabajan en segundo plano. Algunos operan por simple malevolencia borrando datos importantes y no buscan cometer fraude ni robo, y la \u00fanica recompensa del hacker es la frustraci\u00f3n de sus v\u00edctimas, sin embargo, existen instancias donde se buscan consecuencias m\u00e1s graves.<\/p>\n\n\n\n<p>Las m\u00e1quinas infectadas de este software guardan la informaci\u00f3n personal o financiera del usuario y se la env\u00edan al atacante, que utiliza para cometer fraude o robo de identidad.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo puedo saber si mi dispositivo esta infectado?<\/strong><\/h2>\n\n\n\n<p>Estos son algunos s\u00edntomas que pueden indicar la presencia de malware en su dispositivo:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>El dispositivo opera m\u00e1s lento de lo normal al navegar por Internet y usando aplicaciones locales.<\/li><li>Reducci\u00f3n repentina de almacenamiento libre disponible, ya que, ciertos tipos de malware descargan e instalan archivos y contenido adicional.<\/li><li>La aparici\u00f3n de anuncios emergentes y programas no deseados es una de las se\u00f1ales m\u00e1s claras.<\/li><\/ul>\n\n\n\n<p>El funcionamiento lento y reducci\u00f3n de almacenamiento libre no siempre significa que haya malware. Con el tiempo, los dispositivos se van llenado de archivos innecesarios. Se aconseja que se limpie de vez en cuando, y si el funcionamiento vuelve a ser normal, es probable que no haya presencia de malware.<\/p>\n\n\n\n<div class=\"wp-block-jetpack-slideshow aligncenter\" data-autoplay=\"true\" data-delay=\"3\" data-effect=\"slide\"><div class=\"wp-block-jetpack-slideshow_container swiper-container\"><ul class=\"wp-block-jetpack-slideshow_swiper-wrapper swiper-wrapper\"><li class=\"wp-block-jetpack-slideshow_slide swiper-slide\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"660\" height=\"300\" alt=\"Adware\" class=\"wp-block-jetpack-slideshow_image wp-image-432\" data-id=\"432\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/Adware_02-3.png\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/Adware_02-3.png 660w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/Adware_02-3-300x136.png 300w\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" \/><\/figure><\/li><li class=\"wp-block-jetpack-slideshow_slide swiper-slide\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"700\" height=\"368\" alt=\"Cargas de pantalla lentas\" class=\"wp-block-jetpack-slideshow_image wp-image-433\" data-id=\"433\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/Slow-Page-Load-Speed-Is-The-New-Downtime-3.jpg\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/Slow-Page-Load-Speed-Is-The-New-Downtime-3.jpg 700w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/Slow-Page-Load-Speed-Is-The-New-Downtime-3-300x158.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/figure><\/li><li class=\"wp-block-jetpack-slideshow_slide swiper-slide\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" alt=\"Almacenamiento lleno\" class=\"wp-block-jetpack-slideshow_image wp-image-446\" data-id=\"446\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-azamat-esenaliev-117729-1024x683.jpg\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-azamat-esenaliev-117729-1024x683.jpg 1024w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-azamat-esenaliev-117729-300x200.jpg 300w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-azamat-esenaliev-117729-768x512.jpg 768w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-azamat-esenaliev-117729-1536x1024.jpg 1536w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-azamat-esenaliev-117729-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul><a class=\"wp-block-jetpack-slideshow_button-prev swiper-button-prev swiper-button-white\" role=\"button\"><\/a><a class=\"wp-block-jetpack-slideshow_button-next swiper-button-next swiper-button-white\" role=\"button\"><\/a><a aria-label=\"Pause Slideshow\" class=\"wp-block-jetpack-slideshow_button-pause\" role=\"button\"><\/a><div class=\"wp-block-jetpack-slideshow_pagination swiper-pagination swiper-pagination-white\"><\/div><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>\u00bfC\u00f3mo puedo eliminar el malware?<\/strong><\/h2>\n\n\n\n<p>Primero, si no se cuenta con un programa antimalware leg\u00edtimo, desc\u00e1rguelo. Est\u00e1n principalmente dise\u00f1ados para buscar y eliminar de forma autom\u00e1tica cualquier malvare en el dispositivo.<\/p>\n\n\n\n<p>Una vez limpio el dispositivo, se aconseja cambiar las contrase\u00f1as: no solo la de ordenador o la del celular, sino tambi\u00e9n la del correo electr\u00f3nico, de las cuentas en redes sociales, p\u00e1ginas web favoritas para compras en l\u00ednea y de cuentas bancarias online.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-fernando-arcos-211151-1024x681.jpg\" alt=\"Cuidado con el software que desacargas\" class=\"wp-image-424\" width=\"768\" height=\"511\" srcset=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-fernando-arcos-211151-1024x681.jpg 1024w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-fernando-arcos-211151-300x199.jpg 300w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-fernando-arcos-211151-768x511.jpg 768w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-fernando-arcos-211151-1536x1021.jpg 1536w, https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-fernando-arcos-211151-2048x1362.jpg 2048w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/><figcaption>Aseg\u00farate que el software que descargues sea leg\u00edtimo<\/figcaption><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Mantenerse a salvo del malware<\/strong><\/h2>\n\n\n\n<p>Preste atenci\u00f3n al nombre de dominio de las p\u00e1ginas al navegar por Internet, es decir, algo distinto de com, org, edu o biz, por mencionar algunos.<\/p>\n\n\n\n<p>Aseg\u00farese de que su sistema operativo, navegadores y complementos est\u00e9n siempre actualizados, porque el software con parches puede dejar acorralados a los atacantes.<\/p>\n\n\n\n<p>En conclusi\u00f3n, antes de ser atacado en su PC, tel\u00e9fono m\u00f3vil o red, h\u00e1gase con un buen programa antimalware. Debe incluir protecci\u00f3n por capas (analizar y detectar malware, y a la vez mantener una defensa proactiva en tiempo real que puede bloquear amenazas).<\/p>\n\n\n\n<p>Te invitamos a seguir nuestro blog para m\u00e1s informaci\u00f3n: <a href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\">DTIP<\/a><\/p>\n\n\n\n<p>Fuentes: <a href=\"https:\/\/www.rapid7.com\/fundamentals\/types-of-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">rapid7<\/a> <a href=\"https:\/\/www.avast.com\/es-es\/c-malware\" target=\"_blank\" rel=\"noreferrer noopener\">avast<\/a> <a href=\"https:\/\/es.malwarebytes.com\/malware\/\" target=\"_blank\" rel=\"noreferrer noopener\">malwarebytes<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El malware es un t\u00e9rmino para referirse a cualquier tipo de &#8220;MALicious softWARE&#8221; (software malicioso) dise\u00f1ado para infiltrarse en un dispositivo electr\u00f3nico. Una vez dentro, puede ocurrir todo tipo de estragos, desde tomar el control del equipo, monitorear acciones y pulsaciones de teclas, hasta enviar silenciosamente todo tipo de datos confidenciales desde el dispositivo o&hellip;<\/p>\n","protected":false},"author":2,"featured_media":442,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[30],"tags":[41,32,44],"class_list":["post-395","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","tag-ataque-cibernetico","tag-ciberseguridad","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>\u00bfQu\u00e9 es el malware y cu\u00e1l es su funcionamiento? - DTIP<\/title>\r\n<meta name=\"description\" content=\"En este post explicamos en que consiste un ataque de malware, as\u00ed como algunas recomendaciones para evitarlo en el futuro.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/\" \/>\r\n<meta property=\"og:locale\" content=\"es_MX\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es el malware y cu\u00e1l es su funcionamiento? - DTIP\" \/>\r\n<meta property=\"og:description\" content=\"En este post explicamos en que consiste un ataque de malware, as\u00ed como algunas recomendaciones para evitarlo en el futuro.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/\" \/>\r\n<meta property=\"og:site_name\" content=\"DTIP\" \/>\r\n<meta property=\"article:published_time\" content=\"2021-06-11T19:40:11+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2021-06-11T19:40:14+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/MALWARE2.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\r\n\t<meta property=\"og:image:height\" content=\"628\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Alejandro Navarro\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alejandro Navarro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/\",\"name\":\"\u00bfQu\u00e9 es el malware y cu\u00e1l es su funcionamiento? - DTIP\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/MALWARE.jpg\",\"datePublished\":\"2021-06-11T19:40:11+00:00\",\"dateModified\":\"2021-06-11T19:40:14+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\"},\"description\":\"En este post explicamos en que consiste un ataque de malware, as\u00ed como algunas recomendaciones para evitarlo en el futuro.\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/#primaryimage\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/MALWARE.jpg\",\"contentUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/MALWARE.jpg\",\"width\":460,\"height\":260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es el malware y cu\u00e1l es su funcionamiento?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\",\"name\":\"DTIP\",\"description\":\"Direcci\u00f3n de Tecnolog\u00edas y Publicidad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\",\"name\":\"Alejandro Navarro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"caption\":\"Alejandro Navarro\"},\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es el malware y cu\u00e1l es su funcionamiento? - DTIP","description":"En este post explicamos en que consiste un ataque de malware, as\u00ed como algunas recomendaciones para evitarlo en el futuro.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/","og_locale":"es_MX","og_type":"article","og_title":"\u00bfQu\u00e9 es el malware y cu\u00e1l es su funcionamiento? - DTIP","og_description":"En este post explicamos en que consiste un ataque de malware, as\u00ed como algunas recomendaciones para evitarlo en el futuro.","og_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/","og_site_name":"DTIP","article_published_time":"2021-06-11T19:40:11+00:00","article_modified_time":"2021-06-11T19:40:14+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/MALWARE2.jpg","type":"image\/jpeg"}],"author":"Alejandro Navarro","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Alejandro Navarro","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/","name":"\u00bfQu\u00e9 es el malware y cu\u00e1l es su funcionamiento? - DTIP","isPartOf":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/#primaryimage"},"image":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/MALWARE.jpg","datePublished":"2021-06-11T19:40:11+00:00","dateModified":"2021-06-11T19:40:14+00:00","author":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a"},"description":"En este post explicamos en que consiste un ataque de malware, as\u00ed como algunas recomendaciones para evitarlo en el futuro.","breadcrumb":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/#primaryimage","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/MALWARE.jpg","contentUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/MALWARE.jpg","width":460,"height":260},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/blogs.uninter.edu.mx\/DTIP\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es el malware y cu\u00e1l es su funcionamiento?"}]},{"@type":"WebSite","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/","name":"DTIP","description":"Direcci\u00f3n de Tecnolog\u00edas y Publicidad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a","name":"Alejandro Navarro","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","caption":"Alejandro Navarro"},"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/MALWARE.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/comments?post=395"}],"version-history":[{"count":31,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/395\/revisions"}],"predecessor-version":[{"id":464,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/395\/revisions\/464"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media\/442"}],"wp:attachment":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media?parent=395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/categories?post=395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/tags?post=395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}