{"id":476,"date":"2021-06-25T18:45:57","date_gmt":"2021-06-25T18:45:57","guid":{"rendered":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?p=476"},"modified":"2021-06-25T18:46:00","modified_gmt":"2021-06-25T18:46:00","slug":"virus-troyano","status":"publish","type":"post","link":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/","title":{"rendered":"\u00bfQu\u00e9 es un virus troyano?"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"855\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/crime-1862312_1920.jpg\" alt=\"Cyber Crime\" class=\"wp-image-527\"\/><\/figure><\/div>\n\n\n\n<p>Un <strong>virus troyano<\/strong> es un tipo de <strong>malware <\/strong>que se hace pasar por un software legitimo. Suelen utilizarse para tratar de acceder al sistema de un usuario. Usualmente los usuarios son enganchados por alguna forma de <strong>ingenier\u00eda social<\/strong> para que carguen y ejecuten troyanos en su sistema.<\/p>\n\n\n\n<p>Una vez hecho esto, los troyanos permiten a los cibercriminales espiarte, robar informaci\u00f3n confidencial y obtener acceso a tu sistema. Entre las acciones que pueden realizar se destacan las siguientes:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Eliminar datos<\/li><li>Bloquear datos<\/li><li>Modificar datos<\/li><li>Copiar datos<\/li><li>Interrumpir el funcionamiento de nuestra computadora<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-gallery columns-2 is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1280\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/hacker-1872291_1920.jpg\" alt=\"\" data-id=\"528\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=528#main\" class=\"wp-image-528\"\/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"3500\" height=\"2333\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-anna-tarazevich-5697256.jpg\" alt=\"\" data-id=\"529\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=529#main\" class=\"wp-image-529\"\/><\/figure><\/li><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" decoding=\"async\" width=\"5472\" height=\"3078\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-hitesh-choudhary-340152.jpg\" alt=\"\" data-id=\"530\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=530#main\" class=\"wp-image-530\"\/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Clasificaci\u00f3n de los troyanos<\/h2>\n\n\n\n<p>Existen distintos tipos de virus troyanos y estos se clasifican seg\u00fan las acciones que pueden realizar en tu computadora:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Backdoor<\/strong>: Este tipo de virus, ofrece a los usuarios maliciosos poder tener control a distancia sobre nuestro dispositivo. Permite que el autor haga cualquier cosa que desee, ya sea enviar, recibir, ejecutar y borrar archivos, suele usarse este tipo de ataques con fines delictivos.<\/li><li><strong>Exploit<\/strong>: Son programas que contienen datos o c\u00f3digos que aprovechan una vulnerabilidad de aplicaciones que se ejecutan en la computadora.<\/li><li><strong>Rootkit<\/strong>: Estos se encuentran dise\u00f1ados para ocultar archivos del sistema o actividades en segundo plano. Su fin es evitar que los programas maliciosos sean detectados para ejecutarse por un periodo m\u00e1s largo de tiempo.<\/li><li>Existen variantes de troyanos que son para tareas especificas como su nombre lo dice, y solo mencionaremos algunos como: <strong>Tojan-Banker<\/strong>, <strong>Trojan-DDoS<\/strong>, <strong>Trojan-Downloader<\/strong>, <strong>Trojan-Dropper<\/strong>, <strong>Trojan-FakeAV<\/strong>, por mencionar algunos.<\/li><\/ul>\n\n\n\n<p><strong>Puede interesarte:<\/strong> <a href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/11\/que-es-el-malware-y-cual-es-su-funcionamiento\/\">\u00bfQu\u00e9 es el malware y cu\u00e1l es su funcionamiento? <\/a><\/p>\n\n\n\n<div class=\"wp-block-jetpack-tiled-gallery aligncenter is-style-rectangular\"><div class=\"tiled-gallery__gallery\"><div class=\"tiled-gallery__row\"><div class=\"tiled-gallery__col\" style=\"flex-basis:69.17867%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/hacker-2883632_1920.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/hacker-2883632_1920.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/hacker-2883632_1920.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/hacker-2883632_1920.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/hacker-2883632_1920.jpg?strip=info&#038;w=1800&#038;ssl=1 1800w,https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/hacker-2883632_1920.jpg?strip=info&#038;w=1920&#038;ssl=1 1920w\" alt=\"\" data-height=\"1280\" data-id=\"531\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=531#main\" data-url=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/hacker-2883632_1920.jpg\" data-width=\"1920\" src=\"https:\/\/i2.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/hacker-2883632_1920.jpg?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><div class=\"tiled-gallery__col\" style=\"flex-basis:30.82133%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5473302.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5473302.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5473302.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5473302.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5473302.jpg?strip=info&#038;w=1800&#038;ssl=1 1800w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5473302.jpg?strip=info&#038;w=2000&#038;ssl=1 2000w\" alt=\"\" data-height=\"5968\" data-id=\"532\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=532#main\" data-url=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5473302.jpg\" data-width=\"3979\" src=\"https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-cottonbro-5473302.jpg?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><\/div><div class=\"tiled-gallery__row\"><div class=\"tiled-gallery__col\" style=\"flex-basis:35.02435%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-hitesh-choudhary-340152-1.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-hitesh-choudhary-340152-1.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-hitesh-choudhary-340152-1.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-hitesh-choudhary-340152-1.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-hitesh-choudhary-340152-1.jpg?strip=info&#038;w=1800&#038;ssl=1 1800w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-hitesh-choudhary-340152-1.jpg?strip=info&#038;w=2000&#038;ssl=1 2000w\" alt=\"\" data-height=\"3078\" data-id=\"533\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=533#main\" data-url=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-hitesh-choudhary-340152-1.jpg\" data-width=\"5472\" src=\"https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-hitesh-choudhary-340152-1.jpg?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-tima-miroshnichenko-5380651.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-tima-miroshnichenko-5380651.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-tima-miroshnichenko-5380651.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-tima-miroshnichenko-5380651.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-tima-miroshnichenko-5380651.jpg?strip=info&#038;w=1800&#038;ssl=1 1800w,https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-tima-miroshnichenko-5380651.jpg?strip=info&#038;w=2000&#038;ssl=1 2000w\" alt=\"\" data-height=\"2624\" data-id=\"534\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=534#main\" data-url=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-tima-miroshnichenko-5380651.jpg\" data-width=\"3936\" src=\"https:\/\/i0.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-tima-miroshnichenko-5380651.jpg?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><div class=\"tiled-gallery__col\" style=\"flex-basis:64.97565%\"><figure class=\"tiled-gallery__item\"><img decoding=\"async\" srcset=\"https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/virus-1889413_1920.jpg?strip=info&#038;w=600&#038;ssl=1 600w,https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/virus-1889413_1920.jpg?strip=info&#038;w=900&#038;ssl=1 900w,https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/virus-1889413_1920.jpg?strip=info&#038;w=1200&#038;ssl=1 1200w,https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/virus-1889413_1920.jpg?strip=info&#038;w=1500&#038;ssl=1 1500w,https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/virus-1889413_1920.jpg?strip=info&#038;w=1800&#038;ssl=1 1800w,https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/virus-1889413_1920.jpg?strip=info&#038;w=1920&#038;ssl=1 1920w\" alt=\"\" data-height=\"1280\" data-id=\"535\" data-link=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?attachment_id=535#main\" data-url=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/virus-1889413_1920.jpg\" data-width=\"1920\" src=\"https:\/\/i1.wp.com\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/virus-1889413_1920.jpg?ssl=1\" data-amp-layout=\"responsive\"\/><\/figure><\/div><\/div><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">\u00bfC\u00f3mo reconocer un troyano?<\/h2>\n\n\n\n<p>Este tipo de malware suelen ser muy dificiles de encontrar y eliminar con los esc\u00e1neres de virus convencionales. Los signos m\u00e1s comunes de los troyanos son los siguientes:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Mensajes raros y pop-ups<\/li><li>Ordenador muy lento<\/li><li>Conexi\u00f3n a internet interrumpida<\/li><li>Ventanas maliciosas<\/li><li>Ficheros perdidos<\/li><li>Desactiva la protecci\u00f3n contra virus y el cortafuegos<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\u00bfQu\u00e9 hacer si tengo un virus troyano?<\/h2>\n\n\n\n<p>Lo primordial para poder protegerte ante este tipo de ataques es contar con las ultimas actualizaciones de nuestro sistema operativo ya que as\u00ed evitamos ciertas vulnerabilidades, adem\u00e1s de contar con un antimalware potente (Antivirus), que sea capaz de detectar y evitar ataques de troyanos. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/pexels-pixabay-60504-1.jpg\" alt=\"Security\" class=\"wp-image-536\" width=\"472\" height=\"315\"\/><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Recomendaciones<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Instalar actualizaciones regulares de software:<\/strong> Es mu importante contar con actualizaciones de nuestro software ya que esto evita que los ciberdelincuentes obtengan acceso a nuestro ordenador por medio de vulnerabilidades en sistemas desactualizados.<\/li><li><strong>Programas de fuentes confiables:<\/strong> El uso de programas de fuentes confiables reduce la probabilidad de que un dispositivo se infecte con un troyano. Por lo tanto es importante verificar el proveedor de donde descargamos nuestro software, ya que algunos suelen contener malware. <\/li><li><strong>Copias de seguridad regulares:<\/strong> Para evitar la perdida de datos e informaci\u00f3n valiosa, es aconsejable hacer regularmente copias de seguridad. Esto ayudara a reducir el impacto del da\u00f1o si somos objetivo de este tipo de ataques.<\/li><li><strong>Evitar v\u00ednculos sospechosos:<\/strong> Como lo mencionamos al principio de nuestro post, los usuarios malintencionados suelen utilizar ingenier\u00eda social para que los usuarios abran v\u00ednculos en enlaces que parecen provenir de fuentes seguras. Sin embargo los enlaces pueden conducir a sitios falsos en los que se solicita a los usuarios proporcionar informaci\u00f3n o descargar archivos, lo que este tipo de implantar troyanos es muy com\u00fan y suelen pasar desapercibidos. <\/li><\/ul>\n\n\n\n<p><strong>Te invitamos a visitar nuestros post acerca de<\/strong> <a href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\">ciberseguridad<\/a>.<\/p>\n\n\n\n<p><strong>Fuentes: <\/strong><a href=\"https:\/\/latam.kaspersky.com\/resource-center\/threats\/trojans\">Kaspersky<\/a>, <a href=\"https:\/\/www.hornetsecurity.com\/es\/knowledge-base\/troyanos\/\">hornetsecurity<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Un virus troyano es un tipo de malware que se hace pasar por un software legitimo. Suelen utilizarse para tratar de acceder al sistema de un usuario. Usualmente los usuarios son enganchados por alguna forma de ingenier\u00eda social para que carguen y ejecuten troyanos en su sistema. Una vez hecho esto, los troyanos permiten a&hellip;<\/p>\n","protected":false},"author":2,"featured_media":537,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[30],"tags":[32,44,52,50,48],"class_list":["post-476","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad","tag-ciberseguridad","tag-malware","tag-software-malicioso","tag-troyanos","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>\u00bfQu\u00e9 es un troyano y como evitar ser victima? - BLOG DTIP<\/title>\r\n<meta name=\"description\" content=\"Te invitamos a conocer m\u00e1s a cerca del virus troyano, y como evitar ser victima de este tipo de software malintencionado.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/\" \/>\r\n<meta property=\"og:locale\" content=\"es_MX\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es un virus troyano?\" \/>\r\n<meta property=\"og:description\" content=\"Un virus troyano es un tipo de malware que se hace pasar por un software legitimo. Suelen utilizarse para tratar de acceder al sistema de un usuario. Usualmente los usuarios son enganchados por alguna forma de ingenier\u00eda social...\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/\" \/>\r\n<meta property=\"og:site_name\" content=\"DTIP\" \/>\r\n<meta property=\"article:published_time\" content=\"2021-06-25T18:45:57+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2021-06-25T18:46:00+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/VIRUS-TROYANO2.jpg\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\r\n\t<meta property=\"og:image:height\" content=\"628\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\r\n<meta name=\"author\" content=\"Alejandro Navarro\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alejandro Navarro\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/\",\"name\":\"\u00bfQu\u00e9 es un troyano y como evitar ser victima? - BLOG DTIP\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/VIRUS-TROYANO1.jpg\",\"datePublished\":\"2021-06-25T18:45:57+00:00\",\"dateModified\":\"2021-06-25T18:46:00+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\"},\"description\":\"Te invitamos a conocer m\u00e1s a cerca del virus troyano, y como evitar ser victima de este tipo de software malintencionado.\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/#primaryimage\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/VIRUS-TROYANO1.jpg\",\"contentUrl\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/VIRUS-TROYANO1.jpg\",\"width\":460,\"height\":260},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es un virus troyano?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website\",\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/\",\"name\":\"DTIP\",\"description\":\"Direcci\u00f3n de Tecnolog\u00edas y Publicidad\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a\",\"name\":\"Alejandro Navarro\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g\",\"caption\":\"Alejandro Navarro\"},\"url\":\"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es un troyano y como evitar ser victima? - BLOG DTIP","description":"Te invitamos a conocer m\u00e1s a cerca del virus troyano, y como evitar ser victima de este tipo de software malintencionado.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/","og_locale":"es_MX","og_type":"article","og_title":"\u00bfQu\u00e9 es un virus troyano?","og_description":"Un virus troyano es un tipo de malware que se hace pasar por un software legitimo. Suelen utilizarse para tratar de acceder al sistema de un usuario. Usualmente los usuarios son enganchados por alguna forma de ingenier\u00eda social...","og_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/","og_site_name":"DTIP","article_published_time":"2021-06-25T18:45:57+00:00","article_modified_time":"2021-06-25T18:46:00+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/VIRUS-TROYANO2.jpg","type":"image\/jpeg"}],"author":"Alejandro Navarro","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Alejandro Navarro","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/","name":"\u00bfQu\u00e9 es un troyano y como evitar ser victima? - BLOG DTIP","isPartOf":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/#primaryimage"},"image":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/#primaryimage"},"thumbnailUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/VIRUS-TROYANO1.jpg","datePublished":"2021-06-25T18:45:57+00:00","dateModified":"2021-06-25T18:46:00+00:00","author":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a"},"description":"Te invitamos a conocer m\u00e1s a cerca del virus troyano, y como evitar ser victima de este tipo de software malintencionado.","breadcrumb":{"@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/#primaryimage","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/VIRUS-TROYANO1.jpg","contentUrl":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/VIRUS-TROYANO1.jpg","width":460,"height":260},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/2021\/06\/25\/virus-troyano\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/blogs.uninter.edu.mx\/DTIP\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es un virus troyano?"}]},{"@type":"WebSite","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#website","url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/","name":"DTIP","description":"Direcci\u00f3n de Tecnolog\u00edas y Publicidad","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.uninter.edu.mx\/DTIP\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/4fb1c915f41fffa4fde5651cfab88e3a","name":"Alejandro Navarro","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blogs.uninter.edu.mx\/DTIP\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bf2c65c0900ca2ec69daf572d5da8dc41dece9a6a90e483f9b8464cb37c15c6c?s=96&d=mm&r=g","caption":"Alejandro Navarro"},"url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/author\/anavarro\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blogs.uninter.edu.mx\/DTIP\/wp-content\/uploads\/2021\/06\/VIRUS-TROYANO1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/476","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/comments?post=476"}],"version-history":[{"count":4,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/476\/revisions"}],"predecessor-version":[{"id":543,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/posts\/476\/revisions\/543"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media\/537"}],"wp:attachment":[{"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/media?parent=476"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/categories?post=476"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uninter.edu.mx\/DTIP\/index.php\/wp-json\/wp\/v2\/tags?post=476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}