{"id":4745,"date":"2015-08-13T11:05:13","date_gmt":"2015-08-13T09:05:13","guid":{"rendered":"https:\/\/www.safecreative.org\/blog\/es\/?p=4745"},"modified":"2022-09-21T15:54:22","modified_gmt":"2022-09-21T13:54:22","slug":"phishing-y-otros-enganos-como-proteger-datos-y-obras","status":"publish","type":"post","link":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/","title":{"rendered":"Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras"},"content":{"rendered":"<p>El t\u00e9rmino\u00a0<em>phishing<\/em>\u00a0hace referencia a ciertas pr\u00e1cticas delictivas en Internet que buscan conseguir informaci\u00f3n confidencial de usuarios. En ocasiones a esto siguen suplantaciones de identidad, o se venden esos datos personales a organizaciones interesadas. El nombre viene del ingl\u00e9s \u00abfishing\u00bb (pescar), por hacer que los usuarios estafados \u00abpiquen\u00bb.<\/p>\n<p>Hay muchas clases de p\u00e1ginas de <em>phishing<\/em>. Las m\u00e1s frecuentes son las que simulan ser webs leg\u00edtimas muy conocidas, como por ejemplo la p\u00e1gina de inicio de Facebook. Si no se comprueba la URL para confirmar que se trata del Facebook aut\u00e9ntico el usuario cae en la trampa al introducir su usuario y contrase\u00f1a.<\/p>\n<p>Para informaci\u00f3n m\u00e1s detallada: aprendiendo a\u00a0identificar los 10 <em>phishing<\/em> m\u00e1s utilizados.<\/p>\n<p>&nbsp;<\/p>\n<p>Hace poco compartimos a trav\u00e9s de las redes sociales <a href=\"https:\/\/www.plagiarismtoday.com\/2015\/07\/30\/phishing-scam-targets-photographers-protecting-copyright\/\" target=\"_blank\" rel=\"noopener\">un art\u00edculo de PlagiarismToday acerca de WallPart<\/a>, una p\u00e1gina de venta on-line de p\u00f3sters que result\u00f3 ser una estafa. Lo m\u00e1s probable es que se tratara de un sitio de <em>phishing<\/em>.\u00a0No est\u00e1 claro si la p\u00e1gina vende en efecto p\u00f3sters o no. Lo que s\u00ed se sabe es que sus productos no son contenido original,\u00a0sino im\u00e1genes sacadas directamente de Google, sin pedir derechos.<\/p>\n<p>Ah\u00ed es donde parece estar\u00a0el anzuelo del <em>phishing<\/em>. Los usuarios caen en la trampa cuando rellenan un formulario para poner una reclamaci\u00f3n por infracci\u00f3n de derechos de autor. Alguien est\u00e1 vendiendo p\u00f3sters con mi foto, pongo una reclamaci\u00f3n y as\u00ed es como consiguen mis datos personales. La propia p\u00e1gina reconoce no tener un cat\u00e1logo de im\u00e1genes propio, pero su actividad seg\u00fan ellos no infringe los derechos de los autores (nos ahorramos los comentarios).<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-4746 aligncenter\" src=\"https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2015\/08\/plagiarismtoday-search-postershop-550x253.png\" alt=\"Phishing website for photographers\" width=\"550\" height=\"253\" srcset=\"https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2015\/08\/plagiarismtoday-search-postershop-550x253.png 550w, https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2015\/08\/plagiarismtoday-search-postershop-550x253-300x138.png 300w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Sigue sin saberse para qu\u00e9 quieren estos datos y por qu\u00e9 en este caso han ido buscando autores que pusieran reclamaciones, adem\u00e1s de compradores incautos.<\/p>\n<p>Pero si os informamos no es s\u00f3lo por este caso en particular. Es s\u00f3lo un ejemplo entre muchos. Esta semana hemos encontrado otra p\u00e1gina que tiene todas las papeletas para ser otra web de <em>phishing<\/em> con una din\u00e1mica parecida. Se llama General-ebooks, no a\u00f1adimos enlace por razones obvias. Las p\u00e1ginas como \u00e9sta consiguen los t\u00edtulos de <em>ebooks<\/em> desde sitios\u00a0como Amazon, redireccionan a las personas que se los intentan descargar a alguna web de <em>scam<\/em> con la que tienen un acuerdo y sacan beneficio. Algunas intentan distribuir <em>malware<\/em>, otras ense\u00f1an anuncios y <em>popups<\/em>, pero en el fondo el prop\u00f3sito es el mismo. Fingir tener un <em>ebook<\/em>, salir bien posicionado en buscadores por los t\u00e9rminos de b\u00fasqueda, y sacar beneficios. En estos casos una denuncia por derecho de autor no ser\u00eda lo m\u00e1s adecuado, porque el libro en realidad ni siquiera est\u00e1 en la p\u00e1gina. De todas formas hay p\u00e1ginas que cierran tras enviarles una advertencia, para prevenir problemas mayores.<\/p>\n<p>&nbsp;<\/p>\n<p>En estos casos lo mejor es <strong>no dar nunca nuestros datos<\/strong>. Si la p\u00e1gina no parece de fiar, aunque est\u00e9n usando una obra que nos pertenece, es mejor dejarlo estar hasta que cierren la web o denunciarla nosotros. Nunca hay que rellenar un formulario, ni darse de alta, proporcionando informaci\u00f3n personal y aceptando a saber qu\u00e9 t\u00e9rminos y condiciones. Si el sitio web es grande y goza de buena reputaci\u00f3n, si vemos que la direcci\u00f3n web empieza por <strong>https:\/\/<\/strong>, entonces podemos poner una reclamaci\u00f3n sin peligro.\u00a0Si no, cuidado, nuestra obra robada puede ser s\u00f3lo el anzuelo de un <em>phisher<\/em>.<\/p>\n<p>Una opci\u00f3n si quisi\u00e9ramos tomar medidas es denunciar la p\u00e1gina o el contenido en <a href=\"https:\/\/support.google.com\/legal\/troubleshooter\/1114905?hl=es\" target=\"_blank\" rel=\"noopener\">Google, en su servicio de retirada de contenidos<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>Os recordamos tambi\u00e9n que antes de subir nuestra obra a cualquier sitio, aunque sean p\u00e1ginas leg\u00edtimas como Amazon, es mejor <strong>registrarla<\/strong> para tener una prueba antes de surja cualquier problema.<\/p>\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>El t\u00e9rmino\u00a0phishing\u00a0hace referencia a ciertas pr\u00e1cticas delictivas en Internet que buscan conseguir informaci\u00f3n confidencial de usuarios. En ocasiones a esto siguen suplantaciones de identidad, o&hellip;<!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":20,"featured_media":4758,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-4745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulos","has-post-thumbnail-archive"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras - Safe Creative: Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras - Safe Creative: Blog\" \/>\n<meta property=\"og:description\" content=\"El t\u00e9rmino\u00a0phishing\u00a0hace referencia a ciertas pr\u00e1cticas delictivas en Internet que buscan conseguir informaci\u00f3n confidencial de usuarios. En ocasiones a esto siguen suplantaciones de identidad, o&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/\" \/>\n<meta property=\"og:site_name\" content=\"Safe Creative: Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/safecreative\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-13T09:05:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-21T13:54:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2015\/08\/Phishing-site.png\" \/>\n\t<meta property=\"og:image:width\" content=\"560\" \/>\n\t<meta property=\"og:image:height\" content=\"315\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Marta Palacio\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@safecreative\" \/>\n<meta name=\"twitter:site\" content=\"@safecreative\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marta Palacio\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/\"},\"author\":{\"name\":\"Marta Palacio\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/#\\\/schema\\\/person\\\/b5e3f83b5a5104366e1f9107c20df060\"},\"headline\":\"Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras\",\"datePublished\":\"2015-08-13T09:05:13+00:00\",\"dateModified\":\"2022-09-21T13:54:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/\"},\"wordCount\":674,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/Phishing-site.png\",\"articleSection\":[\"Art\u00edculos\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/\",\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/\",\"name\":\"Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras - Safe Creative: Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/Phishing-site.png\",\"datePublished\":\"2015-08-13T09:05:13+00:00\",\"dateModified\":\"2022-09-21T13:54:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/Phishing-site.png\",\"contentUrl\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/wp-content\\\/uploads\\\/2015\\\/08\\\/Phishing-site.png\",\"width\":560,\"height\":315,\"caption\":\"Phishing site\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/2015\\\/08\\\/13\\\/phishing-y-otros-enganos-como-proteger-datos-y-obras\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/\",\"name\":\"Safe Creative: Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/#organization\",\"name\":\"Safe Creative\",\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/texto-blog.png\",\"contentUrl\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/texto-blog.png\",\"width\":953,\"height\":183,\"caption\":\"Safe Creative\"},\"image\":{\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/safecreative\",\"https:\\\/\\\/x.com\\\/safecreative\",\"https:\\\/\\\/www.instagram.com\\\/safecreative\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/safe-creative\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/safecreative\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/#\\\/schema\\\/person\\\/b5e3f83b5a5104366e1f9107c20df060\",\"name\":\"Marta Palacio\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/47c9648f8613a02ea6eb70adce9c5f6b46d8ab3fe09ec5fccd403e23575f32c5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/47c9648f8613a02ea6eb70adce9c5f6b46d8ab3fe09ec5fccd403e23575f32c5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/47c9648f8613a02ea6eb70adce9c5f6b46d8ab3fe09ec5fccd403e23575f32c5?s=96&d=mm&r=g\",\"caption\":\"Marta Palacio\"},\"sameAs\":[\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/author\\\/mpalacio\\\/\"],\"url\":\"https:\\\/\\\/www.safecreative.org\\\/blog\\\/es\\\/author\\\/mpalacio\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras - Safe Creative: Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/","og_locale":"es_ES","og_type":"article","og_title":"Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras - Safe Creative: Blog","og_description":"El t\u00e9rmino\u00a0phishing\u00a0hace referencia a ciertas pr\u00e1cticas delictivas en Internet que buscan conseguir informaci\u00f3n confidencial de usuarios. En ocasiones a esto siguen suplantaciones de identidad, o&hellip;","og_url":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/","og_site_name":"Safe Creative: Blog","article_publisher":"https:\/\/www.facebook.com\/safecreative","article_published_time":"2015-08-13T09:05:13+00:00","article_modified_time":"2022-09-21T13:54:22+00:00","og_image":[{"width":560,"height":315,"url":"https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2015\/08\/Phishing-site.png","type":"image\/png"}],"author":"Marta Palacio","twitter_card":"summary_large_image","twitter_creator":"@safecreative","twitter_site":"@safecreative","twitter_misc":{"Written by":"Marta Palacio","Est. reading time":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/#article","isPartOf":{"@id":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/"},"author":{"name":"Marta Palacio","@id":"https:\/\/www.safecreative.org\/blog\/es\/#\/schema\/person\/b5e3f83b5a5104366e1f9107c20df060"},"headline":"Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras","datePublished":"2015-08-13T09:05:13+00:00","dateModified":"2022-09-21T13:54:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/"},"wordCount":674,"commentCount":1,"publisher":{"@id":"https:\/\/www.safecreative.org\/blog\/es\/#organization"},"image":{"@id":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2015\/08\/Phishing-site.png","articleSection":["Art\u00edculos"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/","url":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/","name":"Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras - Safe Creative: Blog","isPartOf":{"@id":"https:\/\/www.safecreative.org\/blog\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/#primaryimage"},"image":{"@id":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/#primaryimage"},"thumbnailUrl":"https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2015\/08\/Phishing-site.png","datePublished":"2015-08-13T09:05:13+00:00","dateModified":"2022-09-21T13:54:22+00:00","breadcrumb":{"@id":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/#primaryimage","url":"https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2015\/08\/Phishing-site.png","contentUrl":"https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2015\/08\/Phishing-site.png","width":560,"height":315,"caption":"Phishing site"},{"@type":"BreadcrumbList","@id":"https:\/\/www.safecreative.org\/blog\/es\/2015\/08\/13\/phishing-y-otros-enganos-como-proteger-datos-y-obras\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.safecreative.org\/blog\/es\/"},{"@type":"ListItem","position":2,"name":"Phishing y otros enga\u00f1os, c\u00f3mo proteger tus datos y obras"}]},{"@type":"WebSite","@id":"https:\/\/www.safecreative.org\/blog\/es\/#website","url":"https:\/\/www.safecreative.org\/blog\/es\/","name":"Safe Creative: Blog","description":"","publisher":{"@id":"https:\/\/www.safecreative.org\/blog\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.safecreative.org\/blog\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.safecreative.org\/blog\/es\/#organization","name":"Safe Creative","url":"https:\/\/www.safecreative.org\/blog\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.safecreative.org\/blog\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2024\/05\/texto-blog.png","contentUrl":"https:\/\/www.safecreative.org\/blog\/es\/wp-content\/uploads\/2024\/05\/texto-blog.png","width":953,"height":183,"caption":"Safe Creative"},"image":{"@id":"https:\/\/www.safecreative.org\/blog\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/safecreative","https:\/\/x.com\/safecreative","https:\/\/www.instagram.com\/safecreative\/","https:\/\/www.linkedin.com\/company\/safe-creative\/","https:\/\/www.youtube.com\/c\/safecreative"]},{"@type":"Person","@id":"https:\/\/www.safecreative.org\/blog\/es\/#\/schema\/person\/b5e3f83b5a5104366e1f9107c20df060","name":"Marta Palacio","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/47c9648f8613a02ea6eb70adce9c5f6b46d8ab3fe09ec5fccd403e23575f32c5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/47c9648f8613a02ea6eb70adce9c5f6b46d8ab3fe09ec5fccd403e23575f32c5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/47c9648f8613a02ea6eb70adce9c5f6b46d8ab3fe09ec5fccd403e23575f32c5?s=96&d=mm&r=g","caption":"Marta Palacio"},"sameAs":["https:\/\/www.safecreative.org\/blog\/es\/author\/mpalacio\/"],"url":"https:\/\/www.safecreative.org\/blog\/es\/author\/mpalacio\/"}]}},"_links":{"self":[{"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/posts\/4745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/comments?post=4745"}],"version-history":[{"count":12,"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/posts\/4745\/revisions"}],"predecessor-version":[{"id":7812,"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/posts\/4745\/revisions\/7812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/media\/4758"}],"wp:attachment":[{"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/media?parent=4745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/categories?post=4745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.safecreative.org\/blog\/es\/wp-json\/wp\/v2\/tags?post=4745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}