{"id":13156,"date":"2022-02-07T15:10:55","date_gmt":"2022-02-07T15:10:55","guid":{"rendered":"https:\/\/pagprueba.guru-soft.com\/?p=13156"},"modified":"2022-02-07T15:15:45","modified_gmt":"2022-02-07T15:15:45","slug":"que-es-el-ransomware","status":"publish","type":"post","link":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/","title":{"rendered":"\u00bfQu\u00e9 es el ransomware?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"13156\" class=\"elementor elementor-13156\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-404e15d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"404e15d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7c8e4e3\" data-id=\"7c8e4e3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-34837c1 elementor-widget elementor-widget-text-editor\" data-id=\"34837c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\tTiempo de Lectura: 4 minutos \ud83d\udcd6\u23f1\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a9cd9b elementor-widget elementor-widget-text-editor\" data-id=\"3a9cd9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">La informaci\u00f3n se ha convertido en uno de los activos m\u00e1s importantes de las marcas en la actualidad. Cada vez es m\u00e1s valorada. Y es en este contexto que, para salvaguardar a la misma, surge el concepto de <\/span><b><span data-contrast=\"auto\">seguridad de la informaci\u00f3n<\/span><\/b><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Cuidar de ella en el espectro digital es relevante para una compa\u00f1\u00eda, pues evita una exposici\u00f3n innecesaria ante los <\/span><b><span data-contrast=\"auto\">ataques cibern\u00e9ticos<\/span><\/b><span data-contrast=\"auto\">, en especial en los \u00faltimos a\u00f1os, que ha surgido el temido <\/span><b><span data-contrast=\"auto\">ransomware<\/span><\/b><span data-contrast=\"auto\">, el cual es una clase de <\/span><b><span data-contrast=\"auto\">software malicioso<\/span><\/b><span data-contrast=\"auto\"> que tiene como objetivo extorsionar.\u00a0 Pero, \u00bfc\u00f3mo funciona? Al ser afectado un equipo por esta modalidad, se bloquea la pantalla o cifra la informaci\u00f3n que se encuentra en el disco, solicitando un pago a la v\u00edctima para liberar los datos, como lo expresa <\/span><a href=\"https:\/\/www.eset.com\/es\/caracteristicas\/ransomware\/\"><span data-contrast=\"none\">ESET<\/span><\/a><span data-contrast=\"auto\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">El t\u00e9rmino apareci\u00f3 all\u00e1 por 1989 y fue conocido como el <\/span><b><span data-contrast=\"auto\">Troyano del SIDA,<\/span><\/b><span data-contrast=\"auto\"> pero ha cobrado un impacto mayor recientemente por el crecimiento de la vida online. Es v\u00e1lido mencionar que su ataque puede ser a nivel personal o empresarial, siendo este \u00faltima m\u00e1s atrayente para los ciberdelincuentes, por la magnitud de informaci\u00f3n que capturan y el monto que pueden solicitar.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/p><p><b><span data-contrast=\"auto\">Luis Corrons<\/span><\/b><span data-contrast=\"auto\">, Security Evangelist de <\/span><a href=\"https:\/\/www.avast.com\/es-ww\/index\"><span data-contrast=\"none\">Avast Software,<\/span><\/a> <span data-contrast=\"none\">alert\u00f3 sobre la posibilidad de sufrir una <\/span><b><span data-contrast=\"none\">doble extorsi\u00f3n<\/span><\/b><span data-contrast=\"none\"> o <\/span><b><span data-contrast=\"none\">doxing, <\/span><\/b><span data-contrast=\"none\">debido a que los atacantes hacen una copia de la informaci\u00f3n hurtada y amenazan con hacerla p\u00fablica, p<\/span><span data-contrast=\"auto\">or lo tanto, se debe conocer el problema y tener respuestas inmediatas a la mano que hagan que el ataque no sea recurrente y sobre todo prevenir y colocar la <\/span><a href=\"https:\/\/guru-soft.com\/ciberseguridad-mas-que-una-tendencia-una-forma-de-cuidar-tu-empresa\/\"><span data-contrast=\"none\">ciberseguridad<\/span><\/a><span data-contrast=\"auto\"> como un tema crucial en toda la organizaci\u00f3n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Algunas medidas que ayudar\u00e1n a prevenir estos ataques son: la capacitaci\u00f3n y seguridad en la navegaci\u00f3n, evaluaci\u00f3n y seguimiento de la red del sistema empleado.<\/span><span data-contrast=\"none\"> E<\/span><span data-contrast=\"auto\">stas no son las \u00fanicas modalidades de hurto conocidas, ya que en nuestra nota anterior te mencionamos sobre <\/span><a href=\"https:\/\/guru-soft.com\/pishing-vishing-y-smishing-tres-estafas-mas-comunes-de-lo-que-se-cree\/\"><span data-contrast=\"none\">pishing, vishing y smishing,<\/span><\/a><span data-contrast=\"auto\"> que son recurrentes y pueden colocar al descubierto tus contrase\u00f1as y cuentas bancarias. Por consiguiente, es preciso tener cuidado en d\u00f3nde se navega y qu\u00e9 informaci\u00f3n se comparte.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"none\">En <\/span><b><span data-contrast=\"auto\">GuruSoft<\/span><\/b> <span data-contrast=\"none\">entendemos la necesidad de estar actualizados, por eso te traemos informaci\u00f3n de inter\u00e9s que cuide de ti y tu empresa. \u00a1<\/span><span data-contrast=\"auto\">La <\/span><b><span data-contrast=\"auto\">ciberseguridad <\/span><\/b><span data-contrast=\"auto\">es un tema que nos involucra a todos!<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p><p><span data-contrast=\"auto\">Por Natalia Guti\u00e9rrez V.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Tiempo de Lectura: 4 minutos \ud83d\udcd6\u23f1 La informaci\u00f3n se ha convertido en uno de los activos m\u00e1s importantes de las marcas en la actualidad. Cada vez es m\u00e1s valorada. Y es en este contexto que, para salvaguardar a la misma, surge el concepto de seguridad de la informaci\u00f3n.\u00a0 Cuidar de ella en el espectro digital [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":13157,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[20],"tags":[],"post_folder":[],"class_list":["post-13156","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-gurusoft-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>GuruSoft | Facturaci\u00f3n Electr\u00f3nica | Am\u00e9rica Latina<\/title>\n<meta name=\"description\" content=\"Desarrollo de tecnolog\u00eda en Latinoam\u00e9rica y el Caribe, proyectos con empresas privadas de sectores econ\u00f3micos; como el sector educativo, banca, industrial, retail.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"GuruSoft | Facturaci\u00f3n Electr\u00f3nica | Am\u00e9rica Latina\" \/>\n<meta property=\"og:description\" content=\"Desarrollo de tecnolog\u00eda en Latinoam\u00e9rica y el Caribe, proyectos con empresas privadas de sectores econ\u00f3micos; como el sector educativo, banca, industrial, retail.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"GuruSoft\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GuruSoftLatam\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-07T15:10:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-07T15:15:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/migrate-clon.guru-soft.com\/wp-content\/uploads\/2022\/02\/QueEsRansomware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1610\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"userapp\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GuruSoftLatam\" \/>\n<meta name=\"twitter:site\" content=\"@GuruSoftLatam\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"userapp\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/\"},\"author\":{\"name\":\"userapp\",\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/#\\\/schema\\\/person\\\/b63a52c8002030050db57274dd1cea21\"},\"headline\":\"\u00bfQu\u00e9 es el ransomware?\",\"datePublished\":\"2022-02-07T15:10:55+00:00\",\"dateModified\":\"2022-02-07T15:15:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/\"},\"wordCount\":410,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/QueEsRansomware.png\",\"articleSection\":[\"Gurusoft-Blog-General\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/\",\"url\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/\",\"name\":\"GuruSoft | Facturaci\u00f3n Electr\u00f3nica | Am\u00e9rica Latina\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/QueEsRansomware.png\",\"datePublished\":\"2022-02-07T15:10:55+00:00\",\"dateModified\":\"2022-02-07T15:15:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/#\\\/schema\\\/person\\\/b63a52c8002030050db57274dd1cea21\"},\"description\":\"Desarrollo de tecnolog\u00eda en Latinoam\u00e9rica y el Caribe, proyectos con empresas privadas de sectores econ\u00f3micos; como el sector educativo, banca, industrial, retail.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/QueEsRansomware.png\",\"contentUrl\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/wp-content\\\/uploads\\\/2022\\\/02\\\/QueEsRansomware.png\",\"width\":1610,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/que-es-el-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es el ransomware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/\",\"name\":\"GuruSoft\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/migrate-clon.guru-soft.com\\\/es\\\/#\\\/schema\\\/person\\\/b63a52c8002030050db57274dd1cea21\",\"name\":\"userapp\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c1c47e7dac2cdefac2336218cba5b9307897d2e9266d4cc7848c7ad9edbc7f9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c1c47e7dac2cdefac2336218cba5b9307897d2e9266d4cc7848c7ad9edbc7f9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c1c47e7dac2cdefac2336218cba5b9307897d2e9266d4cc7848c7ad9edbc7f9?s=96&d=mm&r=g\",\"caption\":\"userapp\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"GuruSoft | Facturaci\u00f3n Electr\u00f3nica | Am\u00e9rica Latina","description":"Desarrollo de tecnolog\u00eda en Latinoam\u00e9rica y el Caribe, proyectos con empresas privadas de sectores econ\u00f3micos; como el sector educativo, banca, industrial, retail.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/","og_locale":"es_ES","og_type":"article","og_title":"GuruSoft | Facturaci\u00f3n Electr\u00f3nica | Am\u00e9rica Latina","og_description":"Desarrollo de tecnolog\u00eda en Latinoam\u00e9rica y el Caribe, proyectos con empresas privadas de sectores econ\u00f3micos; como el sector educativo, banca, industrial, retail.","og_url":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/","og_site_name":"GuruSoft","article_publisher":"https:\/\/www.facebook.com\/GuruSoftLatam","article_published_time":"2022-02-07T15:10:55+00:00","article_modified_time":"2022-02-07T15:15:45+00:00","og_image":[{"width":1610,"height":1080,"url":"https:\/\/migrate-clon.guru-soft.com\/wp-content\/uploads\/2022\/02\/QueEsRansomware.png","type":"image\/png"}],"author":"userapp","twitter_card":"summary_large_image","twitter_creator":"@GuruSoftLatam","twitter_site":"@GuruSoftLatam","twitter_misc":{"Escrito por":"userapp","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/#article","isPartOf":{"@id":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/"},"author":{"name":"userapp","@id":"https:\/\/migrate-clon.guru-soft.com\/es\/#\/schema\/person\/b63a52c8002030050db57274dd1cea21"},"headline":"\u00bfQu\u00e9 es el ransomware?","datePublished":"2022-02-07T15:10:55+00:00","dateModified":"2022-02-07T15:15:45+00:00","mainEntityOfPage":{"@id":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/"},"wordCount":410,"commentCount":0,"image":{"@id":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/migrate-clon.guru-soft.com\/wp-content\/uploads\/2022\/02\/QueEsRansomware.png","articleSection":["Gurusoft-Blog-General"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/","url":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/","name":"GuruSoft | Facturaci\u00f3n Electr\u00f3nica | Am\u00e9rica Latina","isPartOf":{"@id":"https:\/\/migrate-clon.guru-soft.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/migrate-clon.guru-soft.com\/wp-content\/uploads\/2022\/02\/QueEsRansomware.png","datePublished":"2022-02-07T15:10:55+00:00","dateModified":"2022-02-07T15:15:45+00:00","author":{"@id":"https:\/\/migrate-clon.guru-soft.com\/es\/#\/schema\/person\/b63a52c8002030050db57274dd1cea21"},"description":"Desarrollo de tecnolog\u00eda en Latinoam\u00e9rica y el Caribe, proyectos con empresas privadas de sectores econ\u00f3micos; como el sector educativo, banca, industrial, retail.","breadcrumb":{"@id":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/#primaryimage","url":"https:\/\/migrate-clon.guru-soft.com\/wp-content\/uploads\/2022\/02\/QueEsRansomware.png","contentUrl":"https:\/\/migrate-clon.guru-soft.com\/wp-content\/uploads\/2022\/02\/QueEsRansomware.png","width":1610,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/migrate-clon.guru-soft.com\/es\/que-es-el-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/migrate-clon.guru-soft.com\/es\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es el ransomware?"}]},{"@type":"WebSite","@id":"https:\/\/migrate-clon.guru-soft.com\/es\/#website","url":"https:\/\/migrate-clon.guru-soft.com\/es\/","name":"GuruSoft","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/migrate-clon.guru-soft.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/migrate-clon.guru-soft.com\/es\/#\/schema\/person\/b63a52c8002030050db57274dd1cea21","name":"userapp","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/2c1c47e7dac2cdefac2336218cba5b9307897d2e9266d4cc7848c7ad9edbc7f9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c1c47e7dac2cdefac2336218cba5b9307897d2e9266d4cc7848c7ad9edbc7f9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c1c47e7dac2cdefac2336218cba5b9307897d2e9266d4cc7848c7ad9edbc7f9?s=96&d=mm&r=g","caption":"userapp"}}]}},"_links":{"self":[{"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/posts\/13156","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/comments?post=13156"}],"version-history":[{"count":0,"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/posts\/13156\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/media\/13157"}],"wp:attachment":[{"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/media?parent=13156"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/categories?post=13156"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/tags?post=13156"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/migrate-clon.guru-soft.com\/es\/wp-json\/wp\/v2\/post_folder?post=13156"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}