{"id":3439,"date":"2015-08-13T12:58:48","date_gmt":"2015-08-13T16:58:48","guid":{"rendered":"http:\/\/aptgadget.com\/?p=3439"},"modified":"2015-08-16T00:31:35","modified_gmt":"2015-08-16T04:31:35","slug":"gone-phishing","status":"publish","type":"post","link":"https:\/\/aptgadget.com\/es\/gone-phishing\/","title":{"rendered":"Gone Phishing - C\u00f3mo proteger mejor sus datos en l\u00ednea"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In today&#8217;s world cyber security is paramount. Hackers seem to lurk around every virtual corner, just waiting to pounce. While this is not necessarily the case, it does seem that cyber attacks happen more and more frequently. This is largely because of high profile attacks on large corporations capturing the attention of the media. Sony&#8217;s infamous breach, Microsoft and Playstation gaming networks being DDOS&#8217;d, even the Federal Government. Each attack has a plethora of theories surrounding them, but they all boil down to one base item. Protected data being insecure.<\/span><\/p>\n<p>While we all know that there is a list basic things we can do to protect ourselves, we almost never follow them. I\u2019m guilty of it. We all are.<\/p>\n<p>So how do we protect ourselves in this world where everything is connected? Start with the basics, educate yourself, and use common sense. Let\u2019s start with that list of things we tend to ignore.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li style=\"font-weight: 400;\"><b>Stay Updated! &#8211;<\/b><span style=\"font-weight: 400;\"> How many updates have you not followed because you were in the middle of something? When was the last time you updated your antivirus? Or even ran it? Are all of your programs and apps up to date, across all your devices?<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Probably not, and mine aren\u2019t either, but they should be and here\u2019s why:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I run a WordPress site for a friend and certain key plugins had caused issues in the past when WordPress updated before they had. I held out on updating to the latest version to maintain compatibility only to have the WordPress groups exploit used against me by hackers to publish a vast e-commerce site on my domain.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This exploit gave the hacker FTP access to my server, and once inside the server, you\u2019re able to make all kinds of trouble. Once discovered, I set about cleaning it up, only to discover that they had planted in excess of 150k html and javascript pages throughout my file structure. A script buried 25 directories deep checked for changes made, and uploaded any file that deleted. Cleanup proved to be frustrating. I was lucky in the sense that all they did was set up a \u201chidden\u201d domain, but the potential for disaster was immense and made worse by the fact that I knew better than to pass on the updates. <\/span><\/p>\n<ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>Passwords &#8211; <\/b><span style=\"font-weight: 400;\">Use strong passwords and change them frequently! A strong password is defined as <\/span><i><span style=\"font-weight: 400;\">\u201cAt least characters in length and uses one or more of each of the following: Capital and Lowercase letters, Numbers and Special Characters.\u201d <\/span><\/i><span style=\"font-weight: 400;\">This can be overwhelming, especially if you have multiple online accounts. <\/span>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">There are password managers that allow you to set a master password and they manage your login credentials for your online accounts, but if you choose this method be careful who you entrust your data to. There have been several attacks on such companies, so make sure that they encrypt your data with at least AES 256 bit encryption. I recommend LastPass. Yes, they recently had a breach, but <\/span><a href=\"https:\/\/lastpass.com\/support.php?cmd=showfaq&amp;id=1096\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">their encryption methods<\/span><\/a><span style=\"font-weight: 400;\"> are top notch. <\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><b><b>DO NOT REUSE YOUR PASSWORD!<\/b><span style=\"font-weight: 400;\"> I know this a hard one to follow, but using the same password for all of your online accounts is risky and dangerous, especially if you use that same password for everything (Banking, Work, etc\u2026). One compromised account hands your attackers the virtual keys to everything.<\/span><\/b><\/li>\n<\/ul>\n<ul>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t save your passwords to your browser. The simple act of opening a malicious webpage or email can allow a \u201cbrowser hijack\u201d attack, exposing your data.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t write your passwords down and leave them where they can be seen or found. I know how this sounds but it\u2019s still a valid concern. I\u2019ve seen sheets taped next to a computer monitor with usernames and passwords for employees, passwords taped to the bottom of keyboards, even on sticky notes with the account credentials and URL!<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Wherever possible, use Multifactor Authentication. I prefer to use a solution like Google Authenticator. It provides a short lived, single use code to verify your identity. If you do not enter the code in the specified time, the code changes and it cannot be reused.<\/span><\/li>\n<\/ul>\n<\/ul>\n<p>&nbsp;<\/p>\n<ul>\n<li><b><b>Install, Use and Update an AntiVirus &#8211; <\/b><span style=\"font-weight: 400;\">This is imperative!<\/span><span style=\"font-weight: 400;\"> Antivirus and AntiMalware solutions are your last line of defense before infection. Keeping these updated with the latest definitions will help keep you protected. There are free options everywhere and Microsoft Security Essentials (which, surprisingly, is really good) comes preinstalled on most Windows systems. The best options are \u201cstateful\u201d programs, which means that your computer is monitored in real-time. Stateful software can alert you to intrusions, unauthorized installations, and even malicious websites. As with any product, you get what you pay for in most cases, so compare user reviews. Personally, I use a combination of <\/span><a href=\"http:\/\/www.comodo.com\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Comodo AV and Firewall<\/span><\/a><span style=\"font-weight: 400;\">y <\/span><a href=\"https:\/\/www.malwarebytes.org\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">MalwareBytes AntiMalware<\/span><\/a><span style=\"font-weight: 400;\">.\n<p><\/span><\/b><\/li>\n<\/ul>\n<ul>\n<li><b><b>Configure and Use a Firewall &#8211; <\/b><span style=\"font-weight: 400;\">Again, this is paramount to prevent unauthorized access to your data. If running Windows, the Windows Firewall is an excellent choice. It\u2019s recommended to block any services you do not need or use. One of the first things I do is close ports 23, 69, and 3389 (I also block these services on my router). This eliminates the possibility of someone maliciously using Telnet, TFTP or RDP against my systems.\n<p><\/span><\/b><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>Configure your Wireless Router &#8211;<\/b><span style=\"font-weight: 400;\"> Too many times have I gone to login to a wireless access point and seen a list populated with names like \u201cNetGear\u201d, \u201cLinkSys\u201d or the like. These networks are subject to being hacked. War Driving is becoming a popular activity for some. It may be someone just looking to hit an open Wi-Fi to check or send an email, or it may be something far more nefarious, but it can (and should) \u00a0be prevented either way. Take the time to configure your router.<br \/>\n<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Change the SSID name, or better yet, change it and then hide it. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Set up a new password for both wi-fi and router management, don\u2019t use the default passwords, especially for router management. Most are simply Username: admin<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Password: password<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">these offer no protection and are readily found online for nearly all manufacturers.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Turn off WPS (Wi-Fi Protected Setup). That push button connection is the least secure method of connecting to your network. It also sends out your network&#8217;s SSID and pin to anyone listening.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use WPA2 encryption. Anything less is extremely easy to hack. If you must use WEP for older devices, try setting up a guest network specifically for that encryption type. The guest network will allow your legacy devices to connect while protecting your main network with the stronger encryption.\n<p><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>Use Common Sense &#8211;<\/b><span style=\"font-weight: 400;\"> You know that email you just got that says your dying relative from Nairobi is a Prince, and he\u2019s leaving you millions in US currency? You can claim that fortune, all you need to do is send your bank account information, Social Security Number and address. &#8211; Yeah, don\u2019t. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">Now while the above may be extremely obvious, not all attempts are. Recent successful attacks are proof of this. You may see emails come from your banking institution telling you to login at the below link, or some other trusted site asking for your credentials. This tactic is known as \u201cPhishing\u201d, using a trusted source to send malicious content, and it has been quite successful. A recent example is the <\/span><a href=\"http:\/\/money.cnn.com\/2014\/12\/19\/technology\/security\/icann-hack-internet\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">ICANN<\/span><\/a><span style=\"font-weight: 400;\"> hack. For those not the know, ICANN is the ultimate internet authority. <\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Be mindful of the links and attachments in emails. Most trusted businesses, banks and services will <\/span><b><i>never <\/i><\/b><span style=\"font-weight: 400;\">ask for your credentials in an email.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Hover over the sender address in an email to see the domain it originates from, spoofed email addresses are a common occurrence in malicious communications.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Beware attachments! This is a prime example of why antivirus and firewalls are so important.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Be mindful of the subject and content in a message. Your buddy just sent you a strange message full of a jumbled mess of text and links. Don\u2019t open it.\n<p><\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\"><b>Educate Yourself! &#8211;<\/b><span style=\"font-weight: 400;\"> All of the above information could be obsolete by tomorrow! Stay current on the topics that may affect you. The major media outlets don\u2019t report emerging threats. They focus on what will get them the most attention. <\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">\u201cJoe Smith over here got hit with a brand new virus that was hidden in a text message (<\/span><a href=\"https:\/\/blog.zimperium.com\/stagefright-vulnerability-details-stagefright-detector-tool-released\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Stagefright<\/span><\/a><span style=\"font-weight: 400;\">), but Huge Corporation Inc was attacked through an unsecured webserver. People love Huge Corporation Inc! Let\u2019s report on that!\u201d<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><span style=\"font-weight: 400;\">There are literally thousands of security based blogs, sites, groups and newsletters online. Follow a few and stay current.<\/span><\/li>\n<\/ul>","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s world cyber security is paramount. Hackers seem to lurk around every virtual corner, just waiting to pounce. While this is not necessarily the case, it does seem that cyber attacks happen more and more frequently. This is largely because of high profile attacks on large corporations capturing the attention of the media. Sony&#8217;s &hellip;<\/p>","protected":false},"author":14,"featured_media":3444,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[928],"tags":[],"class_list":["post-3439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Gone Phishing - How To Better Secure your Online Data - AptGadget.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/aptgadget.com\/es\/gone-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Gone Phishing - How To Better Secure your Online Data\" \/>\n<meta property=\"og:description\" content=\"In today&#8217;s world cyber security is paramount. Hackers seem to lurk around every virtual corner, just waiting to pounce. While this is not necessarily the case, it does seem that cyber attacks happen more and more frequently. This is largely because of high profile attacks on large corporations capturing the attention of the media. Sony&#8217;s &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/aptgadget.com\/es\/gone-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"AptGadget.com\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-13T16:58:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-08-16T04:31:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png\" \/>\n\t<meta property=\"og:image:width\" content=\"638\" \/>\n\t<meta property=\"og:image:height\" content=\"638\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Carl &quot;CyberArcher&quot; L.\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Carl &quot;CyberArcher&quot; L.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/\"},\"author\":{\"name\":\"Carl \\\"CyberArcher\\\" L.\",\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63\"},\"headline\":\"Gone Phishing &#8211; How To Better Secure your Online Data\",\"datePublished\":\"2015-08-13T16:58:48+00:00\",\"dateModified\":\"2015-08-16T04:31:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/\"},\"wordCount\":1446,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png\",\"articleSection\":[\"Tech Tips\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/aptgadget.com\/gone-phishing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/\",\"url\":\"https:\/\/aptgadget.com\/gone-phishing\/\",\"name\":\"Gone Phishing - How To Better Secure your Online Data - AptGadget.com\",\"isPartOf\":{\"@id\":\"https:\/\/aptgadget.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png\",\"datePublished\":\"2015-08-13T16:58:48+00:00\",\"dateModified\":\"2015-08-16T04:31:35+00:00\",\"author\":{\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63\"},\"breadcrumb\":{\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/aptgadget.com\/gone-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage\",\"url\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png\",\"contentUrl\":\"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png\",\"width\":638,\"height\":638},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/aptgadget.com\/gone-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/aptgadget.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Gone Phishing &#8211; How To Better Secure your Online Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/aptgadget.com\/#website\",\"url\":\"https:\/\/aptgadget.com\/\",\"name\":\"AptGadget.com\",\"description\":\"Technology Reviews, Products and News\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/aptgadget.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63\",\"name\":\"Carl \\\"CyberArcher\\\" L.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/aptgadget.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1c448e8d43223d2dbad1aa8cc421afa5dfdd1c1f76ec41e02fdc1a1506f38eca?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1c448e8d43223d2dbad1aa8cc421afa5dfdd1c1f76ec41e02fdc1a1506f38eca?s=96&d=mm&r=g\",\"caption\":\"Carl \\\"CyberArcher\\\" L.\"},\"description\":\"Carl is an Android enthusiast that got his start with an HTC Hero. Quickly tiring of not being able to change certain things about the device, he sought out the means to do what he wanted; Enter XDA Developers. After spending immense amounts of time on the forums learning, building and sharing, Carl decided to pursue higher education to increase his understanding and focus on a direction in the mobile world. Primarily focusing on security and privacy, Carl intends to gain his CEH and Reverse Engineer malware.\",\"url\":\"https:\/\/aptgadget.com\/es\/author\/l1tc4rl\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Gone Phishing - How To Better Secure your Online Data - AptGadget.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/aptgadget.com\/es\/gone-phishing\/","og_locale":"es_ES","og_type":"article","og_title":"Gone Phishing - How To Better Secure your Online Data","og_description":"In today&#8217;s world cyber security is paramount. Hackers seem to lurk around every virtual corner, just waiting to pounce. While this is not necessarily the case, it does seem that cyber attacks happen more and more frequently. This is largely because of high profile attacks on large corporations capturing the attention of the media. Sony&#8217;s &hellip;","og_url":"https:\/\/aptgadget.com\/es\/gone-phishing\/","og_site_name":"AptGadget.com","article_published_time":"2015-08-13T16:58:48+00:00","article_modified_time":"2015-08-16T04:31:35+00:00","og_image":[{"width":638,"height":638,"url":"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png","type":"image\/png"}],"author":"Carl \"CyberArcher\" L.","twitter_misc":{"Escrito por":"Carl \"CyberArcher\" L.","Tiempo de lectura":"7 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/aptgadget.com\/gone-phishing\/#article","isPartOf":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/"},"author":{"name":"Carl \"CyberArcher\" L.","@id":"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63"},"headline":"Gone Phishing &#8211; How To Better Secure your Online Data","datePublished":"2015-08-13T16:58:48+00:00","dateModified":"2015-08-16T04:31:35+00:00","mainEntityOfPage":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/"},"wordCount":1446,"commentCount":0,"image":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png","articleSection":["Tech Tips"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/aptgadget.com\/gone-phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/aptgadget.com\/gone-phishing\/","url":"https:\/\/aptgadget.com\/gone-phishing\/","name":"Gone Phishing - How To Better Secure your Online Data - AptGadget.com","isPartOf":{"@id":"https:\/\/aptgadget.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage"},"image":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png","datePublished":"2015-08-13T16:58:48+00:00","dateModified":"2015-08-16T04:31:35+00:00","author":{"@id":"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63"},"breadcrumb":{"@id":"https:\/\/aptgadget.com\/gone-phishing\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/aptgadget.com\/gone-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/aptgadget.com\/gone-phishing\/#primaryimage","url":"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png","contentUrl":"https:\/\/aptgadget.com\/wp-content\/uploads\/2015\/08\/Phishing.fw_-e1439485096903.png","width":638,"height":638},{"@type":"BreadcrumbList","@id":"https:\/\/aptgadget.com\/gone-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/aptgadget.com\/"},{"@type":"ListItem","position":2,"name":"Gone Phishing &#8211; How To Better Secure your Online Data"}]},{"@type":"WebSite","@id":"https:\/\/aptgadget.com\/#website","url":"https:\/\/aptgadget.com\/","name":"AptGadget.com","description":"Technology Reviews, Products and News","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/aptgadget.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/aptgadget.com\/#\/schema\/person\/8ea415b2bedd92e5fe63e136a9e37d63","name":"Carl \"CyberArcher\" L.","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/aptgadget.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1c448e8d43223d2dbad1aa8cc421afa5dfdd1c1f76ec41e02fdc1a1506f38eca?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1c448e8d43223d2dbad1aa8cc421afa5dfdd1c1f76ec41e02fdc1a1506f38eca?s=96&d=mm&r=g","caption":"Carl \"CyberArcher\" L."},"description":"Carl is an Android enthusiast that got his start with an HTC Hero. Quickly tiring of not being able to change certain things about the device, he sought out the means to do what he wanted; Enter XDA Developers. After spending immense amounts of time on the forums learning, building and sharing, Carl decided to pursue higher education to increase his understanding and focus on a direction in the mobile world. Primarily focusing on security and privacy, Carl intends to gain his CEH and Reverse Engineer malware.","url":"https:\/\/aptgadget.com\/es\/author\/l1tc4rl\/"}]}},"_links":{"self":[{"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/posts\/3439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/comments?post=3439"}],"version-history":[{"count":4,"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/posts\/3439\/revisions"}],"predecessor-version":[{"id":3481,"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/posts\/3439\/revisions\/3481"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/media\/3444"}],"wp:attachment":[{"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/media?parent=3439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/categories?post=3439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aptgadget.com\/es\/wp-json\/wp\/v2\/tags?post=3439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}