{"id":360,"date":"2008-11-14T16:36:15","date_gmt":"2008-11-14T16:36:15","guid":{"rendered":"http:\/\/www.ciberbullying.com\/cyberbullying\/?p=360"},"modified":"2015-07-22T12:50:25","modified_gmt":"2015-07-22T11:50:25","slug":"acosar-a-traves-del-movil-es-cada-vez-mas-facil","status":"publish","type":"post","link":"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/","title":{"rendered":"Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil"},"content":{"rendered":"<p>Acosar a trav\u00e9s del tel\u00e9fono m\u00f3vil es cada vez m\u00e1s f\u00e1cil. Simplemente enviando un mensaje SMS invisible e inadvertido a un tel\u00e9fono m\u00f3vil particular. Wilfried Hafner, consejero delegado de SecurStar GmbH, ha desarrollado un Troyano, llamado \u00abRexSpy\u00bb, solo con fines demostrativos. Los resultados son alarmantes. Cuando el Troyano invade el sistema, las vulnerabilidades de seguridad descubiertas por Hafner muestran la posibilidad de fisgonear en cualquier tel\u00e9fono m\u00f3vil. La compa\u00f1\u00eda aconseja sobre la protecci\u00f3n y ofrece una herramienta de seguridad gratis que puede descargarse inmediatamente en http:\/\/www.securstar.com.<\/p>\n<p>Fuente: <a href=\"http:\/\/www.eleconomista.es\/mercados-cotizaciones\/noticias\/103307\/11\/06\/COMUNICADO-Primera-amenaza-seria-para-los-telefonos-moviles-que-causa-conmocion-RexSpy--el-rey-de-los-espias-Troyanos.html\">eleconomista<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Acosar a trav\u00e9s del tel\u00e9fono m\u00f3vil es cada vez m\u00e1s f\u00e1cil. Simplemente enviando un mensaje SMS invisible e inadvertido a un tel\u00e9fono m\u00f3vil particular. Wilfried Hafner, consejero delegado de SecurStar GmbH, ha desarrollado un Troyano, llamado \u00abRexSpy\u00bb, solo con fines demostrativos. Los resultados son alarmantes. Cuando el Troyano invade el sistema, las vulnerabilidades de seguridad [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,229],"tags":[453,888,30,454,36,408,409],"class_list":["post-360","post","type-post","status-publish","format-standard","hentry","category-ciberbullying","category-noticias","tag-intimidad","tag-noticias","tag-sms","tag-software","tag-telefonos-moviles","tag-troyanos","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil - CIBERBULLYING<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil - CIBERBULLYING\" \/>\n<meta property=\"og:description\" content=\"Acosar a trav\u00e9s del tel\u00e9fono m\u00f3vil es cada vez m\u00e1s f\u00e1cil. Simplemente enviando un mensaje SMS invisible e inadvertido a un tel\u00e9fono m\u00f3vil particular. Wilfried Hafner, consejero delegado de SecurStar GmbH, ha desarrollado un Troyano, llamado \u00abRexSpy\u00bb, solo con fines demostrativos. Los resultados son alarmantes. Cuando el Troyano invade el sistema, las vulnerabilidades de seguridad [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/\" \/>\n<meta property=\"og:site_name\" content=\"CIBERBULLYING\" \/>\n<meta property=\"article:published_time\" content=\"2008-11-14T16:36:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-07-22T11:50:25+00:00\" \/>\n<meta name=\"author\" content=\"PantallasAmigas\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"PantallasAmigas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/2008\\\/11\\\/14\\\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/2008\\\/11\\\/14\\\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\\\/\"},\"author\":{\"name\":\"PantallasAmigas\",\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/#\\\/schema\\\/person\\\/dff89bf66ee732b07375d9552d359416\"},\"headline\":\"Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil\",\"datePublished\":\"2008-11-14T16:36:15+00:00\",\"dateModified\":\"2015-07-22T11:50:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/2008\\\/11\\\/14\\\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\\\/\"},\"wordCount\":116,\"commentCount\":0,\"keywords\":[\"intimidad\",\"Noticias\",\"sms\",\"software\",\"tel\u00e9fonos m\u00f3viles\",\"troyanos\",\"virus\"],\"articleSection\":[\"Ciberbullying\",\"Noticias\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/2008\\\/11\\\/14\\\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/2008\\\/11\\\/14\\\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\\\/\",\"url\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/2008\\\/11\\\/14\\\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\\\/\",\"name\":\"Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil - CIBERBULLYING\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/#website\"},\"datePublished\":\"2008-11-14T16:36:15+00:00\",\"dateModified\":\"2015-07-22T11:50:25+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/#\\\/schema\\\/person\\\/dff89bf66ee732b07375d9552d359416\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/2008\\\/11\\\/14\\\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/2008\\\/11\\\/14\\\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/2008\\\/11\\\/14\\\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/#website\",\"url\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/\",\"name\":\"CIBERBULLYING\",\"description\":\"Acoso escolar \u2013 Ciberacoso entre iguales\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.ciberbullying.com\\\/cyberbullying\\\/#\\\/schema\\\/person\\\/dff89bf66ee732b07375d9552d359416\",\"name\":\"PantallasAmigas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5eab05966ee30ba2d4bdbc7f83f1eb6c99c4e78cb319c02061c4bb4b7dd85bd8?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5eab05966ee30ba2d4bdbc7f83f1eb6c99c4e78cb319c02061c4bb4b7dd85bd8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5eab05966ee30ba2d4bdbc7f83f1eb6c99c4e78cb319c02061c4bb4b7dd85bd8?s=96&d=mm&r=g\",\"caption\":\"PantallasAmigas\"},\"description\":\"PantallasAmigas es una iniciativa fundada en 2004 cuya misi\u00f3n es promover el uso seguro y saludable de las nuevas tecnolog\u00edas as\u00ed como una ciudadan\u00eda digital responsable en la infancia y la adolescencia.\",\"sameAs\":[\"http:\\\/\\\/www.pantallasamigas.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil - CIBERBULLYING","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/","og_locale":"es_ES","og_type":"article","og_title":"Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil - CIBERBULLYING","og_description":"Acosar a trav\u00e9s del tel\u00e9fono m\u00f3vil es cada vez m\u00e1s f\u00e1cil. Simplemente enviando un mensaje SMS invisible e inadvertido a un tel\u00e9fono m\u00f3vil particular. Wilfried Hafner, consejero delegado de SecurStar GmbH, ha desarrollado un Troyano, llamado \u00abRexSpy\u00bb, solo con fines demostrativos. Los resultados son alarmantes. Cuando el Troyano invade el sistema, las vulnerabilidades de seguridad [&hellip;]","og_url":"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/","og_site_name":"CIBERBULLYING","article_published_time":"2008-11-14T16:36:15+00:00","article_modified_time":"2015-07-22T11:50:25+00:00","author":"PantallasAmigas","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"PantallasAmigas","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/#article","isPartOf":{"@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/"},"author":{"name":"PantallasAmigas","@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/#\/schema\/person\/dff89bf66ee732b07375d9552d359416"},"headline":"Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil","datePublished":"2008-11-14T16:36:15+00:00","dateModified":"2015-07-22T11:50:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/"},"wordCount":116,"commentCount":0,"keywords":["intimidad","Noticias","sms","software","tel\u00e9fonos m\u00f3viles","troyanos","virus"],"articleSection":["Ciberbullying","Noticias"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/","url":"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/","name":"Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil - CIBERBULLYING","isPartOf":{"@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/#website"},"datePublished":"2008-11-14T16:36:15+00:00","dateModified":"2015-07-22T11:50:25+00:00","author":{"@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/#\/schema\/person\/dff89bf66ee732b07375d9552d359416"},"breadcrumb":{"@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/2008\/11\/14\/acosar-a-traves-del-movil-es-cada-vez-mas-facil\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.ciberbullying.com\/cyberbullying\/"},{"@type":"ListItem","position":2,"name":"Acosar a trav\u00e9s del m\u00f3vil es cada vez m\u00e1s f\u00e1cil"}]},{"@type":"WebSite","@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/#website","url":"https:\/\/www.ciberbullying.com\/cyberbullying\/","name":"CIBERBULLYING","description":"Acoso escolar \u2013 Ciberacoso entre iguales","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ciberbullying.com\/cyberbullying\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/www.ciberbullying.com\/cyberbullying\/#\/schema\/person\/dff89bf66ee732b07375d9552d359416","name":"PantallasAmigas","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/5eab05966ee30ba2d4bdbc7f83f1eb6c99c4e78cb319c02061c4bb4b7dd85bd8?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5eab05966ee30ba2d4bdbc7f83f1eb6c99c4e78cb319c02061c4bb4b7dd85bd8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5eab05966ee30ba2d4bdbc7f83f1eb6c99c4e78cb319c02061c4bb4b7dd85bd8?s=96&d=mm&r=g","caption":"PantallasAmigas"},"description":"PantallasAmigas es una iniciativa fundada en 2004 cuya misi\u00f3n es promover el uso seguro y saludable de las nuevas tecnolog\u00edas as\u00ed como una ciudadan\u00eda digital responsable en la infancia y la adolescencia.","sameAs":["http:\/\/www.pantallasamigas.net"]}]}},"_links":{"self":[{"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/posts\/360","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":1,"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/posts\/360\/revisions"}],"predecessor-version":[{"id":361,"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/posts\/360\/revisions\/361"}],"wp:attachment":[{"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/media?parent=360"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/categories?post=360"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ciberbullying.com\/cyberbullying\/wp-json\/wp\/v2\/tags?post=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}