{"id":1331,"date":"2012-12-10T22:55:09","date_gmt":"2012-12-11T03:55:09","guid":{"rendered":"http:\/\/eljeffto.com\/?p=1331"},"modified":"2014-07-08T18:19:50","modified_gmt":"2014-07-08T23:19:50","slug":"smartphones-como-vector-de-ataque-emergente-en-ingenieria-social","status":"publish","type":"post","link":"https:\/\/eljeffto.com\/?p=1331","title":{"rendered":"Smartphones como vector de ataque emergente en ingenieria social"},"content":{"rendered":"<p style=\"text-align: justify;\">Les comparto los slides de la charla impartida en el marco de <a title=\"Security Zone\" href=\"http:\/\/securityzone.co\" target=\"_blank\">Security Zone<\/a> abordando la investigaci\u00f3n en torno a desarrollo de ataques de ingenier\u00eda social empleando plataformas de smartphone como vector de ataque. Para quienes est\u00e9n interesados en conocer un poco m\u00e1s les comparto el <a href=\"http:\/\/eljeffto.com\/wp-content\/uploads\/2012\/12\/paper_stalkerphone_jeffrey_borbon.pdf\">paper_de la investigaci\u00f3n.<\/a><\/p>\n<p style=\"text-align: justify;\">A\u00fan este trabajo se encuentra en desarrollo, espero pronto lanzar el Stalker Phone.<\/p>\n<p style=\"text-align: justify;\">[prezi id=&#8217;9de423fa3c771a89aa543c98f55cce7bc84e5b7f&#8217; width=&#8217;600&#8242; height=&#8217;450&#8242;]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les comparto los slides de la charla impartida en el marco de Security Zone abordando la investigaci\u00f3n en torno a desarrollo de ataques de ingenier\u00eda social empleando plataformas de smartphone como vector de ataque. Para quienes est\u00e9n interesados en conocer un poco m\u00e1s les comparto el paper_de la investigaci\u00f3n. A\u00fan este trabajo se encuentra en &#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/eljeffto.com\/?p=1331\">[Read more&#8230;]<\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":1081,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[439,17,25,362,28],"tags":[505,512,504,513],"class_list":{"0":"entry","1":"post","2":"publish","3":"author-jeffto","4":"post-1331","6":"format-standard","7":"has-post-thumbnail","8":"category-hacking","9":"category-pasiones","10":"category-reporte-seguridad-p","11":"category-seguridad-de-la-informacion","12":"category-tecnologia","13":"post_tag-ingenieria-social","14":"post_tag-smartphone","15":"post_tag-social-engineering","16":"post_tag-stalker"},"_links":{"self":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/1331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1331"}],"version-history":[{"count":7,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/1331\/revisions"}],"predecessor-version":[{"id":1608,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/1331\/revisions\/1608"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/media\/1081"}],"wp:attachment":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1331"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1331"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}