{"id":875,"date":"2020-09-17T03:54:57","date_gmt":"2020-09-17T03:54:57","guid":{"rendered":"https:\/\/invezt.co\/kaymera\/?p=875"},"modified":"2020-09-17T03:54:57","modified_gmt":"2020-09-17T03:54:57","slug":"los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte","status":"publish","type":"post","link":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/","title":{"rendered":"Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte"},"content":{"rendered":"\n<p>Durante un webminar, <strong>Chema Alonso<\/strong>, <strong>CDCO <\/strong>de <strong>Telef\u00f3nica<\/strong>, habl\u00f3 de las tendencias en los ataques de ciberdelincuentes.  En su presentaci\u00f3n mostr\u00f3 y el c\u00f3mo por medio de varias t\u00e9cnicas, es posible vulnerar la seguridad de personas y sobre todo <a href=\"https:\/\/invezt.co\/kaymera\/es\/negocios\/\" target=\"_blank\" rel=\"noreferrer noopener\">empresas<\/a>. <\/p>\n\n\n\n<p>En el marco del <strong><a href=\"https:\/\/www.financesummit.mx\" target=\"_blank\" rel=\"noreferrer noopener\">Finance Summit\u00a0<\/a><\/strong>organizado por <strong>VMWare<\/strong> y en poco m\u00e1s de 47 minutos Alonso lanz\u00f3 una muy dura sentencia. \u00abTodos los que est\u00e1is dentro de una empresa y que gestion\u00e1is dinero<strong>\u00a0ten\u00e9is que asumir que la probabilidad de que os ataquen es del 100%<\/strong>\u00ab. Uno de los objetivos de estas personas que utilizan la tecnolog\u00eda para delinquir es obtener dinero. Al usar <strong>tokens OAuth<\/strong>, Inteligencia Artificial y t\u00e9cnicas OSINT (Open Source Intelligence) es sencillo acceder incluso a servicios bancarios. <\/p>\n\n\n\n<p>Lo atractivo de esta presentaci\u00f3n titulada <em><em>How Bad Guys\u00a0Hack Good (Financial) People with State of Art Technology\u00a0<\/em><\/em>, son los ejemplos usados por Alonso.  En estos casos adem\u00e1s de la tecnolog\u00eda, se utiliza una de las t\u00e9cnicas m\u00e1s efectivas para vulnerar la seguridad de una persona, la ingenier\u00eda social. Esta t\u00e9cnica combinada con un ingreso al correo electr\u00f3nico otorga la posibilidad de realizar transacciones financieras a tu nombre. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Las alternativas a tener tu contrase\u00f1a<\/h3>\n\n\n\n<p>\u00abEn el mundo de la ciberseguridad esto se conoce como Open Source Intelligence. OSINT. Utilizar todas las fuentes que hay en internet para localizar todas las piezas de informaci\u00f3n de los empleados de una organizaci\u00f3n. Para tener el mapa de qui\u00e9n trabaja all\u00ed y qui\u00e9n es la pieza m\u00e1s vulnerable\u00bb. Es muy com\u00fan te des de alta a p\u00e1ginas web o servicio en Internet por medio de Google, Facebook, incluso Twitter. Los <strong>ciberdelincuentes<\/strong> aprovechan para crear aplicaciones falsas y as\u00ed, obtener permisos de tus cuentas, extraer informaci\u00f3n y tener lo necesario para ingresar a otras aplicaciones. <\/p>\n\n\n\n<p>La<strong> Inteligencia Artificial<\/strong> es un gran avance y la innovaci\u00f3n se relaciona estrechamente con ella; los ciberdelincuentes han desarrollado m\u00e9todos para vulnerar empresas, por medio del reconocimiento facial o de voz. <\/p>\n\n\n\n<p>Si quieres ver la charla completa te dejamos el video completo.  <\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\nhttps:\/\/youtu.be\/HK2yySFfLLk\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Durante un webminar, Chema Alonso, CDCO de Telef\u00f3nica, habl\u00f3 de las tendencias en los ataques de ciberdelincuentes. En su presentaci\u00f3n mostr\u00f3 y el c\u00f3mo por medio de varias t\u00e9cnicas, es posible vulnerar la seguridad de personas y sobre todo empresas. En el marco del Finance Summit\u00a0organizado por VMWare y en poco m\u00e1s de 47 minutos&hellip;&nbsp;<a href=\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/\" rel=\"bookmark\">Leer m\u00e1s &raquo;<span class=\"screen-reader-text\">Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":877,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[10],"tags":[96,97,98,99,100,13,101,102,103,104],"class_list":["post-875","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias","tag-chema-alonso","tag-ciberdelincuentes","tag-espionaje-cibernetico","tag-espionaje-movil","tag-inteligencia-artificial","tag-kaymera","tag-open-source-intelligence","tag-osint","tag-telefonica","tag-tokens-oauth"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte - Kaymera by Invict<\/title>\n<meta name=\"description\" content=\"El conocido hacker Chema Alonso detall\u00f3 por qu\u00e9 hoy los ciberdelincuentes pueden vulnerarte sin necesidad de tener tu contrase\u00f1a.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte - Kaymera by Invict\" \/>\n<meta property=\"og:description\" content=\"El conocido hacker Chema Alonso detall\u00f3 por qu\u00e9 hoy los ciberdelincuentes pueden vulnerarte sin necesidad de tener tu contrase\u00f1a.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/\" \/>\n<meta property=\"og:site_name\" content=\"Kaymera by Invict\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-17T03:54:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/09\/cyber-security-internet-network-technology-computer-hacker-hacking-digital.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"880\" \/>\n\t<meta property=\"og:image:height\" content=\"586\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin_pupij279\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin_pupij279\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/\"},\"author\":{\"name\":\"admin_pupij279\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0\"},\"headline\":\"Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte\",\"datePublished\":\"2020-09-17T03:54:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/\"},\"wordCount\":376,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/09\/cyber-security-internet-network-technology-computer-hacker-hacking-digital.jpg\",\"keywords\":[\"Chema Alonso\",\"ciberdelincuentes\",\"espionaje cibern\u00e9tico\",\"espionaje m\u00f3vil\",\"Inteligencia Artificial\",\"Kaymera\",\"Open Source Intelligence\",\"OSINT\",\"Telef\u00f3nica\",\"tokens OAuth\"],\"articleSection\":[\"Noticias\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/\",\"url\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/\",\"name\":\"Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte - Kaymera by Invict\",\"isPartOf\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/09\/cyber-security-internet-network-technology-computer-hacker-hacking-digital.jpg\",\"datePublished\":\"2020-09-17T03:54:57+00:00\",\"author\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0\"},\"description\":\"El conocido hacker Chema Alonso detall\u00f3 por qu\u00e9 hoy los ciberdelincuentes pueden vulnerarte sin necesidad de tener tu contrase\u00f1a.\",\"breadcrumb\":{\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#primaryimage\",\"url\":\"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/09\/cyber-security-internet-network-technology-computer-hacker-hacking-digital.jpg\",\"contentUrl\":\"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/09\/cyber-security-internet-network-technology-computer-hacker-hacking-digital.jpg\",\"width\":880,\"height\":586,\"caption\":\"ciberseguridad\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/invict.com.co\/kaymera\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/#website\",\"url\":\"https:\/\/invict.com.co\/kaymera\/\",\"name\":\"Kaymera by Invict\",\"description\":\"High-end mobile security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/invict.com.co\/kaymera\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0\",\"name\":\"admin_pupij279\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7577ba60cf12a7ce66a16a8f2188fc217ef3c6275771a5281d7db4ca350d92ff?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7577ba60cf12a7ce66a16a8f2188fc217ef3c6275771a5281d7db4ca350d92ff?s=96&d=mm&r=g\",\"caption\":\"admin_pupij279\"},\"sameAs\":[\"https:\/\/invict.com.co\/kaymera\"],\"url\":\"https:\/\/invict.com.co\/kaymera\/author\/admin_pupij279\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte - Kaymera by Invict","description":"El conocido hacker Chema Alonso detall\u00f3 por qu\u00e9 hoy los ciberdelincuentes pueden vulnerarte sin necesidad de tener tu contrase\u00f1a.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/","og_locale":"es_ES","og_type":"article","og_title":"Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte - Kaymera by Invict","og_description":"El conocido hacker Chema Alonso detall\u00f3 por qu\u00e9 hoy los ciberdelincuentes pueden vulnerarte sin necesidad de tener tu contrase\u00f1a.","og_url":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/","og_site_name":"Kaymera by Invict","article_published_time":"2020-09-17T03:54:57+00:00","og_image":[{"width":880,"height":586,"url":"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/09\/cyber-security-internet-network-technology-computer-hacker-hacking-digital.jpg","type":"image\/jpeg"}],"author":"admin_pupij279","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"admin_pupij279","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#article","isPartOf":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/"},"author":{"name":"admin_pupij279","@id":"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0"},"headline":"Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte","datePublished":"2020-09-17T03:54:57+00:00","mainEntityOfPage":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/"},"wordCount":376,"commentCount":0,"image":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#primaryimage"},"thumbnailUrl":"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/09\/cyber-security-internet-network-technology-computer-hacker-hacking-digital.jpg","keywords":["Chema Alonso","ciberdelincuentes","espionaje cibern\u00e9tico","espionaje m\u00f3vil","Inteligencia Artificial","Kaymera","Open Source Intelligence","OSINT","Telef\u00f3nica","tokens OAuth"],"articleSection":["Noticias"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/","url":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/","name":"Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte - Kaymera by Invict","isPartOf":{"@id":"https:\/\/invict.com.co\/kaymera\/#website"},"primaryImageOfPage":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#primaryimage"},"image":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#primaryimage"},"thumbnailUrl":"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/09\/cyber-security-internet-network-technology-computer-hacker-hacking-digital.jpg","datePublished":"2020-09-17T03:54:57+00:00","author":{"@id":"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0"},"description":"El conocido hacker Chema Alonso detall\u00f3 por qu\u00e9 hoy los ciberdelincuentes pueden vulnerarte sin necesidad de tener tu contrase\u00f1a.","breadcrumb":{"@id":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#primaryimage","url":"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/09\/cyber-security-internet-network-technology-computer-hacker-hacking-digital.jpg","contentUrl":"https:\/\/invict.com.co\/kaymera\/wp-content\/uploads\/2020\/09\/cyber-security-internet-network-technology-computer-hacker-hacking-digital.jpg","width":880,"height":586,"caption":"ciberseguridad"},{"@type":"BreadcrumbList","@id":"https:\/\/invict.com.co\/kaymera\/2020\/09\/17\/los-ciberdelincuentes-ya-no-necesitan-tu-contrasena-para-robarte\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/invict.com.co\/kaymera\/"},{"@type":"ListItem","position":2,"name":"Los ciberdelincuentes ya no necesitan tu contrase\u00f1a para robarte"}]},{"@type":"WebSite","@id":"https:\/\/invict.com.co\/kaymera\/#website","url":"https:\/\/invict.com.co\/kaymera\/","name":"Kaymera by Invict","description":"High-end mobile security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/invict.com.co\/kaymera\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/9b0133a54cb09737e433661cdc5460a0","name":"admin_pupij279","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/invict.com.co\/kaymera\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7577ba60cf12a7ce66a16a8f2188fc217ef3c6275771a5281d7db4ca350d92ff?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7577ba60cf12a7ce66a16a8f2188fc217ef3c6275771a5281d7db4ca350d92ff?s=96&d=mm&r=g","caption":"admin_pupij279"},"sameAs":["https:\/\/invict.com.co\/kaymera"],"url":"https:\/\/invict.com.co\/kaymera\/author\/admin_pupij279\/"}]}},"_links":{"self":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/posts\/875","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/comments?post=875"}],"version-history":[{"count":0,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/posts\/875\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/media\/877"}],"wp:attachment":[{"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/media?parent=875"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/categories?post=875"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/invict.com.co\/kaymera\/wp-json\/wp\/v2\/tags?post=875"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}