{"id":530,"date":"2018-05-21T12:04:44","date_gmt":"2018-05-21T10:04:44","guid":{"rendered":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/05\/triptico_bloque_I_phishing.pdf"},"modified":"2018-05-21T12:04:44","modified_gmt":"2018-05-21T10:04:44","slug":"triptico_bloque_i_phishing","status":"inherit","type":"attachment","link":"https:\/\/blogs.ugr.es\/seguridadinformatica\/tripticos-y-salvapantallas-con-consejos\/triptico_bloque_i_phishing\/","title":{"rendered":"triptico_bloque_I_phishing"},"author":27,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":""},"class_list":{"0":"post-530","1":"attachment","2":"type-attachment","3":"status-inherit","5":"entry"},"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/05\/triptico_bloque_I_phishing.pdf'>triptico_bloque_I_phishing<\/a><\/p>\n"},"caption":{"rendered":"<p>triptico_bloque_I_phishing<\/p>\n"},"alt_text":"","media_type":"file","mime_type":"application\/pdf","media_details":{},"post":322,"source_url":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/05\/triptico_bloque_I_phishing.pdf","_links":{"self":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media\/530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/comments?post=530"}],"wp:attached-to":[{"embeddable":true,"post_type":"page","id":322,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/pages\/322"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}