{"id":1053,"date":"2019-07-24T12:11:07","date_gmt":"2019-07-24T10:11:07","guid":{"rendered":"https:\/\/blogs.ugr.es\/seguridadinformatica\/?p=1053"},"modified":"2019-07-24T12:11:07","modified_gmt":"2019-07-24T10:11:07","slug":"cybersecurityreport19h1-45-000-apps-eliminadas-de-google-play-2-de-ellas-detectadas-por-antivirus","status":"publish","type":"post","link":"https:\/\/blogs.ugr.es\/seguridadinformatica\/cybersecurityreport19h1-45-000-apps-eliminadas-de-google-play-2-de-ellas-detectadas-por-antivirus\/","title":{"rendered":"#CyberSecurityReport19H1: 45.000 apps eliminadas de Google Play, 2% de ellas detectadas por antivirus"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/publicada-en-el-boe-la-instruccion-tecnica-de-seguridad-de-auditoria\/leyendo-un-libro\/\" rel=\"attachment wp-att-305\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-305 alignleft\" src=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2018\/04\/LEYENDO-UN-LIBRO.jpg\" alt=\"\" width=\"70\" height=\"93\" \/><\/a>Interesante informe sobre vulnerabilidades y tendencias de ataque en 2019 elaborado por Elevenpath empresa de seguridad de Telef\u00f3nica.\u00a0 Demuestra que ya no podemos estar seguros ni con los Stores de app&#8217;s oficiales. Ni IOS se libra. Aconsejo su lectura. <a href=\"https:\/\/empresas.blogthinkbig.com\/cybersecurityreport19h1-apps-eliminadas-de-google-play\/\" target=\"_blank\" rel=\"noopener noreferrer\">Aqu\u00ed os lo dejo el enlace.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Interesante informe sobre vulnerabilidades y tendencias de ataque en 2019 elaborado por Elevenpath empresa de seguridad de Telef\u00f3nica.\u00a0 Demuestra que ya no podemos estar seguros ni con los Stores de app&#8217;s oficiales. Ni IOS se libra. Aconsejo su lectura. Aqu\u00ed os lo dejo el enlace.<\/p>\n","protected":false},"author":27,"featured_media":664,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[12],"tags":[29,31,38,36,14],"class_list":{"0":"post-1053","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-noticias","8":"tag-alertas","9":"tag-android","10":"tag-informe","11":"tag-malware","12":"tag-noticias","13":"entry"},"_links":{"self":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/1053","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/comments?post=1053"}],"version-history":[{"count":1,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/1053\/revisions"}],"predecessor-version":[{"id":1054,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/1053\/revisions\/1054"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media\/664"}],"wp:attachment":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media?parent=1053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/categories?post=1053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/tags?post=1053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}