{"id":2273,"date":"2025-04-09T13:08:10","date_gmt":"2025-04-09T11:08:10","guid":{"rendered":"https:\/\/blogs.ugr.es\/seguridadinformatica\/?p=2273"},"modified":"2025-04-09T13:08:10","modified_gmt":"2025-04-09T11:08:10","slug":"ojo-con-el-tabnabbing","status":"publish","type":"post","link":"https:\/\/blogs.ugr.es\/seguridadinformatica\/ojo-con-el-tabnabbing\/","title":{"rendered":"!OJO con el Tabnabbing!"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>El nuevo malware se llama Tabnabbing, est\u00e1 generando una alerta justificada. \u00bfDe que se trata?, pues Tabnabbing es un t\u00e9rmino inform\u00e1tico para definir un tipo de phishing descrito en 2010 por Aza Raskin\u200b\u200b y que se basa en persuadir al usuario de insertar datos para entrar en cuentas, normalmente de correos o redes sociales, por medio de p\u00e1ginas que aparentan ser las reales.<\/p>\n<p>Para tener mas informaci\u00f3n al respecto te aconsejo que mires aqu\u00ed:<\/p>\n<p>CCN <a href=\"https:\/\/www.ccn-cert.cni.es\/gl\/component\/content\/article\/1736-tabnabbing-nuevo-tipo-de-ataque-de-phishing.html?catid=23&amp;Itemid=11901\" target=\"_blank\" rel=\"noopener\">https:\/\/www.ccn-cert.cni.es\/gl\/component\/content\/article\/1736-tabnabbing-nuevo-tipo-de-ataque-de-phishing.html?catid=23&amp;Itemid=11901<\/a><\/p>\n<p>Policia Nacional <a href=\"https:\/\/www.elconfidencial.com\/tecnologia\/2025-03-17\/1qrt-policia-explica-tabnabbing-alerta-nunca-debe-hacer-paginas-webs-comun-peligroso_4087645\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.elconfidencial.com\/tecnologia\/2025-03-17\/1qrt-policia-explica-tabnabbing-alerta-nunca-debe-hacer-paginas-webs-comun-peligroso_4087645\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; El nuevo malware se llama Tabnabbing, est\u00e1 generando una alerta justificada. \u00bfDe que se trata?, pues Tabnabbing es un t\u00e9rmino inform\u00e1tico para definir un tipo de phishing descrito en 2010 por Aza Raskin\u200b\u200b y que se basa en persuadir al usuario de insertar datos para entrar en cuentas, normalmente de correos o redes [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":2275,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[47,32,12],"tags":[29,36,46],"class_list":{"0":"post-2273","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-alertas","8":"category-consejos","9":"category-noticias","10":"tag-alertas","11":"tag-malware","12":"tag-phising","13":"entry"},"_links":{"self":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/2273","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/comments?post=2273"}],"version-history":[{"count":2,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/2273\/revisions"}],"predecessor-version":[{"id":2278,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/2273\/revisions\/2278"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media\/2275"}],"wp:attachment":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media?parent=2273"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/categories?post=2273"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/tags?post=2273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}