{"id":951,"date":"2019-02-14T09:30:11","date_gmt":"2019-02-14T08:30:11","guid":{"rendered":"https:\/\/blogs.ugr.es\/seguridadinformatica\/?p=951"},"modified":"2019-02-14T09:30:11","modified_gmt":"2019-02-14T08:30:11","slug":"el-centro-criptologico-nacional-advierte-sobre-la-fragmentacion-de-android","status":"publish","type":"post","link":"https:\/\/blogs.ugr.es\/seguridadinformatica\/el-centro-criptologico-nacional-advierte-sobre-la-fragmentacion-de-android\/","title":{"rendered":"El Centro Criptol\u00f3gico Nacional advierte sobre la fragmentaci\u00f3n de Android"},"content":{"rendered":"<p><a href=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/el-centro-criptologico-nacional-advierte-sobre-la-fragmentacion-de-android\/android\/\" rel=\"attachment wp-att-952\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-952\" src=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2019\/02\/Android.jpg\" alt=\"\" width=\"277\" height=\"185\" srcset=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2019\/02\/Android.jpg 718w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2019\/02\/Android-300x200.jpg 300w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2019\/02\/Android-700x467.jpg 700w\" sizes=\"auto, (max-width: 277px) 100vw, 277px\" \/><\/a><\/p>\n<p>Hoy os hago llegar un art\u00edculo que me parece interesante para todos los que teneis Android y que nos habla sobre la necesidad de actualiar el sistema operativo a las \u00faltimas versiones por seguridad. Aqui os dejo el <a href=\"https:\/\/www.muyseguridad.net\/2019\/02\/13\/el-centro-criptologico-nacional-advierte-sobre-la-fragmentacion-de-android\/\" target=\"_blank\" rel=\"noopener\">enlace .<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hoy os hago llegar un art\u00edculo que me parece interesante para todos los que teneis Android y que nos habla sobre la necesidad de actualiar el sistema operativo a las \u00faltimas versiones por seguridad. Aqui os dejo el enlace .<\/p>\n","protected":false},"author":27,"featured_media":952,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[32,12],"tags":[31,40,33,13,14,18],"class_list":{"0":"post-951","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-consejos","8":"category-noticias","9":"tag-android","10":"tag-byod","11":"tag-consejos","12":"tag-moviles","13":"tag-noticias","14":"tag-seguridad","15":"entry"},"_links":{"self":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/951","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/comments?post=951"}],"version-history":[{"count":3,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/951\/revisions"}],"predecessor-version":[{"id":955,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/951\/revisions\/955"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media\/952"}],"wp:attachment":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media?parent=951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/categories?post=951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/tags?post=951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}