{"id":1928,"date":"2014-01-14T20:28:24","date_gmt":"2014-01-14T20:28:24","guid":{"rendered":"http:\/\/kasperskydaily.com\/mexico\/?p=1928"},"modified":"2017-10-13T09:42:36","modified_gmt":"2017-10-13T15:42:36","slug":"2014-en-ciberseguridad-un-pronostico","status":"publish","type":"post","link":"https:\/\/latam.kaspersky.com\/blog\/2014-en-ciberseguridad-un-pronostico\/1928\/","title":{"rendered":"2014 En Ciberseguridad: Un Pron\u00f3stico"},"content":{"rendered":"<p>El 2014 ser\u00e1 un a\u00f1o muy importante en el desarrollo de nuevas amenazas a la ciberseguridad. Est\u00e1s amenazas estar\u00e1n relacionadas con el espionaje comercial y con las nuevas formas de ataques dirigidos a los usuarios.<\/p>\n<p><a href=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/87\/2014\/01\/05213129\/ig-cybersecurity-2014-PNG.png\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-1929\" alt=\"ig-cybersecurity-2014 PNG\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/87\/2014\/01\/05213129\/ig-cybersecurity-2014-PNG.png\" width=\"3328\" height=\"4302\"><\/a><\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: right\">Traducido por:\u00a0Guillermo Vidal Quinteiro<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El 2014 ser\u00e1 un a\u00f1o muy importante en el desarrollo de nuevas amenazas a la ciberseguridad. Est\u00e1s amenazas estar\u00e1n relacionadas con el espionaje comercial y con las nuevas formas de<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[640,638,115,427,484,639,645,118,34,637],"class_list":{"0":"post-1928","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-tips","7":"tag-640","8":"tag-amenazas","9":"tag-antivirus","10":"tag-ataques","11":"tag-espionaje","12":"tag-estado","13":"tag-guillermo-vidal-quinteiro","14":"tag-infografia","15":"tag-malware-2","16":"tag-pronostico"},"hreflang":[{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/2014-en-ciberseguridad-un-pronostico\/1928\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/latam.kaspersky.com\/blog\/tag\/2014\/","name":"2014"},"_links":{"self":[{"href":"https:\/\/latam.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/latam.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/latam.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/latam.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/latam.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=1928"}],"version-history":[{"count":1,"href":"https:\/\/latam.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1928\/revisions"}],"predecessor-version":[{"id":11504,"href":"https:\/\/latam.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/1928\/revisions\/11504"}],"wp:attachment":[{"href":"https:\/\/latam.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=1928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/latam.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=1928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/latam.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=1928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}