{"id":8472,"date":"2017-12-21T10:29:51","date_gmt":"2017-12-21T10:29:51","guid":{"rendered":"https:\/\/www.apen.es\/?p=8472"},"modified":"2025-03-04T10:13:59","modified_gmt":"2025-03-04T10:13:59","slug":"google-adverteix-als-usuaris-dels-metodes-mes-usats-pels-hakers-per-entrar-al-teu-compte-de-gmail","status":"publish","type":"post","link":"https:\/\/www.apen.es\/ca\/bloc\/google-adverteix-als-usuaris-dels-metodes-mes-usats-pels-hakers-per-entrar-al-teu-compte-de-gmail\/","title":{"rendered":"Google adverteix els usuaris dels m\u00e8todes m\u00e9s utilitzats pels hakers per entrar al vostre compte de Gmail"},"content":{"rendered":"<p>Google, amb la col\u00b7laboraci\u00f3 amb la Universitat de Calif\u00f2rnia, ha estudiat l&#039;ecosistema de robatori i compravenda de credencials en mercats negres d&#039;Internet profund. enviar-lo a un servidor extern que est\u00e0 controlat pel propi hacker.<\/p>\n\n\n\n<p>Aquesta pr\u00e0ctica que utilitzen els ciberdelinq\u00fcents, per enganyar l&#039;usuari perqu\u00e8 introdueixi les seves dades en una web controlada pel mateix atacant, s&#039;anomena pishing. Es tracta de la major amena\u00e7a per als usuaris, seguida pels keyloggers i les bretxes de seguretat en serveis de tercers. Els usuaris deixen el seu rastre a Internet a molts llocs, la seva empremta digital es pot veure reflectida en xarxes socials, formularis, registres financers, fotografies o arxius publicats al n\u00favol.<\/p>\n\n\n\n<p>Sovint, l&#039;acc\u00e9s per entrar a totes aquestes finestres en l\u00ednia \u00e9s a trav\u00e9s del nostre correu electr\u00f2nic i una contrasenya, que de vegades acostuma a ser poc segura per a aquest tipus de riscos. De fet, un ciberdelinq\u00fcent pot trobar la nostra contrasenya en cas que no sigui massa segura o b\u00e9 a trav\u00e9s de les preguntes de seguretat necess\u00e0ries, que et permeten trobar o restaurar la contrasenya. Un cop han entrat amb les teves dades, ja tenen accessos a les teves dades banc\u00e0ries, els teus fitxers personals, etc.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" width=\"960\" height=\"600\" src=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/google-76517_960_720.png\" alt=\"\" class=\"wp-image-8478\" srcset=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/google-76517_960_720.png 960w, https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/google-76517_960_720-300x188.png 300w, https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/google-76517_960_720-768x480.png 768w\" sizes=\"auto, (max-width: 960px) 100vw, 960px\" \/><\/figure>\n<\/div>\n\n\n<h2 class=\"wp-block-heading\">Augmenta la seguretat inform\u00e0tica<\/h2>\n\n\n\n<p>La verificaci\u00f3 en dos passos \u00e9s la forma m\u00e9s efica\u00e7 i immediata, juntament amb les mesures de seguretat complement\u00e0ries, que promouen serveis com Gmail i que poden ajudar a evitar el segrest immediat dels comptes, per\u00f2 moltes vegades no n&#039;hi ha prou. Els ciberdelinq\u00fcents poden tenir eines de tota mena, preparades per interceptar els SMS de la verificaci\u00f3 en dos passos o b\u00e9 la geolocalitzaci\u00f3 pr\u00f2pia del dispositiu.<\/p>\n\n\n\n<p>Per aix\u00f2, \u00e9s m\u00e9s recomanable utilitzar m\u00e8todes d&#039;autenticaci\u00f3 m\u00e9s espec\u00edfics com ara Google Authenticator oa trav\u00e9s de l&#039;app de Twitter. Per\u00f2 si vols augmentar la seguretat pots optar per les noves opcions que ofereix per exemple el sistema de reconeixement facial o lectors d&#039;empremta dactilar, que podem trobar per exemple al nou iPhone X.<\/p>","protected":false},"excerpt":{"rendered":"<p>Google, con la colaboraci\u00f3n con la Universidad de California, ha estudiado el ecosistema de robo y compraventa de credenciales en&#8230;<\/p>","protected":false},"author":4,"featured_media":8473,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[47,147,149,194,88],"tags":[173,324,152,323,73,325],"class_list":["post-8472","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apen","category-ciberataques","category-copia-de-seguridad","category-seguridad","category-web","tag-gmail","tag-hacker","tag-privacidad","tag-seguridad","tag-seguridad-informatica","tag-servicios-de-seguridad"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Google, con la colaboraci\u00f3n con la Universidad de California, ha estudiado el ecosistema de robo y compraventa de credenciales en mercados negros de\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/ca\/bloc\/google-adverteix-als-usuaris-dels-metodes-mes-usats-pels-hakers-per-entrar-al-teu-compte-de-gmail\/\" \/>\n<meta property=\"og:locale\" content=\"ca_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Google, con la colaboraci\u00f3n con la Universidad de California, ha estudiado el ecosistema de robo y compraventa de credenciales en mercados negros de\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/ca\/bloc\/google-adverteix-als-usuaris-dels-metodes-mes-usats-pels-hakers-per-entrar-al-teu-compte-de-gmail\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2017-12-21T10:29:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T10:13:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrit per\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Temps estimat de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minuts\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail\",\"datePublished\":\"2017-12-21T10:29:51+00:00\",\"dateModified\":\"2025-03-04T10:13:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/\"},\"wordCount\":422,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/apen-1.jpg\",\"keywords\":[\"Gmail\",\"hacker\",\"Privacidad\",\"seguridad\",\"Seguridad inform\u00e1tica\",\"servicios de seguridad\"],\"articleSection\":[\"Apen\",\"Ciberataques\",\"Copia de seguridad\",\"Seguridad\",\"WEB\"],\"inLanguage\":\"ca\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/\",\"name\":\"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/apen-1.jpg\",\"datePublished\":\"2017-12-21T10:29:51+00:00\",\"dateModified\":\"2025-03-04T10:13:59+00:00\",\"description\":\"Google, con la colaboraci\u00f3n con la Universidad de California, ha estudiado el ecosistema de robo y compraventa de credenciales en mercados negros de\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#breadcrumb\"},\"inLanguage\":\"ca\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/apen-1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2017\\\/12\\\/apen-1.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ca\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ca\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/ca\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Google adverteix els usuaris dels m\u00e8todes m\u00e9s usats pels hakers per entrar al teu compte de Gmail - Apen Inform\u00e0tica","description":"Google, amb la col\u00b7laboraci\u00f3 amb la Universitat de Calif\u00f2rnia, ha estudiat l&#039;ecosistema de robatori i compravenda de credencials en mercats negres de","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/ca\/bloc\/google-adverteix-als-usuaris-dels-metodes-mes-usats-pels-hakers-per-entrar-al-teu-compte-de-gmail\/","og_locale":"ca_ES","og_type":"article","og_title":"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail - Apen Inform\u00e1tica","og_description":"Google, con la colaboraci\u00f3n con la Universidad de California, ha estudiado el ecosistema de robo y compraventa de credenciales en mercados negros de","og_url":"https:\/\/www.apen.es\/ca\/bloc\/google-adverteix-als-usuaris-dels-metodes-mes-usats-pels-hakers-per-entrar-al-teu-compte-de-gmail\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2017-12-21T10:29:51+00:00","article_modified_time":"2025-03-04T10:13:59+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Escrit per":"marqueting","Temps estimat de lectura":"2 minuts"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail","datePublished":"2017-12-21T10:29:51+00:00","dateModified":"2025-03-04T10:13:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/"},"wordCount":422,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg","keywords":["Gmail","hacker","Privacidad","seguridad","Seguridad inform\u00e1tica","servicios de seguridad"],"articleSection":["Apen","Ciberataques","Copia de seguridad","Seguridad","WEB"],"inLanguage":"ca"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/","url":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/","name":"Google adverteix els usuaris dels m\u00e8todes m\u00e9s usats pels hakers per entrar al teu compte de Gmail - Apen Inform\u00e0tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg","datePublished":"2017-12-21T10:29:51+00:00","dateModified":"2025-03-04T10:13:59+00:00","description":"Google, amb la col\u00b7laboraci\u00f3 amb la Universitat de Calif\u00f2rnia, ha estudiat l&#039;ecosistema de robatori i compravenda de credencials en mercats negres de","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#breadcrumb"},"inLanguage":"ca","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/"]}]},{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/google-advierte-a-los-usuarios-de-los-metodos-mas-usados-por-los-hakers-para-entrar-en-tu-cuenta-de-gmail\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Google advierte a los usuarios de los m\u00e9todos m\u00e1s usados por los \u201chakers\u201d para entrar en tu cuenta de Gmail"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e0tica","description":"Manteniment inform\u00e0tic , programari de gesti\u00f3, solucions d&#039;impressi\u00f3","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ca"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: Solucions inform\u00e0tiques","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"m\u00e0rqueting","image":{"@type":"ImageObject","inLanguage":"ca","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/ca\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":47,"label":"Apen"},{"value":147,"label":"Ciberataques"},{"value":149,"label":"Copia de seguridad"},{"value":194,"label":"Seguridad"},{"value":88,"label":"WEB"}],"post_tag":[{"value":173,"label":"Gmail"},{"value":324,"label":"hacker"},{"value":152,"label":"Privacidad"},{"value":323,"label":"seguridad"},{"value":73,"label":"Seguridad inform\u00e1tica"},{"value":325,"label":"servicios de seguridad"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2017\/12\/apen-1.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/ca\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":147,"name":"Ciberataques","slug":"ciberataques","term_group":0,"term_taxonomy_id":147,"taxonomy":"category","description":"","parent":0,"count":42,"filter":"raw","term_order":"0","cat_ID":147,"category_count":42,"category_description":"","cat_name":"Ciberataques","category_nicename":"ciberataques","category_parent":0},{"term_id":149,"name":"Copia de seguridad","slug":"copia-de-seguridad","term_group":0,"term_taxonomy_id":149,"taxonomy":"category","description":"","parent":0,"count":19,"filter":"raw","term_order":"0","cat_ID":149,"category_count":19,"category_description":"","cat_name":"Copia de seguridad","category_nicename":"copia-de-seguridad","category_parent":0},{"term_id":194,"name":"Seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":194,"taxonomy":"category","description":"","parent":0,"count":49,"filter":"raw","term_order":"0","cat_ID":194,"category_count":49,"category_description":"","cat_name":"Seguridad","category_nicename":"seguridad","category_parent":0},{"term_id":88,"name":"WEB","slug":"web","term_group":0,"term_taxonomy_id":88,"taxonomy":"category","description":"","parent":0,"count":121,"filter":"raw","term_order":"0","cat_ID":88,"category_count":121,"category_description":"","cat_name":"WEB","category_nicename":"web","category_parent":0}],"tag_info":[{"term_id":173,"name":"Gmail","slug":"gmail","term_group":0,"term_taxonomy_id":173,"taxonomy":"post_tag","description":"","parent":0,"count":2,"filter":"raw","term_order":"0"},{"term_id":324,"name":"hacker","slug":"hacker","term_group":0,"term_taxonomy_id":324,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":152,"name":"Privacidad","slug":"privacidad","term_group":0,"term_taxonomy_id":152,"taxonomy":"post_tag","description":"","parent":0,"count":5,"filter":"raw","term_order":"0"},{"term_id":323,"name":"seguridad","slug":"seguridad","term_group":0,"term_taxonomy_id":323,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw","term_order":"0"},{"term_id":73,"name":"Seguridad inform\u00e1tica","slug":"seguridad-informatica","term_group":0,"term_taxonomy_id":73,"taxonomy":"post_tag","description":"","parent":0,"count":28,"filter":"raw","term_order":"0"},{"term_id":325,"name":"servicios de seguridad","slug":"servicios-de-seguridad","term_group":0,"term_taxonomy_id":325,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/8472","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/comments?post=8472"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/8472\/revisions"}],"predecessor-version":[{"id":54061,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/posts\/8472\/revisions\/54061"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/media\/8473"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/media?parent=8472"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/categories?post=8472"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/ca\/wp-json\/wp\/v2\/tags?post=8472"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}