{"id":5557,"date":"2016-11-03T08:28:03","date_gmt":"2016-11-03T08:28:03","guid":{"rendered":"https:\/\/www.apen.es\/?p=5557"},"modified":"2025-03-04T11:44:51","modified_gmt":"2025-03-04T11:44:51","slug":"tipologias-de-virus-informatico","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/tipologias-de-virus-informatico\/","title":{"rendered":"Types of computer viruses"},"content":{"rendered":"<h2 class=\"wp-block-heading\">Types of viruses<\/h2>\n\n\n\n<p>In today&#039;s article, we&#039;ll explain the different types of viruses that can jeopardize the health of our computers and our data. At APEN, we have all the necessary computer security and maintenance mechanisms to prevent these real and increasingly common threats from affecting your company&#039;s IT system.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Trojans<\/h4>\n\n\n\n<p>The goal of these viruses is to gather valuable information from our computers by extracting, or rather, stealing, private data such as passwords and bank account details. In the past, these malicious programs entered our computers through viruses, but now it&#039;s common to see computers infected with Trojans through programs or files downloaded from the internet: software, video games, movies, etc.<\/p>\n\n\n\n<p>Many Trojans are installed using phishing techniques, which involve tricking users into believing they are downloading a legitimate program from a fraudulent website that perfectly mimics the original. In reality, they are unknowingly downloading malware from the enemy&#039;s site. In most cases, users access these dangerous websites through links provided in fraudulent emails. With phishing, cybercriminals are not only infecting victims&#039; computers but also impersonating a company or brand to gain credibility, resulting in a double crime.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Earthworms or worms<\/h4>\n\n\n\n<p>This virus attempts to overwhelm your computer with malicious files. This type of virus multiplies, hence its name, as it reproduces like a worm infestation. It floods your computer with thousands of files, consuming resources and severely impacting its performance.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Virus Bomb<\/h4>\n\n\n\n<p>These viruses explode at the moment the cybercriminal decided when creating them. It&#039;s possible that the virus affecting us right now was installed on our computer long before.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Keylogger<\/h4>\n\n\n\n<p>This virus &quot;reads and records&quot; the keys pressed on our computer, allowing cybercriminals to obtain passwords for our social media profiles, security systems, and bank account usernames and passwords. This virus does not affect the computer&#039;s functionality, so we can sometimes be infected without realizing it. Its sole purpose is to record keystrokes in order to steal passwords.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Zombie Virus<\/h4>\n\n\n\n<p>Our computer can be used by third parties if it&#039;s infected with a zombie virus\u2026 and be careful, as it will likely be used to spread malware online. Mass, fraudulent emails will be sent from our computer. This is a very dangerous virus because it not only affects our computer, but many others, often under the victim&#039;s name.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The best thing about computer maintenance is prevention.<\/h2>\n\n\n\n<p>Having a good antivirus program, regularly scanning your computer files, applying security protocols such as frequently changing passwords, and storing vital information on high-security hard drives are some of the tips we offer at APEN. In addition, our IT company offers prevention and IT maintenance plans for all types of businesses starting at \u20ac10\/month. Contact us and get a quote.<\/p>","protected":false},"excerpt":{"rendered":"<p>Types of Viruses In today&#039;s article we&#039;re going to explain the different types of viruses that can infect\u2026<\/p>","protected":false},"author":4,"featured_media":5558,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[47,66],"tags":[100,103,99,68,102,104,98,101],"class_list":["post-5557","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apen","category-mantenimiento-informatico","tag-keylogger","tag-mantenimiento-de-prevencion","tag-tipos-de-virus","tag-troyanos","tag-virus-bomba","tag-virus-de-lombriz-o-gusano","tag-virus-informatico","tag-virus-zombie"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Tipolog\u00edas de virus inform\u00e1tico - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"Los tipos de virus En el art\u00edculo de hoy vamos a explicar las diferentes tipolog\u00edas de virus que pueden poner en riesgo la salud de nuestros ordenadores y\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/tipologias-de-virus-informatico\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tipolog\u00edas de virus inform\u00e1tico - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"Los tipos de virus En el art\u00edculo de hoy vamos a explicar las diferentes tipolog\u00edas de virus que pueden poner en riesgo la salud de nuestros ordenadores y\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/tipologias-de-virus-informatico\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-03T08:28:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T11:44:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/11\/VIRUS-OK.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Tipolog\u00edas de virus inform\u00e1tico\",\"datePublished\":\"2016-11-03T08:28:03+00:00\",\"dateModified\":\"2025-03-04T11:44:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/\"},\"wordCount\":593,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/VIRUS-OK.jpg\",\"keywords\":[\"keylogger\",\"mantenimiento de prevenci\u00f3n\",\"tipos de virus\",\"Troyanos\",\"virus bomba\",\"virus de lombriz o gusano\",\"virus inform\u00e1tico\",\"virus zombie\"],\"articleSection\":[\"Apen\",\"Mantenimiento inform\u00e1tico\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/\",\"name\":\"Tipolog\u00edas de virus inform\u00e1tico - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/VIRUS-OK.jpg\",\"datePublished\":\"2016-11-03T08:28:03+00:00\",\"dateModified\":\"2025-03-04T11:44:51+00:00\",\"description\":\"Los tipos de virus En el art\u00edculo de hoy vamos a explicar las diferentes tipolog\u00edas de virus que pueden poner en riesgo la salud de nuestros ordenadores y\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/VIRUS-OK.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/11\\\/VIRUS-OK.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/tipologias-de-virus-informatico\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tipolog\u00edas de virus inform\u00e1tico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Types of computer viruses - Apen Informatics","description":"Types of Viruses In today&#039;s article we will explain the different types of viruses that can put the health of our computers at risk and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/tipologias-de-virus-informatico\/","og_locale":"en_US","og_type":"article","og_title":"Tipolog\u00edas de virus inform\u00e1tico - Apen Inform\u00e1tica","og_description":"Los tipos de virus En el art\u00edculo de hoy vamos a explicar las diferentes tipolog\u00edas de virus que pueden poner en riesgo la salud de nuestros ordenadores y","og_url":"https:\/\/www.apen.es\/en\/blog\/tipologias-de-virus-informatico\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2016-11-03T08:28:03+00:00","article_modified_time":"2025-03-04T11:44:51+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/11\/VIRUS-OK.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Tipolog\u00edas de virus inform\u00e1tico","datePublished":"2016-11-03T08:28:03+00:00","dateModified":"2025-03-04T11:44:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/"},"wordCount":593,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/11\/VIRUS-OK.jpg","keywords":["keylogger","mantenimiento de prevenci\u00f3n","tipos de virus","Troyanos","virus bomba","virus de lombriz o gusano","virus inform\u00e1tico","virus zombie"],"articleSection":["Apen","Mantenimiento inform\u00e1tico"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/","url":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/","name":"Types of computer viruses - Apen Informatics","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/11\/VIRUS-OK.jpg","datePublished":"2016-11-03T08:28:03+00:00","dateModified":"2025-03-04T11:44:51+00:00","description":"Types of Viruses In today&#039;s article we will explain the different types of viruses that can put the health of our computers at risk and","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/11\/VIRUS-OK.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/11\/VIRUS-OK.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/tipologias-de-virus-informatico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Tipolog\u00edas de virus inform\u00e1tico"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":47,"label":"Apen"},{"value":66,"label":"Mantenimiento inform\u00e1tico"}],"post_tag":[{"value":100,"label":"keylogger"},{"value":103,"label":"mantenimiento de prevenci\u00f3n"},{"value":99,"label":"tipos de virus"},{"value":68,"label":"Troyanos"},{"value":102,"label":"virus bomba"},{"value":104,"label":"virus de lombriz o gusano"},{"value":98,"label":"virus inform\u00e1tico"},{"value":101,"label":"virus zombie"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2016\/11\/VIRUS-OK.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":66,"name":"Mantenimiento inform\u00e1tico","slug":"mantenimiento-informatico","term_group":0,"term_taxonomy_id":66,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","term_order":"0","cat_ID":66,"category_count":78,"category_description":"","cat_name":"Mantenimiento inform\u00e1tico","category_nicename":"mantenimiento-informatico","category_parent":0}],"tag_info":[{"term_id":100,"name":"keylogger","slug":"keylogger","term_group":0,"term_taxonomy_id":100,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":103,"name":"mantenimiento de prevenci\u00f3n","slug":"mantenimiento-de-prevencion","term_group":0,"term_taxonomy_id":103,"taxonomy":"post_tag","description":"","parent":0,"count":3,"filter":"raw","term_order":"0"},{"term_id":99,"name":"tipos de virus","slug":"tipos-de-virus","term_group":0,"term_taxonomy_id":99,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":68,"name":"Troyanos","slug":"troyanos","term_group":0,"term_taxonomy_id":68,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw","term_order":"0"},{"term_id":102,"name":"virus bomba","slug":"virus-bomba","term_group":0,"term_taxonomy_id":102,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":104,"name":"virus de lombriz o gusano","slug":"virus-de-lombriz-o-gusano","term_group":0,"term_taxonomy_id":104,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":98,"name":"virus inform\u00e1tico","slug":"virus-informatico","term_group":0,"term_taxonomy_id":98,"taxonomy":"post_tag","description":"","parent":0,"count":9,"filter":"raw","term_order":"0"},{"term_id":101,"name":"virus zombie","slug":"virus-zombie","term_group":0,"term_taxonomy_id":101,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/5557","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=5557"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/5557\/revisions"}],"predecessor-version":[{"id":54173,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/5557\/revisions\/54173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/5558"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=5557"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=5557"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=5557"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}