{"id":8737,"date":"2018-02-01T10:08:06","date_gmt":"2018-02-01T10:08:06","guid":{"rendered":"https:\/\/www.apen.es\/?p=8737"},"modified":"2025-03-04T10:08:15","modified_gmt":"2025-03-04T10:08:15","slug":"hackers-may-have-compromised-facebook-accounts-through-oculus","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/hackers-may-have-compromised-facebook-accounts-through-oculus\/","title":{"rendered":"Hackers may have compromised Facebook accounts through Oculus"},"content":{"rendered":"<p>Facebook&#039;s integration with Oculus virtual reality headsets could have opened the door for malicious attackers to hijack accounts by exploiting the latter if the social media giant had not fixed the vulnerabilities.<\/p>\n\n\n\n<p>Oculus, best known for its Oculus Rift virtual reality (VR) headsets, was founded in 2012. In March 2014, Facebook announced it would acquire Oculus VR, and the deal was completed in July 2014. In August 2014, Facebook included Oculus Rift in its bug bounty program for &quot;white hat&quot; hackers, offering money to researchers for reporting vulnerabilities. Since then, several vulnerabilities have been found in Oculus services, including a number of flaws that earned one researcher 1,400,000.<\/p>\n\n\n\n<p>In October of last year, Josip Franjkovic,&nbsp;<strong>A web security consultant decided to examine the Oculus application for Windows.<\/strong>, which allows users to connect their Facebook accounts for a more social experience through the use of the native Windows Oculus app and browsers.<\/p>\n\n\n\n<p>In his research,&nbsp;<strong>Franjkovic demonstrated how an attacker could hijack Facebook accounts using GraphQL queries<\/strong>&nbsp;specially designed to connect the victim&#039;s Facebook account to the attacker&#039;s Oculus account and obtain the&nbsp;<em>access_token<\/em>&nbsp;The attacker also has access to the victim&#039;s GraphQL endpoint. Using specially crafted GraphQL queries, the attacker can take control of the victim&#039;s Facebook account, change the phone number, and then reset the account password.<\/p>\n\n\n\n<p>Franjkovic reported the vulnerability to Facebook on October 24 under the company&#039;s bug bounty program, for which a temporary fix was released the same day involving disabling the&nbsp;<em>spot<\/em><em>&nbsp;final facebook_login_sso<\/em>.In addition, Facebook released a permanent patch on October 30.<\/p>\n\n\n\n<p>However, Franjkovic discovered a CSRF (cross-site request forgery) login vulnerability a few weeks later that could have been used to exploit the Facebook patch by redirecting the victim to an Oculus URL of the attacker&#039;s choosing.<\/p>\n\n\n\n<p>Franjkovic reported the second error on Facebook on November 18, for which a temporary fix was made the same day by disabling the endpoint again.&nbsp;<em>facebook_login_sso<\/em>.Three weeks later, the company released a full patch.<\/p>\n\n\n\n<p>Although Franjkovic did not disclose the amount of the rewards he received from Facebook for discovering the vulnerabilities, the social media giant revealed last week that it ended up paying $1,400,880,000 in bug bounties to security researchers in 2017. News written by No\u00e9 Cruz, founder and creator of the blog&nbsp;<strong><a href=\"http:\/\/www.1000tipsinformaticos.com\/\">1000 computer tips<\/a>.<\/strong><\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Facebook&#039;s integration with Oculus virtual reality headsets may have opened the door for attackers\u2026<\/p>","protected":false},"author":4,"featured_media":8740,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[47,88],"tags":[347,243,349,350,348],"class_list":["post-8737","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apen","category-web","tag-consultor-seguridad-web","tag-facebook","tag-hackers","tag-oculus","tag-tips-informaticos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers podr\u00edan haber vulnerado cuentas de Facebook a trav\u00e9s de Oculus - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"La integraci\u00f3n de Facebook con los cascos de realidad virtual Oculus podr\u00edan haber abierto las puertas para que los atacantes malintencionados\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/hackers-may-have-compromised-facebook-accounts-through-oculus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers podr\u00edan haber vulnerado cuentas de Facebook a trav\u00e9s de Oculus - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"La integraci\u00f3n de Facebook con los cascos de realidad virtual Oculus podr\u00edan haber abierto las puertas para que los atacantes malintencionados\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/hackers-may-have-compromised-facebook-accounts-through-oculus\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-01T10:08:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T10:08:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/foto_apen.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Hackers podr\u00edan haber vulnerado cuentas de Facebook a trav\u00e9s de Oculus\",\"datePublished\":\"2018-02-01T10:08:06+00:00\",\"dateModified\":\"2025-03-04T10:08:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/\"},\"wordCount\":508,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/foto_apen.jpg\",\"keywords\":[\"consultor seguridad web\",\"facebook\",\"hackers\",\"oculus\",\"tips informaticos\"],\"articleSection\":[\"Apen\",\"WEB\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/\",\"name\":\"Hackers podr\u00edan haber vulnerado cuentas de Facebook a trav\u00e9s de Oculus - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/foto_apen.jpg\",\"datePublished\":\"2018-02-01T10:08:06+00:00\",\"dateModified\":\"2025-03-04T10:08:15+00:00\",\"description\":\"La integraci\u00f3n de Facebook con los cascos de realidad virtual Oculus podr\u00edan haber abierto las puertas para que los atacantes malintencionados\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/foto_apen.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/foto_apen.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers podr\u00edan haber vulnerado cuentas de Facebook a trav\u00e9s de Oculus\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers may have compromised Facebook accounts through Oculus - Apen Inform\u00e1tica","description":"Facebook&#039;s integration with Oculus virtual reality headsets may have opened the door for malicious attackers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/hackers-may-have-compromised-facebook-accounts-through-oculus\/","og_locale":"en_US","og_type":"article","og_title":"Hackers podr\u00edan haber vulnerado cuentas de Facebook a trav\u00e9s de Oculus - Apen Inform\u00e1tica","og_description":"La integraci\u00f3n de Facebook con los cascos de realidad virtual Oculus podr\u00edan haber abierto las puertas para que los atacantes malintencionados","og_url":"https:\/\/www.apen.es\/en\/blog\/hackers-may-have-compromised-facebook-accounts-through-oculus\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2018-02-01T10:08:06+00:00","article_modified_time":"2025-03-04T10:08:15+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/foto_apen.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Hackers podr\u00edan haber vulnerado cuentas de Facebook a trav\u00e9s de Oculus","datePublished":"2018-02-01T10:08:06+00:00","dateModified":"2025-03-04T10:08:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/"},"wordCount":508,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/foto_apen.jpg","keywords":["consultor seguridad web","facebook","hackers","oculus","tips informaticos"],"articleSection":["Apen","WEB"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/","url":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/","name":"Hackers may have compromised Facebook accounts through Oculus - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/foto_apen.jpg","datePublished":"2018-02-01T10:08:06+00:00","dateModified":"2025-03-04T10:08:15+00:00","description":"Facebook&#039;s integration with Oculus virtual reality headsets may have opened the door for malicious attackers.","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/foto_apen.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/foto_apen.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/hackers-podrian-haber-vulnerado-cuentas-de-facebook-a-traves-de-oculus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Hackers podr\u00edan haber vulnerado cuentas de Facebook a trav\u00e9s de Oculus"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":47,"label":"Apen"},{"value":88,"label":"WEB"}],"post_tag":[{"value":347,"label":"consultor seguridad web"},{"value":243,"label":"facebook"},{"value":349,"label":"hackers"},{"value":350,"label":"oculus"},{"value":348,"label":"tips informaticos"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2018\/02\/foto_apen.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":88,"name":"WEB","slug":"web","term_group":0,"term_taxonomy_id":88,"taxonomy":"category","description":"","parent":0,"count":121,"filter":"raw","term_order":"0","cat_ID":88,"category_count":121,"category_description":"","cat_name":"WEB","category_nicename":"web","category_parent":0}],"tag_info":[{"term_id":347,"name":"consultor seguridad web","slug":"consultor-seguridad-web","term_group":0,"term_taxonomy_id":347,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":243,"name":"facebook","slug":"facebook","term_group":0,"term_taxonomy_id":243,"taxonomy":"post_tag","description":"","parent":0,"count":5,"filter":"raw","term_order":"0"},{"term_id":349,"name":"hackers","slug":"hackers","term_group":0,"term_taxonomy_id":349,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":350,"name":"oculus","slug":"oculus","term_group":0,"term_taxonomy_id":350,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"},{"term_id":348,"name":"tips informaticos","slug":"tips-informaticos","term_group":0,"term_taxonomy_id":348,"taxonomy":"post_tag","description":"","parent":0,"count":1,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/8737","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=8737"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/8737\/revisions"}],"predecessor-version":[{"id":54052,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/8737\/revisions\/54052"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/8740"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=8737"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=8737"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=8737"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}