{"id":14938,"date":"2019-04-02T09:17:42","date_gmt":"2019-04-02T15:17:42","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=14938"},"modified":"2019-04-02T09:17:42","modified_gmt":"2019-04-02T15:17:42","slug":"cibercriminales-usan-las-series-de-television-para-esconder-malware","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/","title":{"rendered":"Cibercriminales usan las series de televisi\u00f3n para esconder malware"},"content":{"rendered":"<p>Aunque son cada vez m\u00e1s las personas que optan por obtener sus\u00a0series de televisi\u00f3n,\u00a0pel\u00edculas\u00a0y m\u00fasica de manera legal, la\u00a0pirater\u00eda\u00a0y los sitios web de\u00a0descarga ilegal\u00a0por medio de\u00a0torrents\u00a0y otros m\u00e9todos se mantienen firmes.<!--more--><\/p>\n<p>Debido a que desde el punto de vista legal los sitios de torrents se encuentran en un\u00a0vac\u00edo, se han convertido en el \u00e1rea elegida por los\u00a0cibercriminales\u00a0para disfrazar\u00a0archivos maliciosos\u00a0como cosas \u00fatiles.<\/p>\n<p>De acuerdo con la compa\u00f1\u00eda de ciberseguridad\u00a0Kaspersky, las personas m\u00e1s f\u00e1ciles de enga\u00f1ar son aquellas que buscan\u00a0descargar software.<\/p>\n<p>Sin embargo, los criminales tambi\u00e9n buscan meter sus\u00a0programas maliciosos\u00a0en cualquier contenido que sea\u00a0popular\u00a0entre los usuarios, entre estos se encuentran las series de televisi\u00f3n.<\/p>\n<p>Ante esto, Kaspersky Lab se dispuso a analizar qu\u00e9 peligros puede traer la descarga de una serie popular como Game Of Thrones o The Walking Dead usando torrents.<\/p>\n<p>Para este\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/tv-series-threats\/26274\/\" target=\"_blank\" rel=\"noopener\">an\u00e1lisis<\/a>, la compa\u00f1\u00eda emple\u00f3 las clasificaciones de\u00a0IMDB\u00a0y\u00a0Rotten Tomatoes\u00a0para elegir 31 series de televisi\u00f3n.<\/p>\n<p>Por otra parte, se emplearon\u00a0estad\u00edsticas an\u00f3nimas del servicio en la\u00a0nube\u00a0Kaspersky Security Network\u00a0(KSN), de la que se obtuvieron datos de los\u00a0malwares infiltrados en los torrents de los shows televisivos.<\/p>\n<p>R\u00e1pidamente, los investigadores se dieron cuenta de que la serie m\u00e1s empleada por los estafadores es\u00a0Game of Thrones.<\/p>\n<p>De acuerdo con las estad\u00edsticas de\u00a0Kaspersky, fueron 9 mil 986 los\u00a0tipos de\u00a0malware\u00a0relacionados con dicho programa de TV que atacaron a los usuarios en 2018.<\/p>\n<p>Estos softwares maliciosos intentaron infectar las computadoras de los usuarios m\u00e1s de 120 mil veces. La compa\u00f1\u00eda puntualiz\u00f3 que esos datos se limitan a las personas que utilizan sus servicios, por lo que el n\u00famero total de ciberataques en el mundo podr\u00eda ser mucho mayor.<\/p>\n<p>La segunda serie que m\u00e1s apareci\u00f3 en los registros de Kaspersky fue\u00a0The Walking Dead, seguido porArrow.<\/p>\n<h5>\u00bfCu\u00e1les son los malwares m\u00e1s\u00a0usados?<\/h5>\n<p>Las estad\u00edsticas recogidas por la firma de ciberseguridad se\u00f1alan que el malware m\u00e1s empleado por los criminales es el\u00a0troyano WinLNK, que es capaz de descargar otro programa malicioso.<\/p>\n<p>Tambi\u00e9n es muy probable, apunta\u00a0Kaspersky, que el usuario que obtiene sus programas por la v\u00eda ilegal obtenga uno de los dos tipos de software conocido como \u201cno virus\u201d: los \u201cadware\u201d o programas de descarga.<\/p>\n<p>El software publicitario lanza anuncios cuando es posible, mientras que los \u201cdescargadores\u201d son el medio para obtener \u201cadware\u201d, o algo peor.<\/p>\n<h5>\u00bfC\u00f3mo saber que se ha descargado un malware?<\/h5>\n<p>La empresa de ciberseguridad advirti\u00f3 que de abril a mayo, el flujo de programas maliciosos infiltrados en series televisivas ser\u00e1 intenso.<\/p>\n<p>En primer lugar, se acerca la\u00a0temporada final\u00a0de Game Of Thrones, as\u00ed como la tercera de\u00a0Westworld, entre otros shows; hecho del que se aprovechar\u00e1n los cibercriminales.<\/p>\n<p>Para mantenerse a salvo, Kaspersky exhort\u00f3 a los usuarios no tratar con canales de distribuci\u00f3n ilegales y optar por las v\u00edas legales. \u201cS\u00ed, tienes que pagar por eso, pero es mucho m\u00e1s seguro\u201d, acot\u00f3.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Aunque son cada vez m\u00e1s las personas que optan por obtener sus\u00a0series de televisi\u00f3n,\u00a0pel\u00edculas\u00a0y m\u00fasica de manera legal, la\u00a0pirater\u00eda\u00a0y los sitios web de\u00a0descarga ilegal\u00a0por medio de\u00a0torrents\u00a0y otros m\u00e9todos se mantienen firmes.<\/p>\n","protected":false},"author":1,"featured_media":14939,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[383],"tags":[],"class_list":["post-14938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cibercriminales usan las series de televisi\u00f3n para esconder malware - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cibercriminales usan las series de televisi\u00f3n para esconder malware - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"Aunque son cada vez m\u00e1s las personas que optan por obtener sus\u00a0series de televisi\u00f3n,\u00a0pel\u00edculas\u00a0y m\u00fasica de manera legal, la\u00a0pirater\u00eda\u00a0y los sitios web de\u00a0descarga ilegal\u00a0por medio de\u00a0torrents\u00a0y otros m\u00e9todos se mantienen firmes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-02T15:17:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/04\/Notic.3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Cibercriminales usan las series de televisi\u00f3n para esconder malware\",\"datePublished\":\"2019-04-02T15:17:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/\"},\"wordCount\":536,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/04\/Notic.3.png\",\"articleSection\":[\"Cibersegur\u00eddad\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/\",\"name\":\"Cibercriminales usan las series de televisi\u00f3n para esconder malware - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/04\/Notic.3.png\",\"datePublished\":\"2019-04-02T15:17:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/04\/Notic.3.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/04\/Notic.3.png\",\"width\":600,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cibercriminales usan las series de televisi\u00f3n para esconder malware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cibercriminales usan las series de televisi\u00f3n para esconder malware - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/","og_locale":"en_US","og_type":"article","og_title":"Cibercriminales usan las series de televisi\u00f3n para esconder malware - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"Aunque son cada vez m\u00e1s las personas que optan por obtener sus\u00a0series de televisi\u00f3n,\u00a0pel\u00edculas\u00a0y m\u00fasica de manera legal, la\u00a0pirater\u00eda\u00a0y los sitios web de\u00a0descarga ilegal\u00a0por medio de\u00a0torrents\u00a0y otros m\u00e9todos se mantienen firmes.","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2019-04-02T15:17:42+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/04\/Notic.3.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Cibercriminales usan las series de televisi\u00f3n para esconder malware","datePublished":"2019-04-02T15:17:42+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/"},"wordCount":536,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/04\/Notic.3.png","articleSection":["Cibersegur\u00eddad"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/","name":"Cibercriminales usan las series de televisi\u00f3n para esconder malware - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/04\/Notic.3.png","datePublished":"2019-04-02T15:17:42+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/04\/Notic.3.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/04\/Notic.3.png","width":600,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/cibercriminales-usan-las-series-de-television-para-esconder-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Cibercriminales usan las series de televisi\u00f3n para esconder malware"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/14938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=14938"}],"version-history":[{"count":1,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/14938\/revisions"}],"predecessor-version":[{"id":14940,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/14938\/revisions\/14940"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/14939"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=14938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=14938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=14938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}