{"id":17249,"date":"2019-07-24T08:24:39","date_gmt":"2019-07-24T14:24:39","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=17249"},"modified":"2019-07-24T08:24:49","modified_gmt":"2019-07-24T14:24:49","slug":"detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/","title":{"rendered":"Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas"},"content":{"rendered":"<p><strong>Google retir\u00f3 siete aplicaciones<\/strong><span>\u00a0<\/span>del Play Store\u00a0luego de que la compa\u00f1\u00eda de ciberseguridad Avast le\u00a0alertara sobre sus funciones:\u00a0<strong>estaban dise\u00f1adas para espiar y monitorizar la actividad m\u00f3vil\u00a0de otras personas.<\/strong><!--more--><\/p>\n<p>Seg\u00fan inform\u00f3 Avast, las apps<span>\u00a0<\/span><strong>fueron instaladas m\u00e1s de 130.000 veces<span>\u00a0<\/span><\/strong>y estaban hechas para<span>\u00a0<\/span><strong>acceder a la ubicaci\u00f3n<\/strong><span>\u00a0<\/span>del due\u00f1o del celular,<span>\u00a0<\/span><strong>tomar\u00a0informaci\u00f3n de sus contactos, acceder al contenido de mensajes y al historial de llamadas.<\/strong><\/p>\n<p>Para hacer uso de estas aplicaciones, la persona que iba a espiar los contenidos<span>\u00a0<\/span><strong>deb\u00eda tener acceso al Smartphone\u00a0de la v\u00edctima<\/strong><span>\u00a0<\/span>para instalarlas directamente desde la Play Store. Luego, la persona recib\u00eda un mail con un link para realizar el seguimiento de la actividad del due\u00f1o del celular.<\/p>\n<p>Para camuflar la actividad de espionaje, las propias aplicaciones explicaban al usuario c\u00f3mo hacer desaparecer su rastro del celular de la v\u00edctima, que\u00a0no es consciente de lo que ocurre ya que las aplicaciones no instalan un icono de acceso.<\/p>\n<p><mark>Las aplicaciones que fueron retiradas de Google Play<\/mark><\/p>\n<p>-Track Employees Check Work Phone Online Spy Free<\/p>\n<p>-Spy Kids Tracker<\/p>\n<p>-Phone Cell Tracker<\/p>\n<p>-Mobile Tracking<\/p>\n<p>-Spy Tracker<\/p>\n<p>-SMS Tracker<\/p>\n<p>-Employee Work Spy<\/p>\n<p><strong>Fuente: Via El Pais<\/strong><\/p>\n<p><em>Redacci\u00f3n de V\u00eda Pa\u00eds. (2019, 22 julio). Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas. Recuperado 24 julio, 2019, de https:\/\/viapais.com.ar\/argentina\/1158195-detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Google retir\u00f3 siete aplicaciones\u00a0del Play Store\u00a0luego de que la compa\u00f1\u00eda de ciberseguridad Avast le\u00a0alertara sobre sus funciones:\u00a0estaban dise\u00f1adas para espiar y monitorizar la actividad m\u00f3vil\u00a0de otras personas.<\/p>\n","protected":false},"author":1,"featured_media":17250,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[383],"tags":[],"class_list":["post-17249","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"Google retir\u00f3 siete aplicaciones\u00a0del Play Store\u00a0luego de que la compa\u00f1\u00eda de ciberseguridad Avast le\u00a0alertara sobre sus funciones:\u00a0estaban dise\u00f1adas para espiar y monitorizar la actividad m\u00f3vil\u00a0de otras personas.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-24T14:24:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-24T14:24:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/07\/Notic.3-8.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas\",\"datePublished\":\"2019-07-24T14:24:39+00:00\",\"dateModified\":\"2019-07-24T14:24:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/\"},\"wordCount\":246,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/07\/Notic.3-8.jpg\",\"articleSection\":[\"Cibersegur\u00eddad\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/\",\"name\":\"Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/07\/Notic.3-8.jpg\",\"datePublished\":\"2019-07-24T14:24:39+00:00\",\"dateModified\":\"2019-07-24T14:24:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/07\/Notic.3-8.jpg\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/07\/Notic.3-8.jpg\",\"width\":600,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/","og_locale":"en_US","og_type":"article","og_title":"Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"Google retir\u00f3 siete aplicaciones\u00a0del Play Store\u00a0luego de que la compa\u00f1\u00eda de ciberseguridad Avast le\u00a0alertara sobre sus funciones:\u00a0estaban dise\u00f1adas para espiar y monitorizar la actividad m\u00f3vil\u00a0de otras personas.","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2019-07-24T14:24:39+00:00","article_modified_time":"2019-07-24T14:24:49+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/07\/Notic.3-8.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas","datePublished":"2019-07-24T14:24:39+00:00","dateModified":"2019-07-24T14:24:49+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/"},"wordCount":246,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/07\/Notic.3-8.jpg","articleSection":["Cibersegur\u00eddad"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/","name":"Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/07\/Notic.3-8.jpg","datePublished":"2019-07-24T14:24:39+00:00","dateModified":"2019-07-24T14:24:49+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/07\/Notic.3-8.jpg","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/07\/Notic.3-8.jpg","width":600,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/detectaron-siete-aplicaciones-disenadas-para-espiar-celulares-de-otras-personas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Detectaron siete aplicaciones dise\u00f1adas para espiar celulares de otras personas"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17249","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=17249"}],"version-history":[{"count":2,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17249\/revisions"}],"predecessor-version":[{"id":17252,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17249\/revisions\/17252"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/17250"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=17249"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=17249"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=17249"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}