{"id":17701,"date":"2019-08-13T09:07:34","date_gmt":"2019-08-13T15:07:34","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=17701"},"modified":"2019-08-13T09:07:43","modified_gmt":"2019-08-13T15:07:43","slug":"hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/","title":{"rendered":"Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras"},"content":{"rendered":"<p>Todos hemos visto los \u201ccables USB\u201d que venden en la calle para cargar nuestro tel\u00e9fono o Tablet. Tal vez piensas que no pasa nada al comprarlo y te ahorras unos cuantos pesos, pero piensa esto dos veces porque se encontr\u00f3 que los hackers podr\u00edan tomar el control de tu tel\u00e9fono y de las computadoras donde lo conectes con ayuda de estos cables.<!--more--><\/p>\n<p>De acuerdo a un reporte de<span>\u00a0<\/span><em>Motherboard<\/em>,<span>\u00a0<\/span><strong>un pirata cibern\u00e9tico logr\u00f3 tomar el control de un iPhone y una Mac a trav\u00e9s de un cable Lightning.<\/strong><span>\u00a0<\/span>\u201cParece un cable leg\u00edtimo y funciona igual que uno. Ni siquiera su computadora notar\u00e1 una diferencia. Hasta que yo, como hacker, tome el control de forma inal\u00e1mbrica del cable\u201d, explic\u00f3 l investigador de seguridad conocido como MG que tambi\u00e9n es fabricante de los cables.<\/p>\n<p>Los especialistas construyen estos cables a partir de una herramienta llamada O.MG Cable, la cual cambia los objetivos de su sistema por uno malicioso. MG sugiri\u00f3 que incluso puede dar la versi\u00f3n maliciosa como un regalo para el objetivo; y nadie lo nota porque estos cables incluso vienen con piezas originales.<\/p>\n<p>&nbsp;<\/p>\n<p>El cable viene con varias cargas \u00fatiles, o scripts y comandos que un atacante puede ejecutar en la m\u00e1quina de la v\u00edctima. Un hacker tambi\u00e9n puede \u201cmatar\u201d de forma remota el implante USB, con la esperanza de ocultar alguna evidencia de su uso o existencia.<\/p>\n<blockquote><p>\u201cAl final, pude crear el 100 por ciento del implante y luego integrarlo en un cable. Y estos prototipos en DefCon se hicieron principalmente de la misma manera\u201d, dijo. MG se\u00f1al\u00f3 a otros investigadores que trabajaron en el implante y la interfaz gr\u00e1fica de usuario.<\/p><\/blockquote>\n<p>Antes de que se espanten, estos cables no son baratos, cuestan aproximadamente 200 d\u00f3lares cada uno, as\u00ed que es poco probable que sea de los que encuentran de venta en la calle o el metro.<\/p>\n<p><strong>Fuente:\u00a0<\/strong><\/p>\n<p><em>Edgar Olivares, E. O. (2019, 12 agosto). Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras &#8211; C\u00c3\u00b3digo Espagueti. Recuperado 13 agosto, 2019, de https:\/\/codigoespagueti.com\/noticias\/tecnologia\/hackers-cables-piratas-secuestrar-telefonos-las-computadoras\/<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Todos hemos visto los \u201ccables USB\u201d que venden en la calle para cargar nuestro tel\u00e9fono o Tablet. Tal vez piensas que no pasa nada al comprarlo y te ahorras unos cuantos pesos, pero piensa esto dos veces porque se encontr\u00f3 que los hackers podr\u00edan tomar el control de tu tel\u00e9fono y de las computadoras donde [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":17702,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[383],"tags":[],"class_list":["post-17701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"Todos hemos visto los \u201ccables USB\u201d que venden en la calle para cargar nuestro tel\u00e9fono o Tablet. Tal vez piensas que no pasa nada al comprarlo y te ahorras unos cuantos pesos, pero piensa esto dos veces porque se encontr\u00f3 que los hackers podr\u00edan tomar el control de tu tel\u00e9fono y de las computadoras donde [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-13T15:07:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-08-13T15:07:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.8-3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras\",\"datePublished\":\"2019-08-13T15:07:34+00:00\",\"dateModified\":\"2019-08-13T15:07:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/\"},\"wordCount\":364,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.8-3.png\",\"articleSection\":[\"Cibersegur\u00eddad\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/\",\"name\":\"Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.8-3.png\",\"datePublished\":\"2019-08-13T15:07:34+00:00\",\"dateModified\":\"2019-08-13T15:07:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.8-3.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.8-3.png\",\"width\":600,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/","og_locale":"en_US","og_type":"article","og_title":"Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"Todos hemos visto los \u201ccables USB\u201d que venden en la calle para cargar nuestro tel\u00e9fono o Tablet. Tal vez piensas que no pasa nada al comprarlo y te ahorras unos cuantos pesos, pero piensa esto dos veces porque se encontr\u00f3 que los hackers podr\u00edan tomar el control de tu tel\u00e9fono y de las computadoras donde [&hellip;]","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2019-08-13T15:07:34+00:00","article_modified_time":"2019-08-13T15:07:43+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.8-3.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras","datePublished":"2019-08-13T15:07:34+00:00","dateModified":"2019-08-13T15:07:43+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/"},"wordCount":364,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.8-3.png","articleSection":["Cibersegur\u00eddad"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/","name":"Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.8-3.png","datePublished":"2019-08-13T15:07:34+00:00","dateModified":"2019-08-13T15:07:43+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.8-3.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/08\/Notic.8-3.png","width":600,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/hackers-usan-cables-piratas-para-secuestrar-telefonos-y-las-computadoras\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Hackers usan cables piratas para secuestrar tel\u00e9fonos y las computadoras"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=17701"}],"version-history":[{"count":1,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17701\/revisions"}],"predecessor-version":[{"id":17703,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/17701\/revisions\/17703"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/17702"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=17701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=17701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=17701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}