{"id":18808,"date":"2019-10-02T10:51:48","date_gmt":"2019-10-02T16:51:48","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=18808"},"modified":"2019-10-02T10:54:05","modified_gmt":"2019-10-02T16:54:05","slug":"como-blindar-tu-celular-antes-de-comenzar-a-usar-codi","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/","title":{"rendered":"C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"color: #000000;\">La llegada de la plataforma de Cobros Digitales (CoDi), del Banco de M\u00e9xico, hace a los smartphones un blanco de m\u00e1s inter\u00e9s para los ciberdelincuentes, advierte la\u00a0firma de ciberseguridad Kasperky, la cual recomienda reforzar las medidas de seguridad de los dispositivos antes de utilizar dicha tecnolog\u00eda.<\/span><!--more--><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Por ello, consider\u00f3 que los usuarios de CoDi deben estar prevenidos y protegidos para amenazas cibern\u00e9ticas o fraude.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">\u201cHoy todos somos ciudadanos digitales y es muy importante que aprendamos a proteger nuestra vida digital: se trata de nuestra identidad y nuestro dinero. Y por ello, hay que elevar nuestro nivel de cultura porque este tipo de tecnolog\u00edas son un blanco muy atractivo para los cibercriminales\u201d, se\u00f1al\u00f3 Roberto Mart\u00ednez, analista senior de Seguridad de la firma.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Como destac\u00f3 el banco central del pa\u00eds, para usar la plataforma de pagos es necesario tener una cuenta bancaria y y un samrtphone -al menos de gama media- que pueda generar y leer los c\u00f3digos QR; adem\u00e1s de que CoDi utiliza tecnolog\u00eda de proximidad (o\u00a0NFC) que permita transferir datos al acercarlos. Sin embargo, el especialista subraya dicho intercambio de informaci\u00f3n puede ser interceptada.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">\u201cAl ser una plataforma inal\u00e1mbrica, es relativamente f\u00e1cil que la informaci\u00f3n sea interceptada si no cuenta con las medidas de seguridad adecuadas por parte de los desarrolladores de las apps de los bancos\u201d, indic\u00f3.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Ante esto,\u00a0Kaspersky dio a conocer 9 recomendaciones para utilizar CoDi de manera segura:<\/span><\/p>\n<ol style=\"text-align: justify;\">\n<li><span style=\"color: #000000;\">Analizar si has descargado apps que no sea de una tienda oficial. Si es necesario, formatear el dispositivo y dejarlo con valores de f\u00e1brica.<\/span><\/li>\n<li><span style=\"color: #000000;\">No descargar apps o programas de sitios desconocidos.<\/span><\/li>\n<li><span style=\"color: #000000;\">Utilizar alg\u00fan antivirus para Android.\u00a0<\/span><\/li>\n<li><span style=\"color: #000000;\">No quitar la vista de tu m\u00f3vil cuando est\u00e9s utilizando la aplicaci\u00f3n para cobrar o pagar.\u00a0<\/span><\/li>\n<li><span style=\"color: #000000;\">Activar en las apps disponibles la verificaci\u00f3n de doble factor.<\/span><\/li>\n<li><span style=\"color: #000000;\">Activar las notificaciones de tus movimientos bancarios<\/span><\/li>\n<li><span style=\"color: #000000;\">Marcar un l\u00edmite de transacciones.\u00a0<\/span><\/li>\n<li><span style=\"color: #000000;\">Mantener bloqueado tu smartphone para evitar que puedan acceder a tu informaci\u00f3n.\u00a0<\/span><\/li>\n<li><span style=\"color: #000000;\">Utilizar contrase\u00f1as de alta seguridad.<\/span><\/li>\n<\/ol>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>Fuente:\u00a0<\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><em>Forbes Staff. (2019, 2 octubre). C\u00f3mo &#8216;blindar&#8217; tu celular antes de comenzar a usar CoDi \u2022 Forbes M\u00e9xico. Recuperado 2 octubre, 2019, de https:\/\/www.forbes.com.mx\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La llegada de la plataforma de Cobros Digitales (CoDi), del Banco de M\u00e9xico, hace a los smartphones un blanco de m\u00e1s inter\u00e9s para los ciberdelincuentes, advierte la\u00a0firma de ciberseguridad Kasperky, la cual recomienda reforzar las medidas de seguridad de los dispositivos antes de utilizar dicha tecnolog\u00eda.<\/p>\n","protected":false},"author":1,"featured_media":18809,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[383],"tags":[],"class_list":["post-18808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciberseguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"La llegada de la plataforma de Cobros Digitales (CoDi), del Banco de M\u00e9xico, hace a los smartphones un blanco de m\u00e1s inter\u00e9s para los ciberdelincuentes, advierte la\u00a0firma de ciberseguridad Kasperky, la cual recomienda reforzar las medidas de seguridad de los dispositivos antes de utilizar dicha tecnolog\u00eda.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-02T16:51:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-10-02T16:54:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/10\/Notic.10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi\",\"datePublished\":\"2019-10-02T16:51:48+00:00\",\"dateModified\":\"2019-10-02T16:54:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/\"},\"wordCount\":388,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/10\/Notic.10.jpg\",\"articleSection\":[\"Cibersegur\u00eddad\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/\",\"name\":\"C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/10\/Notic.10.jpg\",\"datePublished\":\"2019-10-02T16:51:48+00:00\",\"dateModified\":\"2019-10-02T16:54:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/10\/Notic.10.jpg\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/10\/Notic.10.jpg\",\"width\":600,\"height\":350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/","og_locale":"en_US","og_type":"article","og_title":"C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"La llegada de la plataforma de Cobros Digitales (CoDi), del Banco de M\u00e9xico, hace a los smartphones un blanco de m\u00e1s inter\u00e9s para los ciberdelincuentes, advierte la\u00a0firma de ciberseguridad Kasperky, la cual recomienda reforzar las medidas de seguridad de los dispositivos antes de utilizar dicha tecnolog\u00eda.","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2019-10-02T16:51:48+00:00","article_modified_time":"2019-10-02T16:54:05+00:00","og_image":[{"width":600,"height":350,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/10\/Notic.10.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi","datePublished":"2019-10-02T16:51:48+00:00","dateModified":"2019-10-02T16:54:05+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/"},"wordCount":388,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/10\/Notic.10.jpg","articleSection":["Cibersegur\u00eddad"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/","name":"C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/10\/Notic.10.jpg","datePublished":"2019-10-02T16:51:48+00:00","dateModified":"2019-10-02T16:54:05+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/10\/Notic.10.jpg","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2019\/10\/Notic.10.jpg","width":600,"height":350},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/ciberseguridad\/como-blindar-tu-celular-antes-de-comenzar-a-usar-codi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"C\u00f3mo \u2018blindar\u2019 tu celular antes de comenzar a usar CoDi"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/18808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=18808"}],"version-history":[{"count":2,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/18808\/revisions"}],"predecessor-version":[{"id":18811,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/18808\/revisions\/18811"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/18809"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=18808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=18808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=18808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}