{"id":1989,"date":"2016-03-18T13:37:34","date_gmt":"2016-03-18T19:37:34","guid":{"rendered":"http:\/\/otech.uaeh.edu.mx\/noti\/?p=1989"},"modified":"2016-03-18T13:38:12","modified_gmt":"2016-03-18T19:38:12","slug":"ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/","title":{"rendered":"Ransomware TeslaCrypt evoluciona y se vuelve indescifrable"},"content":{"rendered":"<p>El malware que afecta principalmente a los gamers se vuelve invencible tras su m\u00e1s reciente actualizaci\u00f3n.<!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Los ciberdelincuentes no se sacian con el da\u00f1o que han hecho a personas que ignoran la reciente proliferaci\u00f3n y constante evoluci\u00f3n del\u00a0ransomware, tipo de malware que cifra los archivos de la v\u00edctima y solicita dinero para descifrarlos. TeslaCrypt\u00a0es una de tantas variantes, cuyo principal objetivo son los gamers. No hace mucho se descubri\u00f3\u00a0esparci\u00e9ndose en sitios web basados en WordPress\u00a0y ahora se ha vuelto indescifrable.<\/p>\n<p>Seg\u00fan\u00a0expertos en seguridad\u00a0de la compa\u00f1\u00eda Cisco, la gente responsable de TeslaCrypt ha puesto fin a las deficiencias del malware para evitar la aplicaci\u00f3n de ingenier\u00eda inversa, ya que gracias a ello\u00a0fue posible desarrollar herramientas como TeslaCrack, Tesladecrypt y TeslaDecoder, las cuales permit\u00edan a las v\u00edctimas descifrar sus archivos sin pagar un s\u00f3lo centavo, de acuerdo con informaci\u00f3n de\u00a0PC World.<\/p>\n<p>TeslaCrypt\u00a0est\u00e1 evolucionando en cada compilaci\u00f3n y la nueva\u00a0versi\u00f3n 3.0.1\u00a0ha implementado un algoritmo criptogr\u00e1fico para asesinar toda esperanza de recuperar los archivos con herramientas de descifrado.\u00a0Ahora lo \u00fanico que pueden hacer las v\u00edctimas es pagar por recuperarlos, monto que suele sobrepasar los USD$400 d\u00f3lares, y posteriormente crear constantemente copias de seguridad de sus archivos.<\/p>\n<p>Sin embargo, aunque esta puede ser una soluci\u00f3n a un\u00a0malware\u00a0que en los \u00faltimos a\u00f1os ha afectado a personas y negocios, se ha descubierto que loscibercriminales han encontrado la manera de infectar redes con ransomware y cualquier copia de seguridad en red\u00a0para eliminarla y completar su trabajo cifrando los archivos. De momento, la \u00fanica manera de evitar la infecci\u00f3n de este tipo de amenazas es\u00a0usando un software anti-ransomware.<\/p>\n<p>Fuente: FayerWayer<\/p>\n","protected":false},"excerpt":{"rendered":"<p>El malware que afecta principalmente a los gamers se vuelve invencible tras su m\u00e1s reciente actualizaci\u00f3n.<\/p>\n","protected":false},"author":1,"featured_media":1990,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1989","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ransomware TeslaCrypt evoluciona y se vuelve indescifrable<\/title>\n<meta name=\"description\" content=\"El malware que afecta principalmente a los gamers se vuelve invencible tras su m\u00e1s reciente actualizaci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware TeslaCrypt evoluciona y se vuelve indescifrable\" \/>\n<meta property=\"og:description\" content=\"El malware que afecta principalmente a los gamers se vuelve invencible tras su m\u00e1s reciente actualizaci\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-18T19:37:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-03-18T19:38:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2016\/03\/ransware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Ransomware TeslaCrypt evoluciona y se vuelve indescifrable\",\"datePublished\":\"2016-03-18T19:37:34+00:00\",\"dateModified\":\"2016-03-18T19:38:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/\"},\"wordCount\":307,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2016\/03\/ransware.jpg\",\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/\",\"name\":\"Ransomware TeslaCrypt evoluciona y se vuelve indescifrable\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2016\/03\/ransware.jpg\",\"datePublished\":\"2016-03-18T19:37:34+00:00\",\"dateModified\":\"2016-03-18T19:38:12+00:00\",\"description\":\"El malware que afecta principalmente a los gamers se vuelve invencible tras su m\u00e1s reciente actualizaci\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2016\/03\/ransware.jpg\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2016\/03\/ransware.jpg\",\"width\":640,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware TeslaCrypt evoluciona y se vuelve indescifrable\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware TeslaCrypt evoluciona y se vuelve indescifrable","description":"El malware que afecta principalmente a los gamers se vuelve invencible tras su m\u00e1s reciente actualizaci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware TeslaCrypt evoluciona y se vuelve indescifrable","og_description":"El malware que afecta principalmente a los gamers se vuelve invencible tras su m\u00e1s reciente actualizaci\u00f3n.","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2016-03-18T19:37:34+00:00","article_modified_time":"2016-03-18T19:38:12+00:00","og_image":[{"width":640,"height":400,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2016\/03\/ransware.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Ransomware TeslaCrypt evoluciona y se vuelve indescifrable","datePublished":"2016-03-18T19:37:34+00:00","dateModified":"2016-03-18T19:38:12+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/"},"wordCount":307,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2016\/03\/ransware.jpg","articleSection":["Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/","name":"Ransomware TeslaCrypt evoluciona y se vuelve indescifrable","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2016\/03\/ransware.jpg","datePublished":"2016-03-18T19:37:34+00:00","dateModified":"2016-03-18T19:38:12+00:00","description":"El malware que afecta principalmente a los gamers se vuelve invencible tras su m\u00e1s reciente actualizaci\u00f3n.","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2016\/03\/ransware.jpg","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2016\/03\/ransware.jpg","width":640,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/tech\/ransomware-teslacrypt-evoluciona-y-se-vuelve-indescifrable\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Ransomware TeslaCrypt evoluciona y se vuelve indescifrable"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/1989","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=1989"}],"version-history":[{"count":2,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/1989\/revisions"}],"predecessor-version":[{"id":1992,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/1989\/revisions\/1992"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/1990"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=1989"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=1989"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=1989"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}