{"id":29379,"date":"2024-07-29T10:22:05","date_gmt":"2024-07-29T16:22:05","guid":{"rendered":"https:\/\/otech.uaeh.edu.mx\/noti\/?p=29379"},"modified":"2025-10-24T15:42:44","modified_gmt":"2025-10-24T21:42:44","slug":"vulnerabilidad-social-ante-el-oligopolio-tecnologico","status":"publish","type":"post","link":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/","title":{"rendered":"Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico"},"content":{"rendered":"<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">El pasado viernes 19 de julio, debido a una actualizaci\u00f3n fallida del software sensor Falcon, plataforma denominada Endpoint Detection and Response (EDR) para vigilar y detectar ataques cibern\u00e9ticos, propiedad de Crowdstrike (U-GOB, 2024), empresa l\u00edder proveedora de servicios de ciberseguridad a m\u00e1s de 29 mil clientes, como Microsoft y el Gobierno de los EEUU<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Por la falla inform\u00e1tica, se afectaron a 8.5 millones de usuarios de Windows-Azure, por tal motivo las acciones de Crowdstrike, bajaron 12% despu\u00e9s de haber alcanzado un valor de mercado de 104 mil 870 mdd (Forbes, 2024)<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Impact\u00f3 a las aerol\u00edneas, provocando retrasos y cancelaciones de vuelos, las telecomunicaciones y medios de comunicaci\u00f3n, al sector salud, transportes ferroviarios, como en el Reino Unido, la banca y los servicios financieros; en M\u00e9xico los principales afectados fueron los viajeros, que no pudieron abordar sus vuelos, provoc\u00e1ndose caos en los aeropuertos del pa\u00eds.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">El director de Seguridad Shawn Henry de Crowdstrike (Shawn, 2024), despu\u00e9s de disculparse explic\u00f3, los procesos para evitar que vuelva a suceder, desarrollando pruebas de software, e implementando contenido de respuesta r\u00e1pida.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Sin embargo, se registra una mala pr\u00e1ctica, dado que las actualizaciones cr\u00edticas, sobre todo para millones de usuarios, no se pueden aplicar, si no se han realizado las pruebas necesarias en entornos controlados, de lo contrario surgen los fallos (Del Castillo, 2024).<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Se observa que son dos grandes empresas, por un lado Microsoft (Estrategias de Inversi\u00f3n , 2021) cuya capitalizaci\u00f3n de mercado alcanza 2 bdd, con una tasa de crecimiento del 20% anual, es as\u00ed que sus dispositivos est\u00e1n en gran parte de las naciones, el poder de su impacto social supera, al de su poder de mercado por el efecto multiplicador.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Por supuesto que el impacto social del corporativo Crowdstrike es enorme; por lo que el capital concentrado de estas dos trasnacionales, hace pensar en su poder geotecnol\u00f3gico, alcanzando las vertientes pol\u00edticas, por el grado de conectividad que ya existe a nivel global.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">El 29 de octubre de 1969 se realiz\u00f3 el primer mensaje por internet, la primera versi\u00f3n de Linux conten\u00eda 176 mil l\u00edneas de c\u00f3digo, hoy los servicios de Google tienen m\u00e1s de 2 mil millones de l\u00edneas de c\u00f3digo, por lo que la digitalizaci\u00f3n, al igual que el cambio clim\u00e1tico, es irreversible; lo peligroso son las decisiones corporativas que impactan a toda la poblaci\u00f3n humana, se toman en la c\u00fapula de las grandes trasnacionales, donde la \u00e9tica y la participaci\u00f3n social est\u00e1n eclipsadas por la alta rentabilidad.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Vivimos un capitalismo cognitivo (Romo, 2024) m\u00e1s que una sociedad del conocimiento, por lo que las grandes trasnacionales buscan rentabilizar sus inversiones, sin considerar los derechos humanos, cuando la esencia de la econom\u00eda es la generaci\u00f3n de bienes satisfactorios antes que mercanc\u00edas. El conocimiento como generador de valor, est\u00e1 articulado al sentido humano antes que a la raz\u00f3n de mercado.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">\u00bfAcaso estamos a merced de criminales y de Estados-naci\u00f3n genocidas dictatoriales? Porque parece ser que ambos est\u00e1n creciendo a una tasa mayor que la conciencia humana, por ejemplo Scattered Spider es una organizaci\u00f3n integrada por una nueva generaci\u00f3n de ciberdelincuentes que desarrollan y aplican tecnolog\u00edas con capacidades para intervenir y atacar sistemas inform\u00e1ticos de empresas y gobiernos.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">El ataque de d\u00eda cero-STuxnet (Perlroth, 2022) se produce cuando los ciberdelincuentes o gobiernos identifican y aprovechan, un error o vulnerabilidad antes que los proveedores o los desarrolladores de una organizaci\u00f3n, sea p\u00fablica o privada, tienen cero d\u00edas para repararlo, esa es la gravedad.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Se ha manejado la ciber resiliencia como una medida para enfrentar las fallas y los ataques cibern\u00e9ticos, el Centro de Ciberseguridad del Foro Econ\u00f3mico de Davos, ya est\u00e1 colaborando con el Centro de Capacidad de Ciberseguridad Global de la Universidad de Oxford, para desarrollar un plan de Ciber Resiliencia empresarial, pero \u00bfy la ciber resiliencia social de pa\u00edses y zonas marginadas?<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Si no abrimos la participaci\u00f3n social, para crear una nueva organizaci\u00f3n de la sociedad humana, m\u00e1s participativa y descentralizada, para salir de la zona de influencia de la gobernanza corporativa, dominada por la rentabilizaci\u00f3n, la sociedad global, seguir\u00e1 en estado de alerta, por la alta vulnerabilidad cibern\u00e9tica. Un bot\u00f3n de muestra lo acabamos de vivir el pasado 19 de julio.<\/span><\/p>\n<p><a href=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-3_compressed.pdf\">Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico<\/a><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Bibliograf\u00eda<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Del Castillo, C. (19 de Julio de 2024). elDiario ar. Recuperado el julio de 2024, de eldiarioar.com: https:\/\/www.eldiarioar.com\/mundo\/fallado-windows-crowdstrike-provocado-caida-informatica-global_1_11536047.html<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Estrategias de Inversion . (7 de 12 de 2021). Estrategias de Inversi\u00f3n. Recuperado el julio de 2024, de estrategiasdeinversion.com\/: https:\/\/www.estrategiasdeinversion.com\/actualidad\/noticias\/bolsa-eeuu\/por-que-microsoft-es-la-compania-del-ano-n-491713<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Forbes. (19 de julio de 2024). Forbes. Recuperado el julio de 2024, de forbes.com.mx: https:\/\/www.forbes.com.mx\/que-es-crowdstrike-la-empresa-de-ciberseguridad-detras-de-la-interrupcion-tecnologica-global\/<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Perlroth, N. (2022). As\u00ed es como me dicen que acabar\u00e1 el mundo. Ciudad de M\u00e9xico: Ediciones Urano S.A. de C.V.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Romo, C. (2024). Ciudad Copyright. Ciudad de M\u00e9xico: Fondo de Cultura Econ\u00f3mica.<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">Shawn, H. (26 de Julio de 2024). crowdstrike. Recuperado el julio de 2024, de crowdstrike.com: https:\/\/www.crowdstrike.com\/preliminary-post-incident-review-latam\/<\/span><\/p>\n<p class=\"cvGsUA direction-ltr align-justify para-style-body\"><span class=\"OYPEnA font-feature-liga-off font-feature-clig-off font-feature-calt-off text-decoration-none text-strikethrough-none\">U-GOB. (19 de julio de 2024). E-GOB. Recuperado el julio de 2024, de u-gob.com: https:\/\/u-gob.com\/gran-apagon-de-microsoft-numerosos-sectores-afectados-en-una-pandemia-digital-mundial\/<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El pasado viernes 19 de julio, debido a una actualizaci\u00f3n fallida del software sensor Falcon, plataforma denominada Endpoint Detection and Response (EDR) para vigilar y detectar ataques cibern\u00e9ticos, propiedad de Crowdstrike (U-GOB, 2024), empresa l\u00edder proveedora de servicios de ciberseguridad a m\u00e1s de 29 mil clientes, como Microsoft y el Gobierno de los EEUU Por [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":29381,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[],"class_list":["post-29379","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-articulo-otech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico - Observatorio Tecnol\u00f3gico de Hidalgo<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico - Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"og:description\" content=\"El pasado viernes 19 de julio, debido a una actualizaci\u00f3n fallida del software sensor Falcon, plataforma denominada Endpoint Detection and Response (EDR) para vigilar y detectar ataques cibern\u00e9ticos, propiedad de Crowdstrike (U-GOB, 2024), empresa l\u00edder proveedora de servicios de ciberseguridad a m\u00e1s de 29 mil clientes, como Microsoft y el Gobierno de los EEUU Por [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/\" \/>\n<meta property=\"og:site_name\" content=\"Observatorio Tecnol\u00f3gico de Hidalgo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/observatoriouaeh\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-29T16:22:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-24T21:42:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-2.png\" \/>\n\t<meta property=\"og:image:width\" content=\"773\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:site\" content=\"@OBSERVATORIOEH\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\"},\"headline\":\"Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico\",\"datePublished\":\"2024-07-29T16:22:05+00:00\",\"dateModified\":\"2025-10-24T21:42:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/\"},\"wordCount\":875,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-2.png\",\"articleSection\":[\"Art\u00edculo OTecH\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/\",\"name\":\"Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico - Observatorio Tecnol\u00f3gico de Hidalgo\",\"isPartOf\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-2.png\",\"datePublished\":\"2024-07-29T16:22:05+00:00\",\"dateModified\":\"2025-10-24T21:42:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#primaryimage\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-2.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-2.png\",\"width\":773,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#website\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#organization\",\"name\":\"Observatorio Tecnol\u00f3gico de Hidalgo\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"contentUrl\":\"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png\",\"width\":250,\"height\":250,\"caption\":\"Observatorio Tecnol\u00f3gico de Hidalgo\"},\"image\":{\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/observatoriouaeh\",\"https:\/\/x.com\/OBSERVATORIOEH\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico - Observatorio Tecnol\u00f3gico de Hidalgo","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/","og_locale":"en_US","og_type":"article","og_title":"Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico - Observatorio Tecnol\u00f3gico de Hidalgo","og_description":"El pasado viernes 19 de julio, debido a una actualizaci\u00f3n fallida del software sensor Falcon, plataforma denominada Endpoint Detection and Response (EDR) para vigilar y detectar ataques cibern\u00e9ticos, propiedad de Crowdstrike (U-GOB, 2024), empresa l\u00edder proveedora de servicios de ciberseguridad a m\u00e1s de 29 mil clientes, como Microsoft y el Gobierno de los EEUU Por [&hellip;]","og_url":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/","og_site_name":"Observatorio Tecnol\u00f3gico de Hidalgo","article_publisher":"https:\/\/www.facebook.com\/observatoriouaeh","article_published_time":"2024-07-29T16:22:05+00:00","article_modified_time":"2025-10-24T21:42:44+00:00","og_image":[{"width":773,"height":1000,"url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-2.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@OBSERVATORIOEH","twitter_site":"@OBSERVATORIOEH","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#article","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/"},"author":{"name":"admin","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c"},"headline":"Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico","datePublished":"2024-07-29T16:22:05+00:00","dateModified":"2025-10-24T21:42:44+00:00","mainEntityOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/"},"wordCount":875,"commentCount":0,"publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-2.png","articleSection":["Art\u00edculo OTecH"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/","name":"Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico - Observatorio Tecnol\u00f3gico de Hidalgo","isPartOf":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website"},"primaryImageOfPage":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#primaryimage"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#primaryimage"},"thumbnailUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-2.png","datePublished":"2024-07-29T16:22:05+00:00","dateModified":"2025-10-24T21:42:44+00:00","breadcrumb":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#primaryimage","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-2.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2024\/07\/Vulnerabilidad-Social-Ante-El-Oligopolio-Tecnologico-2.png","width":773,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/articulo-otech\/vulnerabilidad-social-ante-el-oligopolio-tecnologico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/otech.uaeh.edu.mx\/noti\/"},{"@type":"ListItem","position":2,"name":"Vulnerabilidad Social Ante El Oligopolio Tecnol\u00f3gico"}]},{"@type":"WebSite","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#website","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","name":"Observatorio Tecnol\u00f3gico de Hidalgo","description":"","publisher":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/otech.uaeh.edu.mx\/noti\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#organization","name":"Observatorio Tecnol\u00f3gico de Hidalgo","url":"https:\/\/otech.uaeh.edu.mx\/noti\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/","url":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","contentUrl":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-content\/uploads\/2025\/11\/Logo-circulo.png","width":250,"height":250,"caption":"Observatorio Tecnol\u00f3gico de Hidalgo"},"image":{"@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/observatoriouaeh","https:\/\/x.com\/OBSERVATORIOEH"]},{"@type":"Person","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/95263d004158ffabcd98137e1d0abc1c","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/otech.uaeh.edu.mx\/noti\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08dd17208ee6a9e87c5a01c0a5f4c96c8ed24bf05e625630929b5b6a7c1ffa5f?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/otech.uaeh.edu.mx\/noti\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/29379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/comments?post=29379"}],"version-history":[{"count":3,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/29379\/revisions"}],"predecessor-version":[{"id":31074,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/posts\/29379\/revisions\/31074"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media\/29381"}],"wp:attachment":[{"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/media?parent=29379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/categories?post=29379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/otech.uaeh.edu.mx\/noti\/wp-json\/wp\/v2\/tags?post=29379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}