{"id":14905,"date":"2017-11-21T14:26:34","date_gmt":"2017-11-21T12:26:34","guid":{"rendered":"https:\/\/www.kaspersky.es\/blog\/?p=14905"},"modified":"2017-11-30T12:25:03","modified_gmt":"2017-11-30T10:25:03","slug":"quiz-hackers-or-wild-animal","status":"publish","type":"post","link":"https:\/\/www.kaspersky.es\/blog\/quiz-hackers-or-wild-animal\/14905\/","title":{"rendered":"Quiz: Hacker vs. ardilla"},"content":{"rendered":"<p>No es un secreto que los ciberataques pueden dejar fuera de servicio f\u00e1bricas, peri\u00f3dicos, barcos, etc. Pero resulta que los <em>hackers<\/em> no son los \u00fanicos capaces de causar estragos en las infraestructuras cr\u00edticas, pues la Madre Naturaleza tambi\u00e9n puede ser la responsable. Y no hablamos de fen\u00f3menos meteorol\u00f3gicos catastr\u00f3ficos, sino de\u2026 animales y p\u00e1jaros.<\/p>\n<p>El experto en seguridad Chris Thomas (conocido como Space Rogue) cre\u00f3 un proyecto llamado <a href=\"http:\/\/cybersquirrel1.com\/\" target=\"_blank\" rel=\"noopener nofollow\">Cyber Squirrel 1<\/a>, que demuestra que en las ciberguerras, los <em>hackers<\/em> no son nada comparado con los animales salvajes. Y hay miles de casos.<\/p>\n<p>\u00bfC\u00f3mo lo hacen? Est\u00e1s a punto de descubrirlo. Haz nuestro quiz y trata de adivinar qu\u00e9 fallos fueron causados por ciberataques humanos y cu\u00e1les fueron causados por animales.<\/p>\n<p>\u00a0<\/p>\n<div data-opinionstage-embed-url=\"https:\/\/www.opinionstage.com\/api\/v1\/widgets\/kasperskysm\/hacker-vs-ardilla1\/code.json?width=\" style=\"display: none; visibility: hidden;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Descubre al culpable: \u00bfHan sido hackers o animales salvajes?<\/p>\n","protected":false},"author":2455,"featured_media":14906,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1348],"tags":[378,2469,122,878,2122,61,294,763],"class_list":{"0":"post-14905","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-threats","8":"tag-amenazas","9":"tag-ardillas","10":"tag-hackers","11":"tag-infraestructura-critica","12":"tag-quiz","13":"tag-seguridad","14":"tag-test","15":"tag-tests"},"hreflang":[{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/quiz-hackers-or-wild-animal\/14905\/"},{"hreflang":"en-in","url":"https:\/\/www.kaspersky.co.in\/blog\/quiz-hackers-or-wild-animal\/11853\/"},{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/quiz-hackers-or-wild-animal\/9870\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/quiz-hackers-or-wild-animal\/14112\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/quiz-hackers-or-wild-animal\/12309\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/quiz-hackers-or-wild-animal\/12110\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/quiz-hackers-or-wild-animal\/14747\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/quiz-hackers-or-wild-animal\/19218\/"},{"hreflang":"tr","url":"https:\/\/www.kaspersky.com.tr\/blog\/quiz-hackers-or-wild-animal\/4475\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/quiz-hackers-or-wild-animal\/20231\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/quiz-hackers-or-wild-animal\/15398\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/quiz-hackers-or-wild-animal\/18893\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/quiz-hackers-or-wild-animal\/19090\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/quiz-hackers-or-wild-animal\/19080\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.es\/blog\/tag\/quiz\/","name":"quiz"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/posts\/14905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/users\/2455"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/comments?post=14905"}],"version-history":[{"count":4,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/posts\/14905\/revisions"}],"predecessor-version":[{"id":14910,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/posts\/14905\/revisions\/14910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/media\/14906"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/media?parent=14905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/categories?post=14905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/tags?post=14905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}