{"id":6491,"date":"2015-07-27T08:21:50","date_gmt":"2015-07-27T08:21:50","guid":{"rendered":"http:\/\/kasperskydaily.com\/spain\/?p=6491"},"modified":"2019-11-22T11:29:27","modified_gmt":"2019-11-22T09:29:27","slug":"security-tips-for-kids-4","status":"publish","type":"post","link":"https:\/\/www.kaspersky.es\/blog\/security-tips-for-kids-4\/6491\/","title":{"rendered":"Es el momento de proteger tus dispositivos m\u00f3viles"},"content":{"rendered":"<p lang=\"ru-RU\" align=\"justify\"><span style=\"color: #000000\"><span style=\"font-family: Arial,serif\"><span style=\"font-size: small\"><span style=\"font-family: Trebuchet MS,serif\"><span lang=\"es-ES\">Todos sabemos que a los cibercriminales les encantar\u00eda <a href=\"https:\/\/www.kaspersky.es\/blog\/security-tips-for-kids-1\/6420\/\" target=\"_blank\" rel=\"noopener\">infectar tu PC o tu ordenador port\u00e1til con virus<\/a> o ponerte una trampa para que instales un malware. Lo que tal vez no sabes, es que tambi\u00e9n les gustar\u00eda llegar a tu dispositivo m\u00f3vil. Los cibervillanos saben c\u00f3mo sacar dinero hackeando tu smartphone, <a href=\"https:\/\/www.kaspersky.es\/blog\/hackers-smartphone-infografia\/3061\/\" target=\"_blank\" rel=\"noopener\">ya sea mediante un robo directo o a trav\u00e9s de algo m\u00e1s especializado como las minas de bitcoin<\/a><\/span><\/span><a href=\"https:\/\/www.kaspersky.es\/blog\/hackers-smartphone-infografia\/3061\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-family: Trebuchet MS,serif\"><span lang=\"es-ES\">.<\/span><\/span><\/a> <\/span><\/span><\/span><\/p>\n<p lang=\"ru-RU\" align=\"justify\">\n<\/p><p lang=\"ru-RU\" align=\"justify\"><span style=\"color: #000000\"><span style=\"font-family: Arial,serif\"><span style=\"font-size: small\"><span style=\"font-family: Trebuchet MS,serif\"><span lang=\"es-ES\">Existen Troyanos especiales que se hacen pasar por juegos o aplicaciones m\u00f3viles. Al instalarlos, empiezan a robar dinero de tu cuenta <a href=\"https:\/\/www.kaspersky.es\/blog\/podec-vkontakte-evade-captcha\/5583\/\" target=\"_blank\" rel=\"noopener\">haciendo llamadas o subscribi\u00e9ndote a servicios premium de mensajer\u00eda que no necesitas.<\/a> <\/span><\/span><\/span><\/span><\/span><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">Security do\u2019s and don\u2019ts: Keeping weirdos aside <a href=\"https:\/\/t.co\/zLx7VTMqUE\" target=\"_blank\" rel=\"noopener nofollow\">https:\/\/t.co\/zLx7VTMqUE<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/parenting?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#parenting<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/safekids?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#safekids<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/internettips?src=hash&amp;ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">#internettips<\/a> <a href=\"http:\/\/t.co\/foTFp4GsKZ\" target=\"_blank\" rel=\"noopener nofollow\">pic.twitter.com\/foTFp4GsKZ<\/a><\/p>\n<p>\u2014 Kaspersky (@kaspersky) <a href=\"https:\/\/twitter.com\/kaspersky\/status\/623130470419664896?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener nofollow\">July 20, 2015<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><span style=\"color: #000000\"><span style=\"font-family: Arial,serif\"><span style=\"font-size: small\"><span style=\"font-family: Trebuchet MS,serif\"><span lang=\"es-ES\">Seguramente prefieres gastar tu dinero en cosas que realmente deseas en lugar de perderlo. Dicho esto, deber\u00edas preocuparte por la seguridad de tu dispositivo m\u00f3vil. Aqu\u00ed te dejamos cuatro consejos para ayudarte a mantener tu dispositivo m\u00f3vil seguro:<\/span><\/span><\/span><\/span><\/span><\/p>\n<ul>\n<li style=\"text-align: left\"><span style=\"color: #000000\"><span style=\"font-family: Arial,serif\"><span style=\"font-size: small\"><span style=\"font-family: Trebuchet MS,serif\"><span lang=\"es-ES\">No olvides introducir una <a href=\"https:\/\/www.kaspersky.es\/blog\/security-tips-for-kids-2\/6425\/\" target=\"_blank\" rel=\"noopener\">contrase\u00f1a<\/a><\/span><\/span><span style=\"font-family: Trebuchet MS,serif\"><span lang=\"es-ES\"> en tu m\u00f3vil<\/span><\/span><span style=\"font-family: Trebuchet MS,serif\"><span lang=\"es-ES\"> para que nadie tenga acceso a tus datos. <\/span><\/span><\/span><\/span><\/span><\/li>\n<li style=\"text-align: left\"><span style=\"color: #000000\"><span style=\"font-family: Arial,serif\"><span style=\"font-size: small\"><span style=\"font-family: Trebuchet MS,serif\"><span lang=\"es-ES\">Evita conectarte a redes Wi-Fi desconocidas, en especial a las gratuitas, ya que podr\u00edan obtener f\u00e1cilmente la informaci\u00f3n que env\u00edas. Que no haya una contrase\u00f1a para conectarse, es se\u00f1al de que puede ser una red peligrosa.<\/span><\/span><\/span><\/span><\/span><\/li>\n<li style=\"text-align: left\"><span style=\"color: #000000\"><span style=\"font-family: Arial,serif\"><span style=\"font-size: small\"><span style=\"font-family: Trebuchet MS,serif\"><span lang=\"es-ES\">Puedes tener acceso a tu m\u00f3vil incluso si lo pierdes o te lo roban. Activa el control remoto, ya sea a trav\u00e9s del uso de las funciones incorporadas en el tel\u00e9fono (tales como la de \u201cFind iPhone\u201d), o <a href=\"https:\/\/www.kaspersky.es\/blog\/kaspersky-phound\/5564\/\" target=\"_blank\" rel=\"noopener\">instala un programa especial<\/a>.<\/span><\/span><\/span><\/span><\/span><\/li>\n<li style=\"text-align: left\"><span style=\"color: #000000\"><span style=\"font-family: Arial,serif\"><span style=\"font-size: small\"><span style=\"font-family: Trebuchet MS,serif\"><span lang=\"es-ES\">No olvides que tu tel\u00e9fono tambi\u00e9n est\u00e1 en riesgo de virus. No descargues aplicaciones desconocidas, incluso aunque sea desde la tienda oficial. Comprueba siempre los permisos que te piden las aplicaciones, tales como el acceso a tus contactos o a tus fotos.<\/span><\/span><\/span><\/span><\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Los cibercriminales saben c\u00f3mo beneficiarse de tus dispositivos m\u00f3viles. Permanece atento y sigue nuestras recomendaciones para proteger tus smartphones y tablets. <\/p>\n","protected":false},"author":40,"featured_media":6492,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10],"tags":[59,26,323,219,199,677,591,484,61,722,586],"class_list":{"0":"post-6491","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tips","8":"tag-android","9":"tag-apps","10":"tag-consejos","11":"tag-dispositivos-moviles","12":"tag-ios","13":"tag-malware-movil","14":"tag-ninos","15":"tag-proteccion","16":"tag-seguridad","17":"tag-smartphones","18":"tag-troyanos"},"hreflang":[{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/security-tips-for-kids-4\/6491\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/security-tips-for-kids-4\/5666\/"},{"hreflang":"en-gb","url":"https:\/\/www.kaspersky.co.uk\/blog\/security-tips-for-kids-4\/6030\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/security-tips-for-kids-4\/5839\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/security-tips-for-kids-4\/6375\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/security-tips-for-kids-4\/8422\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/security-tips-for-kids-4\/9388\/"},{"hreflang":"fr","url":"https:\/\/www.kaspersky.fr\/blog\/security-tips-for-kids-4\/4727\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/security-tips-for-kids-4\/5547\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/security-tips-for-kids-4\/8300\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/security-tips-for-kids-4\/8422\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/security-tips-for-kids-4\/9388\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/security-tips-for-kids-4\/9388\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/www.kaspersky.es\/blog\/tag\/android\/","name":"android"},"_links":{"self":[{"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/posts\/6491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/comments?post=6491"}],"version-history":[{"count":2,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/posts\/6491\/revisions"}],"predecessor-version":[{"id":20300,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/posts\/6491\/revisions\/20300"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/media\/6492"}],"wp:attachment":[{"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/media?parent=6491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/categories?post=6491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kaspersky.es\/blog\/wp-json\/wp\/v2\/tags?post=6491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}