{"id":26490,"date":"2022-04-19T15:38:00","date_gmt":"2022-04-19T13:38:00","guid":{"rendered":"https:\/\/perseus.de\/ciberdelito\/"},"modified":"2026-03-31T16:27:50","modified_gmt":"2026-03-31T14:27:50","slug":"ciberdelincuencia","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/ciberdelincuencia\/","title":{"rendered":"Ciberdelito"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26490\" class=\"elementor elementor-26490 elementor-22183\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-487aac9 e-con-full e-flex e-con e-child\" data-id=\"487aac9\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Ciberdelito<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25825\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2af810b0 e-flex e-con-boxed e-con e-parent\" data-id=\"2af810b0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-7a438782 e-con-full e-flex e-con e-child\" data-id=\"7a438782\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Se refiere a delitos cometidos por o contra la tecnolog\u00eda de la informaci\u00f3n. En la mayor\u00eda de los casos, Internet se utiliza para este prop\u00f3sito. <\/p><h4> <\/h4><h4>\u00bfQu\u00e9 significa eso en detalle?<\/h4><p>El campo del ciberdelito abarca una amplia gama de delitos, entre ellos:<\/p><ul><li>Robo de datos, por ejemplo, de nombres de usuario y contrase\u00f1as,<\/li><li>el robo de identidad y el fraude, por ejemplo, a trav\u00e9s del fraude del CEO,<\/li><li>Intentos de fraude, por ejemplo, mediante phishing,<\/li><li>intrusiones en la red, por ejemplo, en una WLAN de la empresa,<\/li><li>Extorsi\u00f3n digital mediante ransomware,<\/li><li>Extorsi\u00f3n digital mediante datos digitales reales o supuestamente existentes, a menudo con contenido embarazoso,<\/li><li>Ataques DOS y DDoS a servidores,<\/li><li>Uso indebido de dispositivos digitales de terceros, por ejemplo, como parte de una botnet o cryptojacking.<\/li><\/ul><p> <\/p><p>Internet permite que los ciberdelincuentes operen en todo el mundo. Los objetivos t\u00edpicos de los ciberdelincuentes son ordenadores, tabletas, smartphones y dispositivos inteligentes y digitales IoT como relojes inteligentes, rastreadores de actividad f\u00edsica, altavoces digitales y c\u00e1maras de vigilancia <\/p><p>El cibercrimen puede ser indiscriminado, como correos electr\u00f3nicos spam o malvertising. El cibercrimen tambi\u00e9n puede llevarse a cabo de manera muy dirigida. Por ejemplo, en el contexto de una amenaza persistente avanzada, ingenier\u00eda social o spear phishing.  <\/p><p>Para poder evaluar la situaci\u00f3n actual del ciberdelito, los cargos penales son muy importantes. Tambi\u00e9n contribuyen a la persecuci\u00f3n de criminales, a contramedidas exitosas y a proteger a otros usuarios y empresas de ordenadores de da\u00f1os mediante advertencias concretas. <\/p><h4> <\/h4><h4>\u00bfD\u00f3nde encuentro el tema en mi trabajo diario?<\/h4><p><span style=\"font-size: 1rem;\">Te lo encontrar\u00e1s con frecuencia. Al fin y al cabo, muchas medidas cotidianas sirven para proteger contra el ciberdelito. Algunos ejemplos son las contrase\u00f1as de tu ordenador de trabajo y tus cuentas de usuario, el PIN de tu smartphone, el protocolo de cifrado https en Internet y tambi\u00e9n el cifrado de tu WLAN.  <\/span><\/p><h4> <\/h4><h4>\u00bfQu\u00e9 puedo hacer para mejorar mi seguridad?<\/h4><p>En t\u00e9rminos generales, aumenta la ciberseguridad de tu organizaci\u00f3n y reduce su riesgo cibern\u00e9tico. Esto requiere varias medidas de interconectamiento. Van desde contrase\u00f1as \u00fanicas complejas hasta copias de seguridad actualizadas y guardadas de forma segura. Desde un cortafuegos hasta la autenticaci\u00f3n de dos factores. Desde esc\u00e1neres antivirus hasta aumentar la concienciaci\u00f3n entre los empleados.    <\/p><p>Adem\u00e1s, denuncia todos los delitos en el \u00e1mbito del ciberdelito.<\/p><h4> <\/h4><h4>M\u00e1s informaci\u00f3n<\/h4><ul><li>Una visi\u00f3n general completa y numerosos estudios de caso son proporcionados por el <a href=\"https:\/\/www.bka.de\/SharedDocs\/Downloads\/DE\/Publikationen\/JahresberichteUndLagebilder\/Cybercrime\/cybercrimeBundeslagebild2021.html;jsessionid=12DED50747C8C4D3E7AF7FAD9C8B3A95.live611?nn=28110\">Informe Federal de Situaci\u00f3n sobre Ciberdelitos 2021 de la Oficina Federal de Polic\u00eda Criminal (BKA).<\/a><\/li><li>Puedes denunciar delitos cibern\u00e9ticos (tambi\u00e9n de forma an\u00f3nima) a la <a href=\"https:\/\/www.allianz-fuer-cybersicherheit.de\/Webs\/ACS\/DE\/IT-Sicherheitsvorfall\/it-sicherheitsvorfall_node.html\">oficina de informes de la Alianza para la Ciberseguridad<\/a> en Alemania.<\/li><li><a href=\"https:\/\/www.allianz-fuer-cybersicherheit.de\/Webs\/ACS\/DE\/IT-Sicherheitsvorfall\/it-sicherheitsvorfall_node.html\">Informaci\u00f3n de la polic\u00eda de Baja Sajonia para presentar una denuncia penal por ciberdelitos<\/a>. Aqu\u00ed tambi\u00e9n se responden preguntas comunes, como c\u00f3mo se obtiene la evidencia. <\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e77b122 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"e77b122\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Ciberdelito Se refiere a delitos cometidos por o contra la tecnolog\u00eda de la informaci\u00f3n. En la mayor\u00eda de los casos, Internet se utiliza para este prop\u00f3sito. \u00bfQu\u00e9 significa eso en detalle? El campo del ciberdelito abarca una amplia gama de delitos, entre ellos: Robo de datos, por ejemplo, de nombres de usuario y contrase\u00f1as, el [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"class_list":["post-26490","post","type-post","status-publish","format-standard","hentry","category-ciberlexico"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ciberdelito - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/ciberdelincuencia\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberdelito - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Ciberdelito Se refiere a delitos cometidos por o contra la tecnolog\u00eda de la informaci\u00f3n. En la mayor\u00eda de los casos, Internet se utiliza para este prop\u00f3sito. \u00bfQu\u00e9 significa eso en detalle? El campo del ciberdelito abarca una amplia gama de delitos, entre ellos: Robo de datos, por ejemplo, de nombres de usuario y contrase\u00f1as, el [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/ciberdelincuencia\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-19T13:38:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-31T14:27:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Ciberdelito\",\"datePublished\":\"2022-04-19T13:38:00+00:00\",\"dateModified\":\"2026-03-31T14:27:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/\"},\"wordCount\":494,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Ciberl\u00e9xico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/\",\"name\":\"Ciberdelito - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-19T13:38:00+00:00\",\"dateModified\":\"2026-03-31T14:27:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/ciberdelincuencia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ciberdelito\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberdelito - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/ciberdelincuencia\/","og_locale":"es_ES","og_type":"article","og_title":"Ciberdelito - Perseus Technologies","og_description":"Ciberdelito Se refiere a delitos cometidos por o contra la tecnolog\u00eda de la informaci\u00f3n. En la mayor\u00eda de los casos, Internet se utiliza para este prop\u00f3sito. \u00bfQu\u00e9 significa eso en detalle? El campo del ciberdelito abarca una amplia gama de delitos, entre ellos: Robo de datos, por ejemplo, de nombres de usuario y contrase\u00f1as, el [&hellip;]","og_url":"https:\/\/perseus.de\/es\/ciberdelincuencia\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-19T13:38:00+00:00","article_modified_time":"2026-03-31T14:27:50+00:00","og_image":[{"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","type":"","width":"","height":""}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/ciberdelincuencia\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/ciberdelincuencia\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Ciberdelito","datePublished":"2022-04-19T13:38:00+00:00","dateModified":"2026-03-31T14:27:50+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/ciberdelincuencia\/"},"wordCount":494,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/ciberdelincuencia\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Ciberl\u00e9xico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/ciberdelincuencia\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/ciberdelincuencia\/","url":"https:\/\/perseus.de\/es\/ciberdelincuencia\/","name":"Ciberdelito - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/ciberdelincuencia\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/ciberdelincuencia\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-19T13:38:00+00:00","dateModified":"2026-03-31T14:27:50+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/ciberdelincuencia\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/ciberdelincuencia\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/ciberdelincuencia\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/ciberdelincuencia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Ciberdelito"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26490","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=26490"}],"version-history":[{"count":2,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26490\/revisions"}],"predecessor-version":[{"id":28302,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26490\/revisions\/28302"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=26490"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=26490"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=26490"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}