{"id":26738,"date":"2022-04-22T12:03:00","date_gmt":"2022-04-22T10:03:00","guid":{"rendered":"https:\/\/perseus.de\/phishing\/"},"modified":"2026-03-30T11:04:34","modified_gmt":"2026-03-30T09:04:34","slug":"phishing","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/phishing\/","title":{"rendered":"Phishing"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26738\" class=\"elementor elementor-26738 elementor-22419\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Phishing<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25825\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3d4dc204 e-flex e-con-boxed e-con e-parent\" data-id=\"3d4dc204\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d474e75 e-con-full e-flex e-con e-child\" data-id=\"d474e75\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>Los delincuentes intentan obtener datos confidenciales de la empresa mediante correos electr\u00f3nicos fraudulentos, sitios web falsos y otros m\u00e9todos. Al hacerse pasar por una persona conocida (colega, jefe) u organizaci\u00f3n (banco, proveedor de servicios), los estafadores explotan la confianza de la v\u00edctima para revelar informaci\u00f3n voluntariamente. <\/p><h4> <\/h4><h4>\u00bfD\u00f3nde me encuentro con el phishing en mi trabajo diario?<\/h4><p>Comienza la jornada y revisas tus correos electr\u00f3nicos, luego encuentras un correo de uno de tus proveedores de servicios. El texto habla de una factura cuya cantidad te sorprende. La factura se adjunta como un documento. Te sorprende porque no has contratado a este proveedor de servicios en los \u00faltimos meses. Lo que hagas en los siguientes segundos es crucial:    <\/p><p>R) Tratas este correo con escepticismo, porque est\u00e1s seguro de que no se esperaba ninguna factura de este proveedor de servicios. Revisan de nuevo el correo de cerca. Tu proveedor de servicios aparece como el remitente, pero la direcci\u00f3n de correo electr\u00f3nico es visible. Por ejemplo, es web@YSJ1QFWP8RU0C0N6.net o bricklayer316@moselland.de. Tu sospecha se profundiza y borras este correo. Si tienes dudas, llama r\u00e1pidamente a tu proveedor de servicios. Bajo ninguna circunstancia deber\u00edas abrir el archivo adjunto de este correo electr\u00f3nico a menos que est\u00e9s completamente seguro de que realmente proviene de tu proveedor de servicios.      <\/p><p>B) Abres el archivo adjunto del correo para saber m\u00e1s. Aparentemente no pasa nada malo, pero la factura es obviamente falsa. Borras el correo. Pero cuando abres el archivo adjunto, un virus ya se ha activado. Mientras t\u00fa est\u00e1s ocupado con otras cosas, \u00e9l env\u00eda correos electr\u00f3nicos con facturas falsas a todos tus contactos en tu nombre. Si tienes mala suerte, el virus cargar\u00e1 <a href=\"https:\/\/perseus.de\/2022\/04\/26\/schadprogramme-malware\/\">malware<\/a> en tu ordenador, provocando <a href=\"https:\/\/perseus.de\/2022\/04\/25\/ransomware\/\">fallos o incluso chantajes<\/a> .     <\/p><h4> <\/h4><h4>\u00bfQu\u00e9 puedo hacer para protegerme del phishing?<\/h4><p>Siempre trata los archivos adjuntos y enlaces de correos electr\u00f3nicos con recelo. Siempre revisa la direcci\u00f3n de correo electr\u00f3nico del remitente para ver si hay correos. Elimina las falsificaciones evidentes. Pero incluso si tienes la m\u00e1s m\u00ednima sospecha, ignora el correo electr\u00f3nico al principio y rev\u00edsalo fuera del programa de correo:   <\/p><ul><li>Si el supuesto remitente es conocido personalmente, lo mejor es llamarle r\u00e1pidamente. Tambi\u00e9n puedes escribirle un correo electr\u00f3nico. Pero: Aseg\u00farate de usar una direcci\u00f3n de correo electr\u00f3nico que sepas con certeza que pertenece al destinatario previsto, NO respondas al correo sospechoso.  <\/li><li>Si el supuesto remitente es una empresa que conoces (por ejemplo, Amazon o tu banco), cierra este correo. Aprovecha deliberadamente el desv\u00edo desde tu navegador e inicia sesi\u00f3n en tu cuenta de cliente con esta empresa. NUNCA uses un enlace de un correo electr\u00f3nico para hacer esto. Revisa tu cuenta de cliente para ver si has recibido alg\u00fan mensaje. Probablemente no sea as\u00ed.    <\/li><li>Si el remitente no lo conoces, busca en Google \u00ab<a href=\"https:\/\/perseus.de\/2022\/04\/26\/spam\/\">spam de correo<\/a>\u00bb y palabras clave en el asunto o en una descripci\u00f3n del correo (por ejemplo, solicitud de cobro, archivo adjunto, factura). En la mayor\u00eda de los casos, encontrar\u00e1s advertencias sobre correos electr\u00f3nicos falsos. Incluso puede citar un correo electr\u00f3nico id\u00e9ntico al que recibiste. Elimina cualquier correo electr\u00f3nico en el que no hayas podido verificar la identidad del remitente de forma independiente del correo.   <\/li><\/ul><p>Se puede encontrar m\u00e1s informaci\u00f3n en la secci\u00f3n de informaci\u00f3n del centro de asesoramiento al consumidor sobre spam de correo electr\u00f3nico, phishing y troyanos: <a href=\"https:\/\/www.verbraucherzentrale.de\/wissen\/digitale-welt\/phishingradar\">www.verbraucherzentrale.de\/wissen\/digitale-welt\/phishingradar<\/a><\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-514782e elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"514782e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Phishing Los delincuentes intentan obtener datos confidenciales de la empresa mediante correos electr\u00f3nicos fraudulentos, sitios web falsos y otros m\u00e9todos. Al hacerse pasar por una persona conocida (colega, jefe) u organizaci\u00f3n (banco, proveedor de servicios), los estafadores explotan la confianza de la v\u00edctima para revelar informaci\u00f3n voluntariamente. \u00bfD\u00f3nde me encuentro con el phishing en mi [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"class_list":["post-26738","post","type-post","status-publish","format-standard","hentry","category-ciberlexico"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/phishing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Phishing Los delincuentes intentan obtener datos confidenciales de la empresa mediante correos electr\u00f3nicos fraudulentos, sitios web falsos y otros m\u00e9todos. Al hacerse pasar por una persona conocida (colega, jefe) u organizaci\u00f3n (banco, proveedor de servicios), los estafadores explotan la confianza de la v\u00edctima para revelar informaci\u00f3n voluntariamente. \u00bfD\u00f3nde me encuentro con el phishing en mi [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-22T10:03:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T09:04:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Phishing\",\"datePublished\":\"2022-04-22T10:03:00+00:00\",\"dateModified\":\"2026-03-30T09:04:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/\"},\"wordCount\":607,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Ciberl\u00e9xico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/\",\"name\":\"Phishing - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-22T10:03:00+00:00\",\"dateModified\":\"2026-03-30T09:04:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/phishing\/","og_locale":"es_ES","og_type":"article","og_title":"Phishing - Perseus Technologies","og_description":"Phishing Los delincuentes intentan obtener datos confidenciales de la empresa mediante correos electr\u00f3nicos fraudulentos, sitios web falsos y otros m\u00e9todos. Al hacerse pasar por una persona conocida (colega, jefe) u organizaci\u00f3n (banco, proveedor de servicios), los estafadores explotan la confianza de la v\u00edctima para revelar informaci\u00f3n voluntariamente. \u00bfD\u00f3nde me encuentro con el phishing en mi [&hellip;]","og_url":"https:\/\/perseus.de\/es\/phishing\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-22T10:03:00+00:00","article_modified_time":"2026-03-30T09:04:34+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/phishing\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/phishing\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Phishing","datePublished":"2022-04-22T10:03:00+00:00","dateModified":"2026-03-30T09:04:34+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/phishing\/"},"wordCount":607,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Ciberl\u00e9xico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/phishing\/","url":"https:\/\/perseus.de\/es\/phishing\/","name":"Phishing - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/phishing\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-22T10:03:00+00:00","dateModified":"2026-03-30T09:04:34+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/phishing\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/phishing\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/phishing\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Phishing"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26738","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=26738"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26738\/revisions"}],"predecessor-version":[{"id":26739,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26738\/revisions\/26739"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=26738"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=26738"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=26738"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}