{"id":79300,"date":"2019-01-10T17:06:21","date_gmt":"2019-01-10T16:06:21","guid":{"rendered":"https:\/\/www.emagister.com\/blog\/?p=79300"},"modified":"2021-05-03T12:08:36","modified_gmt":"2021-05-03T10:08:36","slug":"espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas","status":"publish","type":"post","link":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/","title":{"rendered":"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas"},"content":{"rendered":"<div class=\"entry-headline\">\n<p style=\"text-align: justify;\">La mayor\u00eda de los ciberataques IoT provienen de Brasil (18% de ellos), seguidos de los que tienen como origen China y Jap\u00f3n. En el extremo receptor, desgraciadamente, se encuentra Espa\u00f1a, que sufri\u00f3 el 80% de todo el tr\u00e1fico monitorizado como sospechoso de haber sido objetivo de ciberatacantes.<\/p>\n<\/div>\n<p style=\"text-align: justify;\"><!--more--><\/p>\n<div class=\"entry-content\">\n<div class=\"courses\"><div class=\"course\"><div class=\"inside\"><a href=\"https:\/\/www.emagister.com\/master-ciberseguridad-cursos-3779357.htm\" class=\"course_name directory\">M\u00e1ster en Ciberseguridad<\/a><div class=\"course_center\">Instituto Europeo de Posgrado (IEP)<\/div><div class=\"course_rating\"><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><\/div><div class=\"course_price\"><div class=\"course_price_text\">Precio Emagister<\/div><del>7.750 \u20ac<\/del>  3.643 \u20ac<\/div><a href=\"https:\/\/www.emagister.com\/master-ciberseguridad-cursos-3779357.htm\" class=\"course_button directory\">Ver m\u00e1s<\/a><\/div><\/div><div class=\"course\"><div class=\"inside\"><a href=\"https:\/\/www.emagister.com\/master-universitario-ciberseguridad-cursos-3787990.htm\" class=\"course_name directory\">M\u00e1ster Universitario en Ciberseguridad<\/a><div class=\"course_center\">UNIE UNIVERSIDAD<\/div><div class=\"course_rating\"><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><\/div><div class=\"course_price\"><div class=\"course_price_text\">Precio a consultar<\/div><\/div><a href=\"https:\/\/www.emagister.com\/master-universitario-ciberseguridad-cursos-3787990.htm\" class=\"course_button directory\">Ver m\u00e1s<\/a><\/div><\/div><div class=\"courses_more_wpr\"><span class=\"courses_more directory ofuscado\" onclick=\"window.location.href='https:\/\/www.emagister.com\/web\/search?q=ciberseguridad&#038;token=668d173c-ff0d-4d4f-bd13-3db820a3b96a&#038;segment=1&#038;sort=purePPL';\">Ver todos los cursos<svg height=\"20\" viewBox=\"0 0 20 20\" width=\"20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m12.77 10.332-4.602 4.531c-.184.184-.48.184-.664 0l-.277-.277c-.184-.184-.184-.48 0-.664l3.996-3.922-3.993-3.922c-.183-.183-.183-.48 0-.664l.278-.277c.183-.184.48-.184.664 0l4.601 4.531c.18.184.18.48-.003.664z\" fill=\"#4cb7ac\" fill-rule=\"evenodd\"\/><\/svg><\/span><\/div><\/div>\n<p style=\"text-align: justify;\">Los ataques cl\u00e1sicos a servidores y ordenadores personales siguen siendo una preocupaci\u00f3n acuciante para empresas y particulares de todo el mundo, pero cada vez est\u00e1 subiendo m\u00e1s otra ciberamenaza en el particular ranking de los miedos digitales:\u00a0<strong>las campa\u00f1as que tienen como objetivo los dispositivos conectados que conforman el Internet de las Cosas.<\/strong><\/p>\n<h3>\u00bfQu\u00e9 ocurre con el internet de las cosas?<\/h3>\n<p style=\"text-align: justify;\"><strong>Este ecosistema en plena ebullici\u00f3n<\/strong>\u00a0(Gartner estima 20.000 millones de objetos conectados para finales del pr\u00f3ximo a\u00f1o\u00a0-con un espectacular incremento del 143% en apenas dos a\u00f1os-, mientras que otros estudios hablan de entre 30.000 y 50.000 dispositivos IoT para mediados de d\u00e9cada) es\u00a0<strong>extremadamente atractivo para los ciberdelincuentes<\/strong>\u00a0y que, adem\u00e1s,\u00a0hoy por hoy no goza de las mismas medidas de seguridad (ni de concienciaci\u00f3n)\u00a0que otros elementos de nuestra vida digital.<\/p>\n<p style=\"text-align: justify;\">As\u00ed lo pone de relieve un reciente estudio de F5 Labs seg\u00fan el cual\u00a0los atacantes est\u00e1n poniendo cada vez m\u00e1s sus miras en el entorno del IoT frente a otras acciones m\u00e1s cl\u00e1sicas contra servicios web, aplicaciones o servidores de correo electr\u00f3nico. Y, lo m\u00e1s curioso, es que en la arena de las ciberamenazas de Internet de las Cosas, el mapa de los protagonistas habituales (EEUU \u2018vs\u2019 Rusia \u2018vs\u2019 Ucrania \u2018vs\u2019 Israel \u2018vs\u2019 Corea del Norte) es bastante diferente.<\/p>\n<h3>\u00bfCu\u00e1les son los objetivos de los ciberdelincuentes?<\/h3>\n<p style=\"text-align: justify;\">La mayor\u00eda de las veces, los ciberdelincuentes apuntan a routers, c\u00e1maras IP, DVR y CCTV. Adem\u00e1s, el informe de F5 Labs detalla que los\u00a050 principales ataques registrados proven\u00edan de nuevas direcciones IP, lo que puede significar tan solo tres cosas: o hay muchas personas nuevas involucradas\u2026 o los piratas inform\u00e1ticos est\u00e1n utilizando sistemas nuevos\u2026 o ambos.<\/p>\n<p><em>Fuente: Ticbeat<\/em><\/p>\n<div class=\"courses\"><div class=\"course\"><div class=\"inside\"><a href=\"https:\/\/www.emagister.com\/master-seguridad-salud-trabajo-cursos-3775202.htm\" class=\"course_name directory\">M\u00e1ster en Seguridad y Salud en el Trabajo<\/a><div class=\"course_center\">Instituto Europeo de Posgrado (IEP)<\/div><div class=\"course_rating\"><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg height=\"14\" viewBox=\"0 0 15 14\" width=\"15\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m7.293 11.013-4.315 2.269.824-4.805-3.492-3.404 4.825-.7 2.158-4.373 2.158 4.372 4.825.701-3.492 3.404.825 4.805z\" fill=\"#e5e5e5\" fill-rule=\"evenodd\"\/><\/svg><\/i><\/div><div class=\"course_price\"><div class=\"course_price_text\">Precio Emagister<\/div><del>7.750 \u20ac<\/del>  3.643 \u20ac<\/div><a href=\"https:\/\/www.emagister.com\/master-seguridad-salud-trabajo-cursos-3775202.htm\" class=\"course_button directory\">Ver m\u00e1s<\/a><\/div><\/div><div class=\"course\"><div class=\"inside\"><a href=\"https:\/\/www.emagister.com\/pdd-seleccion-formacion-prevencion-riesgos-laborales-cursos-3462964.htm\" class=\"course_name directory\">M\u00e1ster en Seguridad en el Trabajo<\/a><div class=\"course_center\">ISEB - Instituto Superior Europeo de Barcelona<\/div><div class=\"course_rating\"><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><svg fill=\"none\" height=\"13\" viewBox=\"0 0 13 13\" width=\"13\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m5.79999.990059-1.58 3.220001-3.549999.52c-.6399996.09-.9.87-.43 1.32l2.559999 2.51-.6 3.53004c-.11.64.56 1.12 1.13.82l3.18-1.67v-10.680041c-.29 0-.56.14-.71.43z\" fill=\"#f5ba41\"\/><path d=\"m10.8 12.0901-.6-3.53004 2.57-2.5c.46-.45.21-1.23-.43-1.33l-3.56-.52-1.58-3.220001c-.15-.28-.42-.43-.7-.43v10.680041l3.18 1.67c.56.3 1.23-.18 1.12-.82z\" fill=\"#e5e5e5\"\/><\/svg><\/i><\/div><div class=\"course_price\"><div class=\"course_price_text\">Precio Emagister<\/div><del>3.700 \u20ac<\/del>  2.400 \u20ac<\/div><a href=\"https:\/\/www.emagister.com\/pdd-seleccion-formacion-prevencion-riesgos-laborales-cursos-3462964.htm\" class=\"course_button directory\">Ver m\u00e1s<\/a><\/div><\/div><div class=\"courses_more_wpr\"><span class=\"courses_more directory ofuscado\" onclick=\"window.location.href='https:\/\/www.emagister.com\/web\/search?q=seguridad&#038;token=668d173c-ff0d-4d4f-bd13-3db820a3b96a&#038;segment=1&#038;sort=purePPL';\">Ver todos los cursos<svg height=\"20\" viewBox=\"0 0 20 20\" width=\"20\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"m12.77 10.332-4.602 4.531c-.184.184-.48.184-.664 0l-.277-.277c-.184-.184-.184-.48 0-.664l3.996-3.922-3.993-3.922c-.183-.183-.183-.48 0-.664l.278-.277c.183-.184.48-.184.664 0l4.601 4.531c.18.184.18.48-.003.664z\" fill=\"#4cb7ac\" fill-rule=\"evenodd\"\/><\/svg><\/span><\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>La mayor\u00eda de los ciberataques IoT provienen de Brasil (18% de ellos), seguidos de los que tienen como origen China &#8230; <a title=\"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas\" class=\"read-more\" href=\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/\" aria-label=\"M\u00e1s en Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas\">Leer m\u00e1s<\/a><\/p>\n","protected":false},"author":277,"featured_media":79305,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[8336],"tags":[3044,6012,2690,2849,3041],"class_list":["post-79300","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-noticias","tag-ciberdelincuencia","tag-master-en-ciberseguridad","tag-internet-de-las-cosas","tag-ciberseguridad","tag-hacker","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-25"],"acf":{"mostrar_faldon":"-1","texto_faldon":"","link_faldon":"","link_texto_faldon":"","hreflang":false,"estilo_titulo":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v18.1 (Yoast SEO v27.0) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas - Blog Emagister<\/title>\n<meta name=\"description\" content=\"En el extremo receptor se encuentra Espa\u00f1a, que sufri\u00f3 el 80% de todo el tr\u00e1fico monitorizado como sospechoso de haber sido objetivo de ciberatacantes.\" \/>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas\" \/>\n<meta property=\"og:description\" content=\"En el extremo receptor se encuentra Espa\u00f1a, que sufri\u00f3 el 80% de todo el tr\u00e1fico monitorizado como sospechoso de haber sido objetivo de ciberatacantes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog Emagister\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Emagister\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-10T16:06:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-03T10:08:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2019\/01\/iot-util-peligroso.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"810\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Marta Trap\u00e9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@emagister\" \/>\n<meta name=\"twitter:site\" content=\"@emagister\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Marta Trap\u00e9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/\"},\"author\":{\"name\":\"Marta Trap\u00e9\",\"@id\":\"https:\/\/www.emagister.com\/blog\/#\/schema\/person\/43561579cf9a10db326f00524d5f26a5\"},\"headline\":\"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas\",\"datePublished\":\"2019-01-10T16:06:21+00:00\",\"dateModified\":\"2021-05-03T10:08:36+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/\"},\"wordCount\":396,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.emagister.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2019\/01\/iot-util-peligroso.jpg\",\"keywords\":[\"Ciberdelincuencia\",\"M\u00e1ster en Ciberseguridad\",\"Internet de las cosas\",\"ciberseguridad\",\"Hacker\"],\"articleSection\":[\"Actualidad Emagister\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/\",\"url\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/\",\"name\":\"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas - Blog Emagister\",\"isPartOf\":{\"@id\":\"https:\/\/www.emagister.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2019\/01\/iot-util-peligroso.jpg\",\"datePublished\":\"2019-01-10T16:06:21+00:00\",\"dateModified\":\"2021-05-03T10:08:36+00:00\",\"description\":\"En el extremo receptor se encuentra Espa\u00f1a, que sufri\u00f3 el 80% de todo el tr\u00e1fico monitorizado como sospechoso de haber sido objetivo de ciberatacantes.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#primaryimage\",\"url\":\"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2019\/01\/iot-util-peligroso.jpg\",\"contentUrl\":\"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2019\/01\/iot-util-peligroso.jpg\",\"width\":810,\"height\":540,\"caption\":\"ciberseguridad\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Emagister\",\"item\":\"https:\/\/www.emagister.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Actualidad Emagister\",\"item\":\"https:\/\/www.emagister.com\/blog\/noticias\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.emagister.com\/blog\/#website\",\"url\":\"https:\/\/www.emagister.com\/blog\/\",\"name\":\"Blog Emagister\",\"description\":\"Gu\u00eda de orientaci\u00f3n sobre estudios y tendencias de formaci\u00f3n\",\"publisher\":{\"@id\":\"https:\/\/www.emagister.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.emagister.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.emagister.com\/blog\/#organization\",\"name\":\"Emagister\",\"url\":\"https:\/\/www.emagister.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.emagister.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2017\/02\/photo.png\",\"contentUrl\":\"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2017\/02\/photo.png\",\"width\":120,\"height\":120,\"caption\":\"Emagister\"},\"image\":{\"@id\":\"https:\/\/www.emagister.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Emagister\/\",\"https:\/\/x.com\/emagister\",\"https:\/\/www.instagram.com\/emagister\/\",\"https:\/\/www.linkedin.com\/company\/emagister-com\/\",\"https:\/\/www.pinterest.es\/emagister\/\",\"https:\/\/www.youtube.com\/user\/emagister\/\",\"https:\/\/es.wikipedia.org\/wiki\/Emagister\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.emagister.com\/blog\/#\/schema\/person\/43561579cf9a10db326f00524d5f26a5\",\"name\":\"Marta Trap\u00e9\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.emagister.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3c789ca246ecafd5189e935f3645c0958149b83aecab67769b4f55909196c991?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3c789ca246ecafd5189e935f3645c0958149b83aecab67769b4f55909196c991?s=96&r=g\",\"caption\":\"Marta Trap\u00e9\"},\"url\":\"https:\/\/www.emagister.com\/blog\/author\/mtrape\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas - Blog Emagister","description":"En el extremo receptor se encuentra Espa\u00f1a, que sufri\u00f3 el 80% de todo el tr\u00e1fico monitorizado como sospechoso de haber sido objetivo de ciberatacantes.","robots":{"index":"index","follow":"follow"},"canonical":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/","og_locale":"es_ES","og_type":"article","og_title":"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas","og_description":"En el extremo receptor se encuentra Espa\u00f1a, que sufri\u00f3 el 80% de todo el tr\u00e1fico monitorizado como sospechoso de haber sido objetivo de ciberatacantes.","og_url":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/","og_site_name":"Blog Emagister","article_publisher":"https:\/\/www.facebook.com\/Emagister\/","article_published_time":"2019-01-10T16:06:21+00:00","article_modified_time":"2021-05-03T10:08:36+00:00","og_image":[{"width":810,"height":540,"url":"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2019\/01\/iot-util-peligroso.jpg","type":"image\/jpeg"}],"author":"Marta Trap\u00e9","twitter_card":"summary_large_image","twitter_creator":"@emagister","twitter_site":"@emagister","twitter_misc":{"Escrito por":"Marta Trap\u00e9","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#article","isPartOf":{"@id":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/"},"author":{"name":"Marta Trap\u00e9","@id":"https:\/\/www.emagister.com\/blog\/#\/schema\/person\/43561579cf9a10db326f00524d5f26a5"},"headline":"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas","datePublished":"2019-01-10T16:06:21+00:00","dateModified":"2021-05-03T10:08:36+00:00","mainEntityOfPage":{"@id":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/"},"wordCount":396,"commentCount":0,"publisher":{"@id":"https:\/\/www.emagister.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2019\/01\/iot-util-peligroso.jpg","keywords":["Ciberdelincuencia","M\u00e1ster en Ciberseguridad","Internet de las cosas","ciberseguridad","Hacker"],"articleSection":["Actualidad Emagister"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/","url":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/","name":"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas - Blog Emagister","isPartOf":{"@id":"https:\/\/www.emagister.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#primaryimage"},"image":{"@id":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#primaryimage"},"thumbnailUrl":"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2019\/01\/iot-util-peligroso.jpg","datePublished":"2019-01-10T16:06:21+00:00","dateModified":"2021-05-03T10:08:36+00:00","description":"En el extremo receptor se encuentra Espa\u00f1a, que sufri\u00f3 el 80% de todo el tr\u00e1fico monitorizado como sospechoso de haber sido objetivo de ciberatacantes.","breadcrumb":{"@id":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#primaryimage","url":"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2019\/01\/iot-util-peligroso.jpg","contentUrl":"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2019\/01\/iot-util-peligroso.jpg","width":810,"height":540,"caption":"ciberseguridad"},{"@type":"BreadcrumbList","@id":"https:\/\/www.emagister.com\/blog\/espana-es-el-principal-objetivo-de-los-ciberatacantes-en-el-internet-de-las-cosas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Emagister","item":"https:\/\/www.emagister.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Actualidad Emagister","item":"https:\/\/www.emagister.com\/blog\/noticias\/"},{"@type":"ListItem","position":3,"name":"Espa\u00f1a es el principal objetivo de los ciberatacantes en el Internet de las Cosas"}]},{"@type":"WebSite","@id":"https:\/\/www.emagister.com\/blog\/#website","url":"https:\/\/www.emagister.com\/blog\/","name":"Blog Emagister","description":"Gu\u00eda de orientaci\u00f3n sobre estudios y tendencias de formaci\u00f3n","publisher":{"@id":"https:\/\/www.emagister.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.emagister.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.emagister.com\/blog\/#organization","name":"Emagister","url":"https:\/\/www.emagister.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.emagister.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2017\/02\/photo.png","contentUrl":"https:\/\/www.emagister.com\/blog\/wp-content\/uploads\/2017\/02\/photo.png","width":120,"height":120,"caption":"Emagister"},"image":{"@id":"https:\/\/www.emagister.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Emagister\/","https:\/\/x.com\/emagister","https:\/\/www.instagram.com\/emagister\/","https:\/\/www.linkedin.com\/company\/emagister-com\/","https:\/\/www.pinterest.es\/emagister\/","https:\/\/www.youtube.com\/user\/emagister\/","https:\/\/es.wikipedia.org\/wiki\/Emagister"]},{"@type":"Person","@id":"https:\/\/www.emagister.com\/blog\/#\/schema\/person\/43561579cf9a10db326f00524d5f26a5","name":"Marta Trap\u00e9","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.emagister.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3c789ca246ecafd5189e935f3645c0958149b83aecab67769b4f55909196c991?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3c789ca246ecafd5189e935f3645c0958149b83aecab67769b4f55909196c991?s=96&r=g","caption":"Marta Trap\u00e9"},"url":"https:\/\/www.emagister.com\/blog\/author\/mtrape\/"}]}},"_links":{"self":[{"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/posts\/79300","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/users\/277"}],"replies":[{"embeddable":true,"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/comments?post=79300"}],"version-history":[{"count":1,"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/posts\/79300\/revisions"}],"predecessor-version":[{"id":126019,"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/posts\/79300\/revisions\/126019"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/media\/79305"}],"wp:attachment":[{"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/media?parent=79300"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/categories?post=79300"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.emagister.com\/blog\/wp-json\/wp\/v2\/tags?post=79300"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}