{"id":86,"date":"2019-04-02T20:43:00","date_gmt":"2019-04-02T20:43:00","guid":{"rendered":"http:\/\/54.157.48.44\/2019\/04\/02\/que-son-las-cookies-maliciosas\/"},"modified":"2019-04-02T20:43:00","modified_gmt":"2019-04-02T20:43:00","slug":"que-son-las-cookies-maliciosas","status":"publish","type":"post","link":"http:\/\/34.227.63.65\/en\/technology\/what-are-malicious-cookies\/","title":{"rendered":"What are malicious Cookies?"},"content":{"rendered":"<div style=\"clear: both; text-align: center;\"><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em;\">\n<div style=\"clear: both; text-align: center;\"><a href=\"http:\/\/98.81.225.148\/wp-content\/uploads\/2019\/04\/Captura-1.png\" style=\"margin-left: 1em; margin-right: 1em;\"><img fetchpriority=\"high\" decoding=\"async\" border=\"0\" data-original-height=\"316\" data-original-width=\"318\" height=\"398\" src=\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1-300x298.png\" width=\"400\" \/><\/a><\/div>\n<div style=\"clear: both; text-align: center;\"><a href=\"https:\/\/www.blogger.com\/u\/1\/blogger.g?blogID=7456891857864012010\" style=\"margin-left: 1em; margin-right: 1em;\"><\/a><\/div>\n<p><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em;\"><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>Malicious Cookies<\/b>:<\/u>&nbsp; Cookies is a small text file that stores data up to 4Kb, so that the next time you enter a web page data is stored, such as your account already opened, or modifications you have made, it is special for WEB 2.0. While malicious cookies use this data to inject advertising that would be similar to what Spyware does, and can collect your information and sell it to third parties.&nbsp;<\/span><\/p>\n<\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b><br \/><\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b><br \/><\/b><\/u><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>How to defend yourself?<\/b><\/u><\/span><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Block cookies in your browser, this can be done through your browser settings.<\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Install third-party extensions to avoid all types of malicious cookies.<\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Updated antivirus.<\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Do not surf on unreliable web pages.&nbsp;<\/span><\/div>","protected":false},"excerpt":{"rendered":"<p>Cookies maliciosas:&nbsp; Las cookies es un peque\u00f1o archivo de texto que guardan datos de hasta 4Kb, para que la pr\u00f3xima vez que entres a una p\u00e1gina web queden datos guardados, como tu cuenta ya abierta, o modificaciones que has hecho, es especial para la WEB 2.0. Mientras que las cookies maliciosas usan estos datos para [&hellip;]<\/p>","protected":false},"author":3,"featured_media":127,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-86","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00bfQu\u00e9 son las Cookies maliciosas? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/34.227.63.65\/en\/technology\/what-are-malicious-cookies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 son las Cookies maliciosas? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"og:description\" content=\"Cookies maliciosas:&nbsp; Las cookies es un peque\u00f1o archivo de texto que guardan datos de hasta 4Kb, para que la pr\u00f3xima vez que entres a una p\u00e1gina web queden datos guardados, como tu cuenta ya abierta, o modificaciones que has hecho, es especial para la WEB 2.0. Mientras que las cookies maliciosas usan estos datos para [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/34.227.63.65\/en\/technology\/what-are-malicious-cookies\/\" \/>\n<meta property=\"og:site_name\" content=\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-02T20:43:00+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"318\" \/>\n\t<meta property=\"og:image:height\" content=\"316\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Johan Astudillo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Johan Astudillo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/\"},\"author\":{\"name\":\"Johan Astudillo\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44\"},\"headline\":\"\u00bfQu\u00e9 son las Cookies maliciosas?\",\"datePublished\":\"2019-04-02T20:43:00+00:00\",\"dateModified\":\"2019-04-02T20:43:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/\"},\"wordCount\":130,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1.png\",\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/\",\"url\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/\",\"name\":\"\u00bfQu\u00e9 son las Cookies maliciosas? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1.png\",\"datePublished\":\"2019-04-02T20:43:00+00:00\",\"dateModified\":\"2019-04-02T20:43:00+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#primaryimage\",\"url\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1.png\",\"contentUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1.png\",\"width\":318,\"height\":316},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/34.227.63.65\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 son las Cookies maliciosas?\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/34.227.63.65\/#website\",\"url\":\"http:\/\/34.227.63.65\/\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"description\":\"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress\",\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/34.227.63.65\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/34.227.63.65\/#organization\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"url\":\"http:\/\/34.227.63.65\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"contentUrl\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"width\":512,\"height\":512,\"caption\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44\",\"name\":\"Johan Astudillo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g\",\"caption\":\"Johan Astudillo\"},\"url\":\"http:\/\/34.227.63.65\/en\/author\/johan-astudillo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 son las Cookies maliciosas? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/34.227.63.65\/en\/technology\/what-are-malicious-cookies\/","og_locale":"en_US","og_type":"article","og_title":"\u00bfQu\u00e9 son las Cookies maliciosas? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","og_description":"Cookies maliciosas:&nbsp; Las cookies es un peque\u00f1o archivo de texto que guardan datos de hasta 4Kb, para que la pr\u00f3xima vez que entres a una p\u00e1gina web queden datos guardados, como tu cuenta ya abierta, o modificaciones que has hecho, es especial para la WEB 2.0. Mientras que las cookies maliciosas usan estos datos para [&hellip;]","og_url":"http:\/\/34.227.63.65\/en\/technology\/what-are-malicious-cookies\/","og_site_name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","article_published_time":"2019-04-02T20:43:00+00:00","og_image":[{"width":318,"height":316,"url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1.png","type":"image\/png"}],"author":"Johan Astudillo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Johan Astudillo","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#article","isPartOf":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/"},"author":{"name":"Johan Astudillo","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44"},"headline":"\u00bfQu\u00e9 son las Cookies maliciosas?","datePublished":"2019-04-02T20:43:00+00:00","dateModified":"2019-04-02T20:43:00+00:00","mainEntityOfPage":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/"},"wordCount":130,"commentCount":0,"publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"image":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1.png","articleSection":["Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/","url":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/","name":"\u00bfQu\u00e9 son las Cookies maliciosas? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","isPartOf":{"@id":"http:\/\/34.227.63.65\/#website"},"primaryImageOfPage":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#primaryimage"},"image":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1.png","datePublished":"2019-04-02T20:43:00+00:00","dateModified":"2019-04-02T20:43:00+00:00","breadcrumb":{"@id":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#primaryimage","url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1.png","contentUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/04\/Captura-1.png","width":318,"height":316},{"@type":"BreadcrumbList","@id":"http:\/\/34.227.63.65\/tecnologia\/que-son-las-cookies-maliciosas\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/34.227.63.65\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 son las Cookies maliciosas?"}]},{"@type":"WebSite","@id":"http:\/\/34.227.63.65\/#website","url":"http:\/\/34.227.63.65\/","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","description":"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress","publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/34.227.63.65\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/34.227.63.65\/#organization","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","url":"http:\/\/34.227.63.65\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/","url":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","contentUrl":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","width":512,"height":512,"caption":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda"},"image":{"@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44","name":"Johan Astudillo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/image\/","url":"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g","caption":"Johan Astudillo"},"url":"http:\/\/34.227.63.65\/en\/author\/johan-astudillo\/"}]}},"_links":{"self":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/86"}],"collection":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/comments?post=86"}],"version-history":[{"count":0,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/86\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media\/127"}],"wp:attachment":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media?parent=86"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/categories?post=86"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/tags?post=86"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}