{"id":52347,"date":"2016-08-29T10:38:28","date_gmt":"2016-08-29T17:38:28","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52347"},"modified":"2025-07-28T23:23:14","modified_gmt":"2025-07-29T06:23:14","slug":"como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/","title":{"rendered":"C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica"},"content":{"rendered":"<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Years ago, holograms were considered the stuff of science fiction. Things have changed. In recent times, we&#8217;ve gone from seeing our beloved, deceased cultural icons appear on stages <\/span><\/span><a href=\"http:\/\/www.billboard.com\/articles\/events\/bbma-2014\/6092040\/michael-jackson-hologram-billboard-music-awards\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">at music award<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> shows to CEOs attending large meetings <\/span><\/span><a href=\"https:\/\/www.washingtonpost.com\/news\/on-leadership\/wp\/2016\/04\/13\/star-wars-meets-the-c-suite-why-this-ceos-hologram-is-getting-beamed-into-meetings\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">as holograms<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> . Obviously, our ability to protect ourselves through virtual reality around the world has evolved. But the security implications of this have evolved as well.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Those consequences came to light earlier this month at the Usenix security conference, an annual security symposium designed to highlight the cybersecurity issues of new technology. During this year&#8217;s conference, researchers from the University of North Carolina demonstrated how <\/span><\/span><a href=\"https:\/\/www.wired.com\/2016\/08\/hackers-trick-facial-recognition-logins-photos-facebook-thanks-zuck\/#slide-1\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">lifelike facial animations<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> could be used to fool facial recognition.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">To accomplish this, WIRED reports, the researchers used virtual reality-like technology and a few photographs borrowed from volunteers. (Although the volunteers freely gave the researchers permission, the photographs were obtained in a similar way to how cybercriminals would obtain them, according to WIRED.) This technique bypassed several tested security systems.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">When it comes to technology, this isn&#8217;t unexpected. New technologies will almost always have vulnerabilities and obstacles during their inception. As always, security researchers are best equipped to uncover the security flaws embedded in these technologies.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">In <\/span><\/span><a href=\"http:\/\/www.techradar.com\/us\/news\/software\/security-software\/here-s-why-facial-recognition-tech-is-far-from-flawless-1326889\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">this particular case<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , the researchers used the stolen virtual photographs to create fake faces using readily available 3D rendering and animation software. They then combined the photographs and animated the 3D images to fool facial recognition programs into thinking the fake images had movement and depth (even making them blink and smile)\u2014measures these programs use to verify when scanning a face.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">It&#8217;s a great reminder that it&#8217;s trivial to steal high-quality photographs of someone today. Even from multiple angles, which is what a theoretical attack requires. Criminals could simply <\/span><\/span><a href=\"http:\/\/www.digitaltrends.com\/cool-tech\/facial-recognition-hack\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">browse their Facebook<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , LinkedIn, and other social media profiles. And while this vulnerability is easy to exploit, it&#8217;s also a bit tricky to defend against. After all, having an online presence is important for social and career purposes, and even the most careful people when posting can&#8217;t always guarantee they won&#8217;t leave digital footprints.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Alarming? Sure. But it&#8217;s not so worrying: the attack is too complicated and time-consuming for cybercriminals to bother carrying out. It takes a lot of preparation\u2014and in-depth knowledge\u2014to successfully replicate this theoretical attack. This fact significantly reduces the number of people who could be at risk. Furthermore, these vulnerabilities have been emphasized to cybersecurity firms\u2014firms that want this technology to succeed. Fixes for these problems will be available soon.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Given this research, we&#8217;ll take the opportunity to review two issues that are relevant in today&#8217;s digital world. First, as discussed above, maintaining a level of online privacy is important not only as a lifestyle choice but also for security. Our photos are now connected to our profiles, and consequently, to our security. Second, technology isn&#8217;t a static thing. There are new innovations every day in devices and services, and security takes time to perfect. Biometric security and similar innovations are no different.<\/span><\/span><\/p>\n<h2>Consejos para practicar la seguridad biom\u00e9trica<\/h2>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">With that in mind, I present three tips for practicing biometric security:<\/span><\/span><\/p>\n<ul>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Limit your online exposure.<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> Make sure your social media preferences are set to &#8220;private.&#8221; This way, you&#8217;ll protect not only your images, but also those of your loved ones. Always check the privacy options on your social media website. Avoid uploading images for people who don&#8217;t already have them.<\/span><\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Use comprehensive security.<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> Good security requires a lot of preparation\u2014and a comprehensive approach works best. By using a comprehensive security solution like <\/span><\/span><a href=\"http:\/\/home.mcafee.com\/root\/campaign.aspx?cid=132126\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">McAfee LiveSafe\u2122<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , you extend your level of protection across your devices.<\/span><\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Use multi-factor authentication.<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> There are several tried-and-true methods for protecting yourself online. <\/span><\/span><a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/two-steps-are-better-than-one-make-a-hackers-job-harder-with-two-step-verification\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Two-factor and multi-factor authentication<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u2014when a service requires identification using something you know, like a password or PIN, and something you have, like a smartphone\u2014is one of the most reliable security methods available. Check the services you use online and see if it&#8217;s available for account authentication.<\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Of course, stay ahead of the latest mobile and consumer security threats <\/span><\/span><a href=\"http:\/\/www.twitter.com\/garyjdavis\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">by following<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> and checking in with us <\/span><\/span><a href=\"http:\/\/www.twitter.com\/McAfee_home\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">@McAfee_Home<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> on Twitter, and liking us on <\/span><\/span><a href=\"http:\/\/www.facebook.com\/McAfee\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Facebook<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> .<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Years ago, holograms were considered the stuff of science fiction. Things have changed. In recent times, we&#8217;ve gone from seeing&#8230;<\/p>\n","protected":false},"author":674,"featured_media":170493,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11848,11851,11863],"tags":[14431,14425,14428],"coauthors":[16326],"class_list":["post-52347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","category-internet-security","category-privacy-identity-protection","tag-biometric-security-es-es","tag-facebook-es-es","tag-virtual-reality-es-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica | Blog de McAfee<\/title>\n<meta name=\"description\" content=\"Years ago, holograms were considered the stuff of science fiction. Things have changed. In recent times, we&#039;ve gone from seeing our beloved, deceased\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica | Blog de McAfee\" \/>\n<meta property=\"og:description\" content=\"Years ago, holograms were considered the stuff of science fiction. Things have changed. In recent times, we&#039;ve gone from seeing our beloved, deceased\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog de McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-29T17:38:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-29T06:23:14+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica\",\"datePublished\":\"2016-08-29T17:38:28+00:00\",\"dateModified\":\"2025-07-29T06:23:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/\"},\"wordCount\":718,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/614x300_Lets-Make-Security-Easy.png\",\"keywords\":[\"Biometric Security\",\"facebook\",\"virtual reality\"],\"articleSection\":[\"Seguridad m\u00f3vil\",\"Seguridad en Internet\",\"Privacidad y protecci\u00f3n de identidad\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/\",\"name\":\"C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica | Blog de McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/614x300_Lets-Make-Security-Easy.png\",\"datePublished\":\"2016-08-29T17:38:28+00:00\",\"dateModified\":\"2025-07-29T06:23:14+00:00\",\"description\":\"Years ago, holograms were considered the stuff of science fiction. Things have changed. In recent times, we've gone from seeing our beloved, deceased\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/614x300_Lets-Make-Security-Easy.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/614x300_Lets-Make-Security-Easy.png\",\"width\":622,\"height\":308},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad m\u00f3vil\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"name\":\"Blog de McAfee\",\"description\":\"Noticias sobre seguridad en Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica | Blog de McAfee","description":"Years ago, holograms were considered the stuff of science fiction. Things have changed. In recent times, we've gone from seeing our beloved, deceased","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica | Blog de McAfee","og_description":"Years ago, holograms were considered the stuff of science fiction. Things have changed. In recent times, we've gone from seeing our beloved, deceased","og_url":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/","og_site_name":"Blog de McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-08-29T17:38:28+00:00","article_modified_time":"2025-07-29T06:23:14+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica","datePublished":"2016-08-29T17:38:28+00:00","dateModified":"2025-07-29T06:23:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/"},"wordCount":718,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/614x300_Lets-Make-Security-Easy.png","keywords":["Biometric Security","facebook","virtual reality"],"articleSection":["Seguridad m\u00f3vil","Seguridad en Internet","Privacidad y protecci\u00f3n de identidad"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/","name":"C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica | Blog de McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/614x300_Lets-Make-Security-Easy.png","datePublished":"2016-08-29T17:38:28+00:00","dateModified":"2025-07-29T06:23:14+00:00","description":"Years ago, holograms were considered the stuff of science fiction. Things have changed. In recent times, we've gone from seeing our beloved, deceased","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/614x300_Lets-Make-Security-Easy.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/11\/614x300_Lets-Make-Security-Easy.png","width":622,"height":308},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/como-la-realidad-virtual-ayudaron-a-los-investigadores-a-hackear-la-seguridad-biometrica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/"},{"@type":"ListItem","position":2,"name":"Seguridad m\u00f3vil","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"C\u00f3mo la realidad virtual ayudaron a los investigadores a hackear la Seguridad Biom\u00e9trica"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","name":"Blog de McAfee","description":"Noticias sobre seguridad en Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/52347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/comments?post=52347"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/52347\/revisions"}],"predecessor-version":[{"id":212445,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/52347\/revisions\/212445"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/media\/170493"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/media?parent=52347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/categories?post=52347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/tags?post=52347"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/coauthors?post=52347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}