{"id":52591,"date":"2024-05-14T07:26:43","date_gmt":"2024-05-14T14:26:43","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=52591"},"modified":"2025-07-28T22:11:04","modified_gmt":"2025-07-29T05:11:04","slug":"el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/","title":{"rendered":"El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos"},"content":{"rendered":"<p style=\"text-align: left;\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Most people have heard the story of the Trojan horse. We&#8217;ve learned the lesson from history: don&#8217;t trust gifts from strangers. Today, no one would use a giant horse statue, except for a few pranksters with a bad sense of humor, although similar tricks exist in digital form. People are wary of unfamiliar .exe files and sudden pop-up ad downloads. They trust more familiar files like .jpg. But the latest incarnation of the Trojan horse is malicious code that can hide in images and allows cybercriminals to <\/span><\/span><a href=\"http:\/\/www.forbes.com\/sites\/thomasbrewster\/2016\/09\/06\/google-android-one-photo-hack\/#242678215552\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">take over Android devices<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> .<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Google has moved quickly and has already issued an Android update. Once these software changes occur on a device, this loophole will be resolved. Another positive point is that this tactic is not widespread; it was discovered by cybersecurity researcher Tim Strazzere. So, ultimately, photo hacking is <\/span><\/span><em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">not<\/span><\/span><\/em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> a widespread threat. However, people should be cautious and stay informed. Understanding how cybercriminals operate is the first step in knowing how to stay safe online.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Truth be told, hiding malicious code in other forms isn&#8217;t a new tactic. Criminals have devised all sorts of scams. <\/span><\/span><a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/microsoft-word-malware\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Infected Microsoft Word documents<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> have been found. When users run these infected files on their PCs, malware is installed to steal sensitive information. The photography method is the latest in this context.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">What&#8217;s unique about this case is the warning that bad guys can infiltrate even if the images aren&#8217;t clicked. Let&#8217;s go into a brief rundown of the technical details to explain how. When photos are sent to your Android device, some of that data is <\/span><\/span><a href=\"http:\/\/www.techworm.net\/2016\/09\/hackers-can-use-single-photo-remotely-takeover-android-smartphone.html\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">processed before users open the file<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> . This is known as <\/span><\/span><em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">parsing<\/span><\/span><\/em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> in computer science terms: the unpacking and separating of information. You see, smartphones need to know what data to process when users open a file. But they must first see other data to understand the nature of the file type. That&#8217;s why cybercriminals can pack secret instructions that will be triggered when they retrieve the file.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">What happens next? Well, malware can \u201clock\u201d the user&#8217;s devices, rendering them unusable. Cybercriminals then gain remote access to the smartphone. With all the sensitive information our devices are now using, criminals can get quite a bit! Think of financial details, passwords and online accounts, as well as emails. Criminals could even use the phone&#8217;s apps to their advantage, and to the user&#8217;s detriment.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Remember, Google has already issued an Android update to combat this, so there&#8217;s no need to panic. There are several deceptive threats, and the key to countering them is to be informed. This won&#8217;t be the last incarnation of the Trojan horse. But with the right security knowledge, people can stay safe in the digital age.<\/span><\/span><\/p>\n<h2>Consejos de ciberseguridad<\/h2>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">With that in mind, here are three cybersecurity tips to keep in mind:<\/span><\/span><\/p>\n<ul>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Don&#8217;t overexpose yourself on social media or chat apps.<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> For this photo trick to work on your Android device, someone has to send you an image. How do they do that? Probably through a Facebook message or another chat app. So think of security in layers: at the basic perimeter, simply don&#8217;t let people contact you. This also protects you from <\/span><\/span><a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/social-media-harassment-threat\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">social media bullying<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> .<\/span><\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Update your device as soon as possible.<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> Large companies have cybersecurity teams working to protect their customers, but updates depend on the customers. In this case, once Google received the report, the latest Android update was tailored to address the vulnerability. Make sure to update your devices and your apps as well.<\/span><\/span><\/li>\n<\/ul>\n<ul>\n<li><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Be aware of where you browse and what you open<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> . As threats evolve, cybercriminals continue to introduce malware using advanced methods. Some people may receive an email with <\/span><\/span><a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/microsoft-word-malware\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">an infected Microsoft Word document attached<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , while others may accidentally land on an <\/span><\/span><a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/android-linux-bug-2016\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">unsafe website<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> . Always make sure what you see on your screen is authentic. Double-check email senders. Look for the official URL. Be aware and vigilant.<\/span><\/span><\/li>\n<\/ul>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Stay ahead of the latest mobile and consumer security threats <\/span><\/span><a href=\"http:\/\/www.twitter.com\/garyjdavis\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">by following<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> and engaging with us <\/span><\/span><a href=\"https:\/\/twitter.com\/McAfee\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">@McAfee<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> \u00a0on Twitter and liking us on <\/span><\/span><a href=\"https:\/\/www.facebook.com\/McAfee\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Facebook<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> .<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most people have heard the story of the Trojan horse. We&#8217;ve learned the lesson from history: don&#8217;t trust gifts from&#8230;<\/p>\n","protected":false},"author":838,"featured_media":138091,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11848,11851],"tags":[16235],"coauthors":[16326,4687],"class_list":["post-52591","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile-security","category-internet-security","tag-seguridad-movil-es-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos | Blog de McAfee<\/title>\n<meta name=\"description\" content=\"Most people have heard the story of the Trojan horse. We&#039;ve learned the lesson from history: don&#039;t trust gifts from strangers. Today, no one would use a\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos | Blog de McAfee\" \/>\n<meta property=\"og:description\" content=\"Most people have heard the story of the Trojan horse. We&#039;ve learned the lesson from history: don&#039;t trust gifts from strangers. Today, no one would use a\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog de McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-14T14:26:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-29T05:11:04+00:00\" \/>\n<meta name=\"author\" content=\"McAfee LTAM\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee LTAM\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/\"},\"author\":{\"name\":\"McAfee LTAM\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc\"},\"headline\":\"El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos\",\"datePublished\":\"2024-05-14T14:26:43+00:00\",\"dateModified\":\"2025-07-29T05:11:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/\"},\"wordCount\":700,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"keywords\":[\"seguridad m\u00f3vil\"],\"articleSection\":[\"Seguridad m\u00f3vil\",\"Seguridad en Internet\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/\",\"name\":\"El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos | Blog de McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"datePublished\":\"2024-05-14T14:26:43+00:00\",\"dateModified\":\"2025-07-29T05:11:04+00:00\",\"description\":\"Most people have heard the story of the Trojan horse. We've learned the lesson from history: don't trust gifts from strangers. Today, no one would use a\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg\",\"width\":614,\"height\":300,\"caption\":\"man using android apps\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad m\u00f3vil\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"name\":\"Blog de McAfee\",\"description\":\"Noticias sobre seguridad en Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc\",\"name\":\"McAfee LTAM\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/138881b47da8f70f6daacc26e1ea0963\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg\",\"caption\":\"McAfee LTAM\"},\"description\":\"Conozca nuestra visi\u00f3n global en espa\u00f1ol y portugu\u00e9s, sobre tendencias y ejes de pensamiento en temas de ciber-seguridad, enfocada en el ciclo de vida de la amenazas y mostrando como protegerlas, detectarlas y corregirlas utilizando intercambio de inteligencia, frente a los desaf\u00edos de la actualidad | Learn about our global vision in Spanish and Portuguese, trends and thought leadership topics oriented to cyber security, and the threat defense life-cycle to protect, detect and correct them, using threat intelligence and driving today\u00b4s challenges.\",\"sameAs\":[\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/intel-security-ltam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos | Blog de McAfee","description":"Most people have heard the story of the Trojan horse. We've learned the lesson from history: don't trust gifts from strangers. Today, no one would use a","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos | Blog de McAfee","og_description":"Most people have heard the story of the Trojan horse. We've learned the lesson from history: don't trust gifts from strangers. Today, no one would use a","og_url":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/","og_site_name":"Blog de McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-05-14T14:26:43+00:00","article_modified_time":"2025-07-29T05:11:04+00:00","author":"McAfee LTAM","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee LTAM","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/"},"author":{"name":"McAfee LTAM","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc"},"headline":"El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos","datePublished":"2024-05-14T14:26:43+00:00","dateModified":"2025-07-29T05:11:04+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/"},"wordCount":700,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","keywords":["seguridad m\u00f3vil"],"articleSection":["Seguridad m\u00f3vil","Seguridad en Internet"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/","name":"El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos | Blog de McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","datePublished":"2024-05-14T14:26:43+00:00","dateModified":"2025-07-29T05:11:04+00:00","description":"Most people have heard the story of the Trojan horse. We've learned the lesson from history: don't trust gifts from strangers. Today, no one would use a","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/614x300_AndroidApps.jpg","width":614,"height":300,"caption":"man using android apps"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/el-hackeo-de-la-foto-de-android-una-foto-dice-mas-que-mil-comandos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/"},{"@type":"ListItem","position":2,"name":"Seguridad m\u00f3vil","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/mobile-security\/"},{"@type":"ListItem","position":3,"name":"El hackeo de la foto de Android: una foto dice m\u00e1s que mil comandos"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","name":"Blog de McAfee","description":"Noticias sobre seguridad en Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc","name":"McAfee LTAM","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/138881b47da8f70f6daacc26e1ea0963","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg","caption":"McAfee LTAM"},"description":"Conozca nuestra visi\u00f3n global en espa\u00f1ol y portugu\u00e9s, sobre tendencias y ejes de pensamiento en temas de ciber-seguridad, enfocada en el ciclo de vida de la amenazas y mostrando como protegerlas, detectarlas y corregirlas utilizando intercambio de inteligencia, frente a los desaf\u00edos de la actualidad | Learn about our global vision in Spanish and Portuguese, trends and thought leadership topics oriented to cyber security, and the threat defense life-cycle to protect, detect and correct them, using threat intelligence and driving today\u00b4s challenges.","sameAs":["https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/intel-security-ltam\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/52591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/users\/838"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/comments?post=52591"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/52591\/revisions"}],"predecessor-version":[{"id":212430,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/52591\/revisions\/212430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/media\/138091"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/media?parent=52591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/categories?post=52591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/tags?post=52591"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/coauthors?post=52591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}