{"id":53363,"date":"2016-10-14T17:27:31","date_gmt":"2016-10-15T00:27:31","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=53363"},"modified":"2025-07-28T23:19:47","modified_gmt":"2025-07-29T06:19:47","slug":"informe-de-amenazas-de-septiembre-de-mcafee-labs","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/","title":{"rendered":"Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs"},"content":{"rendered":"<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">As technology makes our lives increasingly convenient, we can rely on it more. We use it constantly, even sharing our personal information with apps and services.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">But cybercriminals know this\u2014in fact, they&#8217;re counting on it. <\/span><\/span><a href=\"https:\/\/mcafee.app.box.com\/files\/0\/f\/11308264797\/1\/f_94941933469\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">McAfee Labs&#8217; September 2016 Threat Report<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> reveals that scammers are targeting people, attacking their data more than ever. It&#8217;s become easier for them to steal this information, and the report even states that &#8220;personal data about customers or employees now makes up the majority of reported breaches, with payments coming in a distant third.&#8221;<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">But why does this happen? Shouldn&#8217;t technological advances make us more secure? Truth be told, new vehicles for sharing personal data can also be a treasure trove for criminals.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">We&#8217;re living in an age where mobile devices, cloud-based sharing platforms, and social media are the norm. That&#8217;s largely why <\/span><\/span><a href=\"https:\/\/mcafee.app.box.com\/files\/0\/f\/11307936830\/1\/f_94918963805\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">personal data has become a big target<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> . But it&#8217;s important to remember that new technology invites threats, just like old technology. It&#8217;s all about ease of access: when attackers detect flaws in a cybersecurity system (old or new), they&#8217;re drawn in.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">One of cybercriminals&#8217; new targets, believe it or not, is medical records. Hospital software is more outdated than you might think. But criminals go deeper than consumers, and they&#8217;ve taken advantage of weaknesses, especially over the past year. This year, <\/span><\/span><a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/sep-2016-threats-report-takeaways\/\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">hospitals have become a major target for <\/span><\/span><em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">ransomware<\/span><\/span><\/em><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> , with one cybercriminal even earning $121 million from a handful of campaigns targeting hospitals.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">This increase in ransomware attacks on the healthcare sector is no coincidence. It&#8217;s due to the outdated infrastructure required to remain operational at all times. These systems, which struggle to integrate new cybersecurity technologies with outdated systems, are a target.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Because hospitals contain repositories of personalized data, many thieves also target consumers directly. Age isn&#8217;t the only factor; new technologies are also being exploited. Take social media, for example. It provides thieves with a new source to target and enhance <\/span><\/span><em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">phishing<\/span><\/span><\/em><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> attacks .<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Other new platforms, such as cloud computing technologies, are also more difficult to protect using older methods. As people spend more time on mobile devices, scammers are capitalizing on that space as well. During the second quarter of 2016 alone, the number of new mobile malware samples was the highest ever recorded, with two million samples.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">The moral of the story is this: personal data is being hunted. Thieves are finding security holes in both new and old technologies to extract the most private information.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">But luckily, there are solutions. Security is also thinking ahead. The industry is constantly looking for innovative ways to keep people safe. As the latest McAfee Labs Threat Report indicates, the number of internet-connected devices and the volume of data are increasing every year. This allows analytics to slowly become the primary approach to disrupting incoming attacks. From data science to machine learning, we can expect more cutting-edge security solutions every day.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">In fact, we&#8217;ve already started. With the launch of McAfee Next Generation Anti-Malware Engine, the cornerstone of our new consumer security line, we&#8217;re using behavioral analysis and machine learning to better detect threats. This new solution, along with our other product updates, ensures that your mobile, cloud-connected, and wearable devices remain secure.<\/span><\/span><\/p>\n<h2 data-start=\"51\" data-end=\"79\"><strong data-start=\"51\" data-end=\"79\">Consejos para protegerte<\/strong><\/h2>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">In the meantime, to keep your personal data safe, here are some tips to protect yourself:<\/span><\/span><\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">It&#8217;s time for an update.<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> Don&#8217;t let your own records become obsolete. It&#8217;s essential to avoid having old and vulnerable software. Update your devices&#8217; operating systems to the latest versions. Very often, software updates come with security updates.<\/span><\/span><\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Keep security in mind when purchasing new technology or accessing a website.<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> Do a quick Google search for a product before taking it home, and make sure it&#8217;s rated as secure. Also, check what security settings it has. If you&#8217;re unsure whether a website is vulnerable, you can use the True Key app to log in securely.<\/span><\/span><\/p>\n<p><strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Back up everything and be ready for removal.<\/span><\/span><\/strong><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> When breaches occur, damage control is necessary. Having your account information can help you communicate with the teams responsible for security. So keep copies on an external hard drive. That way, if a breach occurs, you won&#8217;t lose everything. And if malware is deployed, our new Virus Protection Pledge products guarantee permanent virus removal.<\/span><\/span><\/p>\n<p><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">And of course, stay ahead of the latest mobile and consumer security threats by following us, like us <\/span><\/span><a href=\"https:\/\/twitter.com\/McAfee\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">@McAfee<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> on Twitter, and liking us on <\/span><\/span><a href=\"https:\/\/www.facebook.com\/McAfee\"><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\">Facebook<\/span><\/span><\/a><span style=\"vertical-align: inherit;\"><span style=\"vertical-align: inherit;\"> .<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As technology makes our lives increasingly convenient, we can rely on it more. We use it constantly, even sharing our&#8230;<\/p>\n","protected":false},"author":838,"featured_media":182579,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[11860,11851,11857],"tags":[16235],"coauthors":[16326,4687],"class_list":["post-53363","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-news","category-internet-security","category-security-news","tag-seguridad-movil-es-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs | Blog de McAfee<\/title>\n<meta name=\"description\" content=\"As technology makes our lives increasingly convenient, we can rely on it more. We use it constantly, even sharing our personal information with apps and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs | Blog de McAfee\" \/>\n<meta property=\"og:description\" content=\"As technology makes our lives increasingly convenient, we can rely on it more. We use it constantly, even sharing our personal information with apps and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog de McAfee\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-15T00:27:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-29T06:19:47+00:00\" \/>\n<meta name=\"author\" content=\"McAfee LTAM\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee LTAM\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/\"},\"author\":{\"name\":\"McAfee LTAM\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc\"},\"headline\":\"Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs\",\"datePublished\":\"2016-10-15T00:27:31+00:00\",\"dateModified\":\"2025-07-29T06:19:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/\"},\"wordCount\":766,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/mcafee-labs.jpg\",\"keywords\":[\"seguridad m\u00f3vil\"],\"articleSection\":[\"Noticias de McAfee\",\"Seguridad en Internet\",\"Noticias sobre seguridad\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/\",\"name\":\"Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs | Blog de McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/mcafee-labs.jpg\",\"datePublished\":\"2016-10-15T00:27:31+00:00\",\"dateModified\":\"2025-07-29T06:19:47+00:00\",\"description\":\"As technology makes our lives increasingly convenient, we can rely on it more. We use it constantly, even sharing our personal information with apps and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/mcafee-labs.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/mcafee-labs.jpg\",\"width\":614,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad en Internet\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"name\":\"Blog de McAfee\",\"description\":\"Noticias sobre seguridad en Internet\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc\",\"name\":\"McAfee LTAM\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/138881b47da8f70f6daacc26e1ea0963\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg\",\"caption\":\"McAfee LTAM\"},\"description\":\"Conozca nuestra visi\u00f3n global en espa\u00f1ol y portugu\u00e9s, sobre tendencias y ejes de pensamiento en temas de ciber-seguridad, enfocada en el ciclo de vida de la amenazas y mostrando como protegerlas, detectarlas y corregirlas utilizando intercambio de inteligencia, frente a los desaf\u00edos de la actualidad | Learn about our global vision in Spanish and Portuguese, trends and thought leadership topics oriented to cyber security, and the threat defense life-cycle to protect, detect and correct them, using threat intelligence and driving today\u00b4s challenges.\",\"sameAs\":[\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/intel-security-ltam\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs | Blog de McAfee","description":"As technology makes our lives increasingly convenient, we can rely on it more. We use it constantly, even sharing our personal information with apps and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs | Blog de McAfee","og_description":"As technology makes our lives increasingly convenient, we can rely on it more. We use it constantly, even sharing our personal information with apps and","og_url":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/","og_site_name":"Blog de McAfee","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-10-15T00:27:31+00:00","article_modified_time":"2025-07-29T06:19:47+00:00","author":"McAfee LTAM","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee LTAM","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/"},"author":{"name":"McAfee LTAM","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc"},"headline":"Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs","datePublished":"2016-10-15T00:27:31+00:00","dateModified":"2025-07-29T06:19:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/"},"wordCount":766,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/mcafee-labs.jpg","keywords":["seguridad m\u00f3vil"],"articleSection":["Noticias de McAfee","Seguridad en Internet","Noticias sobre seguridad"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/","name":"Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs | Blog de McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/mcafee-labs.jpg","datePublished":"2016-10-15T00:27:31+00:00","dateModified":"2025-07-29T06:19:47+00:00","description":"As technology makes our lives increasingly convenient, we can rely on it more. We use it constantly, even sharing our personal information with apps and","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/mcafee-labs.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/mcafee-labs.jpg","width":614,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/informe-de-amenazas-de-septiembre-de-mcafee-labs\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/"},{"@type":"ListItem","position":2,"name":"Seguridad en Internet","item":"https:\/\/www.mcafee.com\/blogs\/es-es\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Lo Viejo, lo Nuevo y el Futuro: Informe de Amenazas de Septiembre de McAfee Labs"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#website","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","name":"Blog de McAfee","description":"Noticias sobre seguridad en Internet","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/es-es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/es-es\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/18884aeff6d97b77e170410af524e6fc","name":"McAfee LTAM","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.mcafee.com\/blogs\/es-es\/#\/schema\/person\/image\/138881b47da8f70f6daacc26e1ea0963","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/05\/Social-Media-PF-Logo-Pic-150x150.jpg","caption":"McAfee LTAM"},"description":"Conozca nuestra visi\u00f3n global en espa\u00f1ol y portugu\u00e9s, sobre tendencias y ejes de pensamiento en temas de ciber-seguridad, enfocada en el ciclo de vida de la amenazas y mostrando como protegerlas, detectarlas y corregirlas utilizando intercambio de inteligencia, frente a los desaf\u00edos de la actualidad | Learn about our global vision in Spanish and Portuguese, trends and thought leadership topics oriented to cyber security, and the threat defense life-cycle to protect, detect and correct them, using threat intelligence and driving today\u00b4s challenges.","sameAs":["https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/es-es\/author\/intel-security-ltam\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/53363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/users\/838"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/comments?post=53363"}],"version-history":[{"count":1,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/53363\/revisions"}],"predecessor-version":[{"id":212411,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/posts\/53363\/revisions\/212411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/media\/182579"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/media?parent=53363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/categories?post=53363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/tags?post=53363"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/es-es\/wp-json\/wp\/v2\/coauthors?post=53363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}