{"id":150814,"date":"2018-05-16T15:53:13","date_gmt":"2018-05-16T15:53:13","guid":{"rendered":"http:\/\/sftarticles.wpenginepowered.com\/es\/?p=150814"},"modified":"2025-06-13T00:42:54","modified_gmt":"2025-06-12T22:42:54","slug":"5mitos-y-verdades-seguridad-informatica-nr","status":"publish","type":"post","link":"https:\/\/cms-articles.softonic.io\/es\/5mitos-y-verdades-seguridad-informatica-nr\/","title":{"rendered":"5 mitos y verdades sobre seguridad inform\u00e1tica"},"content":{"rendered":"<p>El mundo de la inform\u00e1tica, y de la tecnolog\u00eda en general, est\u00e1 lleno de mitos y leyendas urbanas -a cada cual m\u00e1s rocambolesca- que van circulando entre los usuarios. Ahora bien, \u00bfy si alguna de ellas es verdad? Hoy te traemos <strong>cinco mitos y verdades sobre seguridad inform\u00e1tica que est\u00e1n en nuestro d\u00eda a d\u00eda<\/strong>.<\/p>\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_optimized,f_auto\/p\/ba11145a-96bf-11e6-8b84-00163ed833e7\/674007088\/ccleaner-logo.png\" alt=\"CCleaner\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">CCleaner<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/ccleaner.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">Descargar<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--90\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"90\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"9\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\">9<\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/ccleaner.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n<h2>iPhone no tiene virus<\/h2>\n<p><strong>\u00bfMito o verdad? Mito<\/strong>. iPhone puede tener virus al igual que cualquier sistema operativo. Ahora bien, cabe destacar un punto en cuesti\u00f3n: <strong>es muy dif\u00edcil que eso ocurra<\/strong> (pero puede, que ah\u00ed est\u00e1 la clave). Apple trabaja concienzudamente en todas y cada una de las versiones de su sistema operativo para otorgar un nivel de seguridad muy alto, tanto que, recordemos, ni el FBI pudo sacar informaci\u00f3n de un iPhone durante una larga temporada.<\/p>\n<p>As\u00ed mismo, a todo esto hay que sumarle que la tienda virtual, la Apple Store, cuenta con un nivel de comprobaci\u00f3n exacerbado. Toda aplicaci\u00f3n que se sube al bazar pasa por <strong>grandes controles de seguridad<\/strong>, algo de lo que Google aprende a marchas forzadas. iPhone puede tener virus, claro, pero es muy dif\u00edcil que eso ocurra.<\/p>\n<h2>Te pueden espiar por la c\u00e1mara del port\u00e1til<\/h2>\n<p><strong>\u00bfMito o verdad? Verdad<\/strong>. Las herramientas de control remoto llevan entre nosotros desde hace casi dos d\u00e9cadas, as\u00ed que es posible que un troyano coja esta funcionalidad y se meta en tu PC. La principal caracter\u00edstica de estos programas es que pueden ser indetectables, es decir, que est\u00e9n dentro de tu sistema operativo y t\u00fa no seas consciente de ellos. Como es l\u00f3gico, pueden aprovechar cualquier vulnerabilidad, <strong>v\u00e9ase utilizar la c\u00e1mara de tu ordenador port\u00e1til<\/strong> (o webcam instalada) sin que uno se percate.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-142546\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye.jpg\" alt=\"\" width=\"1280\" height=\"720\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye.jpg 1280w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye-300x169.jpg 300w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye-768x433.jpg 768w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye-1024x576.jpg 1024w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye-800x450.jpg 800w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye-664x374.jpg 664w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye-238x134.jpg 238w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye-436x246.jpg 436w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye-370x208.jpg 370w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye-304x170.jpg 304w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/10\/spy-eye-1200x675.jpg 1200w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\n<h2>Chrome o Firefox no tienen problemas<\/h2>\n<p><strong>\u00bfMito o verdad? Mito<\/strong>. Que Internet Explorer es el peor navegador de todos no es ninguna sorpresa; de hecho, Microsoft lo ha sustituido por Edge en sus \u00faltimas versiones. Sin embargo, esto no significa que sea el \u00fanico que recibe posibles amenazas de seguridad: <strong>tanto Google Chrome como Firefox tambi\u00e9n est\u00e1n expuestos a ello<\/strong>. Cualquier navegador es factible de ser infectado, as\u00ed que no cantes victoria con ninguno lleve el nombre que lleve.<\/p>\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_optimized,f_auto\/p\/b2e6d43a-96bf-11e6-a674-00163ed833e7\/2551395796\/google-chrome-logo.png\" alt=\"Google Chrome\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">Google Chrome<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/chrome.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\">Descarga el programa aqu\u00ed<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--70\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"70\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"7\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\">7<\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/chrome.softonic.com\/android\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n<h2>El antivirus est\u00e1 actualizado y defiende todo<\/h2>\n<p><strong>\u00bfMito o verdad? Mito<\/strong>. Por mucho antivirus que tengas actualizado a la \u00faltima versi\u00f3n, cualquier virus puede entrar en tu sistema operativo. Cada d\u00eda salen decenas de programas maliciosos en Internet, as\u00ed que puedes tener la mala suerte de que uno recaiga en tu ordenador\u2026 y el antivirus no lo detecte. Recuerda: <strong>es importante navegar por sitios seguros y no entrar en cualquier web<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-139990\" src=\"https:\/\/articles-img.sftcdn.net\/sft\/articles\/auto-mapping-folder\/sites\/2\/2017\/07\/virus.jpg\" alt=\"\" width=\"360\" height=\"240\" srcset=\"https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/07\/virus.jpg 360w, https:\/\/articles-img.sftcdn.net\/auto-mapping-folder\/sites\/2\/2017\/07\/virus-300x200.jpg 300w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/p>\n<h2>Formatear arregla todo virus<\/h2>\n<p><strong>\u00bfMito o verdad? Verdad<\/strong>. Si tienes un virus y no eres capaz de borrarlo del sistema operativo, el mejor consejo es que formatees. Una vez lo hayas hecho, el disco duro volver\u00e1 a estar limpio y como si hubiera salido de f\u00e1brica (con su correspondiente uso, por supuesto). No obstante, hay que puntualizar que si no tomas las correspondientes medidas de seguridad, que tu PC se vuelva a infectar puede ser lo m\u00e1s normal del mundo\u2026<\/p>\n<div class=\"sc-card-program\">\r\n  <div class=\"sc-card-program__body\">\r\n    <div class=\"sc-card-program__row clearfix\">\r\n      <div class=\"sc-card-program__col-logo\">\r\n        <img decoding=\"async\" class=\"sc-card-program__img\" src=\"https:\/\/images.sftcdn.net\/images\/t_optimized,f_auto\/p\/ba11145a-96bf-11e6-8b84-00163ed833e7\/674007088\/ccleaner-logo.png\" alt=\"CCleaner\" width=\"100px\" height=\"100px\">\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-title\">\r\n        <span class=\"sc-card-program__title\">CCleaner<\/span>\r\n        <a class=\"sc-card-program__button sc-card-program-internal\" href=\"https:\/\/ccleaner.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\">Descargar<\/a>\r\n      <\/div>\r\n      <div class=\"sc-card-program__col-rating\">\r\n        <svg class=\"rating-score__content\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" version=\"1.1\" x=\"0\" y=\"0\" viewbox=\"0 0 50 50\" enable-background=\"new 0 0 50 50\" xml:space=\"preserve\"><path class=\"rating-score__background rating-score--good\" fill=\"none\" stroke-width=\"6\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><path class=\"rating-score__value rating-score__value--90\" fill=\"none\" stroke-width=\"6\" stroke-dashoffset=\"90\" stroke-miterlimit=\"10\" d=\"M40 40c8.3-8.3 8.3-21.7 0-30s-21.7-8.3-30 0 -8.3 21.7 0 30\"><\/path><text class=\"rating-score__number\" content=\"9\" text-anchor=\"middle\" transform=\"matrix(1 0 0 1 25 31.0837)\" data-auto=\"app-user-score\">9<\/text><\/svg>\r\n      <\/div>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <span class=\"sc-card-program__description\"><\/span>\r\n    <\/div>\r\n    <div class=\"sc-card-program__row\">\r\n      <img decoding=\"async\" class=\"sc-card-program__bigpic\" src=\"\" onerror=\"this.style.display='none'\">\r\n    <\/div>\r\n    <a class=\"sc-card-program__link track-link sc-card-program-internal\" href=\"https:\/\/ccleaner.softonic.com\/\" target=\"_self\" rel=\"noopener noreferrer\"><\/a>\r\n  <\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>El mundo de la inform\u00e1tica, y de la tecnolog\u00eda en general, est\u00e1 lleno de mitos y leyendas urbanas -a cada cual m\u00e1s rocambolesca- que van circulando entre los usuarios. Ahora bien, \u00bfy si alguna de ellas es verdad? Hoy te traemos cinco mitos y verdades sobre seguridad inform\u00e1tica que est\u00e1n en nuestro d\u00eda a d\u00eda. &hellip; <a href=\"https:\/\/cms-articles.softonic.io\/es\/5mitos-y-verdades-seguridad-informatica-nr\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;5 mitos y verdades sobre seguridad inform\u00e1tica&#8221;<\/span><\/a><\/p>\n","protected":false},"author":9091,"featured_media":150844,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wpcf-pageviews":0},"categories":[9706],"tags":[9360,9352,9403,9321],"usertag":[],"vertical":[],"content-category":[],"class_list":["post-150814","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-how-to","tag-firefox","tag-google-chrome","tag-ios","tag-seguridad"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/150814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/users\/9091"}],"replies":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/comments?post=150814"}],"version-history":[{"count":1,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/150814\/revisions"}],"predecessor-version":[{"id":371945,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/posts\/150814\/revisions\/371945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/media\/150844"}],"wp:attachment":[{"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/media?parent=150814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/categories?post=150814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/tags?post=150814"},{"taxonomy":"usertag","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/usertag?post=150814"},{"taxonomy":"vertical","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/vertical?post=150814"},{"taxonomy":"content-category","embeddable":true,"href":"https:\/\/cms-articles.softonic.io\/es\/wp-json\/wp\/v2\/content-category?post=150814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}