{"id":8978,"date":"2023-06-09T10:34:15","date_gmt":"2023-06-09T10:34:15","guid":{"rendered":"https:\/\/csiaradar.com\/?p=8978"},"modified":"2023-06-09T10:34:15","modified_gmt":"2023-06-09T10:34:15","slug":"los-vehiculos-conectados-faciles-de-hackear-para-los-ciberdelincuentes","status":"publish","type":"post","link":"https:\/\/csiaradar.com\/es\/los-vehiculos-conectados-faciles-de-hackear-para-los-ciberdelincuentes\/","title":{"rendered":"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?"},"content":{"rendered":"<ul>\n<li aria-level=\"1\"><b>Los expertos piden confiar en los veh\u00edculos conectados, pero est\u00e1n investigando en poner los medios para contrarrestar las acciones maliciosas y expondr\u00e1n sus avances en el CSI Radar, que empieza el lunes 12 en Sevilla<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>El Centro Tecnol\u00f3gico catal\u00e1n EURECAT presentar\u00e1 el proyecto europeo \u201cSELFY\u201d<\/b><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>La Universidad de M\u00e1laga (UMA) tambi\u00e9n investiga sobre c\u00f3mo hacer las redes de telecomunicaci\u00f3n m\u00e1s seguras en las redes 5G<\/b><\/li>\n<\/ul>\n<p><b>Los veh\u00edculos conectados y sus vulnerabilidades<\/b>, como son los posibles ataques de los hackers, tendr\u00e1n una presencia destacada en el Radar Internacional de la CiberSeguridad (<b>CSI Radar<\/b>), <b>que arranca el lunes 12 en Sevilla<\/b> con una agenda de 40 ponencias multidisciplinarias sobre todos los aspectos de la Delincuencia Digital.<\/p>\n<p>El problema para el autom\u00f3vil conectado es grave. Ya que cualquier conductor, si sufre un hackeo de su coche, pierde seguridad y las consecuencias pueden ser tr\u00e1gicas para \u00e9l y para el resto de los conductores y veh\u00edculos.<\/p>\n<p>Por ello los expertos hablan de la<b> Movilidad Cooperativa Conectada y Automatizada<\/b> (CCAM) <b>cibersegura, <\/b>y se han generado iniciativas europeas<b> para<\/b> <b>aumentar la seguridad, la protecci\u00f3n, la solidez y la resiliencia del ecosistema CCAM frente a ciberataques o acciones maliciosas<\/b>.<\/p>\n<p><b>V\u00edctor Jim\u00e9nez<\/b>, IT&amp;OT Security Researcher and SELFY Technical Coordinator del Centro Tecnol\u00f3gico catal\u00e1n <b>EURECAT<\/b>, hablar\u00e1 del <b>proyecto SELFY.<\/b> \u201cEs un proyecto a nivel europeo que desarrolla una <b>caja de herramientas colaborativas\u201d.<\/b><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8979 size-full\" src=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-08-at-11.35.13.jpeg\" alt=\"\" width=\"603\" height=\"602\" srcset=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-08-at-11.35.13.jpeg 603w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-08-at-11.35.13-300x300.jpeg 300w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-08-at-11.35.13-150x150.jpeg 150w\" sizes=\"auto, (max-width: 603px) 100vw, 603px\" \/><\/p>\n<p>Para Jim\u00e9nez el veh\u00edculo conectado \u201cva en progreso. Por cuestiones de sostenibilidad, reducci\u00f3n de costes, poluci\u00f3n, usabilidad o moverse de manera aut\u00f3noma, el veh\u00edculo conectado es un bien para la sociedad, aunque<b> implica un esfuerzo en seguridad, ya que puede ser hackeado por un externo y esto podr\u00eda implicar la p\u00e9rdida de vidas humanas\u201d.\u00a0<\/b><\/p>\n<p>El objetivo final, no es otro que \u201clograr que la gente conf\u00ede en lo que va a venir en los pr\u00f3ximos a\u00f1os, que se adopten las nuevas tecnolog\u00edas y que las industrias puedan garantizar este sue\u00f1o de manera segura y que nos beneficie a todos en la sociedad\u201d, avanza Jim\u00e9nez.<\/p>\n<p>Por su parte, <b>Emil J. Khatib<\/b>, doctor en Telecomunicaciones e investigador de la Universidad de M\u00e1laga <b>(UMA)<\/b>, explicar\u00e1 la importancia del <b>EDT <\/b>(Early Data Transmission), en lo que est\u00e1n trabajando, y que acorta y simplifica los pasos a la hora de establecer una conexi\u00f3n 5G.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-8981 size-full\" src=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/Emil-Jatib-Khatib.jpg\" alt=\"\" width=\"480\" height=\"640\" srcset=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/Emil-Jatib-Khatib.jpg 480w, https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/Emil-Jatib-Khatib-225x300.jpg 225w\" sizes=\"auto, (max-width: 480px) 100vw, 480px\" \/><\/p>\n<p>\u201cLa tecnolog\u00eda 5G es la base de la pr\u00f3xima generaci\u00f3n de servicios inal\u00e1mbricos y del Internet de las Cosas (IoT). <b>Y hay que analizar las posibles vulnerabilidades para hacerla 100% segura\u201d<\/b>, afirma Khatib.<\/p>\n<p>Adem\u00e1s, durante la celebraci\u00f3n presencial del <b>CSI Radar,<\/b> tres veh\u00edculos <b>Tesla<\/b>, marca estadounidense l\u00edder mundial en veh\u00edculos conectados, estar\u00e1n en la Demo Area del Radar Internacional de la Ciberseguridad, cuya ponencia inaugural correr\u00e1 a cargo de la CEO de Telef\u00f3nica Tech para CIberseguridad y Cloud, <b>Mar\u00eda Jes\u00fas Almazor.\u00a0<\/b><\/p>\n<p>Esta primera edici\u00f3n de CSI Radar est\u00e1 impulsada por <b>Telef\u00f3nica Tech, Sevilla City Office y FIBES, y cuenta con el apoyo de AWS, Proofpoint, Huawei, ZTE, IBM, Cremades &amp; Calvo-Sotelo y El Observatorio.<\/b><\/p>\n<p><b>\u2018CSI Radar\u2019<\/b> (Cyber Security International Radar) reunir\u00e1 a empresas y multinacionales l\u00edderes de Europa, Estados Unidos y China, adem\u00e1s de universidades, instituciones, fabricantes y expertos que est\u00e1n trabajando para mejorar la ciberseguridad en las empresas y las administraciones p\u00fablicas en Espa\u00f1a y en el mundo. La agenda ya est\u00e1 disponible en la web oficial.<\/p>\n<p>Todas las conferencias del CSI Radar se podr\u00e1n seguir por <b>&#8216;El Observatorio&#8217;, <\/b>plataforma lanzada por Medina Media Events, donde se podr\u00e1n disfrutar durante todo el a\u00f1o, adem\u00e1s de poder conectar en cualquier momento con m\u00e1s 3.700 profesionales que forman parte del Networking Virtual.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Los expertos piden confiar en los veh\u00edculos conectados, pero est\u00e1n investigando en poner los medios para contrarrestar las acciones maliciosas y expondr\u00e1n sus avances en el CSI Radar, que empieza el lunes 12 en Sevilla El Centro Tecnol\u00f3gico catal\u00e1n EURECAT presentar\u00e1 el proyecto europeo \u201cSELFY\u201d La Universidad de M\u00e1laga (UMA) tambi\u00e9n investiga sobre c\u00f3mo hacer [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":8983,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[100],"tags":[227,226,228,242],"class_list":["post-8978","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-evento","tag-ciberseguridad","tag-csi-radar","tag-fibes","tag-sevilla"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes? - CSI Radar<\/title>\n<meta name=\"description\" content=\"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes? - CSI Radar\" \/>\n<meta property=\"og:description\" content=\"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"CSI Radar\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-09T10:34:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-08-at-11.19.17.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1066\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"MME\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"MME\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/\"},\"author\":{\"name\":\"MME\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#\\\/schema\\\/person\\\/d3ac8a54c8020e3f50f5f0a4a7dd72da\"},\"headline\":\"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?\",\"datePublished\":\"2023-06-09T10:34:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/\"},\"wordCount\":653,\"publisher\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/WhatsApp-Image-2023-06-08-at-11.19.17.jpeg\",\"keywords\":[\"ciberseguridad\",\"csi radar\",\"fibes\",\"sevilla\"],\"articleSection\":[\"Evento\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/\",\"url\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/\",\"name\":\"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes? - CSI Radar\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/WhatsApp-Image-2023-06-08-at-11.19.17.jpeg\",\"datePublished\":\"2023-06-09T10:34:15+00:00\",\"description\":\"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/#primaryimage\",\"url\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/WhatsApp-Image-2023-06-08-at-11.19.17.jpeg\",\"contentUrl\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/WhatsApp-Image-2023-06-08-at-11.19.17.jpeg\",\"width\":1600,\"height\":1066},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/connected-vehicles-easy-for-cybercriminals-to-hack\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/csiaradar.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#website\",\"url\":\"https:\\\/\\\/csiaradar.com\\\/\",\"name\":\"CSI Radar\",\"description\":\"Cyber Security International\",\"publisher\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/csiaradar.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#organization\",\"name\":\"SUTUS\",\"url\":\"https:\\\/\\\/csiaradar.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sutuscolor.png\",\"contentUrl\":\"https:\\\/\\\/csiaradar.com\\\/web\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/sutuscolor.png\",\"width\":268,\"height\":85,\"caption\":\"SUTUS\"},\"image\":{\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/csiaradar.com\\\/#\\\/schema\\\/person\\\/d3ac8a54c8020e3f50f5f0a4a7dd72da\",\"name\":\"MME\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes? - CSI Radar","description":"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/","og_locale":"es_ES","og_type":"article","og_title":"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes? - CSI Radar","og_description":"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?","og_url":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/","og_site_name":"CSI Radar","article_published_time":"2023-06-09T10:34:15+00:00","og_image":[{"width":1600,"height":1066,"url":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-08-at-11.19.17.jpeg","type":"image\/jpeg"}],"author":"MME","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"MME","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/#article","isPartOf":{"@id":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/"},"author":{"name":"MME","@id":"https:\/\/csiaradar.com\/#\/schema\/person\/d3ac8a54c8020e3f50f5f0a4a7dd72da"},"headline":"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?","datePublished":"2023-06-09T10:34:15+00:00","mainEntityOfPage":{"@id":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/"},"wordCount":653,"publisher":{"@id":"https:\/\/csiaradar.com\/#organization"},"image":{"@id":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-08-at-11.19.17.jpeg","keywords":["ciberseguridad","csi radar","fibes","sevilla"],"articleSection":["Evento"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/","url":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/","name":"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes? - CSI Radar","isPartOf":{"@id":"https:\/\/csiaradar.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/#primaryimage"},"image":{"@id":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-08-at-11.19.17.jpeg","datePublished":"2023-06-09T10:34:15+00:00","description":"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?","breadcrumb":{"@id":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/#primaryimage","url":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-08-at-11.19.17.jpeg","contentUrl":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2023\/06\/WhatsApp-Image-2023-06-08-at-11.19.17.jpeg","width":1600,"height":1066},{"@type":"BreadcrumbList","@id":"https:\/\/csiaradar.com\/connected-vehicles-easy-for-cybercriminals-to-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/csiaradar.com\/es\/"},{"@type":"ListItem","position":2,"name":"Los veh\u00edculos conectados, \u00bff\u00e1ciles de hackear para los ciberdelincuentes?"}]},{"@type":"WebSite","@id":"https:\/\/csiaradar.com\/#website","url":"https:\/\/csiaradar.com\/","name":"CSI Radar","description":"Cyber Security International","publisher":{"@id":"https:\/\/csiaradar.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/csiaradar.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/csiaradar.com\/#organization","name":"SUTUS","url":"https:\/\/csiaradar.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/csiaradar.com\/#\/schema\/logo\/image\/","url":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2019\/01\/sutuscolor.png","contentUrl":"https:\/\/csiaradar.com\/web\/wp-content\/uploads\/2019\/01\/sutuscolor.png","width":268,"height":85,"caption":"SUTUS"},"image":{"@id":"https:\/\/csiaradar.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/csiaradar.com\/#\/schema\/person\/d3ac8a54c8020e3f50f5f0a4a7dd72da","name":"MME"}]}},"_links":{"self":[{"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/posts\/8978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/comments?post=8978"}],"version-history":[{"count":0,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/posts\/8978\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/media\/8983"}],"wp:attachment":[{"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/media?parent=8978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/categories?post=8978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/csiaradar.com\/es\/wp-json\/wp\/v2\/tags?post=8978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}