{"id":13612,"date":"2023-07-20T10:51:51","date_gmt":"2023-07-20T16:51:51","guid":{"rendered":"https:\/\/eblaw.com.mx\/?p=13612"},"modified":"2023-07-20T10:51:54","modified_gmt":"2023-07-20T16:51:54","slug":"phishing","status":"publish","type":"post","link":"https:\/\/eblaw.com.mx\/en\/phishing\/","title":{"rendered":"PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE"},"content":{"rendered":"<p class=\"has-medium-font-size\">En el mundo digital de hoy, la ciberseguridad se ha convertido en una preocupaci\u00f3n constante para individuos y empresas. Una de las amenazas m\u00e1s comunes y peligrosas es el phishing. Aqu\u00ed analizaremos qu\u00e9 es el phishing, c\u00f3mo detectarlo y las medidas que puedes tomar para protegerte de esta forma de fraude en l\u00ednea.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">I. \u00bfQu\u00e9 es el phishing?<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Es una t\u00e9cnica de ingenier\u00eda social utilizada por ciberdelincuentes para obtener informaci\u00f3n confidencial, como contrase\u00f1as, n\u00fameros de tarjetas de cr\u00e9dito y otra informaci\u00f3n personal sensible. Los atacantes se hacen pasar por entidades leg\u00edtimas, como bancos, empresas, sitios web populares o incluso contactos conocidos, para enga\u00f1ar a las personas y persuadirlas de que divulguen sus datos.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">II. \u00bfC\u00f3mo funciona?<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Los atacantes emplean diversas estrategias para llevar a cabo ataques de phishing, algunas de las m\u00e1s comunes incluyen:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"has-medium-font-size\"><strong>Correos Electr\u00f3nicos Falsos:<\/strong> Los ciberdelincuentes env\u00edan correos electr\u00f3nicos que parecen provenir de fuentes leg\u00edtimas, como bancos o plataformas de redes sociales. Estos correos solicitan que el destinatario haga clic en enlaces maliciosos o proporcione informaci\u00f3n personal.<\/li>\n\n\n\n<li class=\"has-medium-font-size\"><strong>Sitios Web Falsos:<\/strong> Los atacantes crean sitios web que imitan la apariencia de p\u00e1ginas de inicio de sesi\u00f3n de servicios conocidos. Al hacer que las personas ingresen sus credenciales en estos sitios, los ciberdelincuentes obtienen acceso a sus cuentas.<\/li>\n\n\n\n<li class=\"has-medium-font-size\"><strong>Mensajes de Texto (SMS) y Mensajes en Redes Sociales:<\/strong> Los phishing tambi\u00e9n pueden ocurrir a trav\u00e9s de mensajes de texto o mensajes directos en redes sociales, donde los atacantes intentan convencer a las personas para que proporcionen informaci\u00f3n confidencial.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">III. \u00bfC\u00f3mo detectar un ataque?<\/h2>\n\n\n\n<p class=\"has-medium-font-size\">Reconocer un ataque de phishing es esencial para evitar ser v\u00edctima de esta amenaza. Aqu\u00ed hay algunas se\u00f1ales de advertencia a tener en cuenta:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"has-medium-font-size\"><strong>Errores Gramaticales y Ortogr\u00e1ficos:<\/strong> Los correos electr\u00f3nicos o mensajes que contienen errores gramaticales o de ortograf\u00eda pueden ser una se\u00f1al de phishing, ya que las empresas leg\u00edtimas suelen tener un cuidado meticuloso en su comunicaci\u00f3n.<\/li>\n\n\n\n<li class=\"has-medium-font-size\"><strong>Enlaces Sospechosos:<\/strong> Antes de hacer clic en un enlace en un correo electr\u00f3nico o mensaje, pasa el cursor sobre \u00e9l (sin hacer clic). Esto te mostrar\u00e1 la URL real a la que te dirigir\u00e1 el enlace. Si la direcci\u00f3n parece extra\u00f1a o no coincide con el sitio esperado, es probable que sea una estafa.<\/li>\n\n\n\n<li class=\"has-medium-font-size\"><strong>Solicitudes de Informaci\u00f3n Personal:<\/strong> Las empresas leg\u00edtimas rara vez solicitan informaci\u00f3n personal sensible, como contrase\u00f1as o n\u00fameros de tarjetas de cr\u00e9dito, a trav\u00e9s de correos electr\u00f3nicos no solicitados.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\">IV. Medidas de protecci\u00f3n <\/h2>\n\n\n\n<p>Aqu\u00ed hay algunas medidas que puedes tomar para protegerte del phishing y mantener tu informaci\u00f3n segura:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li class=\"has-medium-font-size\"><strong>Educaci\u00f3n:<\/strong> Inf\u00f3rmate sobre las t\u00e1cticas de phishing y comparte esta informaci\u00f3n con amigos y familiares. Conocer los riesgos y las se\u00f1ales de advertencia aumenta la posibilidad de detectar un ataque.<\/li>\n\n\n\n<li class=\"has-medium-font-size\"><strong>Verificaci\u00f3n de Remitentes:<\/strong> Siempre verifica la direcci\u00f3n de correo electr\u00f3nico o el n\u00famero de tel\u00e9fono del remitente antes de responder a un mensaje o proporcionar informaci\u00f3n.<\/li>\n\n\n\n<li class=\"has-medium-font-size\"><strong>Usa Autenticaci\u00f3n de Dos Factores (2FA):<\/strong> Habilita la autenticaci\u00f3n de dos factores en tus cuentas siempre que sea posible. Esto a\u00f1adir\u00e1 una capa adicional de seguridad y dificultar\u00e1 que los atacantes accedan a tus cuentas incluso si obtienen tu contrase\u00f1a.<\/li>\n\n\n\n<li class=\"has-medium-font-size\"><strong>Mant\u00e9n tus Dispositivos Actualizados:<\/strong> Aseg\u00farate de tener las \u00faltimas actualizaciones y parches de seguridad instalados en tus dispositivos y programas. Las actualizaciones suelen corregir vulnerabilidades conocidas.<\/li>\n\n\n\n<li class=\"has-medium-font-size\"><strong>Creaci\u00f3n de Manuales<\/strong>: Se recomienda que las empresas de todos los sectores contar  con un <strong><em>manual de mejores pr\u00e1ctica<\/em>s <\/strong>en contra del phishing atendiendo a su necesidades en todo momento. <\/li>\n<\/ol>\n\n\n\n<p class=\"has-medium-font-size\">Si requieres conocer m\u00e1s acerca de la protecci\u00f3n de datos personales, revisa el siguiente link:&nbsp;<a href=\"https:\/\/eblaw.com.mx\/en\/category\/proteccion-de-datos-personales\/\">Protecci\u00f3n de datos personales archivos \u2013 Esponda Betancourt (eblaw.com.mx)<\/a><\/p>\n\n\n\n<p class=\"has-medium-font-size\">Finalmente, en caso de duda o aclaraci\u00f3n no dudes en contactarnos. En\u00a0<strong>Esponda Abogados<\/strong>\u00a0contamos con m\u00e1s de diez a\u00f1os de experiencia profesional, asesorando exitosamente a empresas nacionales e internacionales en protecci\u00f3n de datos personales.<\/p>","protected":false},"excerpt":{"rendered":"<p>En el mundo digital de hoy, la ciberseguridad se ha&hellip;<\/p>\n<p> <a class=\"more-link\" href=\"https:\/\/eblaw.com.mx\/en\/phishing\/\">Read more<\/a><\/p>","protected":false},"author":2,"featured_media":13613,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[72],"tags":[],"class_list":{"0":"post-13612","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-proteccion-de-datos-personales"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE |<\/title>\n<meta name=\"description\" content=\"Tiene por objeto explicar qu\u00e9 es phishing, c\u00f3mo detectar un ataque y cu\u00e1les son las medidas de protecci\u00f3n.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eblaw.com.mx\/en\/phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE |\" \/>\n<meta property=\"og:description\" content=\"Tiene por objeto explicar qu\u00e9 es phishing, c\u00f3mo detectar un ataque y cu\u00e1les son las medidas de protecci\u00f3n.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eblaw.com.mx\/en\/phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Esponda Betancourt\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-20T16:51:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T16:51:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2023\/07\/hacker-8018474_1280.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"717\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"eblaw\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"eblaw\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/eblaw.com.mx\/phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/eblaw.com.mx\/phishing\/\"},\"author\":{\"name\":\"eblaw\",\"@id\":\"https:\/\/eblaw.com.mx\/#\/schema\/person\/11d2e0dcd66af9080508f6b306697e70\"},\"headline\":\"PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE\",\"datePublished\":\"2023-07-20T16:51:51+00:00\",\"dateModified\":\"2023-07-20T16:51:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/eblaw.com.mx\/phishing\/\"},\"wordCount\":706,\"publisher\":{\"@id\":\"https:\/\/eblaw.com.mx\/#organization\"},\"image\":{\"@id\":\"https:\/\/eblaw.com.mx\/phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2023\/07\/hacker-8018474_1280.png\",\"articleSection\":[\"Protecci\u00f3n de datos personales\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/eblaw.com.mx\/phishing\/\",\"url\":\"https:\/\/eblaw.com.mx\/phishing\/\",\"name\":\"PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE |\",\"isPartOf\":{\"@id\":\"https:\/\/eblaw.com.mx\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/eblaw.com.mx\/phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/eblaw.com.mx\/phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2023\/07\/hacker-8018474_1280.png\",\"datePublished\":\"2023-07-20T16:51:51+00:00\",\"dateModified\":\"2023-07-20T16:51:54+00:00\",\"description\":\"Tiene por objeto explicar qu\u00e9 es phishing, c\u00f3mo detectar un ataque y cu\u00e1les son las medidas de protecci\u00f3n.\",\"breadcrumb\":{\"@id\":\"https:\/\/eblaw.com.mx\/phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/eblaw.com.mx\/phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eblaw.com.mx\/phishing\/#primaryimage\",\"url\":\"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2023\/07\/hacker-8018474_1280.png\",\"contentUrl\":\"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2023\/07\/hacker-8018474_1280.png\",\"width\":1280,\"height\":717},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/eblaw.com.mx\/phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/eblaw.com.mx\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/eblaw.com.mx\/#website\",\"url\":\"https:\/\/eblaw.com.mx\/\",\"name\":\"Esponda Betancourt\",\"description\":\"Boutique Law Firm\",\"publisher\":{\"@id\":\"https:\/\/eblaw.com.mx\/#organization\"},\"alternateName\":\"Servicios legales especializados\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/eblaw.com.mx\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/eblaw.com.mx\/#organization\",\"name\":\"Esponda Betancourt\",\"alternateName\":\"Servicios legales especializados\",\"url\":\"https:\/\/eblaw.com.mx\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eblaw.com.mx\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2020\/10\/cropped-WhatsApp_Image_2020-10-02_at_11.47.24_PM-removebg-preview-2.png\",\"contentUrl\":\"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2020\/10\/cropped-WhatsApp_Image_2020-10-02_at_11.47.24_PM-removebg-preview-2.png\",\"width\":403,\"height\":127,\"caption\":\"Esponda Betancourt\"},\"image\":{\"@id\":\"https:\/\/eblaw.com.mx\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/eblaw.com.mx\/#\/schema\/person\/11d2e0dcd66af9080508f6b306697e70\",\"name\":\"eblaw\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/eblaw.com.mx\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f8e3a95427b0499358c4cfb4beccb9d4f5174f083537e71d1072f38931eb07f1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f8e3a95427b0499358c4cfb4beccb9d4f5174f083537e71d1072f38931eb07f1?s=96&d=mm&r=g\",\"caption\":\"eblaw\"},\"url\":\"https:\/\/eblaw.com.mx\/en\/author\/eblaw\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE |","description":"Tiene por objeto explicar qu\u00e9 es phishing, c\u00f3mo detectar un ataque y cu\u00e1les son las medidas de protecci\u00f3n.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eblaw.com.mx\/en\/phishing\/","og_locale":"en_US","og_type":"article","og_title":"PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE |","og_description":"Tiene por objeto explicar qu\u00e9 es phishing, c\u00f3mo detectar un ataque y cu\u00e1les son las medidas de protecci\u00f3n.","og_url":"https:\/\/eblaw.com.mx\/en\/phishing\/","og_site_name":"Esponda Betancourt","article_published_time":"2023-07-20T16:51:51+00:00","article_modified_time":"2023-07-20T16:51:54+00:00","og_image":[{"width":1280,"height":717,"url":"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2023\/07\/hacker-8018474_1280.png","type":"image\/png"}],"author":"eblaw","twitter_card":"summary_large_image","twitter_misc":{"Written by":"eblaw","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eblaw.com.mx\/phishing\/#article","isPartOf":{"@id":"https:\/\/eblaw.com.mx\/phishing\/"},"author":{"name":"eblaw","@id":"https:\/\/eblaw.com.mx\/#\/schema\/person\/11d2e0dcd66af9080508f6b306697e70"},"headline":"PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE","datePublished":"2023-07-20T16:51:51+00:00","dateModified":"2023-07-20T16:51:54+00:00","mainEntityOfPage":{"@id":"https:\/\/eblaw.com.mx\/phishing\/"},"wordCount":706,"publisher":{"@id":"https:\/\/eblaw.com.mx\/#organization"},"image":{"@id":"https:\/\/eblaw.com.mx\/phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2023\/07\/hacker-8018474_1280.png","articleSection":["Protecci\u00f3n de datos personales"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/eblaw.com.mx\/phishing\/","url":"https:\/\/eblaw.com.mx\/phishing\/","name":"PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE |","isPartOf":{"@id":"https:\/\/eblaw.com.mx\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eblaw.com.mx\/phishing\/#primaryimage"},"image":{"@id":"https:\/\/eblaw.com.mx\/phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2023\/07\/hacker-8018474_1280.png","datePublished":"2023-07-20T16:51:51+00:00","dateModified":"2023-07-20T16:51:54+00:00","description":"Tiene por objeto explicar qu\u00e9 es phishing, c\u00f3mo detectar un ataque y cu\u00e1les son las medidas de protecci\u00f3n.","breadcrumb":{"@id":"https:\/\/eblaw.com.mx\/phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eblaw.com.mx\/phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eblaw.com.mx\/phishing\/#primaryimage","url":"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2023\/07\/hacker-8018474_1280.png","contentUrl":"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2023\/07\/hacker-8018474_1280.png","width":1280,"height":717},{"@type":"BreadcrumbList","@id":"https:\/\/eblaw.com.mx\/phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/eblaw.com.mx\/"},{"@type":"ListItem","position":2,"name":"PHISHING: C\u00d3MO DETECTARLO Y PROTEGERSE"}]},{"@type":"WebSite","@id":"https:\/\/eblaw.com.mx\/#website","url":"https:\/\/eblaw.com.mx\/","name":"Esponda Betancourt","description":"Boutique Law Firm","publisher":{"@id":"https:\/\/eblaw.com.mx\/#organization"},"alternateName":"Servicios legales especializados","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eblaw.com.mx\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/eblaw.com.mx\/#organization","name":"Esponda Betancourt","alternateName":"Servicios legales especializados","url":"https:\/\/eblaw.com.mx\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eblaw.com.mx\/#\/schema\/logo\/image\/","url":"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2020\/10\/cropped-WhatsApp_Image_2020-10-02_at_11.47.24_PM-removebg-preview-2.png","contentUrl":"https:\/\/eblaw.com.mx\/wp-content\/uploads\/2020\/10\/cropped-WhatsApp_Image_2020-10-02_at_11.47.24_PM-removebg-preview-2.png","width":403,"height":127,"caption":"Esponda Betancourt"},"image":{"@id":"https:\/\/eblaw.com.mx\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/eblaw.com.mx\/#\/schema\/person\/11d2e0dcd66af9080508f6b306697e70","name":"eblaw","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/eblaw.com.mx\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f8e3a95427b0499358c4cfb4beccb9d4f5174f083537e71d1072f38931eb07f1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f8e3a95427b0499358c4cfb4beccb9d4f5174f083537e71d1072f38931eb07f1?s=96&d=mm&r=g","caption":"eblaw"},"url":"https:\/\/eblaw.com.mx\/en\/author\/eblaw\/"}]}},"_links":{"self":[{"href":"https:\/\/eblaw.com.mx\/en\/wp-json\/wp\/v2\/posts\/13612","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eblaw.com.mx\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eblaw.com.mx\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eblaw.com.mx\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eblaw.com.mx\/en\/wp-json\/wp\/v2\/comments?post=13612"}],"version-history":[{"count":0,"href":"https:\/\/eblaw.com.mx\/en\/wp-json\/wp\/v2\/posts\/13612\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eblaw.com.mx\/en\/wp-json\/wp\/v2\/media\/13613"}],"wp:attachment":[{"href":"https:\/\/eblaw.com.mx\/en\/wp-json\/wp\/v2\/media?parent=13612"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eblaw.com.mx\/en\/wp-json\/wp\/v2\/categories?post=13612"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eblaw.com.mx\/en\/wp-json\/wp\/v2\/tags?post=13612"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}