{"id":2148,"date":"2025-12-11T13:25:30","date_gmt":"2025-12-11T16:25:30","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2148"},"modified":"2025-12-11T13:25:30","modified_gmt":"2025-12-11T16:25:30","slug":"social-engineering-what-it-is-and-how-to-identify-it","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/es\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/","title":{"rendered":"Ingenier\u00eda social: qu\u00e9 es y c\u00f3mo identificarla"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">La ingenier\u00eda social es una t\u00e9cnica de manipulaci\u00f3n psicol\u00f3gica usada por delincuentes para persuadir a las v\u00edctimas a revelar determinada informaci\u00f3n confidencial o a ejecutar una acci\u00f3n perjudicial.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Las t\u00e1cticas de ingenier\u00eda social son sumamente eficientes porque los delincuentes, incluyendo a los cibern\u00e9ticos, saben que enga\u00f1ar a la gente puede ser mucho m\u00e1s f\u00e1cil que burlar las barreras de seguridad f\u00edsicas o computacionales.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Y, probablemente, ya te hayas preguntado alguna vez: \u00bfpero por qu\u00e9 caemos en las mentiras de los delincuentes? Bueno, las causas son muchas: a veces, estamos distra\u00eddos, cansados o simplemente no identificamos el riesgo cuando se presenta.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Pero la verdad es que nosotros, los seres humanos, tenemos como caracter\u00edsticas intr\u00ednsecas la empat\u00eda, que nos lleva a querer ser amigables, y la obediencia a la autoridad. Y estos son, justamente, los dos factores m\u00e1s explorados por los delincuentes para aplicar <a href=\"https:\/\/hackerrangers.siteup.dev\/es\/scams\/social-engineering-scams-using-qr-codes-how-can-you-protect-your-digital-information\/\">estafas de ingenier\u00eda social<\/a>.\u00a0<\/span><\/p>\n<h2><b>En la pr\u00e1ctica<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">El objetivo de los delincuentes que usan la ingenier\u00eda social para enga\u00f1ar a las v\u00edctimas es, casi siempre, obtener algo en beneficio propio: recoger informaci\u00f3n para cometer fraudes o atacar sistemas; ganar dinero de forma r\u00e1pida; robar identidades; y as\u00ed sucesivamente.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00bfQu\u00e9 te parecer\u00eda conocer algunas t\u00e9cnicas de ingenier\u00eda social que los delincuentes usan a menudo en la pr\u00e1ctica?<\/span><\/p>\n<h2><b>Pretexting<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Por medio del pretexting, traducido literalmente, un \u201cpretexto\u201d, el delincuente inventa una historia ficticia para manipular a la v\u00edctima, forz\u00e1ndola a ejecutar acciones que no realizar\u00eda en circunstancias  \u201cnormales\u201d. Generalmente, \u00e9l se hace pasar por una persona confiable para lograr que la v\u00edctima crea en la farsa m\u00e1s f\u00e1cilmente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por ejemplo, es posible que un estafador mande un e-mail a la v\u00edctima haci\u00e9ndose pasar por el soporte de la empresa, alegando que se identific\u00f3 un problema de seguridad en la computadora y que es necesario instalar un nuevo software de seguridad.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Otro escenario es aquel en el que el delincuente llama a la v\u00edctima simulando ser el representante de un banco y alegando que se identific\u00f3 un movimiento sospechoso en la cuenta de su blanco. Entonces, seg\u00fan el malhechor, es necesario que la v\u00edctima proporcione informaci\u00f3n personal para confirmar si realmente es ella quien est\u00e1 usando la tarjeta.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El pretexting explora, fundamentalmente, la confianza.<\/span><\/p>\n<h2><b>Baiting\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">El baiting (en espa\u00f1ol, \u201cse\u00f1uelo\u201d) es una t\u00e9cnica en la cual el ciberdelincuente elabora una trampa para atraer la atenci\u00f3n de la v\u00edctima.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Una pr\u00e1ctica com\u00fan es dejar USB infectados con virus repartidos por un lugar por el cual circulen muchas personas, como la cafeter\u00eda de la empresa o una oficina de coworking, esperando que una v\u00edctima curiosa lo conecte a su computadora de trabajo y, as\u00ed, infecte los sistemas con malware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Esta t\u00e9cnica tambi\u00e9n se usa digitalmente cuando los ciberdelincuentes ofrecen obsequios sorpresa o descuentos exclusivos en mensajes fraudulentos. A fin de cuentas, esas son solo armas para atrapar a las v\u00edctimas.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El baiting explora, fundamentalmente, la curiosidad.\u00a0<\/span><\/p>\n<h2><b>Phishing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">El phishing es una estafa en la cual los ciberdelincuentes env\u00edan comunicaciones electr\u00f3nicas fraudulentas a las v\u00edctimas con el objetivo de que estas ejecuten alguna acci\u00f3n perjudicial para ellas mismas, ya sea proporcionar una informaci\u00f3n confidencial, clicar en un adjunto malicioso o transferir dinero a un estafador. Generalmente, el phishing viene acompa\u00f1ado de t\u00e9cnicas de pretexting y baiting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cuando el phishing se aplica por e-mail, a menudo el ciberdelincuente se hace pasar por una empresa leg\u00edtima y alega que hay un producto en promoci\u00f3n a un precio incre\u00edble o que se identific\u00f3 un problema en la cuenta, como un pago no realizado o un intento de invasi\u00f3n.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cuando el phishing se opera v\u00eda mensajes de WhatsApp, el ciberdelincuente suele hacer de cuenta que es un conocido de la v\u00edctima y le pide a esta que transfiera cierta cantidad de dinero para ayudarlo a solucionar un problema urgente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">El phishing explora, fundamentalmente, el miedo, la ambici\u00f3n y la empat\u00eda.<\/span><\/p>\n<h2><b>C\u00f3mo identificar y evitar estafas de ingenier\u00eda social<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Desafortunadamente, cualquier persona puede ser blanco de un estafador. Sin embargo, existen algunas formas de identificar y evitar las manipulaciones de la ingenier\u00eda social si un delincuente intenta aplicarlas contra ti.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Desconf\u00eda de ofertas que parezcan demasiado buenas como para ser verdaderas<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Si alguien te ofrece algo que pareciera ser un negocio incre\u00edble, es probable que sea una estafa. Desconf\u00eda de inversiones con retornos garantizados y sin riesgos y de mensajes en los que se te comunique que has ganado un premio del cual ni siquiera ten\u00edas noticia.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>No compartas informaci\u00f3n confidencial<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Nunca compartas informaci\u00f3n confidencial, como contrase\u00f1as, credenciales de acceso, n\u00fameros de tarjeta de cr\u00e9dito, informaci\u00f3n de cuenta bancaria o datos personales, no importa cu\u00e1n leg\u00edtima o urgente parezca la comunicaci\u00f3n.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Verifica las solicitudes y no conf\u00edes en remitentes desconocidos<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Antes de clicar en un enlace, hacer una transferencia de dinero o compartir informaci\u00f3n, verifica con cautela cu\u00e1l es la fuente de la solicitud. Si se trata de un remitente desconocido, opta por ignorar el pedido. Cuando sea un remitente conocido, entra en contacto con la persona por otros medios para chequear si la solicitud que supuestamente te est\u00e1 haciendo es verdadera.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Rechaza contactos no solicitados<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Ya sea por e-mail, tel\u00e9fono o WhatsApp, si alguien ha entrado en contacto contigo solicit\u00e1ndote alg\u00fan tipo de informaci\u00f3n, seduci\u00e9ndote con alguna oferta imperdible o alegando que necesitas entrar en contacto con alg\u00fan tipo de soporte, opta por ignorar el mensaje. En caso de dudas, entra en contacto directamente con la persona o instituci\u00f3n de que se trate para conocer m\u00e1s detalles de lo ocurrido.<\/span><\/p>\n<h2><b>Protege a tu empresa contra estafas de ingenier\u00eda social<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Los colaboradores de las empresas son personas como otras cualesquiera y, por supuesto, tambi\u00e9n son potenciales v\u00edctimas de una estafa de ingenier\u00eda social. Por eso, es muy importante invertir en la concienciaci\u00f3n en ciberseguridad de los colaboradores para que ellos aprendan a adoptar h\u00e1bitos seguros en su d\u00eda a d\u00eda de trabajo, manteniendo a la organizaci\u00f3n protegida.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Social engineering is a psychological manipulation technique used by criminals to persuade victims to reveal confidential information or to trick them into doing something. Social engineering is extremely effective because criminals, including cybercriminals, know that fooling people can often be much easier than circumventing physical or computer security barriers. You may wonder why people always [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2149,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[46],"tags":[113,92,119,121],"class_list":["post-2148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","tag-information-security","tag-phishing","tag-security","tag-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social engineering: what it is and how to identify it | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social engineering: what it is and how to identify it | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/es\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T16:25:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Social engineering: what it is and how to identify it\",\"datePublished\":\"2025-12-11T16:25:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\"},\"wordCount\":821,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg\",\"keywords\":[\"information security\",\"phishing\",\"security\",\"social engineering\"],\"articleSection\":[\"Awareness\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\",\"name\":\"Social engineering: what it is and how to identify it | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg\",\"datePublished\":\"2025-12-11T16:25:30+00:00\",\"description\":\"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Social engineering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social engineering: what it is and how to identify it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social engineering: what it is and how to identify it | Hacker Rangers","description":"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"es_ES","og_type":"article","og_title":"Social engineering: what it is and how to identify it | Hacker Rangers","og_description":"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.","og_url":"https:\/\/hackerrangers.siteup.dev\/es\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-11T16:25:30+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg","type":"image\/jpeg"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Tiempo de lectura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Social engineering: what it is and how to identify it","datePublished":"2025-12-11T16:25:30+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/"},"wordCount":821,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg","keywords":["information security","phishing","security","social engineering"],"articleSection":["Awareness"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/","url":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/","name":"Social engineering: what it is and how to identify it | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg","datePublished":"2025-12-11T16:25:30+00:00","description":"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg","width":2560,"height":1707,"caption":"Social engineering"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Social engineering: what it is and how to identify it"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/es\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/comments?post=2148"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/posts\/2148\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media\/2149"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/media?parent=2148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/categories?post=2148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/es\/wp-json\/wp\/v2\/tags?post=2148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}