{"id":6256,"date":"2021-08-17T10:44:28","date_gmt":"2021-08-17T08:44:28","guid":{"rendered":"https:\/\/www.adssl.com\/?p=6256"},"modified":"2023-12-16T09:03:57","modified_gmt":"2023-12-16T08:03:57","slug":"compte-amb-el-phishing","status":"publish","type":"post","link":"https:\/\/www.adssl.com\/es\/compte-amb-el-phishing\/","title":{"rendered":"Alerta amb el Phishing!"},"content":{"rendered":"<p>Imagina el desconcert&nbsp;al&nbsp;pagar amb la targeta i assabentar-te que els teus diners han estat robats. Aquesta situaci\u00f3 la viuen di\u00e0riament moltes persones al m\u00f3n. Donen clic a un&nbsp;link&nbsp;&#8220;innocent&#8221; i tota la seva informaci\u00f3 \u00e9s robada.<\/p>\n\n\n\n<h2 class=\"has-medium-font-size wp-block-heading\"><strong>\u00bfCom funciona el&nbsp;Phishing?<\/strong><\/h2>\n\n\n\n<p>El tipus m\u00e9s com\u00fa de\u00a0phishing\u00a0\u00e9s l&#8217;atacant que s&#8217;acosta al seu objectiu, generalment per correu electr\u00f2nic, fent-se passar per una empresa leg\u00edtima i, a trav\u00e9s d&#8217;aix\u00f2, intentant obtenir informaci\u00f3 personal o informaci\u00f3 d&#8217;inici de sessi\u00f3 de l&#8217;objectiu. Els correus electr\u00f2nics sovint es basen\u00a0en\u00a0invocar una sensaci\u00f3 d&#8217;alarma o (ir\u00f2nicament), p\u00e8rdua de seguretat. L&#8217;atac de\u00a0phishing\u00a0podria ser un missatge fals de la teva &#8220;banc&#8221; o un lloc on guardes la teva informaci\u00f3, com Google Drive. Els\u00a0phishers\u00a0poden dir-te que hi ha hagut una violaci\u00f3 de dades i et demanaran que entris a trav\u00e9s del seu lloc web per assegurar-se que &#8220;tu ets tu&#8221; o que canvi\u00efs la contrasenya. Aquest lloc \u00e9s llavors un lloc web fals, que nom\u00e9s s&#8217;utilitza per obtenir les dades d&#8217;inici de sessi\u00f3 dels objectius per a aquestes inst\u00e0ncies, com el banc o els teus comptes de Google.<\/p>\n\n\n\n<p>Tamb\u00e9 podria ser que el correu electr\u00f2nic de&nbsp;phishing&nbsp;es camufli com un canvi de contrasenya de rutina o com una actualitzaci\u00f3 de la informaci\u00f3. Per exemple, podries rebre un correu electr\u00f2nic del programari que fas servir, informant que la teva subscripci\u00f3 s&#8217;est\u00e0 esgotant i sol\u00b7licitant que segueixis amb la subscripci\u00f3 ingressant els detalls de la targeta de cr\u00e8dit. La part que sol\u00b7licita les dades de la targeta de cr\u00e8dit \u00e9s un estafador, que utilitzar\u00e0 la informaci\u00f3 de la targeta de cr\u00e8dit.<\/p>\n\n\n\n<p>El correu electr\u00f2nic de&nbsp;phishing&nbsp;tamb\u00e9 podria &#8220;advertir&#8221; que la contrasenya d&#8217;un programari o aplicaci\u00f3 est\u00e0 desactualitzada i et demanaran que donis una altra. A mesura que&nbsp;afegeixis&nbsp;la contrasenya anterior i nova, els&nbsp;phishers&nbsp;obtenen acc\u00e9s a la contrasenya anterior (tamb\u00e9 coneguda com a real) en el programari o programa i la utilitzen per iniciar sessi\u00f3 i obtenir la teva informaci\u00f3 privada.<\/p>\n\n\n\n<p><strong>La majoria dels atacs de&nbsp;phishing&nbsp;continuen arribant per correu electr\u00f2nic<\/strong>, per\u00f2 ja no s\u00f3n l&#8217;\u00fanic mitj\u00e0 per als atacs de&nbsp;phishing. Tamb\u00e9 poden oc\u00f3rrer a trav\u00e9s de missatges instantanis, xarxes socials o fins i tot anuncis en motors de cerca, com Google Ads. <strong>El que totes les estafes tenen en com\u00fa \u00e9s que inclouen un enlla\u00e7 a un lloc web, que despr\u00e9s intenten que lliuris les teves credencials d&#8217;inici de sessi\u00f3 a un lloc web espec\u00edfic<\/strong>, o que lliuris les teves dades privades, com els detalls de la seguretat social o el n\u00famero de targeta banc\u00e0ria.&nbsp;<\/p>\n\n\n\n<h2 class=\"has-small-font-size wp-block-heading\"><strong>A continuaci\u00f3 oferim alguns consells per &#8220;evitar&#8221; aquest tipus d&#8217;estafes<\/strong><\/h2>\n\n\n\n<ul><li>Mira el remitent. Aix\u00f2 vol dir l&#8217;adre\u00e7a de correu electr\u00f2nic de la qual prov\u00e9 i NO NOM\u00c9S EL NOM. De vegades, el nom podria ser el de la teva mare o fins i tot el teu cap, PER\u00d2 sempre, sempre verifica l&#8217;adre\u00e7a de correu electr\u00f2nic perqu\u00e8 aix\u00f2 \u00e9s el que delata el&nbsp;phisher.<\/li><\/ul>\n\n\n\n<ul><li>Targetes, Walmart, UPS i molts altres llocs, marques i empreses de confian\u00e7a poden ser tergiversats en un correu electr\u00f2nic de&nbsp;phishing. Per exemple, qualsevol pot obtenir un logotip i enganxar-lo en un correu electr\u00f2nic. COMPROVA l&#8217;adre\u00e7a de correu electr\u00f2nic del remitent.<\/li><\/ul>\n\n\n\n<ul><li>Quan no estiguis segur, NO facis clic en res NI contesti al correu electr\u00f2nic sospit\u00f3s. Simplement&nbsp;c\u00e8rca&nbsp;a Google el remitent o la possible estafa. Sovint, quan es tracta d&#8217;una estafa, apareixer\u00e0 a Google.&nbsp;Possa&#8217;t&nbsp;en contacte amb l&#8217;empresa, avisa i despr\u00e9s bloqueja el remitent, mou-la a la carpeta de correu no desitjat. UNA ALTRA VEGADA, no facis clic a res ni contesti al correu electr\u00f2nic de&nbsp;phishing&nbsp;en q\u00fcesti\u00f3.<\/li><\/ul>\n\n\n\n<ul><li>Si realment no pots esbrinar si est\u00e0s sent v\u00edctima de suplantaci\u00f3 d&#8217;identitat, truca al teu professional de&nbsp;TI&nbsp;de confian\u00e7a. Ells et poden assessorar adequadament.<\/li><\/ul>\n\n\n\n<ul><li>Finalment, quan vegis un correu electr\u00f2nic sospit\u00f3s &#8230; SEMPRE verifica l&#8217;adre\u00e7a de correu electr\u00f2nic de l&#8217;emissor i mai facis clic a res ni contestis.<\/li><\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Conclusi\u00f3<\/strong><\/h4>\n\n\n\n<p>La protecci\u00f3 contra atacs de phishing requereix que tant els usuaris com les empreses prenguin mesures.<\/p>\n\n\n\n<p><strong>Per als usuaris<\/strong>, la vigil\u00e0ncia \u00e9s clau. Un missatge falsificat sovint cont\u00e9 errors subtils que exposen la seva veritable identitat. Aquests poden incloure errors ortogr\u00e0fics o canvis en els noms de domini. Els usuaris tamb\u00e9 s&#8217;han d&#8217;aturar i pensar per qu\u00e8 estan rebent aquest correu electr\u00f2nic.<\/p>\n\n\n\n<p><strong>Per a les empreses, <\/strong>es poden prendre una s\u00e8rie de passos per mitigar els atacs de&nbsp;phishing&nbsp;com pot ser l&#8217;autenticaci\u00f3 de dos factors (2FA), ja que \u00e9s un dels m\u00e8todes m\u00e9s efica\u00e7os per contrarestar aquest tipus d&#8217;atacs. A m\u00e9s les empreses haurien d&#8217;aplicar pol\u00edtiques estrictes d&#8217;administraci\u00f3 de contrasenyes.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.adssl.com\/es\/contacte\/\">Contacta&#8217;ns <\/a>per a mes informaci\u00f3.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Imagina el desconcert&nbsp;al&nbsp;pagar amb la targeta i assabentar-te que els teus diners han estat robats. Aquesta situaci\u00f3 la viuen di\u00e0riament moltes persones al m\u00f3n. Donen clic a un&nbsp;link&nbsp;&#8220;innocent&#8221; i tota la seva informaci\u00f3 \u00e9s robada. \u00bfCom funciona el&nbsp;Phishing? El tipus m\u00e9s com\u00fa de\u00a0phishing\u00a0\u00e9s l&#8217;atacant que s&#8217;acosta al seu objectiu, generalment per correu electr\u00f2nic, fent-se passar [&hellip;]<\/p>","protected":false},"author":4,"featured_media":6258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Alerta amb el Phishing! - ADS, An\u00e0lisi\/Disseny de Soft<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.adssl.com\/es\/compte-amb-el-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Alerta amb el Phishing! - ADS, An\u00e0lisi\/Disseny de Soft\" \/>\n<meta property=\"og:description\" content=\"Imagina el desconcert&nbsp;al&nbsp;pagar amb la targeta i assabentar-te que els teus diners han estat robats. Aquesta situaci\u00f3 la viuen di\u00e0riament moltes persones al m\u00f3n. Donen clic a un&nbsp;link&nbsp;&#8220;innocent&#8221; i tota la seva informaci\u00f3 \u00e9s robada. \u00bfCom funciona el&nbsp;Phishing? El tipus m\u00e9s com\u00fa de\u00a0phishing\u00a0\u00e9s l&#8217;atacant que s&#8217;acosta al seu objectiu, generalment per correu electr\u00f2nic, fent-se passar [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.adssl.com\/es\/compte-amb-el-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"ADS, An\u00e0lisi\/Disseny de Soft\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ADS-An%c3%a0lisiDisseny-de-Soft-SLU-156582594398681\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-17T08:44:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-16T08:03:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.adssl.com\/wp-content\/uploads\/2021\/08\/phishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"668\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Yossef\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ADSOlot\" \/>\n<meta name=\"twitter:site\" content=\"@ADSOlot\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Yossef\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/\"},\"author\":{\"name\":\"Yossef\",\"@id\":\"https:\/\/www.adssl.com\/#\/schema\/person\/4f427cecbe37f0f381759b5fc514f200\"},\"headline\":\"Alerta amb el Phishing!\",\"datePublished\":\"2021-08-17T08:44:28+00:00\",\"dateModified\":\"2023-12-16T08:03:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/\"},\"wordCount\":864,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.adssl.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adssl.com\/wp-content\/uploads\/2021\/08\/phishing.jpg\",\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/\",\"url\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/\",\"name\":\"Alerta amb el Phishing! - ADS, An\u00e0lisi\/Disseny de Soft\",\"isPartOf\":{\"@id\":\"https:\/\/www.adssl.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.adssl.com\/wp-content\/uploads\/2021\/08\/phishing.jpg\",\"datePublished\":\"2021-08-17T08:44:28+00:00\",\"dateModified\":\"2023-12-16T08:03:57+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#primaryimage\",\"url\":\"https:\/\/www.adssl.com\/wp-content\/uploads\/2021\/08\/phishing.jpg\",\"contentUrl\":\"https:\/\/www.adssl.com\/wp-content\/uploads\/2021\/08\/phishing.jpg\",\"width\":1024,\"height\":668},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/www.adssl.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alerta amb el Phishing!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.adssl.com\/#website\",\"url\":\"https:\/\/www.adssl.com\/\",\"name\":\"ADS, An\u00e0lisi\/Disseny de Soft\",\"description\":\"Serveis inform\u00e0tics\",\"publisher\":{\"@id\":\"https:\/\/www.adssl.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.adssl.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.adssl.com\/#organization\",\"name\":\"ADS, An\u00e0lisi\/Disseny de Soft\",\"url\":\"https:\/\/www.adssl.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adssl.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.adssl.com\/wp-content\/uploads\/2020\/12\/cropped-Logo_A.png\",\"contentUrl\":\"https:\/\/www.adssl.com\/wp-content\/uploads\/2020\/12\/cropped-Logo_A.png\",\"width\":194,\"height\":120,\"caption\":\"ADS, An\u00e0lisi\/Disseny de Soft\"},\"image\":{\"@id\":\"https:\/\/www.adssl.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/ADS-An\u00e0lisiDisseny-de-Soft-SLU-156582594398681\/\",\"https:\/\/x.com\/ADSOlot\",\"https:\/\/es.linkedin.com\/company\/ads-analisi-disseny-de-soft-sl\",\"https:\/\/youtu.be\/swDmw2qXphU\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.adssl.com\/#\/schema\/person\/4f427cecbe37f0f381759b5fc514f200\",\"name\":\"Yossef\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.adssl.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7dee51c8925918cb3c2e8c5955e5809e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7dee51c8925918cb3c2e8c5955e5809e?s=96&d=mm&r=g\",\"caption\":\"Yossef\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Alerta amb el Phishing! - ADS, An\u00e0lisi\/Disseny de Soft","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.adssl.com\/es\/compte-amb-el-phishing\/","og_locale":"es_ES","og_type":"article","og_title":"Alerta amb el Phishing! - ADS, An\u00e0lisi\/Disseny de Soft","og_description":"Imagina el desconcert&nbsp;al&nbsp;pagar amb la targeta i assabentar-te que els teus diners han estat robats. Aquesta situaci\u00f3 la viuen di\u00e0riament moltes persones al m\u00f3n. Donen clic a un&nbsp;link&nbsp;&#8220;innocent&#8221; i tota la seva informaci\u00f3 \u00e9s robada. \u00bfCom funciona el&nbsp;Phishing? El tipus m\u00e9s com\u00fa de\u00a0phishing\u00a0\u00e9s l&#8217;atacant que s&#8217;acosta al seu objectiu, generalment per correu electr\u00f2nic, fent-se passar [&hellip;]","og_url":"https:\/\/www.adssl.com\/es\/compte-amb-el-phishing\/","og_site_name":"ADS, An\u00e0lisi\/Disseny de Soft","article_publisher":"https:\/\/www.facebook.com\/ADS-An%c3%a0lisiDisseny-de-Soft-SLU-156582594398681\/","article_published_time":"2021-08-17T08:44:28+00:00","article_modified_time":"2023-12-16T08:03:57+00:00","og_image":[{"width":1024,"height":668,"url":"https:\/\/www.adssl.com\/wp-content\/uploads\/2021\/08\/phishing.jpg","type":"image\/jpeg"}],"author":"Yossef","twitter_card":"summary_large_image","twitter_creator":"@ADSOlot","twitter_site":"@ADSOlot","twitter_misc":{"Escrito por":"Yossef","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#article","isPartOf":{"@id":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/"},"author":{"name":"Yossef","@id":"https:\/\/www.adssl.com\/#\/schema\/person\/4f427cecbe37f0f381759b5fc514f200"},"headline":"Alerta amb el Phishing!","datePublished":"2021-08-17T08:44:28+00:00","dateModified":"2023-12-16T08:03:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/"},"wordCount":864,"commentCount":0,"publisher":{"@id":"https:\/\/www.adssl.com\/#organization"},"image":{"@id":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adssl.com\/wp-content\/uploads\/2021\/08\/phishing.jpg","inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.adssl.com\/compte-amb-el-phishing\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/","url":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/","name":"Alerta amb el Phishing! - ADS, An\u00e0lisi\/Disseny de Soft","isPartOf":{"@id":"https:\/\/www.adssl.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#primaryimage"},"image":{"@id":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.adssl.com\/wp-content\/uploads\/2021\/08\/phishing.jpg","datePublished":"2021-08-17T08:44:28+00:00","dateModified":"2023-12-16T08:03:57+00:00","breadcrumb":{"@id":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.adssl.com\/compte-amb-el-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#primaryimage","url":"https:\/\/www.adssl.com\/wp-content\/uploads\/2021\/08\/phishing.jpg","contentUrl":"https:\/\/www.adssl.com\/wp-content\/uploads\/2021\/08\/phishing.jpg","width":1024,"height":668},{"@type":"BreadcrumbList","@id":"https:\/\/www.adssl.com\/compte-amb-el-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.adssl.com\/"},{"@type":"ListItem","position":2,"name":"Alerta amb el Phishing!"}]},{"@type":"WebSite","@id":"https:\/\/www.adssl.com\/#website","url":"https:\/\/www.adssl.com\/","name":"ADS, An\u00e0lisi\/Disseny de Soft","description":"Serveis inform\u00e0tics","publisher":{"@id":"https:\/\/www.adssl.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.adssl.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.adssl.com\/#organization","name":"ADS, An\u00e0lisi\/Disseny de Soft","url":"https:\/\/www.adssl.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adssl.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.adssl.com\/wp-content\/uploads\/2020\/12\/cropped-Logo_A.png","contentUrl":"https:\/\/www.adssl.com\/wp-content\/uploads\/2020\/12\/cropped-Logo_A.png","width":194,"height":120,"caption":"ADS, An\u00e0lisi\/Disseny de Soft"},"image":{"@id":"https:\/\/www.adssl.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ADS-An\u00e0lisiDisseny-de-Soft-SLU-156582594398681\/","https:\/\/x.com\/ADSOlot","https:\/\/es.linkedin.com\/company\/ads-analisi-disseny-de-soft-sl","https:\/\/youtu.be\/swDmw2qXphU"]},{"@type":"Person","@id":"https:\/\/www.adssl.com\/#\/schema\/person\/4f427cecbe37f0f381759b5fc514f200","name":"Yossef","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.adssl.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7dee51c8925918cb3c2e8c5955e5809e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7dee51c8925918cb3c2e8c5955e5809e?s=96&d=mm&r=g","caption":"Yossef"}}]}},"_links":{"self":[{"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/posts\/6256"}],"collection":[{"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/comments?post=6256"}],"version-history":[{"count":8,"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/posts\/6256\/revisions"}],"predecessor-version":[{"id":7631,"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/posts\/6256\/revisions\/7631"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/media\/6258"}],"wp:attachment":[{"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/media?parent=6256"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/categories?post=6256"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adssl.com\/es\/wp-json\/wp\/v2\/tags?post=6256"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}