{"id":3124,"date":"2023-06-23T16:08:13","date_gmt":"2023-06-23T22:08:13","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/?p=3124"},"modified":"2023-06-23T16:28:26","modified_gmt":"2023-06-23T22:28:26","slug":"como-lidiar-ante-una-extorsion-online","status":"publish","type":"post","link":"https:\/\/redporlaciberseguridad.org\/en\/como-lidiar-ante-una-extorsion-online\/","title":{"rendered":"3. How to deal with online extortion?"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"3124\" class=\"elementor elementor-3124\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bdc83b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"1bdc83b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3302f89\" data-id=\"3302f89\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9dc496e elementor-widget elementor-widget-heading\" data-id=\"9dc496e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">3. How to deal with online extortion?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc6a5a2 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"cc6a5a2\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e5dbdb7\" data-id=\"e5dbdb7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-40d5738 elementor-widget elementor-widget-image\" data-id=\"40d5738\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-13.png-1024x576.webp\" class=\"attachment-large size-large wp-image-3094\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-13.png-1024x576.webp 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-13.png-600x338.webp 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-13.png-300x169.webp 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-13.png-768x432.webp 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-13.png-1536x864.webp 1536w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2023\/06\/BANNER-WEBINAR-TODOS-13.png.webp 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35edba0 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"35edba0\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54767ac\" data-id=\"54767ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d1a56e8 elementor-widget elementor-widget-heading\" data-id=\"d1a56e8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Online Extortion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c408df elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"0c408df\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a26d7d0\" data-id=\"a26d7d0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bc79e85 elementor-widget elementor-widget-text-editor\" data-id=\"bc79e85\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Internet extortion is the way of asking for a \u201cransom for your information\u201d extracted through malware by another person, that is, a malicious computer program is infiltrated into your computer, so that a payment or some other demand is previously requested to recover said stolen information.<\/p><p>\u00a0<\/p><p>Malware can be contracted for several reasons, an example is by downloading a file from untrustworthy sources, installing some free software that is already infected, visiting malicious websites, clicking on a link and\/or causing the entry to malware.<\/p><p>\u00a0<\/p><p>Every type of electronic device is prone to such an infection, such as a mobile phone, a computer, a tablet, even a video game console, if the device has access to the internet it is vulnerable to a cyber attack.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2514ebd elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"2514ebd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f6ebae1\" data-id=\"f6ebae1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27cae4c elementor-widget elementor-widget-heading\" data-id=\"27cae4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">What types of extortion exist?<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-73621ef elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"73621ef\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c1ad728\" data-id=\"c1ad728\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bf857fc elementor-widget elementor-widget-text-editor\" data-id=\"bf857fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>It is very important to be careful what we click on, there is a lot of evil, among the various most famous online extortions are:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c5e7059 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"c5e7059\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d1314e1\" data-id=\"d1314e1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c32c090 elementor-widget elementor-widget-heading\" data-id=\"c32c090\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Grooming<\/h4>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a480582 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"a480582\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7618ff9\" data-id=\"7618ff9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-492f638 elementor-widget elementor-widget-text-editor\" data-id=\"492f638\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">It is sexual harassment and abuse, the so-called \u201cpedophile deception\u201d. They are actions of an adult through the Internet to deceive a minor for sexual purposes.<\/span><\/p><p>\u00a0<\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">The underage person is extorted to access sexual demands, which increase under the threat of revealing said content.<\/span><\/p><p>\u00a0<\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">The attackers are pedophiles or pedophiles who approach the minor through a means of communication on the Internet, establishing an emotional bond to obtain photographs or videos, or directly stealing photographs.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b2f04c elementor-widget elementor-widget-heading\" data-id=\"5b2f04c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Sharenting trick<\/h4>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4dab993 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"4dab993\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c0522f9\" data-id=\"c0522f9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a65b954 elementor-widget elementor-widget-text-editor\" data-id=\"a65b954\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Sharenting is an action by the father and mother figure when sharing information about their children on social networks, it does not have a malicious intention, on the contrary, the intention of the parents is to share the \u201cemotion\u201d and how \u201cproud\u201d they are. They are their children, however, this action has a responsibility, firstly you do not know if your children agree, secondly, most children still do not understand anything they publish.<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\">\u00a0<\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">It is likely that you are making your child vulnerable to fraud, password theft, or even financial risk, but it is not the only risk. By having so many photos and information on the network, an outsider could impersonate you. by close friends, family of the minor to deceive a person.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9550e84 elementor-widget elementor-widget-heading\" data-id=\"9550e84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Sexting<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-20eaa9f elementor-widget elementor-widget-text-editor\" data-id=\"20eaa9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d32a007 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d32a007\" data-element_type=\"section\"><div class=\"elementor-container elementor-column-gap-default\"><div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b9f9350\" data-id=\"b9f9350\" data-element_type=\"column\"><div class=\"elementor-widget-wrap elementor-element-populated\"><div class=\"elementor-element elementor-element-8ea7e09 elementor-widget elementor-widget-text-editor\" data-id=\"8ea7e09\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p>As its name indicates, it deals with sexual content, in which two people exchange sexual videos or photos, and one party threatens to show them to the public, friends or family with the intention of getting something.<\/p><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-af93c68 elementor-widget elementor-widget-heading\" data-id=\"af93c68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Ransomware<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-81d207a elementor-widget elementor-widget-text-editor\" data-id=\"81d207a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>This type of malware prevents a user from accessing their operating system or any personal files, and then requests a ransom to access them again.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b5de1b7 elementor-widget elementor-widget-heading\" data-id=\"b5de1b7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\nWhat should you do?<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f42e964 elementor-widget elementor-widget-text-editor\" data-id=\"f42e964\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fe44495 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fe44495\" data-element_type=\"section\"><div class=\"elementor-container elementor-column-gap-default\"><div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4f2f8d7\" data-id=\"4f2f8d7\" data-element_type=\"column\"><div class=\"elementor-widget-wrap elementor-element-populated\"><div class=\"elementor-element elementor-element-0ba575e elementor-widget elementor-widget-text-editor\" data-id=\"0ba575e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">In any situation, it is advisable to follow the following steps:<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\">\u00a0<\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Step 1:<\/span><span class=\"S1PPyQ\">\u00a0Keep calm and do not take hasty actions.<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Step 2:\u00a0<\/span><span class=\"S1PPyQ\">Do not delete anything, this is to maintain evidence of the extortion.<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Step 3:\u00a0<\/span><span class=\"S1PPyQ\">Do not respond, maintain zero communications with the attacker.<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Step 4:\u00a0<\/span><span class=\"S1PPyQ\">Do not negotiate, so as not to be a victim of manipulation.<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Step 5:<\/span><span class=\"S1PPyQ\">\u00a0Ask the Police for help, the following is a catalog for help:<\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/section><section class=\"elementor-section elementor-top-section elementor-element elementor-element-a6a5d6b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a6a5d6b\" data-element_type=\"section\"><div class=\"elementor-container elementor-column-gap-default\"><div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb39823\" data-id=\"eb39823\" data-element_type=\"column\"><div class=\"elementor-widget-wrap elementor-element-populated\"><div class=\"elementor-element elementor-element-a942801 elementor-widget elementor-widget-text-editor\" data-id=\"a942801\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Step 6:<\/span><span class=\"S1PPyQ\">\u00a0Turn off your device (mobile or computer).<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Step 7:<\/span><span class=\"S1PPyQ\">If possible, change all your passwords.<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">Step 8:<\/span><span class=\"S1PPyQ\">Restore your information from a backup<\/span><\/p><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0cf1b3 elementor-widget elementor-widget-heading\" data-id=\"a0cf1b3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Prevent before sorry!<\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4ab8265 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"4ab8265\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aedbdde\" data-id=\"aedbdde\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-cd0e69e elementor-widget elementor-widget-text-editor\" data-id=\"cd0e69e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-fe44495 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"fe44495\" data-element_type=\"section\"><div class=\"elementor-container elementor-column-gap-default\"><div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4f2f8d7\" data-id=\"4f2f8d7\" data-element_type=\"column\"><div class=\"elementor-widget-wrap elementor-element-populated\"><div class=\"elementor-element elementor-element-0ba575e elementor-widget elementor-widget-text-editor\" data-id=\"0ba575e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\"><div class=\"elementor-widget-container\"><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\"><span class=\"S1PPyQ\">It's time to start having digital civility. Small actions make a difference, for example;<\/span><\/p><p class=\"_04xlpA direction-ltr align-justify para-style-subtitle\">\u00a0<\/p><ul><li><span class=\"S1PPyQ\">Avoid entering suspicious websites<\/span><\/li><li><span class=\"S1PPyQ\">Have an antivirus installed on your device<\/span><\/li><li><span class=\"S1PPyQ\">Do not open email from dubious origin (in this case it is better to investigate who the email is from before opening any link or downloading any file).<\/span><\/li><li><span class=\"S1PPyQ\">Do not accept anyone's friend request.<\/span><\/li><li><span class=\"S1PPyQ\">Do not keep in contact with strangers or at least do not trust what they send us.<\/span><\/li><li><span class=\"S1PPyQ\">Check the domain of a site to verify that it is the official site.<\/span><\/li><li><span class=\"S1PPyQ\">Ask for help, if you need it, from the authorities, to sue the attackers.<\/span><\/li><li><span class=\"S1PPyQ\">Take care of the information you share.<\/span><\/li><li><span class=\"S1PPyQ\">Cover the camera of your computer and\/or cell phone with tape.<\/span><\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/section>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5699edf elementor-widget elementor-widget-heading\" data-id=\"5699edf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><b>bibliographic references<\/b><\/h3>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5eab04b elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5eab04b\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8507ec6\" data-id=\"8507ec6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-645eb12 elementor-widget elementor-widget-text-editor\" data-id=\"645eb12\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<ul><li class=\"_04xlpA direction-ltr align-center para-style-body\"><span class=\"S1PPyQ\">Movistar Prosegur Alarmas 2022, https:\/\/blog.prosegur.es\/intenta-hacerme-chantaje-online\/<\/span>\u00a0<\/li><li class=\"_04xlpA direction-ltr align-center para-style-body\">Guest Author<span class=\"S1PPyQ\">(2019) 4 tipos de fraudes por Internet que debes conocer para no caer en el enga\u00f1o<\/span><\/li><li>https:\/\/ciberseguridad.ift.org.mx\/reporte_ciudadano.php<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d5cfb78 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"d5cfb78\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-374443f\" data-id=\"374443f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-27ab2a3 elementor-widget elementor-widget-image\" data-id=\"27ab2a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"367\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2022\/12\/contactanos-.png\" class=\"attachment-large size-large wp-image-2086\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2022\/12\/contactanos-.png 800w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2022\/12\/contactanos--600x275.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2022\/12\/contactanos--300x138.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2022\/12\/contactanos--768x352.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-312df40 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"312df40\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b03bc27\" data-id=\"b03bc27\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d4acee elementor-shape-circle elementor-grid-0 e-grid-align-center elementor-widget elementor-widget-social-icons\" data-id=\"5d4acee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"social-icons.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-social-icons-wrapper elementor-grid\" role=\"list\">\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-facebook elementor-repeater-item-7974e07\" href=\"https:\/\/www.facebook.com\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Facebook<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-facebook\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-linkedin elementor-repeater-item-3faa0ff\" href=\"https:\/\/www.linkedin.com\/company\/red-por-la-ciberseguridad\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Linkedin<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-linkedin\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-youtube elementor-repeater-item-f3c2677\" href=\"https:\/\/www.youtube.com\/@redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Youtube<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-youtube\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t\t\t<span class=\"elementor-grid-item\" role=\"listitem\">\n\t\t\t\t\t<a class=\"elementor-icon elementor-social-icon elementor-social-icon-twitch elementor-repeater-item-5ad851c\" href=\"https:\/\/www.twitch.tv\/redporlaciberseguridad\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-screen-only\">Twitch<\/span>\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fab fa-twitch\"><\/i>\t\t\t\t\t<\/a>\n\t\t\t\t<\/span>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>3. \u00bfC\u00f3mo lidiar ante una extorsi\u00f3n online? Extorsi\u00f3n Online La extorsi\u00f3n por internet es la manera de pedir un \u201crescate por su informaci\u00f3n\u201d extra\u00edda mediante un malware por otra persona, es decir, un programa inform\u00e1tico malicioso es infiltrado en su computadora, esto para que previamente se solicite un pago o alguna otra demanda para recuperar<\/p>","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[22],"tags":[],"class_list":["post-3124","post","type-post","status-publish","format-standard","hentry","category-noticias"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/3124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=3124"}],"version-history":[{"count":0,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/3124\/revisions"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=3124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/categories?post=3124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/tags?post=3124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}