{"id":145,"date":"2017-05-31T18:58:29","date_gmt":"2017-05-31T18:58:29","guid":{"rendered":"http:\/\/127.0.0.1\/rcm\/osi\/alertas\/"},"modified":"2017-05-31T18:58:29","modified_gmt":"2017-05-31T18:58:29","slug":"alertas","status":"publish","type":"page","link":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/alertas\/","title":{"rendered":"Alertas y Estatus"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row][vc_column]<section class=\"items-grid wf-container\"><div class=\"wf-cell wf-1\"><article class=\"post-format-standard\"><div class=\"mini-post-img\"><a class=\"alignleft post-rollover no-avatar\" href=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/08\/18\/healthcare-data-breaches-caused-by-hacks-are-on-the-rise\/\"  style=\"width:80px; height: 80px;\" aria-label=\"Post image\"><\/a><\/div><div class=\"post-content\"><a href=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/08\/18\/healthcare-data-breaches-caused-by-hacks-are-on-the-rise\/\">Healthcare data breaches caused by hacks are on the rise<\/a><p class=\"text-small\">By&nbsp;Rachel Z. Arndt&nbsp;&nbsp;|&nbsp; August 16, 2017 (This story was updated Aug. 18, 2017). Data breaches caused by hacking and so-called IT incidents are on the rise, with the number reported in 2017 to set out pace the number reported in 2016, according to data from HHS&#8217; Office for Civil Rights. Security experts said that&#8217;s because&hellip;<\/p><time class=\"text-secondary\" datetime=\"2017-08-18T18:48:25+00:00\">August 18, 2017<\/time><\/div><\/article><\/div><div class=\"wf-cell wf-1\"><article class=\"post-format-standard\"><div class=\"mini-post-img\"><a class=\"alignleft post-rollover no-avatar\" href=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/08\/18\/two-critical-zero-day-flaws-disclosed-in-foxit-pdf-reader\/\"  style=\"width:80px; height: 80px;\" aria-label=\"Post image\"><\/a><\/div><div class=\"post-content\"><a href=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/08\/18\/two-critical-zero-day-flaws-disclosed-in-foxit-pdf-reader\/\">Two Critical Zero-Day Flaws Disclosed in Foxit PDF Reader<\/a><p class=\"text-small\">Are you using Foxit PDF Reader? If yes, then you need to watch your back. Security researchers have discovered two critical zero-day security vulnerabilities in Foxit Reader software that could allow attackers to execute arbitrary code on a targeted computer, if not configured to open files in the Safe Reading Mode. The first vulnerability (CVE-2017-10951)&hellip;<\/p><time class=\"text-secondary\" datetime=\"2017-08-18T18:45:45+00:00\">August 18, 2017<\/time><\/div><\/article><\/div><div class=\"wf-cell wf-1\"><article class=\"post-format-standard\"><div class=\"mini-post-img\"><a class=\"alignleft post-rollover no-avatar\" href=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/07\/19\/zero-day-vulnerabilities-in-windows-ntlm-security-protocols\/\"  style=\"width:80px; height: 80px;\" aria-label=\"Post image\"><\/a><\/div><div class=\"post-content\"><a href=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/07\/19\/zero-day-vulnerabilities-in-windows-ntlm-security-protocols\/\">Zero-day vulnerabilities in Windows NTLM security protocols<\/a><p class=\"text-small\">As part of this month&#8217;s Patch Tuesday, Microsoft has released security patches for a serious privilege escalation vulnerability which affect all versions of its Windows operating system for enterprises released since 2007. Researchers at behavioral firewall specialist Preempt discovered two zero-day vulnerabilities in Windows NTLM security protocols, both of which allow attackers to create a&hellip;<\/p><time class=\"text-secondary\" datetime=\"2017-07-19T15:16:07+00:00\">July 19, 2017<\/time><\/div><\/article><\/div><div class=\"wf-cell wf-1\"><article class=\"post-format-standard\"><div class=\"mini-post-img\"><a class=\"alignleft post-rollover layzr-bg\" href=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/07\/18\/alerta-critical-vulnerability\/\" aria-label=\"Post image\"><img decoding=\"async\" class=\"preload-me lazy-load aspect\" src=\"data:image\/svg+xml,%3Csvg%20xmlns%3D&#39;http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg&#39;%20viewBox%3D&#39;0%200%2080%2080&#39;%2F%3E\" data-src=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-content\/themes\/dt-the7\/images\/noimage.jpg\" data-srcset=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-content\/themes\/dt-the7\/images\/noimage.jpg 80w\" loading=\"eager\" style=\"--ratio: 80 \/ 80\" sizes=\"(max-width: 80px) 100vw, 80px\" width=\"80\" height=\"80\"  alt=\"\" \/><\/a><\/div><div class=\"post-content\"><a href=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/07\/18\/alerta-critical-vulnerability\/\">Highly critical vulnerability discovered in Cisco Systems&#8217; WebEX browser<\/a><p class=\"text-small\">[vc_row][vc_column][vc_column_text]A highly critical vulnerability has been discovered in the Cisco Systems\u2019 WebEx browser extension for Chrome and Firefox, for the second time in this year, which could allow attackers to remotely execute malicious code on a victim&#8217;s computer. Cisco WebEx is a popular communication tool for online events, including meetings, webinars and video conferences that&hellip;<\/p><time class=\"text-secondary\" datetime=\"2017-07-18T20:01:47+00:00\">July 18, 2017<\/time><\/div><\/article><\/div><div class=\"wf-cell wf-1\"><article class=\"post-format-standard\"><div class=\"mini-post-img\"><a class=\"alignleft post-rollover no-avatar\" href=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/06\/16\/alerta-de-seguridad-ransomware\/\"  style=\"width:80px; height: 80px;\" aria-label=\"Post image\"><\/a><\/div><div class=\"post-content\"><a href=\"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/2017\/06\/16\/alerta-de-seguridad-ransomware\/\">Alerta de seguridad &#8211; \u201cRansomware\u201d<\/a><p class=\"text-small\">Se ha estado alertando sobre ataques cibern\u00e9ticos conocidos como &#8220;Ransomware&#8220;, el cual es un tipo de malware que una vez infecta las computadoras de los usuarios, restringe el acceso a todos los documentos mediante cifrado, y demanda pago para recuperar la informaci\u00f3n. Se han estado tomando previsiones para evitar incidentes dentro del Recinto y toda&hellip;<\/p><time class=\"text-secondary\" datetime=\"2017-06-16T11:47:49+00:00\">June 16, 2017<\/time><\/div><\/article><\/div><\/section>[\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][\/vc_column][\/vc_row]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-microsite.php","meta":{"footnotes":""},"class_list":["post-145","page","type-page","status-publish","hentry","description-off"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/pages\/145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/comments?post=145"}],"version-history":[{"count":0,"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/pages\/145\/revisions"}],"wp:attachment":[{"href":"https:\/\/rcm1.rcm.upr.edu\/oficinasistemas\/wp-json\/wp\/v2\/media?parent=145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}