{"id":1850,"date":"2021-10-20T06:51:24","date_gmt":"2021-10-20T09:51:24","guid":{"rendered":"https:\/\/tecnologia5.com\/blog\/?p=1850"},"modified":"2021-10-20T06:51:25","modified_gmt":"2021-10-20T09:51:25","slug":"hackers","status":"publish","type":"post","link":"https:\/\/tec5.tech\/blog\/hackers\/","title":{"rendered":"Hackers de sombrero negro y blanco"},"content":{"rendered":"\n<p>En los \u00faltimos a\u00f1os, las noticias y el cine han hecho que los Hackers se hayan convertido en personajes muy conocido en todos los \u00e1mbitos.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Pero, \u00bfSab\u00edas que no todos los hackers tiene los mismo valores \u00e9ticos?<\/h3>\n\n\n\n<p>Dentro del universo de la inform\u00e1tica existe dos tipos de hacer, aquellos de sombrero Negro y los de sombrero Blanco.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">sombrero Negro<\/h3>\n\n\n\n<p>En este caso la motivaci\u00f3n del acto tiene fines malignos e ilegales. Los hacker de sombrero negro son ciber delincuentes que utilizan sus conocimientos para fines delictivos.<\/p>\n\n\n\n<p>Alguno de los actos que suelen realizar, robar contrase\u00f1as, <a href=\"https:\/\/tecnologia5.com\/blog\/robo-de-tarjetas-de-credito\/\">n\u00fameros de tarjetas de cr\u00e9dito<\/a> y otras clases de informaci\u00f3n confidencial, a tomar sistemas de reh\u00e9n o a propagar malware dise\u00f1ado para borrar archivos.<\/p>\n\n\n\n<p>Los hackers que prefieren este bando, lo eligen por su gran redito econ\u00f3mico.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sombrero Blanco<\/h3>\n\n\n\n<p>En este caso tenemos especialistas que buscan colaborar en contra de la ciber delincuencia<\/p>\n\n\n\n<p>Dentro de este mundo de hackers \u00e9tico, existe un peque\u00f1o grupo que se especializa en&nbsp;&nbsp;hacer pruebas de penetraci\u00f3n para corroborar la seguridad de diferentes compa\u00f1\u00edas y entidades.<\/p>\n\n\n\n<p>La grande diferencia<\/p>\n\n\n\n<p>Existe una sola diferencia entre ambos estilos de hackers, y es la motivaci\u00f3n. Existen aquellos que buscan generar caos y delincuencia y aquellos que buscan evitarla y prevenirla.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En los \u00faltimos a\u00f1os, las noticias y el cine han hecho que los Hackers se hayan convertido en personajes muy conocido en todos los \u00e1mbitos. Pero, \u00bfSab\u00edas que no todos los hackers tiene los mismo valores \u00e9ticos? Dentro del universo de la inform\u00e1tica existe dos tipos de hacer, aquellos de sombrero Negro y los de [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1851,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1850","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-notas"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers de sombrero negro y blanco - Tec5.Tech<\/title>\n<meta name=\"description\" content=\"Hackers de sombrero negro y blanco Notas de Inter\u00e9s Descubr\u00ed la diferencia entre estos dos protagonistas que conviven en el universo digital\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/tec5.tech\/blog\/hackers\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers de sombrero negro y blanco - Tec5.Tech\" \/>\n<meta property=\"og:description\" content=\"Hackers de sombrero negro y blanco Notas de Inter\u00e9s Descubr\u00ed la diferencia entre estos dos protagonistas que conviven en el universo digital\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tec5.tech\/blog\/hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Tec5.Tech\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/Tecnologia5\/?ref=bookmarks\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-20T09:51:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-20T09:51:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1318\" \/>\n\t<meta property=\"og:image:height\" content=\"494\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Tecnolog\u00eda 5\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@tecnologia5it\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tecnolog\u00eda 5\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/tec5.tech\/blog\/hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/tec5.tech\/blog\/hackers\/\"},\"author\":{\"name\":\"Tecnolog\u00eda 5\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/person\/615ea8e720c575663a3c6451962cb47d\"},\"headline\":\"Hackers de sombrero negro y blanco\",\"datePublished\":\"2021-10-20T09:51:24+00:00\",\"dateModified\":\"2021-10-20T09:51:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/tec5.tech\/blog\/hackers\/\"},\"wordCount\":230,\"publisher\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/tec5.tech\/blog\/hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg\",\"articleSection\":[\"Notas de Inter\u00e9s\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tec5.tech\/blog\/hackers\/\",\"url\":\"https:\/\/tec5.tech\/blog\/hackers\/\",\"name\":\"Hackers de sombrero negro y blanco - Tec5.Tech\",\"isPartOf\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tec5.tech\/blog\/hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tec5.tech\/blog\/hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg\",\"datePublished\":\"2021-10-20T09:51:24+00:00\",\"dateModified\":\"2021-10-20T09:51:25+00:00\",\"description\":\"Hackers de sombrero negro y blanco Notas de Inter\u00e9s Descubr\u00ed la diferencia entre estos dos protagonistas que conviven en el universo digital\",\"breadcrumb\":{\"@id\":\"https:\/\/tec5.tech\/blog\/hackers\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tec5.tech\/blog\/hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/tec5.tech\/blog\/hackers\/#primaryimage\",\"url\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg\",\"contentUrl\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg\",\"width\":1318,\"height\":494,\"caption\":\"hacker\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tec5.tech\/blog\/hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\/\/tec5.tech\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers de sombrero negro y blanco\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tec5.tech\/blog\/#website\",\"url\":\"https:\/\/tec5.tech\/blog\/\",\"name\":\"Tec5.Tech\",\"description\":\"Actualidad y Tecnolog\u00eda\",\"publisher\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tec5.tech\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/tec5.tech\/blog\/#organization\",\"name\":\"Tec5.Tech\",\"url\":\"https:\/\/tec5.tech\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg\",\"contentUrl\":\"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg\",\"width\":1200,\"height\":300,\"caption\":\"Tec5.Tech\"},\"image\":{\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/person\/615ea8e720c575663a3c6451962cb47d\",\"name\":\"Tecnolog\u00eda 5\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/tec5.tech\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1a1d00e03da2ade12e49e93a2d10b303456e13ee30dc8b5c38120c89ca5f148a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1a1d00e03da2ade12e49e93a2d10b303456e13ee30dc8b5c38120c89ca5f148a?s=96&d=mm&r=g\",\"caption\":\"Tecnolog\u00eda 5\"},\"description\":\"Somos una Consultora de IT que provee soluciones tecnol\u00f3gicas profesionales a empresas de diferentes tama\u00f1os y rubros con el fin de potenciarlas y mejorar su competitividad, la relaci\u00f3n con sus clientes y concentrarse en su negocio.\",\"sameAs\":[\"https:\/\/tecnologia5.com\/home\",\"https:\/\/www.facebook.com\/Tecnologia5\/?ref=bookmarks\",\"https:\/\/www.instagram.com\/tecnologia5it\/\",\"https:\/\/www.linkedin.com\/company\/tecnologia5it\/?viewAsMember=true\",\"https:\/\/x.com\/tecnologia5it\",\"youtube@tecnologia5.com\",\"tecnologia 5\"],\"url\":\"https:\/\/tec5.tech\/blog\/author\/editor-t5\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers de sombrero negro y blanco - Tec5.Tech","description":"Hackers de sombrero negro y blanco Notas de Inter\u00e9s Descubr\u00ed la diferencia entre estos dos protagonistas que conviven en el universo digital","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/tec5.tech\/blog\/hackers\/","og_locale":"es_ES","og_type":"article","og_title":"Hackers de sombrero negro y blanco - Tec5.Tech","og_description":"Hackers de sombrero negro y blanco Notas de Inter\u00e9s Descubr\u00ed la diferencia entre estos dos protagonistas que conviven en el universo digital","og_url":"https:\/\/tec5.tech\/blog\/hackers\/","og_site_name":"Tec5.Tech","article_author":"https:\/\/www.facebook.com\/Tecnologia5\/?ref=bookmarks","article_published_time":"2021-10-20T09:51:24+00:00","article_modified_time":"2021-10-20T09:51:25+00:00","og_image":[{"width":1318,"height":494,"url":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg","type":"image\/jpeg"}],"author":"Tecnolog\u00eda 5","twitter_card":"summary_large_image","twitter_creator":"@tecnologia5it","twitter_misc":{"Escrito por":"Tecnolog\u00eda 5","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/tec5.tech\/blog\/hackers\/#article","isPartOf":{"@id":"https:\/\/tec5.tech\/blog\/hackers\/"},"author":{"name":"Tecnolog\u00eda 5","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/person\/615ea8e720c575663a3c6451962cb47d"},"headline":"Hackers de sombrero negro y blanco","datePublished":"2021-10-20T09:51:24+00:00","dateModified":"2021-10-20T09:51:25+00:00","mainEntityOfPage":{"@id":"https:\/\/tec5.tech\/blog\/hackers\/"},"wordCount":230,"publisher":{"@id":"https:\/\/tec5.tech\/blog\/#organization"},"image":{"@id":"https:\/\/tec5.tech\/blog\/hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg","articleSection":["Notas de Inter\u00e9s"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/tec5.tech\/blog\/hackers\/","url":"https:\/\/tec5.tech\/blog\/hackers\/","name":"Hackers de sombrero negro y blanco - Tec5.Tech","isPartOf":{"@id":"https:\/\/tec5.tech\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tec5.tech\/blog\/hackers\/#primaryimage"},"image":{"@id":"https:\/\/tec5.tech\/blog\/hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg","datePublished":"2021-10-20T09:51:24+00:00","dateModified":"2021-10-20T09:51:25+00:00","description":"Hackers de sombrero negro y blanco Notas de Inter\u00e9s Descubr\u00ed la diferencia entre estos dos protagonistas que conviven en el universo digital","breadcrumb":{"@id":"https:\/\/tec5.tech\/blog\/hackers\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tec5.tech\/blog\/hackers\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tec5.tech\/blog\/hackers\/#primaryimage","url":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg","contentUrl":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg","width":1318,"height":494,"caption":"hacker"},{"@type":"BreadcrumbList","@id":"https:\/\/tec5.tech\/blog\/hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/tec5.tech\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers de sombrero negro y blanco"}]},{"@type":"WebSite","@id":"https:\/\/tec5.tech\/blog\/#website","url":"https:\/\/tec5.tech\/blog\/","name":"Tec5.Tech","description":"Actualidad y Tecnolog\u00eda","publisher":{"@id":"https:\/\/tec5.tech\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tec5.tech\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/tec5.tech\/blog\/#organization","name":"Tec5.Tech","url":"https:\/\/tec5.tech\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg","contentUrl":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/04\/Logo-Horizontal.jpg","width":1200,"height":300,"caption":"Tec5.Tech"},"image":{"@id":"https:\/\/tec5.tech\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/person\/615ea8e720c575663a3c6451962cb47d","name":"Tecnolog\u00eda 5","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/tec5.tech\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1a1d00e03da2ade12e49e93a2d10b303456e13ee30dc8b5c38120c89ca5f148a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1a1d00e03da2ade12e49e93a2d10b303456e13ee30dc8b5c38120c89ca5f148a?s=96&d=mm&r=g","caption":"Tecnolog\u00eda 5"},"description":"Somos una Consultora de IT que provee soluciones tecnol\u00f3gicas profesionales a empresas de diferentes tama\u00f1os y rubros con el fin de potenciarlas y mejorar su competitividad, la relaci\u00f3n con sus clientes y concentrarse en su negocio.","sameAs":["https:\/\/tecnologia5.com\/home","https:\/\/www.facebook.com\/Tecnologia5\/?ref=bookmarks","https:\/\/www.instagram.com\/tecnologia5it\/","https:\/\/www.linkedin.com\/company\/tecnologia5it\/?viewAsMember=true","https:\/\/x.com\/tecnologia5it","youtube@tecnologia5.com","tecnologia 5"],"url":"https:\/\/tec5.tech\/blog\/author\/editor-t5\/"}]}},"featured_image_url":"https:\/\/tec5.tech\/blog\/wp-content\/uploads\/2021\/10\/3.jpg","_links":{"self":[{"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts\/1850","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/comments?post=1850"}],"version-history":[{"count":1,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts\/1850\/revisions"}],"predecessor-version":[{"id":1852,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/posts\/1850\/revisions\/1852"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/media\/1851"}],"wp:attachment":[{"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/media?parent=1850"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/categories?post=1850"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tec5.tech\/blog\/wp-json\/wp\/v2\/tags?post=1850"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}