{"id":52769,"date":"2018-03-14T16:47:43","date_gmt":"2018-03-14T16:47:43","guid":{"rendered":"https:\/\/eurecat.org\/ciberatacs-advanced-factories\/"},"modified":"2019-07-19T12:17:58","modified_gmt":"2019-07-19T12:17:58","slug":"ciberataques-advanced-factories","status":"publish","type":"post","link":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/","title":{"rendered":"Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial"},"content":{"rendered":"<h2 style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>ADVANCED FACTORIES Y INDUSTRY 4.0 CONGRESS<\/strong><\/span><\/h2>\n<h1 style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial<\/strong><\/span><\/h1>\n<ul>\n<li style=\"text-align: center;\">\n<h2><strong><span style=\"color: #000000;\">Seg\u00fan expertos de Eurecat, se trata de un campo \u201cen claro crecimiento y que los hackers comienzan a utilizar cada vez m\u00e1s\u201d.<\/span><\/strong><\/h2>\n<\/li>\n<li style=\"text-align: center;\">\n<h2><strong><span style=\"color: #000000;\">Ahora se pueden crear programas maliciosos, con la finalidad de detectar las vulnerabilidades y defensas de la v\u00edctima, cambiar su comportamiento y tener \u00e9xito en el ataque.<\/span><\/strong><\/h2>\n<\/li>\n<\/ul>\n<p><strong><u>Barcelona, 14 de marzo de 2018.-<\/u><\/strong> Expertos en ciberseguridad del centro tecnol\u00f3gico <span style=\"color: #800080;\"><strong><a style=\"color: #800080;\" href=\"http:\/\/eurecat.org\/es\/\">Eurecat<\/a><\/strong><\/span> (miembro de Tecnio) advierten del incremento del riesgo de ataques inform\u00e1ticos que aprovechan la Inteligencia Artificial, con capacidad de lanzar programas maliciosos (malware) que pueden aprender, evolucionar y cambiar su comportamiento en funci\u00f3n de sus objetivos y las caracter\u00edsticas de la v\u00edctima.<\/p>\n<p>El director de la Unidad de IT Security de Eurecat, Juan Caubet, ha se\u00f1alado en su intervenci\u00f3n en el <a href=\"https:\/\/www.advancedfactories.com\/congress\/\"><span style=\"color: #800080;\"><strong>Industry 4.0 Congress<\/strong><\/span><\/a>, en el marco de la feria <a href=\"https:\/\/www.advancedfactories.com\/\"><span style=\"color: #800080;\"><strong>Advanced Factories<\/strong><\/span><\/a>, organizada por Nebext, que \u00abla respuesta para evitar este tipo de ataques tambi\u00e9n necesita de la Inteligencia Artificial\u00bb, un campo que\u00bb est\u00e1 en claro crecimiento y que los hackers empiezan a utilizar cada vez m\u00e1s\u00bb.<\/p>\n<p>Durante la pasada edici\u00f3n de la <em>Black Hat USA 2017<\/em>, un elevado n\u00famero de l\u00edderes y profesionales de la ciberseguridad se reunieron en Las Vegas para discutir sobre las amenazas y tecnolog\u00edas emergentes. Durante esta reuni\u00f3n, el 62 por ciento de los asistentes aseguraba que las amenazas y ataques de 2018 utilizar\u00edan t\u00e9cnicas de Inteligencia Artificial por conseguir sus objetivos.<\/p>\n<p>Seg\u00fan expone Mario Reyes, experto en Inteligencia Artificial de la Unidad de Ciberseguridad de Eurecat, los hackers \u00abahora pueden crear un malware dise\u00f1ado para aprender de su objetivo, de su v\u00edctima\u00bb, con el fin de \u00abdetectar sus vulnerabilidades y defensas, cambiar su comportamiento y tener \u00e9xito en su ataque\u00bb.<\/p>\n<p>Para aportar soluciones a este peligro, el equipo de Ciberseguridad de Eurecat est\u00e1 investigando el uso de la Inteligencia Artificial en la ciberdefensa, con medidas que \u00abpermiten evitar que un software de este tipo pueda tener impacto sobre cualquier empresa, analizando su comportamiento, de modo que podamos dirigir las acciones del programa malicioso, reduciendo su impacto, o anulando su efecto\u00bb, apunta.<\/p>\n<p>Dirigido por Eurecat, el Industry 4.0 Congress es un \u00abespacio de debate y de an\u00e1lisis en torno a los retos que introduce la digitalizaci\u00f3n de la industria\u00bb, con el fin de que \u00ablas propuestas tecnol\u00f3gicas para el futuro m\u00e1s inmediato se conozcan y se extiendan a toda la actividad industrial\u00bb, destaca el director general de Negocio del centro tecnol\u00f3gico, Miquel Rey.<\/p>\n<p>El Industry 4.0 Congress est\u00e1 considerado uno de los congresos del sur de Europa m\u00e1s importantes sobre innovaci\u00f3n industrial y congrega hasta ma\u00f1ana en Barcelona a m\u00e1s de un centenar de expertos internacionales para compartir casos de \u00e9xito sobre sectores como la aeron\u00e1utica, la automoci\u00f3n, el ferrocarril, el textil, la alimentaci\u00f3n, el sider\u00fargico o la salud.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ADVANCED FACTORIES Y INDUSTRY 4.0 CONGRESS Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial Seg\u00fan expertos de Eurecat, se trata de un campo \u201cen claro crecimiento y que los hackers comienzan a utilizar cada vez m\u00e1s\u201d. Ahora se pueden crear programas maliciosos, con la finalidad de detectar las vulnerabilidades y defensas de la  [&#8230;]<\/p>\n","protected":false},"author":12,"featured_media":52765,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[702,727,401,383,134],"tags":[732,1432],"class_list":["post-52769","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-eventos","category-ferias","category-it-security-es","category-it-security","category-notas-de-prensa","tag-advanced-factories-es","tag-ciberseguretat-es"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial<\/title>\n<meta name=\"description\" content=\"Seg\u00fan expertos de Eurecat, se trata de un campo \u201cen claro crecimiento y que los hackers comienzan a utilizar cada vez m\u00e1s\u201d.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial\" \/>\n<meta property=\"og:description\" content=\"Seg\u00fan expertos de Eurecat, se trata de un campo \u201cen claro crecimiento y que los hackers comienzan a utilizar cada vez m\u00e1s\u201d.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/\" \/>\n<meta property=\"og:site_name\" content=\"Eurecat\" \/>\n<meta property=\"article:published_time\" content=\"2018-03-14T16:47:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-07-19T12:17:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/eurecat.org\/wp-content\/uploads\/2018\/03\/Juan_Caubet.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1015\" \/>\n\t<meta property=\"og:image:height\" content=\"726\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EurecatEG\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"EurecatEG\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/\"},\"author\":{\"name\":\"EurecatEG\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/#\\\/schema\\\/person\\\/def9217eded50ee57a9dc4cf0c883f80\"},\"headline\":\"Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial\",\"datePublished\":\"2018-03-14T16:47:43+00:00\",\"dateModified\":\"2019-07-19T12:17:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/\"},\"wordCount\":509,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/Juan_Caubet.jpg\",\"keywords\":[\"Advanced Factories\",\"ciberseguretat\"],\"articleSection\":[\"Eventos\",\"Ferias\",\"IT-Security\",\"IT-Security\",\"Notas de prensa\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/\",\"url\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/\",\"name\":\"Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/Juan_Caubet.jpg\",\"datePublished\":\"2018-03-14T16:47:43+00:00\",\"dateModified\":\"2019-07-19T12:17:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/#\\\/schema\\\/person\\\/def9217eded50ee57a9dc4cf0c883f80\"},\"description\":\"Seg\u00fan expertos de Eurecat, se trata de un campo \u201cen claro crecimiento y que los hackers comienzan a utilizar cada vez m\u00e1s\u201d.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/#primaryimage\",\"url\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/Juan_Caubet.jpg\",\"contentUrl\":\"https:\\\/\\\/eurecat.org\\\/wp-content\\\/uploads\\\/2018\\\/03\\\/Juan_Caubet.jpg\",\"width\":1015,\"height\":726},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/ciberataques-advanced-factories\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inici\",\"item\":\"https:\\\/\\\/eurecat.org\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/eurecat.org\\\/es\\\/\",\"name\":\"Eurecat\",\"description\":\"Otro sitio realizado con WordPress\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/eurecat.org\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/eurecat.org\\\/es\\\/#\\\/schema\\\/person\\\/def9217eded50ee57a9dc4cf0c883f80\",\"name\":\"EurecatEG\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f40dd9b6ecd3e5c591f3c9b033e495ee0ec9877ba77249fbf268b3889350c824?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f40dd9b6ecd3e5c591f3c9b033e495ee0ec9877ba77249fbf268b3889350c824?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f40dd9b6ecd3e5c591f3c9b033e495ee0ec9877ba77249fbf268b3889350c824?s=96&d=mm&r=g\",\"caption\":\"EurecatEG\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial","description":"Seg\u00fan expertos de Eurecat, se trata de un campo \u201cen claro crecimiento y que los hackers comienzan a utilizar cada vez m\u00e1s\u201d.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/","og_locale":"es_ES","og_type":"article","og_title":"Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial","og_description":"Seg\u00fan expertos de Eurecat, se trata de un campo \u201cen claro crecimiento y que los hackers comienzan a utilizar cada vez m\u00e1s\u201d.","og_url":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/","og_site_name":"Eurecat","article_published_time":"2018-03-14T16:47:43+00:00","article_modified_time":"2019-07-19T12:17:58+00:00","og_image":[{"width":1015,"height":726,"url":"https:\/\/eurecat.org\/wp-content\/uploads\/2018\/03\/Juan_Caubet.jpg","type":"image\/jpeg"}],"author":"EurecatEG","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"EurecatEG","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/#article","isPartOf":{"@id":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/"},"author":{"name":"EurecatEG","@id":"https:\/\/eurecat.org\/es\/#\/schema\/person\/def9217eded50ee57a9dc4cf0c883f80"},"headline":"Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial","datePublished":"2018-03-14T16:47:43+00:00","dateModified":"2019-07-19T12:17:58+00:00","mainEntityOfPage":{"@id":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/"},"wordCount":509,"commentCount":0,"image":{"@id":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/#primaryimage"},"thumbnailUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2018\/03\/Juan_Caubet.jpg","keywords":["Advanced Factories","ciberseguretat"],"articleSection":["Eventos","Ferias","IT-Security","IT-Security","Notas de prensa"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/","url":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/","name":"Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial","isPartOf":{"@id":"https:\/\/eurecat.org\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/#primaryimage"},"image":{"@id":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/#primaryimage"},"thumbnailUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2018\/03\/Juan_Caubet.jpg","datePublished":"2018-03-14T16:47:43+00:00","dateModified":"2019-07-19T12:17:58+00:00","author":{"@id":"https:\/\/eurecat.org\/es\/#\/schema\/person\/def9217eded50ee57a9dc4cf0c883f80"},"description":"Seg\u00fan expertos de Eurecat, se trata de un campo \u201cen claro crecimiento y que los hackers comienzan a utilizar cada vez m\u00e1s\u201d.","breadcrumb":{"@id":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/#primaryimage","url":"https:\/\/eurecat.org\/wp-content\/uploads\/2018\/03\/Juan_Caubet.jpg","contentUrl":"https:\/\/eurecat.org\/wp-content\/uploads\/2018\/03\/Juan_Caubet.jpg","width":1015,"height":726},{"@type":"BreadcrumbList","@id":"https:\/\/eurecat.org\/es\/ciberataques-advanced-factories\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inici","item":"https:\/\/eurecat.org\/es\/"},{"@type":"ListItem","position":2,"name":"Alertan del riesgo de ciberataques que aprovechan la Inteligencia Artificial"}]},{"@type":"WebSite","@id":"https:\/\/eurecat.org\/es\/#website","url":"https:\/\/eurecat.org\/es\/","name":"Eurecat","description":"Otro sitio realizado con WordPress","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/eurecat.org\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/eurecat.org\/es\/#\/schema\/person\/def9217eded50ee57a9dc4cf0c883f80","name":"EurecatEG","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/f40dd9b6ecd3e5c591f3c9b033e495ee0ec9877ba77249fbf268b3889350c824?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f40dd9b6ecd3e5c591f3c9b033e495ee0ec9877ba77249fbf268b3889350c824?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f40dd9b6ecd3e5c591f3c9b033e495ee0ec9877ba77249fbf268b3889350c824?s=96&d=mm&r=g","caption":"EurecatEG"}}]}},"_links":{"self":[{"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/posts\/52769","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/comments?post=52769"}],"version-history":[{"count":0,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/posts\/52769\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/media\/52765"}],"wp:attachment":[{"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/media?parent=52769"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/categories?post=52769"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eurecat.org\/es\/wp-json\/wp\/v2\/tags?post=52769"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}