{"id":153651,"date":"2021-10-18T13:22:36","date_gmt":"2021-10-18T13:22:36","guid":{"rendered":"https:\/\/www.internetsociety.org\/blog\/2021\/10\/la-semana-en-noticias-de-internet-el-uso-de-los-deportes-para-luchar-contra-la-ciberdelincuencia\/"},"modified":"2021-10-25T12:26:34","modified_gmt":"2021-10-25T12:26:34","slug":"la-semana-en-noticias-de-internet-el-uso-de-los-deportes-para-luchar-contra-la-ciberdelincuencia","status":"publish","type":"post","link":"https:\/\/www.internetsociety.org\/es\/blog\/2021\/10\/la-semana-en-noticias-de-internet-el-uso-de-los-deportes-para-luchar-contra-la-ciberdelincuencia\/","title":{"rendered":"La semana en noticias de Internet: el uso de los deportes para luchar contra la ciberdelincuencia"},"content":{"rendered":"\n<p><strong>Hacking games: <\/strong>The U.S. National Institute of Standards and Technology has funded an organization called U.S. Cyber Games that will assemble a team of young people to compete in an international cybersecurity competition, the <a href=\"https:\/\/www.washingtonpost.com\/video-games\/2021\/10\/15\/cybersecurity-hacks-esports\/\">Washington Post reports<\/a>. Modeled on competitive video gaming, the competition will include \u201cking-of-the-hill-type games where one team tries to break into a network, while the other team tries to defend it.<meta charset=\"utf-8\"\/>\u201d There will also be <meta charset=\"utf-8\"\/>\u201ccapture-the-flag-type games, where teams must complete a series of puzzles that follow the basic tenets of cybersecurity programs, like decrypting an encrypted file or analyzing secret network traffic.\u201d<\/p>\n\n<p><strong>Delinking:<\/strong> LinkedIn has cut services in China because of \u201ca significantly more challenging operating environment and greater compliance requirements\u201d in the country, the <a href=\"https:\/\/www.scmp.com\/tech\/tech-war\/article\/3152526\/linkedins-china-retreat-stems-regulatory-and-competitive-pressures\">South China Morning Post reports<\/a>. The social media site, owned by Microsoft, will instead offer a new app focused only on job postings, the <a href=\"https:\/\/www.nytimes.com\/2021\/10\/14\/technology\/linkedin-china-microsoft.html\">New York Times adds<\/a>.<\/p>\n\n<p><strong>Illegal source code: <\/strong>Missouri Governor Mike Parson\u00a0has called for criminal charges against a U.S. newspaper reporter who viewed and then pointed out the security flaws of the source code on a state website, the <a href=\"https:\/\/missouriindependent.com\/2021\/10\/14\/missouri-governor-vows-criminal-prosecution-of-reporter-who-found-flaw-in-state-website\/\">Missouri Independent says<\/a>. The <a href=\"https:\/\/www.washingtonpost.com\/politics\/2021\/10\/14\/newspaper-informed-missouri-about-website-flaw-governor-accused-it-hacking\/\">Washington Post, meanwhile, says<\/a> that viewing source code is pretty trivial and common stuff.<\/p>\n\n<p><strong>We\u2019re watching you: <\/strong>A judge in the U.K. has ruled that an Internet-connected Ring video doorbell violated the privacy of the owner\u2019s neighbor, the <a href=\"https:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/amazon-ring-privacy-court-gdpr-b1938963.html\">Independent says<\/a>. \u201cPersonal data may be captured from people who are not even aware that the device is there, or that it records and processes audio and personal data,\u201d Judge Melissa Clarke\u00a0said. Clarke was particularly concerned about audio data the device was collecting.<\/p>\n\n<p><strong>Play no favorites:<\/strong> U.S. senators are planning legislation that would prohibit large online platforms from favoring their own products and disadvantaging rivals, <a href=\"https:\/\/www.cnbc.com\/2021\/10\/14\/new-antitrust-bill-aims-to-stop-big-tech-from-disadvantaging-rivals.html\">CNBC reports<\/a>. The proposed Senate bill mirrors a House of Representatives bill that has already been approved by a House committee. \u201cThe bill would have profound implications for companies like Amazon, Apple, and Google which all run their own marketplaces for products or information. Those companies have been accused of ranking their own products higher than rivals\u2019 in an attempt to generate more profits for themselves.\u201d<\/p>\n\n<h6 class=\"wp-block-heading\"><a href=\"https:\/\/www.internetsociety.org\/encryption\/global-encryption-under-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span style=\"color:#3a82e4\" class=\"tadv-color\"><span style=\"text-decoration: underline;\">Protejamos el cifrado, protejamos nuestros datos y prot\u00e9jamonos entre nosotros<\/span><\/span><\/a><\/h6>\n","protected":false},"excerpt":{"rendered":"<p>Concurso internacional de ciberseguridad; LinkedIn recorta sus servicios en China; c\u00f3digo fuente ilegal; problemas con el timbre por la privacidad; no hay favoritos<\/p>\n","protected":false},"author":1331,"featured_media":83556,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_uag_custom_page_level_css":"","footnotes":""},"categories":[184],"tags":[4688],"region_news_regions":[5931],"content_category":[6102],"ppma_author":[4056],"class_list":["post-153651","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia","tag-la-semana-en-las-noticias-de-internet","region_news_regions-global","content_category-blog-type"],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple.png",1280,550,false],"thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple-150x150.png",150,150,true],"medium":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple-300x129.png",300,129,true],"medium_large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple-768x330.png",768,330,true],"large":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple-1024x440.png",1024,440,true],"1536x1536":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple.png",1280,550,false],"2048x2048":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple.png",1280,550,false],"post-thumbnail":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple-250x107.png",250,107,true],"square":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple-600x550.png",600,550,true],"gform-image-choice-sm":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple.png",300,129,false],"gform-image-choice-md":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple.png",400,172,false],"gform-image-choice-lg":["https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/07\/In-the-news-purple.png",600,258,false]},"uagb_author_info":{"display_name":"Grant Gross","author_link":"https:\/\/www.internetsociety.org\/es\/author\/gross\/"},"uagb_comment_info":0,"uagb_excerpt":"Concurso internacional de ciberseguridad; LinkedIn recorta sus servicios en China; c\u00f3digo fuente ilegal; problemas con el timbre por la privacidad; no hay favoritos","authors":[{"term_id":4056,"user_id":1331,"is_guest":0,"slug":"gross","display_name":"Grant Gross","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/a7eb5e8d897086f5c66d8a5abe5ba37f7fc9c274b7a0750cf19bb65ba5ad19d7?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/153651","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/users\/1331"}],"replies":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/comments?post=153651"}],"version-history":[{"count":0,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/posts\/153651\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media\/83556"}],"wp:attachment":[{"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/media?parent=153651"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/categories?post=153651"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/tags?post=153651"},{"taxonomy":"region_news_regions","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/region_news_regions?post=153651"},{"taxonomy":"content_category","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/content_category?post=153651"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.internetsociety.org\/es\/wp-json\/wp\/v2\/ppma_author?post=153651"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}