{"id":3758,"date":"2021-12-03T11:34:34","date_gmt":"2021-12-03T16:34:34","guid":{"rendered":"https:\/\/knowledgeflow.org\/the-knowledgeflow-newsletter-7th-ed-2\/"},"modified":"2024-07-22T23:39:28","modified_gmt":"2024-07-23T03:39:28","slug":"the-knowledgeflow-newsletter-7th-edition","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/es\/the-knowledgeflow-newsletter-7th-edition\/","title":{"rendered":"Bolet\u00edn KnowledgeFlow - 7\u00aa edici\u00f3n: Actualizaciones y perspectivas"},"content":{"rendered":"\n<p class=\"has-text-align-center\" style=\"font-size:28px\"><em>Newsletter:<\/em> Hand-picked headlines from KnowledgeFlow&#8217;s dedicated cybersafety curators. Vol. 7<\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong><strong>Top Story<\/strong> on our newsletter<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">GLOBAL NEWS: Rideau Hall Internal Cyber Network Hit by \u2018Breach\u2019 \u2013 Effects Unclear<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/globalnews.ca\/news\/8419717\/rideau-hall-cyber-incident-2021\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-11.png\" alt=\"\" class=\"wp-image-3730\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-11.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-11-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-11-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\">The Governor General\u2019s office at Rideau Hall confirms that there has been a breach of the internal networks at their office, but the actual impact is thus far unclear. The statement issued by the Office of the Secretary to the Governor General said there had been \u201can unauthorized access to its internal network.\u201d The nature and scope of the breach are still unclear, and the OSGG is working with the Canadian Centre for Cyber Security to investigate the incident.<\/p>\n\n\n\n<p><a href=\"https:\/\/globalnews.ca\/news\/8419717\/rideau-hall-cyber-incident-2021\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Ransomware<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">WE LIVE SECURITY: What to Do if You Receive a Data Breach Notice<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.welivesecurity.com\/2021\/11\/22\/what-do-if-you-receive-data-breach-notice\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-17.png\" alt=\"\" class=\"wp-image-3731\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-17.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-17-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-17-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\">Cyberattacks and data breaches have become more and more common over the past few years. While you may hope that you will never be the victim, it&#8217;s possible that you will be, and it&#8217;s best to be prepared in case it happens. Here is a rundown of some of the steps you should take when you receive the notice that you&#8217;ve been the victim of a data breach.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.welivesecurity.com\/2021\/11\/22\/what-do-if-you-receive-data-breach-notice\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Smart Home Devices<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">SLATE: How Big Tech Turns Privacy Laws Into Privacy Theatre<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-style-default\"><a href=\"https:\/\/slate.com\/technology\/2021\/12\/facebook-twitter-big-tech-privacy-sham.html\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-18.png\" alt=\"\" class=\"wp-image-3732\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-18.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-18-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-18-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\">How do Big Tech companies actually approach privacy? According to Ari Ezra Waldman, lawyer and researcher, privacy compliance is generally completed to the bare minimum and privacy impact assessments are considered as mere checkboxes. The phrase &#8220;Your privacy is important&#8221; gets thrown around a lot, but tech companies systematically co-opt both their employees and the law so that everything serves their data extractive needs.<\/p>\n\n\n\n<p><a href=\"https:\/\/slate.com\/technology\/2021\/12\/facebook-twitter-big-tech-privacy-sham.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Phone Security<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">THE VERGE: Qualcomm&#8217;s New Always-On Smartphone Camera is a Potential Privacy Nightmare<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-19.png\" alt=\"\" class=\"wp-image-3733\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-19.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-19-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Knowledgeflow-Newsletter-Template-19-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/figure>\n\n\n\n<p>The new Snapdragon 8 Gen 1 chip from Qualcomm Technologies, set to be in many top-shelf Android phones next year, will introduce an always-on camera function. This function has some new use cases, such as being able to instantly lock your phone when not pointed toward your face, but there is a danger that this new technology could create privacy problems.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.theverge.com\/22811740\/qualcomm-snapdragon-8-gen-1-always-on-camera-privacy-security-concerns\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Cyber Crime<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">GLOBAL NEWS: \u2018Epidemic of Cybercrime\u2019 Underway in Midst of Pandemic: Security Expert<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/globalnews.ca\/news\/8422051\/epidemic-cybercrime-covid-security-expert\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Datarisk-Digest-Template-13.png\" alt=\"\" class=\"wp-image-3734\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Datarisk-Digest-Template-13.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Datarisk-Digest-Template-13-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-Datarisk-Digest-Template-13-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>According to the Canadian Centre for Cyber Security, the COVID-19 pandemic has seen an increase in cyber threats, many directed toward healthcare and medical research facilities. In June, Toronto\u2019s Humber River Hospital suffered a ransomware attack that briefly disabled services, and recently Newfoundland and Labrador\u2019s health system was attacked. Experts argue that this is an ongoing epidemic that could continue to get worse.<\/p>\n\n\n\n<p><a href=\"https:\/\/globalnews.ca\/news\/8422051\/epidemic-cybercrime-covid-security-expert\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id3758_5b1b5b-87{margin-bottom:var(--global-kb-spacing-xl, 4rem);}.kb-row-layout-id3758_5b1b5b-87 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id3758_5b1b5b-87 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id3758_5b1b5b-87 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id3758_5b1b5b-87 > .kt-row-layout-overlay{opacity:0.50;background-color:var(--global-palette9, #ffffff);}@media all and (max-width: 1024px){.kb-row-layout-id3758_5b1b5b-87 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id3758_5b1b5b-87 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id3758_5b1b5b-87 alignfull has-theme-palette7-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-layout-overlay kt-row-overlay-normal\"><\/div><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column3758_a28019-1e > .kt-inside-inner-col{display:flex;}.kadence-column3758_a28019-1e > .kt-inside-inner-col{padding-bottom:0px;}.kadence-column3758_a28019-1e > .kt-inside-inner-col,.kadence-column3758_a28019-1e > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column3758_a28019-1e > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column3758_a28019-1e > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3758_a28019-1e > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column3758_a28019-1e{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3758_a28019-1e{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3758_a28019-1e > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3758_a28019-1e > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column3758_a28019-1e{text-align:center;}.kadence-column3758_a28019-1e{position:relative;}.kadence-column3758_a28019-1e, .kt-inside-inner-col > .kadence-column3758_a28019-1e:not(.specificity){margin-bottom:0px;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column3758_a28019-1e{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3758_a28019-1e{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3758_a28019-1e > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kadence-column3758_a28019-1e > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column3758_a28019-1e{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3758_a28019-1e{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3758_a28019-1e > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3758_a28019-1e > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column3758_a28019-1e kb-section-dir-vertical inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading3758_f95b0d-fe, .wp-block-kadence-advancedheading.kt-adv-heading3758_f95b0d-fe[data-kb-block=\"kb-adv-heading3758_f95b0d-fe\"]{padding-bottom:var(--global-kb-spacing-sm, 1.5rem);font-size:var(--global-kb-font-size-md, 1.25rem);font-weight:400;font-style:normal;text-transform:uppercase;}.wp-block-kadence-advancedheading.kt-adv-heading3758_f95b0d-fe mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3758_f95b0d-fe[data-kb-block=\"kb-adv-heading3758_f95b0d-fe\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3758_f95b0d-fe img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3758_f95b0d-fe[data-kb-block=\"kb-adv-heading3758_f95b0d-fe\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading3758_f95b0d-fe wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading3758_f95b0d-fe\">rESOURCES<\/h6>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3758_f55212-ac, .wp-block-kadence-advancedheading.kt-adv-heading3758_f55212-ac[data-kb-block=\"kb-adv-heading3758_f55212-ac\"]{padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;font-size:var(--global-kb-font-size-xxl, 4rem);line-height:1;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3758_f55212-ac mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3758_f55212-ac[data-kb-block=\"kb-adv-heading3758_f55212-ac\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3758_f55212-ac img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3758_f55212-ac[data-kb-block=\"kb-adv-heading3758_f55212-ac\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h1 class=\"kt-adv-heading3758_f55212-ac wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading3758_f55212-ac\">resources for Everyone<\/h1>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3758_aecebd-09, .wp-block-kadence-advancedheading.kt-adv-heading3758_aecebd-09[data-kb-block=\"kb-adv-heading3758_aecebd-09\"]{max-width:896px;margin-right:auto;margin-left:auto;padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;text-align:center;font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3758_aecebd-09 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3758_aecebd-09[data-kb-block=\"kb-adv-heading3758_aecebd-09\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3758_aecebd-09 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3758_aecebd-09[data-kb-block=\"kb-adv-heading3758_aecebd-09\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading3758_aecebd-09 wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading3758_aecebd-09\">The KnowledgeFlow Cybersafety Foundation provides a wealth of resources tailored for a wide range of audiences. Our resources cover various aspects of online safety, ensuring that each group can navigate the digital environment with confidence. Parents can access guidance to protect their children online, teachers can find tools to educate students about cybersafety, seniors can learn to avoid common online scams, and police can utilize resources to enhance their cybersecurity knowledge. By offering specialized content for these diverse groups, KnowledgeFlow empowers everyone to stay safe and secure in the digital world.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kt-btns3758_123a4a-5b, .site .entry-content .wp-block-kadence-advancedbtn.kt-btns3758_123a4a-5b, .wp-block-kadence-advancedbtn.kb-btns3758_123a4a-5b, .site .entry-content .wp-block-kadence-advancedbtn.kb-btns3758_123a4a-5b{margin-bottom:0px;}.wp-block-kadence-advancedbtn.kb-btns3758_123a4a-5b{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:center;align-items:center;}.kt-btns3758_123a4a-5b .kt-button{font-weight:normal;font-style:normal;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns3758_123a4a-5b\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn3758_1a7c35-1f.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn3758_1a7c35-1f.kb-button{margin-top:var(--global-kb-spacing-sm, 1.5rem);}.wp-block-kadence-advancedbtn .kb-btn3758_1a7c35-1f.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn3758_1a7c35-1f.kb-button:focus{background:var(--global-palette1, #3182CE);}<\/style><a class=\"kb-button kt-button button kb-btn3758_1a7c35-1f kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-inherit  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-button__link wp-block-kadence-singlebtn\" href=\"https:\/\/knowledgeflow.org\/resources\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"kt-btn-inner-text\">View Resources<\/span><\/a><\/div>\n<\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Bolet\u00edn de noticias: Titulares seleccionados a mano por los expertos en ciberseguridad de KnowledgeFlow. Vol. 7 Top Story en nuestro bolet\u00edn NOTICIAS GLOBALES:...<\/p>","protected":false},"author":8,"featured_media":3773,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[],"class_list":["post-3758","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-KnowledgeFlow-Newsletter-\u2013-7th-Ed..png",1024,576,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/es\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","cat_ID":516,"category_count":78,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/3758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/comments?post=3758"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/3758\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media\/3773"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media?parent=3758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/categories?post=3758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/tags?post=3758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}