{"id":3759,"date":"2021-11-23T11:36:55","date_gmt":"2021-11-23T16:36:55","guid":{"rendered":"https:\/\/knowledgeflow.org\/the-knowledgeflow-newsletter-6th-ed-2\/"},"modified":"2024-07-22T23:39:28","modified_gmt":"2024-07-23T03:39:28","slug":"the-knowledgeflow-newsletter-6th-edition","status":"publish","type":"post","link":"https:\/\/knowledgeflow.org\/es\/the-knowledgeflow-newsletter-6th-edition\/","title":{"rendered":"El bolet\u00edn KnowledgeFlow: 6\u00aa edici\u00f3n"},"content":{"rendered":"\n<p class=\"has-text-align-center\" style=\"font-size:28px\"><em>Newsletter: Hand-picked headlines from KnowledgeFlow&#8217;s cybersafety curators. Vol. 6<\/em><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Claudiu&#8217;s Top Story<\/strong> on Our Newsletter<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><meta charset=\"utf-8\">TORRENT FREAK: &#8220;The NFT Bay&#8221; Claims to Share Multi-Terabyte Archive of &#8216;Pirated&#8217; NFTs<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.linkedin.com\/posts\/claudiu-popa_the-nft-bay-shares-multi-terabyte-archive-activity-6867210951268163584-CxGm\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-20.png\" alt=\"\" class=\"wp-image-3719\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-20.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-20-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-20-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\"><meta charset=\"utf-8\">NFTs have become popular over the past year, with people paying up to millions of dollars to &#8220;own&#8221; these digital items. NFTs are stored as entries on a blockchain, and prove that the buyer is the legitimate owner of this digital item. Recently, however, a vast trove of NFTs has been uploaded to a website called The NFT Bay. This collection of NFTs is approximately 15 terabytes of data, and puts into question the true value of NFTs.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.linkedin.com\/posts\/claudiu-popa_the-nft-bay-shares-multi-terabyte-archive-activity-6867210951268163584-CxGm\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Ransomware<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><meta charset=\"utf-8\">CNN NEWS: US Government Issues Thanksgiving Ransomware Warning<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cnn.com\/2021\/11\/22\/politics\/thanksgiving-ransomware-warning\/index.html\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-23.png\" alt=\"\" class=\"wp-image-3720\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-23.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-23-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-23-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\"><meta charset=\"utf-8\">US officials are warning American businesses and organizations to be cautious of potential ransomware threats this Thanksgiving season. While there is no one specific threat, but ransomware attacks commonly happen on weekends and holidays, when organizations are short-staffed and potentially off-guard. CISA suggests identifying key IT security employees who can be on call in the event of a ransomware attack.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cnn.com\/2021\/11\/22\/politics\/thanksgiving-ransomware-warning\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Smart Home Devices<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\"><meta charset=\"utf-8\">THE WASHINGTON POST: Big Tech is Pushing Smart Home Devices as the Latest Work-From-Home Tools<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full is-style-default\"><a href=\"https:\/\/www.washingtonpost.com\/technology\/2021\/11\/22\/smart-home-devices-security-remote-workers\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-24-1.png\" alt=\"\" class=\"wp-image-3721\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-24-1.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-24-1-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Datarisk-Digest-Template-24-1-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p class=\"has-normal-font-size\"><meta charset=\"utf-8\">The move to work-from-home activity has caused many to use their smart home devices (Amazon Echo or Google Nest, for example) as part of their work life; some workers ask their Google Assistant or Alexa to book meetings, fetch company information, or remind them about events. While this may add convenience to many workers&#8217; lives, the question then becomes: at what expense to security and privacy does convenience come?<\/p>\n\n\n\n<p><a href=\"https:\/\/www.washingtonpost.com\/technology\/2021\/11\/22\/smart-home-devices-security-remote-workers\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Phone Security<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">CNET: Face ID Isn&#8217;t Enough. Change These Settings Now to Better Secure Your iPhone.<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.cnet.com\/tech\/mobile\/face-id-isnt-enough-change-these-settings-now-to-better-secure-your-iphone\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-14-1.png\" alt=\"\" class=\"wp-image-3722\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-14-1.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-14-1-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-14-1-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>Apple&#8217;s Face ID or Touch ID is a good step toward better iPhone security, but it&#8217;s not the only measure you should put in place. If you do not have the right settings enabled, some activities can still be performed while your phone is locked: notifications can be seen and messages can be sent through Siri, for example.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.cnet.com\/tech\/mobile\/face-id-isnt-enough-change-these-settings-now-to-better-secure-your-iphone\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Education<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">FORBES: Cybersecurity is a Business Essential: How Are You Approaching It?<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.forbes.com\/sites\/forbesfinancecouncil\/2021\/11\/23\/cybersecurity-is-a-business-essential-how-are-you-approaching-it\/?sh=8b6f64b65ba7\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-15-2.png\" alt=\"\" class=\"wp-image-3723\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-15-2.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-15-2-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-15-2-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>Being a victim of a cyberattack is a challenge for an individual, but even more so for an organization or business. The effects of a successful cyberattack can be crippling if not prepared for properly. Dealing with the proper mindset, the right investments, and training your people are all part of approaching cybersecurity to avoid disaster.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.forbes.com\/sites\/forbesfinancecouncil\/2021\/11\/23\/cybersecurity-is-a-business-essential-how-are-you-approaching-it\/?sh=8b6f64b65ba7\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>Technology<\/strong><\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">USA TODAY: How to Protect Your Privacy While Shopping on Amazon During the Holidays<\/h3>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/www.usatoday.com\/story\/tech\/columnist\/komando\/2021\/11\/18\/how-protect-your-privacy-adjust-your-public-profile-amazon\/8642710002\/\" target=\"_blank\" rel=\"noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"222\" src=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-16-1.png\" alt=\"\" class=\"wp-image-3724\" title=\"\" srcset=\"https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-16-1.png 1000w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-16-1-600x133.png 600w, https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/11\/The-Knowledgeflow-Newsletter-Template-16-1-768x170.png 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/a><\/figure>\n\n\n\n<p>Amazon has become an increasingly popular choice for shopping during the holiday season. However, before you begin your online shopping expedition, it&#8217;s worth checking out Amazon&#8217;s privacy settings to make sure that you are being as safe as possible while buying online. This guide has detailed instructions on how to stop Amazon from tracking your browsing, making your lists private, and more.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.usatoday.com\/story\/tech\/columnist\/komando\/2021\/11\/18\/how-protect-your-privacy-adjust-your-public-profile-amazon\/8642710002\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Read More<\/strong><\/a><\/p>\n\n\n<style>.kb-row-layout-wrap.wp-block-kadence-rowlayout.kb-row-layout-id3759_fe30a0-c5{margin-bottom:var(--global-kb-spacing-xl, 4rem);}.kb-row-layout-id3759_fe30a0-c5 > .kt-row-column-wrap{align-content:start;}:where(.kb-row-layout-id3759_fe30a0-c5 > .kt-row-column-wrap) > .wp-block-kadence-column{justify-content:start;}.kb-row-layout-id3759_fe30a0-c5 > .kt-row-column-wrap{column-gap:var(--global-kb-gap-md, 2rem);row-gap:var(--global-kb-gap-md, 2rem);max-width:var( --global-content-width, 1290px );padding-left:var(--global-content-edge-padding);padding-right:var(--global-content-edge-padding);padding-top:var(--global-kb-spacing-xxl, 5rem);padding-bottom:var(--global-kb-spacing-xxl, 5rem);grid-template-columns:minmax(0, 1fr);}.kb-row-layout-id3759_fe30a0-c5 > .kt-row-layout-overlay{opacity:0.50;background-color:var(--global-palette9, #ffffff);}@media all and (max-width: 1024px){.kb-row-layout-id3759_fe30a0-c5 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}@media all and (max-width: 767px){.kb-row-layout-id3759_fe30a0-c5 > .kt-row-column-wrap{grid-template-columns:minmax(0, 1fr);}}<\/style><div class=\"kb-row-layout-wrap kb-row-layout-id3759_fe30a0-c5 alignfull has-theme-palette7-background-color kt-row-has-bg wp-block-kadence-rowlayout\"><div class=\"kt-row-layout-overlay kt-row-overlay-normal\"><\/div><div class=\"kt-row-column-wrap kt-has-1-columns kt-row-layout-equal kt-tab-layout-inherit kt-mobile-layout-row kt-row-valign-top kb-theme-content-width\">\n<style>.kadence-column3759_7dd744-82 > .kt-inside-inner-col{display:flex;}.kadence-column3759_7dd744-82 > .kt-inside-inner-col{padding-bottom:0px;}.kadence-column3759_7dd744-82 > .kt-inside-inner-col,.kadence-column3759_7dd744-82 > .kt-inside-inner-col:before{border-top-left-radius:0px;border-top-right-radius:0px;border-bottom-right-radius:0px;border-bottom-left-radius:0px;}.kadence-column3759_7dd744-82 > .kt-inside-inner-col{column-gap:var(--global-kb-gap-sm, 1rem);}.kadence-column3759_7dd744-82 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3759_7dd744-82 > .kt-inside-inner-col > .aligncenter{width:100%;}.kt-row-column-wrap > .kadence-column3759_7dd744-82{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3759_7dd744-82{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3759_7dd744-82 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3759_7dd744-82 > .kt-inside-inner-col:before{opacity:0.3;}.kadence-column3759_7dd744-82{text-align:center;}.kadence-column3759_7dd744-82{position:relative;}.kadence-column3759_7dd744-82, .kt-inside-inner-col > .kadence-column3759_7dd744-82:not(.specificity){margin-bottom:0px;}@media all and (max-width: 1024px){.kt-row-column-wrap > .kadence-column3759_7dd744-82{align-self:flex-start;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3759_7dd744-82{align-self:auto;}}@media all and (max-width: 1024px){.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3759_7dd744-82 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 1024px){.kadence-column3759_7dd744-82 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}@media all and (max-width: 767px){.kt-row-column-wrap > .kadence-column3759_7dd744-82{align-self:flex-start;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3759_7dd744-82{align-self:auto;}.kt-inner-column-height-full:not(.kt-has-1-columns) > .wp-block-kadence-column.kadence-column3759_7dd744-82 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}.kadence-column3759_7dd744-82 > .kt-inside-inner-col{flex-direction:column;justify-content:flex-start;}}<\/style>\n<div class=\"wp-block-kadence-column kadence-column3759_7dd744-82 kb-section-dir-vertical inner-column-2\"><div class=\"kt-inside-inner-col\"><style>.wp-block-kadence-advancedheading.kt-adv-heading3759_ce37da-f8, .wp-block-kadence-advancedheading.kt-adv-heading3759_ce37da-f8[data-kb-block=\"kb-adv-heading3759_ce37da-f8\"]{padding-bottom:var(--global-kb-spacing-sm, 1.5rem);font-size:var(--global-kb-font-size-md, 1.25rem);font-weight:400;font-style:normal;text-transform:uppercase;}.wp-block-kadence-advancedheading.kt-adv-heading3759_ce37da-f8 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3759_ce37da-f8[data-kb-block=\"kb-adv-heading3759_ce37da-f8\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3759_ce37da-f8 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3759_ce37da-f8[data-kb-block=\"kb-adv-heading3759_ce37da-f8\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h6 class=\"kt-adv-heading3759_ce37da-f8 wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading3759_ce37da-f8\">rESOURCES<\/h6>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3759_16619a-79, .wp-block-kadence-advancedheading.kt-adv-heading3759_16619a-79[data-kb-block=\"kb-adv-heading3759_16619a-79\"]{padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;font-size:var(--global-kb-font-size-xxl, 4rem);line-height:1;font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3759_16619a-79 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3759_16619a-79[data-kb-block=\"kb-adv-heading3759_16619a-79\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3759_16619a-79 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3759_16619a-79[data-kb-block=\"kb-adv-heading3759_16619a-79\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<h1 class=\"kt-adv-heading3759_16619a-79 wp-block-kadence-advancedheading has-theme-palette-3-color has-text-color\" data-kb-block=\"kb-adv-heading3759_16619a-79\">resources for Everyone<\/h1>\n\n\n<style>.wp-block-kadence-advancedheading.kt-adv-heading3759_375be4-e3, .wp-block-kadence-advancedheading.kt-adv-heading3759_375be4-e3[data-kb-block=\"kb-adv-heading3759_375be4-e3\"]{max-width:896px;margin-right:auto;margin-left:auto;padding-top:0px;padding-bottom:var(--global-kb-spacing-sm, 1.5rem);margin-top:0px;margin-bottom:0px;text-align:center;font-size:var(--global-kb-font-size-md, 1.25rem);font-style:normal;}.wp-block-kadence-advancedheading.kt-adv-heading3759_375be4-e3 mark.kt-highlight, .wp-block-kadence-advancedheading.kt-adv-heading3759_375be4-e3[data-kb-block=\"kb-adv-heading3759_375be4-e3\"] mark.kt-highlight{font-style:normal;color:#f76a0c;-webkit-box-decoration-break:clone;box-decoration-break:clone;padding-top:0px;padding-right:0px;padding-bottom:0px;padding-left:0px;}.wp-block-kadence-advancedheading.kt-adv-heading3759_375be4-e3 img.kb-inline-image, .wp-block-kadence-advancedheading.kt-adv-heading3759_375be4-e3[data-kb-block=\"kb-adv-heading3759_375be4-e3\"] img.kb-inline-image{width:150px;vertical-align:baseline;}<\/style>\n<p class=\"kt-adv-heading3759_375be4-e3 wp-block-kadence-advancedheading has-theme-palette-4-color has-text-color\" data-kb-block=\"kb-adv-heading3759_375be4-e3\">The KnowledgeFlow Cybersafety Foundation provides a wealth of resources tailored for a wide range of audiences. Our resources cover various aspects of online safety, ensuring that each group can navigate the digital environment with confidence. Parents can access guidance to protect their children online, teachers can find tools to educate students about cybersafety, seniors can learn to avoid common online scams, and police can utilize resources to enhance their cybersecurity knowledge. By offering specialized content for these diverse groups, KnowledgeFlow empowers everyone to stay safe and secure in the digital world.<\/p>\n\n\n<style>.wp-block-kadence-advancedbtn.kt-btns3759_8c2df7-74, .site .entry-content .wp-block-kadence-advancedbtn.kt-btns3759_8c2df7-74, .wp-block-kadence-advancedbtn.kb-btns3759_8c2df7-74, .site .entry-content .wp-block-kadence-advancedbtn.kb-btns3759_8c2df7-74{margin-bottom:0px;}.wp-block-kadence-advancedbtn.kb-btns3759_8c2df7-74{gap:var(--global-kb-gap-xs, 0.5rem );justify-content:center;align-items:center;}.kt-btns3759_8c2df7-74 .kt-button{font-weight:normal;font-style:normal;}<\/style>\n<div class=\"wp-block-kadence-advancedbtn kb-buttons-wrap kb-btns3759_8c2df7-74\"><style>ul.menu .wp-block-kadence-advancedbtn .kb-btn3759_875932-d0.kb-button{width:initial;}.wp-block-kadence-advancedbtn .kb-btn3759_875932-d0.kb-button{margin-top:var(--global-kb-spacing-sm, 1.5rem);}.wp-block-kadence-advancedbtn .kb-btn3759_875932-d0.kb-button:hover, .wp-block-kadence-advancedbtn .kb-btn3759_875932-d0.kb-button:focus{background:var(--global-palette1, #3182CE);}<\/style><a class=\"kb-button kt-button button kb-btn3759_875932-d0 kt-btn-size-standard kt-btn-width-type-auto kb-btn-global-inherit  kt-btn-has-text-true kt-btn-has-svg-false  wp-block-button__link wp-block-kadence-singlebtn\" href=\"https:\/\/knowledgeflow.org\/resources\/\" target=\"_blank\" rel=\"noreferrer noopener\"><span class=\"kt-btn-inner-text\">View Resources<\/span><\/a><\/div>\n<\/div><\/div>\n\n<\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Bolet\u00edn de noticias: Titulares seleccionados a mano por los conservadores de ciberseguridad de KnowledgeFlow. Vol. 6 Claudiu's Top Story on Our Newsletter TORRENT FREAK:...<\/p>","protected":false},"author":8,"featured_media":3776,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[516],"tags":[],"class_list":["post-3759","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-knowledgebytes"],"acf":[],"taxonomy_info":{"category":[{"value":516,"label":"KnowledgeBytes"}]},"featured_image_src_large":["https:\/\/knowledgeflow.org\/wp-content\/uploads\/2021\/12\/The-KnowledgeFlow-Newsletter-\u2013-6th-Ed..png",1024,576,false],"author_info":{"display_name":"KnowledgeFlow Cybersafety Foundation","author_link":"https:\/\/knowledgeflow.org\/es\/author\/knowledgefloweditor\/"},"comment_info":0,"category_info":[{"term_id":516,"name":"KnowledgeBytes","slug":"knowledgebytes","term_group":0,"term_taxonomy_id":516,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","cat_ID":516,"category_count":78,"category_description":"","cat_name":"KnowledgeBytes","category_nicename":"knowledgebytes","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/3759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/comments?post=3759"}],"version-history":[{"count":0,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/posts\/3759\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media\/3776"}],"wp:attachment":[{"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/media?parent=3759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/categories?post=3759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/knowledgeflow.org\/es\/wp-json\/wp\/v2\/tags?post=3759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}