{"id":8594,"date":"2026-01-17T12:53:56","date_gmt":"2026-01-17T15:53:56","guid":{"rendered":"https:\/\/infocuatro.com\/?p=8594"},"modified":"2026-03-06T21:01:04","modified_gmt":"2026-03-07T00:01:04","slug":"el-robo-silencioso-detras-del-pago-con-qr-asi-hacen-los-hackers-para-vaciarte-la-cuenta","status":"publish","type":"post","link":"https:\/\/infocuatro.com\/?p=8594","title":{"rendered":"El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta"},"content":{"rendered":"\n<p>Durante a\u00f1os, los c\u00f3digos QR fueron presentados como una herramienta pr\u00e1ctica, r\u00e1pida y segura para reemplazar el efectivo. En la Argentina, su adopci\u00f3n se dispar\u00f3 con la expansi\u00f3n de las\u00a0billeteras virtuales, los pagos en comercios, el transporte, los servicios p\u00fablicos y hasta los tr\u00e1mites cotidianos.<\/p>\n\n\n\n<p>Sin embargo, esa confianza construida en torno a la tecnolog\u00eda se transform\u00f3 en el principal aliado de una\u00a0nueva ola de estafas\u00a0digitales\u00a0que preocupa a especialistas en ciberseguridad. El problema no est\u00e1 en el QR como herramienta, sino en lo que puede ocultarse detr\u00e1s de un simple escaneo.<\/p>\n\n\n\n<p>Esta nueva modalidad de fraude es conocida como\u00a0<strong>qrishing<\/strong>, una variante del phishing tradicional que utiliza c\u00f3digos QR como veh\u00edculo del enga\u00f1o.\u00a0El ataque comienza cuando una persona escanea un c\u00f3digo que parece leg\u00edtimo, pero que en realidad redirige a\u00a0plataformas controladas por ciberdelincuentes.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"740\" height=\"494\" src=\"https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/pago-efectivo-codigo-qr-pequenas-empresas-tienda_53876-127043.avif\" alt=\"\" class=\"wp-image-8596\" style=\"aspect-ratio:1.498023090305235;width:800px;height:auto\" srcset=\"https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/pago-efectivo-codigo-qr-pequenas-empresas-tienda_53876-127043.avif 740w, https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/pago-efectivo-codigo-qr-pequenas-empresas-tienda_53876-127043-300x200.jpg 300w\" sizes=\"auto, (max-width: 740px) 100vw, 740px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">C\u00f3mo funciona la estafa detr\u00e1s del pago con QR<\/h2>\n\n\n\n<p>Una de las maniobras m\u00e1s comunes consiste en la\u00a0sustituci\u00f3n de c\u00f3digos QR reales por otros maliciosos. Esto ocurre en comercios, restaurantes, ferias, espacios p\u00fablicos o incluso entre vendedores ambulantes. El usuario cree que est\u00e1 pagando un producto o servicio, pero el dinero termina en manos de un tercero.<\/p>\n\n\n\n<p>Otra variante lleva a p\u00e1ginas que solicitan usuario, contrase\u00f1a o c\u00f3digos de verificaci\u00f3n. Con esa informaci\u00f3n, los delincuentes pueden tomar control de cuentas bancarias, billeteras virtuales, correos electr\u00f3nicos o redes sociales, lo que ampl\u00eda el da\u00f1o m\u00e1s all\u00e1 de una sola transacci\u00f3n.<\/p>\n\n\n\n<p>Tambi\u00e9n se detectaron c\u00f3digos que inducen a descargar\u00a0supuestas aplicaciones de validaci\u00f3n o control del pago. En realidad, se trata de troyanos que permiten espiar el dispositivo, interceptar claves y monitorear operaciones financieras en tiempo real.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"534\" src=\"https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/pago-con-codigo-qr-persona-que-paga-telefono-movil-transferir-dinero-el-212780629.webp\" alt=\"\" class=\"wp-image-8597\" srcset=\"https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/pago-con-codigo-qr-persona-que-paga-telefono-movil-transferir-dinero-el-212780629.webp 800w, https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/pago-con-codigo-qr-persona-que-paga-telefono-movil-transferir-dinero-el-212780629-300x200.webp 300w, https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/pago-con-codigo-qr-persona-que-paga-telefono-movil-transferir-dinero-el-212780629-768x513.webp 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Argentina, un terreno f\u00e9rtil para este fraude digital<\/h2>\n\n\n\n<p>El impacto de estas estafas es particularmente fuerte en la Argentina, donde\u00a0el uso del QR se volvi\u00f3 casi universal.\u00a0Desde pagar un caf\u00e9 hasta abonar impuestos o servicios, el escaneo es parte de la rutina diaria, lo que ampl\u00eda de forma significativa la superficie de ataque.<\/p>\n\n\n\n<p>En los \u00faltimos a\u00f1os se registraron casos resonantes en distintas provincias.&nbsp;Hubo falsas multas de tr\u00e1nsito colocadas en parabrisas; notificaciones ap\u00f3crifas de cortes de gas con c\u00f3digos maliciosos en ciudades como Salta y La Plata; y carteles en la v\u00eda p\u00fablica con mensajes provocadores dise\u00f1ados para despertar curiosidad.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Recomendaciones clave para evitar caer en la trampa<\/h2>\n\n\n\n<p>Desde el sector de la ciberseguridad recomiendan\u00a0desconfiar de cualquier c\u00f3digo QR\u00a0recibido por correo electr\u00f3nico o pegado en espacios p\u00fablicos sin una fuente clara.<\/p>\n\n\n\n<p>Tambi\u00e9n aconsejan\u00a0verificar siempre la URL antes de ingresar datos, evitar descargar aplicaciones sugeridas por c\u00f3digos desconocidos y reforzar la protecci\u00f3n de las cuentas con autenticaci\u00f3n multifactor.  <a href=\"https:\/\/lacult.org\/creator\/mason608\" target=\"_blank\">xxx Mason608<\/a><\/p>\n\n\n\n<p>En un contexto donde el QR se convirti\u00f3 en una herramienta cotidiana, la prevenci\u00f3n y la desconfianza informada aparecen como la \u00fanica barrera efectiva frente a una estafa que, con un solo escaneo, puede vaciar una cuenta en segundos.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Durante a\u00f1os, los c\u00f3digos QR fueron presentados como una herramienta pr\u00e1ctica, r\u00e1pida y segura para reemplazar el efectivo. En la Argentina, su adopci\u00f3n se dispar\u00f3 [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":8595,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[10],"tags":[],"class_list":["post-8594","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta - InfoCuatro<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/infocuatro.com\/?p=8594\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta - InfoCuatro\" \/>\n<meta property=\"og:description\" content=\"Durante a\u00f1os, los c\u00f3digos QR fueron presentados como una herramienta pr\u00e1ctica, r\u00e1pida y segura para reemplazar el efectivo. En la Argentina, su adopci\u00f3n se dispar\u00f3 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/infocuatro.com\/?p=8594\" \/>\n<meta property=\"og:site_name\" content=\"InfoCuatro\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/infocuatro.noticias\" \/>\n<meta property=\"article:published_time\" content=\"2026-01-17T15:53:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-07T00:01:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/599997.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1270\" \/>\n\t<meta property=\"og:image:height\" content=\"714\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Arnaldo N\u00fa\u00f1ez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@InfoCuatro\" \/>\n<meta name=\"twitter:site\" content=\"@InfoCuatro\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arnaldo N\u00fa\u00f1ez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594\"},\"author\":{\"name\":\"Arnaldo N\u00fa\u00f1ez\",\"@id\":\"https:\\\/\\\/infocuatro.com\\\/#\\\/schema\\\/person\\\/560f9b4fb1043ae9c42c5c718f3fcc65\"},\"headline\":\"El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta\",\"datePublished\":\"2026-01-17T15:53:56+00:00\",\"dateModified\":\"2026-03-07T00:01:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594\"},\"wordCount\":548,\"publisher\":{\"@id\":\"https:\\\/\\\/infocuatro.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/infocuatro.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/599997.webp\",\"articleSection\":[\"blog\"],\"inLanguage\":\"es-AR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594\",\"url\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594\",\"name\":\"El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta - InfoCuatro\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/infocuatro.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/infocuatro.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/599997.webp\",\"datePublished\":\"2026-01-17T15:53:56+00:00\",\"dateModified\":\"2026-03-07T00:01:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594#breadcrumb\"},\"inLanguage\":\"es-AR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/infocuatro.com\\\/?p=8594\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-AR\",\"@id\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594#primaryimage\",\"url\":\"https:\\\/\\\/infocuatro.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/599997.webp\",\"contentUrl\":\"https:\\\/\\\/infocuatro.com\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/599997.webp\",\"width\":1270,\"height\":714},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/infocuatro.com\\\/?p=8594#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Inicio\",\"item\":\"https:\\\/\\\/infocuatro.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/infocuatro.com\\\/#website\",\"url\":\"https:\\\/\\\/infocuatro.com\\\/\",\"name\":\"InfoCuatro\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/infocuatro.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/infocuatro.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-AR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/infocuatro.com\\\/#organization\",\"name\":\"InfoCuatro\",\"url\":\"https:\\\/\\\/infocuatro.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-AR\",\"@id\":\"https:\\\/\\\/infocuatro.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/infocuatro.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Logo-original.fw_.png\",\"contentUrl\":\"https:\\\/\\\/infocuatro.com\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/Logo-original.fw_.png\",\"width\":500,\"height\":500,\"caption\":\"InfoCuatro\"},\"image\":{\"@id\":\"https:\\\/\\\/infocuatro.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/infocuatro.noticias\",\"https:\\\/\\\/x.com\\\/InfoCuatro\",\"https:\\\/\\\/www.instagram.com\\\/infocuatro\",\"https:\\\/\\\/mastodon.social\\\/@infocuatro\",\"https:\\\/\\\/www.youtube.com\\\/@InfoCuatro\",\"https:\\\/\\\/www.tiktok.com\\\/@infocuatro\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/infocuatro.com\\\/#\\\/schema\\\/person\\\/560f9b4fb1043ae9c42c5c718f3fcc65\",\"name\":\"Arnaldo N\u00fa\u00f1ez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-AR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/63149f8b4b6f9b26dfe253aa95efa81655bb545eec50cc479c690a89ee8df583?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/63149f8b4b6f9b26dfe253aa95efa81655bb545eec50cc479c690a89ee8df583?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/63149f8b4b6f9b26dfe253aa95efa81655bb545eec50cc479c690a89ee8df583?s=96&r=g\",\"caption\":\"Arnaldo N\u00fa\u00f1ez\"},\"url\":\"https:\\\/\\\/infocuatro.com\\\/?author=4\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta - InfoCuatro","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/infocuatro.com\/?p=8594","og_locale":"es_ES","og_type":"article","og_title":"El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta - InfoCuatro","og_description":"Durante a\u00f1os, los c\u00f3digos QR fueron presentados como una herramienta pr\u00e1ctica, r\u00e1pida y segura para reemplazar el efectivo. En la Argentina, su adopci\u00f3n se dispar\u00f3 [&hellip;]","og_url":"https:\/\/infocuatro.com\/?p=8594","og_site_name":"InfoCuatro","article_publisher":"https:\/\/www.facebook.com\/infocuatro.noticias","article_published_time":"2026-01-17T15:53:56+00:00","article_modified_time":"2026-03-07T00:01:04+00:00","og_image":[{"width":1270,"height":714,"url":"https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/599997.webp","type":"image\/webp"}],"author":"Arnaldo N\u00fa\u00f1ez","twitter_card":"summary_large_image","twitter_creator":"@InfoCuatro","twitter_site":"@InfoCuatro","twitter_misc":{"Escrito por":"Arnaldo N\u00fa\u00f1ez","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/infocuatro.com\/?p=8594#article","isPartOf":{"@id":"https:\/\/infocuatro.com\/?p=8594"},"author":{"name":"Arnaldo N\u00fa\u00f1ez","@id":"https:\/\/infocuatro.com\/#\/schema\/person\/560f9b4fb1043ae9c42c5c718f3fcc65"},"headline":"El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta","datePublished":"2026-01-17T15:53:56+00:00","dateModified":"2026-03-07T00:01:04+00:00","mainEntityOfPage":{"@id":"https:\/\/infocuatro.com\/?p=8594"},"wordCount":548,"publisher":{"@id":"https:\/\/infocuatro.com\/#organization"},"image":{"@id":"https:\/\/infocuatro.com\/?p=8594#primaryimage"},"thumbnailUrl":"https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/599997.webp","articleSection":["blog"],"inLanguage":"es-AR"},{"@type":"WebPage","@id":"https:\/\/infocuatro.com\/?p=8594","url":"https:\/\/infocuatro.com\/?p=8594","name":"El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta - InfoCuatro","isPartOf":{"@id":"https:\/\/infocuatro.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/infocuatro.com\/?p=8594#primaryimage"},"image":{"@id":"https:\/\/infocuatro.com\/?p=8594#primaryimage"},"thumbnailUrl":"https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/599997.webp","datePublished":"2026-01-17T15:53:56+00:00","dateModified":"2026-03-07T00:01:04+00:00","breadcrumb":{"@id":"https:\/\/infocuatro.com\/?p=8594#breadcrumb"},"inLanguage":"es-AR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/infocuatro.com\/?p=8594"]}]},{"@type":"ImageObject","inLanguage":"es-AR","@id":"https:\/\/infocuatro.com\/?p=8594#primaryimage","url":"https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/599997.webp","contentUrl":"https:\/\/infocuatro.com\/wp-content\/uploads\/2026\/01\/599997.webp","width":1270,"height":714},{"@type":"BreadcrumbList","@id":"https:\/\/infocuatro.com\/?p=8594#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Inicio","item":"https:\/\/infocuatro.com\/"},{"@type":"ListItem","position":2,"name":"El robo silencioso detr\u00e1s del pago con QR: as\u00ed hacen los hackers para vaciarte la cuenta"}]},{"@type":"WebSite","@id":"https:\/\/infocuatro.com\/#website","url":"https:\/\/infocuatro.com\/","name":"InfoCuatro","description":"","publisher":{"@id":"https:\/\/infocuatro.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/infocuatro.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-AR"},{"@type":"Organization","@id":"https:\/\/infocuatro.com\/#organization","name":"InfoCuatro","url":"https:\/\/infocuatro.com\/","logo":{"@type":"ImageObject","inLanguage":"es-AR","@id":"https:\/\/infocuatro.com\/#\/schema\/logo\/image\/","url":"https:\/\/infocuatro.com\/wp-content\/uploads\/2025\/09\/Logo-original.fw_.png","contentUrl":"https:\/\/infocuatro.com\/wp-content\/uploads\/2025\/09\/Logo-original.fw_.png","width":500,"height":500,"caption":"InfoCuatro"},"image":{"@id":"https:\/\/infocuatro.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/infocuatro.noticias","https:\/\/x.com\/InfoCuatro","https:\/\/www.instagram.com\/infocuatro","https:\/\/mastodon.social\/@infocuatro","https:\/\/www.youtube.com\/@InfoCuatro","https:\/\/www.tiktok.com\/@infocuatro"]},{"@type":"Person","@id":"https:\/\/infocuatro.com\/#\/schema\/person\/560f9b4fb1043ae9c42c5c718f3fcc65","name":"Arnaldo N\u00fa\u00f1ez","image":{"@type":"ImageObject","inLanguage":"es-AR","@id":"https:\/\/secure.gravatar.com\/avatar\/63149f8b4b6f9b26dfe253aa95efa81655bb545eec50cc479c690a89ee8df583?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/63149f8b4b6f9b26dfe253aa95efa81655bb545eec50cc479c690a89ee8df583?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/63149f8b4b6f9b26dfe253aa95efa81655bb545eec50cc479c690a89ee8df583?s=96&r=g","caption":"Arnaldo N\u00fa\u00f1ez"},"url":"https:\/\/infocuatro.com\/?author=4"}]}},"_links":{"self":[{"href":"https:\/\/infocuatro.com\/index.php?rest_route=\/wp\/v2\/posts\/8594","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infocuatro.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infocuatro.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infocuatro.com\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/infocuatro.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8594"}],"version-history":[{"count":0,"href":"https:\/\/infocuatro.com\/index.php?rest_route=\/wp\/v2\/posts\/8594\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infocuatro.com\/index.php?rest_route=\/wp\/v2\/media\/8595"}],"wp:attachment":[{"href":"https:\/\/infocuatro.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8594"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infocuatro.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8594"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infocuatro.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8594"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}