{"id":5891,"date":"2021-11-23T09:00:54","date_gmt":"2021-11-23T08:00:54","guid":{"rendered":"https:\/\/www.esferize.com\/?p=5891"},"modified":"2022-01-21T13:18:02","modified_gmt":"2022-01-21T12:18:02","slug":"phishing-variants-vishing-and-smishing","status":"publish","type":"post","link":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/","title":{"rendered":"Phishing variants: vishing and smishing"},"content":{"rendered":"<div class=\"page\" title=\"Page 36\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>If <a href=\"https:\/\/www.esferize.com\/en\/what-is-phishing-how-does-it-work-and-how-to-protect-yourself\/\"><strong>phishing<\/strong><\/a> wasn&#8217;t enough for us, we need to be more alert than ever as new variants are arriving: vishing and smishing. Cybercriminals will try to trick us over the phone, either by voice or text message.<\/p>\n<p>It is worth remembering that <strong>phishing is a form of cybercrime<\/strong> using email, usually in which someone impersonates a trusted organisation or company, such as a bank or the tax office. With an increasingly real appearance, they try to trick us into providing confidential data, such as personal identification information, bank and credit card details and passwords.<\/p>\n<p>With this information, criminals try to access other accounts, stealing our identity or even our money.<\/p>\n<p>Well, these same phishing tactics are being used for two other forms of crime: <strong>vishing<\/strong> and <strong>smishing<\/strong>.<\/p>\n<h3>How to fool yourself with social engineering<\/h3>\n<p>All these scams are based on social engineering to<strong> trick victims<\/strong>. With these techniques, criminals manage to manipulate, influence or trick people to get what they want: data, passwords, control of the computer&#8230; The hacker can use telephone, email, mail or direct contact to gain illegal access. Phishing is a good example.<\/p>\n<p>To achieve this social engineering, hackers use a <strong>variety of techniques<\/strong>. Sometimes they send a security alert message requiring the person&#8217;s immediate intervention. Other times they try to acquire sensitive information, such as usernames, passwords and credit card details, by impersonating a trusted entity using email.<\/p>\n<p>In many cases, criminals use <strong>some kind of bait<\/strong>: a message with an attachment that says &#8220;Letter of dismissal&#8221; or a promotion of a discount if you buy from a certain company. They may also try to redirect you to a <strong>legal-looking<\/strong> website that you are used to accessing, but which is <strong>fraudulent<\/strong>.<\/p>\n<div class=\"page\" title=\"Page 37\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h3>I will help you if you give me information<\/h3>\n<p>One of the latest techniques, and one that has a lot to do with this new type of scam such as <strong>vishing<\/strong>, is when <strong>they try to impersonate a technical service<\/strong>. They will offer us their help in exchange for us providing them with certain information.<\/p>\n<p>In this case, these people phone (either landline or mobile) either from a company or a house to assure you that there is a problem with your computer systems or your gas installation, but that they can help. If, in addition, they ask you to turn off your antivirus first, then it is more than obvious that it is a trap call.<\/p>\n<h3>How vishing works<\/h3>\n<p>The word <strong>\u00abvishing\u00bb<\/strong> comes from the combination of <strong>\u00abvoice\u00bb<\/strong> and <strong>\u00abphishing\u00bb<\/strong>. In other words, it is a phishing technique in which, instead of using e-mail, voice is used. The objective is always the same: to trick the other person into <strong>revealing personal, sensitive or confidential information<\/strong>.<\/p>\n<p>Attackers impersonate a person or a well-known company. Using different techniques, they try to put fear into the person on the other end of the phone and <strong>emotionally manipulate<\/strong> them into giving the information the attackers are looking for. Often they even ask for a money transfer to be made in order to fix the problem that the user supposedly has.<\/p>\n<div class=\"page\" title=\"Page 37\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p>In addition, vishers create <strong>fake caller ID profiles<\/strong> to make the phone they are dialling from look legitimate. This gives them extra credibility with the victim.<\/p>\n<p>If they do not reach the victim at that moment, they are likely to leave a <strong>message in the victim&#8217;s mailbox<\/strong> to try to get the victim to call back. If not, they will call back at another time.<\/p>\n<div class=\"page\" title=\"Page 38\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h3>When the scam comes in an SMS<\/h3>\n<p>But, in addition to voice, attackers are also using phones for other versions of phishing. In this case, and making use of SMS, the criminals will also use all kinds of social engineering techniques to make us believe that they are someone respectable. We are talking about <strong>smishing<\/strong>.<\/p>\n<p>The origin of this word, again, is the combination of<strong> SMS and phishing<\/strong>, as SMS text messages are used here. They also frequently use some of the popular <strong>instant messaging applications<\/strong> to try to trick us.<\/p>\n<p>Again, attackers will impersonate another person or an entity (public or private) that users trust. They will try to trick us, using some of the techniques seen above, into providing personal information, making a payment, clicking on a malicious link or downloading an attachment.<\/p>\n<p>According to\u00a0<a href=\"https:\/\/www.incibe.es\">INCIBE<\/a>,<strong> the great success of these attacks is that we do not expect them<\/strong>. We are perhaps more alert against phishing and can detect them earlier, but we may not expect to receive a scam via SMS, especially when there are already few people and companies using this communication system.<\/p>\n<div class=\"page\" title=\"Page 38\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<h3>Doubt is always a good thing<\/h3>\n<p>We are now familiar with the variants of phishing: vishing and smishing. As we can see, no one is <strong>safe from being affected<\/strong> by one of the many variants of phishing. As well as always being vigilant, we should be wary of communications that actively ask us to do something on our behalf, such as giving out confidential data, downloading a file or clicking on a link.<\/p>\n<p><strong>Ignoring these messages<\/strong> and <strong>deleting<\/strong> <strong>them<\/strong> or<strong> hanging up directly<\/strong> if the call seems suspicious are some of the best measures you can take to avoid falling victim to vishing and smishing.<\/p>\n<p>Source: Ideas para tu empresa &#8211; Vodafone<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>If phishing wasn&#8217;t enough for us, we need to be  [&#8230;]<\/p>\n","protected":false},"author":8,"featured_media":5890,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[225,228],"tags":[582,701,703,749,267,743,750,744,748,269,746,747,745],"class_list":["post-5891","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-security-on-the-internet","tag-attacker","tag-cyberattack","tag-cybercriminal","tag-fraudulent-call","tag-malware-en","tag-phishing-en","tag-scam","tag-smishing-en","tag-sms-en","tag-social-engineering","tag-social-engineering-techniques","tag-virus-en","tag-vishing-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing variants: vishing and smishing - Esferize<\/title>\n<meta name=\"description\" content=\"As if we did not have enough, our alerts must be more prepared than ever, watch out for these variants of phishing: vishing and smishing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing variants: vishing and smishing - Esferize\" \/>\n<meta property=\"og:description\" content=\"As if we did not have enough, our alerts must be more prepared than ever, watch out for these variants of phishing: vishing and smishing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Esferize\" \/>\n<meta property=\"article:published_time\" content=\"2021-11-23T08:00:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-21T12:18:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_keyboard.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"603\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Cynthia Soto del R\u00edo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Cynthia Soto del R\u00edo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/\"},\"author\":{\"name\":\"Cynthia Soto del R\u00edo\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\"},\"headline\":\"Phishing variants: vishing and smishing\",\"datePublished\":\"2021-11-23T08:00:54+00:00\",\"dateModified\":\"2022-01-21T12:18:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/\"},\"wordCount\":881,\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/metaball_keyboard.jpg\",\"keywords\":[\"attacker\",\"cyberattack\",\"cybercriminal\",\"fraudulent call\",\"Malware\",\"phishing\",\"scam\",\"smishing\",\"sms\",\"Social Engineering\",\"social engineering techniques\",\"virus\",\"vishing\"],\"articleSection\":[\"Cybersecurity\",\"Security on the Internet\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/\",\"name\":\"Phishing variants: vishing and smishing - Esferize\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/metaball_keyboard.jpg\",\"datePublished\":\"2021-11-23T08:00:54+00:00\",\"dateModified\":\"2022-01-21T12:18:02+00:00\",\"description\":\"As if we did not have enough, our alerts must be more prepared than ever, watch out for these variants of phishing: vishing and smishing.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/metaball_keyboard.jpg\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/metaball_keyboard.jpg\",\"width\":1000,\"height\":603,\"caption\":\"Variantes del phishing: vishing y smishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/phishing-variants-vishing-and-smishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing variants: vishing and smishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"name\":\"Esferize\",\"description\":\"Connect to the future\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#organization\",\"name\":\"Esferize Comunicaciones S.L.\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.esferize.com\\\/wp-content\\\/uploads\\\/2019\\\/10\\\/logo.png\",\"width\":453,\"height\":100,\"caption\":\"Esferize Comunicaciones S.L.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/esferize-comunicaciones\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/#\\\/schema\\\/person\\\/6dd1aa318242d5cd1a6c357008503d2b\",\"name\":\"Cynthia Soto del R\u00edo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g\",\"caption\":\"Cynthia Soto del R\u00edo\"},\"url\":\"https:\\\/\\\/www.esferize.com\\\/en\\\/author\\\/csoto\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing variants: vishing and smishing - Esferize","description":"As if we did not have enough, our alerts must be more prepared than ever, watch out for these variants of phishing: vishing and smishing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/","og_locale":"en_US","og_type":"article","og_title":"Phishing variants: vishing and smishing - Esferize","og_description":"As if we did not have enough, our alerts must be more prepared than ever, watch out for these variants of phishing: vishing and smishing.","og_url":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/","og_site_name":"Esferize","article_published_time":"2021-11-23T08:00:54+00:00","article_modified_time":"2022-01-21T12:18:02+00:00","og_image":[{"width":1000,"height":603,"url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_keyboard.jpg","type":"image\/jpeg"}],"author":"Cynthia Soto del R\u00edo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Cynthia Soto del R\u00edo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/#article","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/"},"author":{"name":"Cynthia Soto del R\u00edo","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b"},"headline":"Phishing variants: vishing and smishing","datePublished":"2021-11-23T08:00:54+00:00","dateModified":"2022-01-21T12:18:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/"},"wordCount":881,"publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"image":{"@id":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_keyboard.jpg","keywords":["attacker","cyberattack","cybercriminal","fraudulent call","Malware","phishing","scam","smishing","sms","Social Engineering","social engineering techniques","virus","vishing"],"articleSection":["Cybersecurity","Security on the Internet"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/","url":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/","name":"Phishing variants: vishing and smishing - Esferize","isPartOf":{"@id":"https:\/\/www.esferize.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/#primaryimage"},"image":{"@id":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_keyboard.jpg","datePublished":"2021-11-23T08:00:54+00:00","dateModified":"2022-01-21T12:18:02+00:00","description":"As if we did not have enough, our alerts must be more prepared than ever, watch out for these variants of phishing: vishing and smishing.","breadcrumb":{"@id":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/#primaryimage","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_keyboard.jpg","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2021\/09\/metaball_keyboard.jpg","width":1000,"height":603,"caption":"Variantes del phishing: vishing y smishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.esferize.com\/en\/phishing-variants-vishing-and-smishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.esferize.com\/en\/"},{"@type":"ListItem","position":2,"name":"Phishing variants: vishing and smishing"}]},{"@type":"WebSite","@id":"https:\/\/www.esferize.com\/en\/#website","url":"https:\/\/www.esferize.com\/en\/","name":"Esferize","description":"Connect to the future","publisher":{"@id":"https:\/\/www.esferize.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.esferize.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.esferize.com\/en\/#organization","name":"Esferize Comunicaciones S.L.","url":"https:\/\/www.esferize.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","contentUrl":"https:\/\/www.esferize.com\/wp-content\/uploads\/2019\/10\/logo.png","width":453,"height":100,"caption":"Esferize Comunicaciones S.L."},"image":{"@id":"https:\/\/www.esferize.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/esferize-comunicaciones"]},{"@type":"Person","@id":"https:\/\/www.esferize.com\/en\/#\/schema\/person\/6dd1aa318242d5cd1a6c357008503d2b","name":"Cynthia Soto del R\u00edo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/607023580431f3ebba6044ec2ef49d78d64cacf5aff25a877d4d2cbf80b5dd87?s=96&d=mm&r=g","caption":"Cynthia Soto del R\u00edo"},"url":"https:\/\/www.esferize.com\/en\/author\/csoto\/"}]}},"_links":{"self":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5891","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/comments?post=5891"}],"version-history":[{"count":0,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/posts\/5891\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media\/5890"}],"wp:attachment":[{"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/media?parent=5891"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/categories?post=5891"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esferize.com\/en\/wp-json\/wp\/v2\/tags?post=5891"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}