{"id":3687,"date":"2026-02-23T14:01:25","date_gmt":"2026-02-23T13:01:25","guid":{"rendered":"https:\/\/trustlab.upct.es\/?p=3687"},"modified":"2026-02-26T17:59:23","modified_gmt":"2026-02-26T16:59:23","slug":"how-to-tell-if-your-password-has-been-leaked-and-what-to-do-immediately","status":"publish","type":"post","link":"https:\/\/trustlab.upct.es\/en\/2026\/02\/23\/how-to-tell-if-your-password-has-been-leaked-and-what-to-do-immediately\/","title":{"rendered":"How to Tell If Your Password Has Been Leaked (and What to Do Immediately)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3687\" class=\"elementor elementor-3687 elementor-3676\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c035030 e-flex e-con-boxed rael-particle-no qodef-elementor-content-no e-con e-parent\" data-id=\"c035030\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;rae_animations_entrance&quot;:&quot;none&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b78bc22 elementor-widget elementor-widget-text-editor\" data-id=\"b78bc22\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Data breaches happen. And they don\u2019t always come with a warning. That\u2019s why the most useful response isn\u2019t to panic, but to have a clear method to check and act within minutes.<\/p><p>There\u2019s also a key detail that explains why this matters so much: reusing the same password across multiple websites turns a \u201csmall\u201d breach into a major problem. If one account is exposed (email\/username + password), an attacker can try those same credentials on other services. This technique is extremely common and can affect social media accounts, email, online stores, and even work tools.<\/p><p>Below, you\u2019ll find how to check whether a password (or email address) has been leaked and, most importantly, what to do immediately afterward to regain control and prevent a domino effect.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c2a742 elementor-widget elementor-widget-sbi-widget\" data-id=\"1c2a742\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"sbi-widget.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\n<div id=\"sb_instagram\"  class=\"sbi sbi_mob_col_1 sbi_tab_col_2 sbi_col_4 sbi_width_resp\" style=\"padding-bottom: 10px;\"\t data-feedid=\"*1\"  data-res=\"auto\" data-cols=\"4\" data-colsmobile=\"1\" data-colstablet=\"2\" data-num=\"4\" data-nummobile=\"2\" data-item-padding=\"5\"\t data-shortcode-atts=\"{&quot;feed&quot;:&quot;1&quot;}\"  data-postid=\"3687\" data-locatornonce=\"c5c078793d\" data-imageaspectratio=\"1:1\" data-sbi-flags=\"favorLocal,gdpr\">\n\t<div class=\"sb_instagram_header  sbi_medium\"   >\n\t<a class=\"sbi_header_link\" target=\"_blank\"\n\t   rel=\"nofollow noopener\" href=\"https:\/\/www.instagram.com\/trustlabupct\/\" title=\"@trustlabupct\">\n\t\t<div class=\"sbi_header_text\">\n\t\t\t<div class=\"sbi_header_img\"  data-avatar-url=\"https:\/\/scontent-ams2-1.cdninstagram.com\/v\/t51.2885-19\/445860690_2218533688490732_3734170186859679917_n.jpg?stp=dst-jpg_s206x206_tt6&amp;_nc_cat=101&amp;ccb=7-5&amp;_nc_sid=bf7eb4&amp;efg=eyJ2ZW5jb2RlX3RhZyI6InByb2ZpbGVfcGljLnd3dy4xMDgwLkMzIn0%3D&amp;_nc_ohc=maBb-4zDPiQQ7kNvwGQfDHs&amp;_nc_oc=AdoQoPipcKRvx7_KyFY532Pd6ozoyVZhNyNqIwBvVGOZ7ftHV49rht6NZbhR4IAxDCg&amp;_nc_zt=24&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=AP4hL3IEAAAA&amp;_nc_tpa=Q5bMBQHV4HfEvgn-v-0mgRgbdk3-ahXB4kZPt_9pB3tW0l96l9NwWDQjZduwykw9BniDBwyRxSmlZBFITQ&amp;oh=00_Af0zaQqLHDrysOHfmIv3PYhkk4MuoZEGlEh8i_xC1leZng&amp;oe=69E5BB37\">\n\t\t\t\t\t\t\t\t\t<div class=\"sbi_header_img_hover\"  ><svg class=\"sbi_new_logo fa-instagram fa-w-14\" aria-hidden=\"true\" data-fa-processed=\"\" aria-label=\"Instagram\" data-prefix=\"fab\" data-icon=\"instagram\" role=\"img\" viewBox=\"0 0 448 512\">\n                    <path fill=\"currentColor\" d=\"M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z\"><\/path>\n                <\/svg><\/div>\n\t\t\t\t\t<img decoding=\"async\"  src=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/sb-instagram-feed-images\/trustlabupct.webp\" alt=\"\" width=\"50\" height=\"50\">\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t<div class=\"sbi_feedtheme_header_text\">\n\t\t\t\t<h3>trustlabupct<\/h3>\n\t\t\t\t\t\t\t\t\t<p class=\"sbi_bio\">Redise\u00f1ando el futuro \u27a1\ufe0f Ciberseguridad y comunicaciones seguras<br>\n\ud83d\udd0e Investigaci\u00f3n<br>\n\ud83d\udca1 Innovaci\u00f3n<br>\n\ud83d\udc69\u200d\ud83c\udfeb Formaci\u00f3n<br>\n@upctoficial @incibe<br>\n#NextGenerationEU<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/a>\n<\/div>\n\n\t<div id=\"sbi_images\"  style=\"gap: 10px;\">\n\t\t<div class=\"sbi_item sbi_type_image sbi_new sbi_transition\"\n\tid=\"sbi_18078202088394645\" data-date=\"1776080908\">\n\t<div class=\"sbi_photo_wrap\">\n\t\t<a class=\"sbi_photo\" href=\"https:\/\/www.instagram.com\/p\/DXEhfrdjfR_\/\" target=\"_blank\" rel=\"noopener nofollow\"\n\t\t\tdata-full-res=\"https:\/\/scontent-ams2-1.cdninstagram.com\/v\/t51.82787-15\/670559400_17944199712159373_4190896595535328962_n.jpg?stp=dst-jpg_e35_tt6&#038;_nc_cat=109&#038;ccb=7-5&#038;_nc_sid=18de74&#038;efg=eyJlZmdfdGFnIjoiRkVFRC5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&#038;_nc_ohc=hYE4RRRyq-cQ7kNvwHTF0TK&#038;_nc_oc=AdrNQHF5_60oVEXTzM4qOnU0jed5eBa02B4y995x0FeTNNPB9G8DTuJR33bDQNfENHg&#038;_nc_zt=23&#038;_nc_ht=scontent-ams2-1.cdninstagram.com&#038;edm=ANo9K5cEAAAA&#038;_nc_gid=mIuJDPqpmywEuyc7dufesw&#038;_nc_tpa=Q5bMBQHm75TtgcDy4-IMKZrbnd3oIrHDbERO7UHyfBqiPsceCaqVLtMv3ZJF1IpuSQhbBA90Q01UImLX5Q&#038;oh=00_Af0yOlsisocUDzE1n1rbmwj1rEY2kVTkChPHgQTx7rBChQ&#038;oe=69E5EDFA\"\n\t\t\tdata-img-src-set=\"{&quot;d&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/670559400_17944199712159373_4190896595535328962_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=109&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiRkVFRC5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=hYE4RRRyq-cQ7kNvwHTF0TK&amp;_nc_oc=AdrNQHF5_60oVEXTzM4qOnU0jed5eBa02B4y995x0FeTNNPB9G8DTuJR33bDQNfENHg&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQHm75TtgcDy4-IMKZrbnd3oIrHDbERO7UHyfBqiPsceCaqVLtMv3ZJF1IpuSQhbBA90Q01UImLX5Q&amp;oh=00_Af0yOlsisocUDzE1n1rbmwj1rEY2kVTkChPHgQTx7rBChQ&amp;oe=69E5EDFA&quot;,&quot;150&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/670559400_17944199712159373_4190896595535328962_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=109&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiRkVFRC5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=hYE4RRRyq-cQ7kNvwHTF0TK&amp;_nc_oc=AdrNQHF5_60oVEXTzM4qOnU0jed5eBa02B4y995x0FeTNNPB9G8DTuJR33bDQNfENHg&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQHm75TtgcDy4-IMKZrbnd3oIrHDbERO7UHyfBqiPsceCaqVLtMv3ZJF1IpuSQhbBA90Q01UImLX5Q&amp;oh=00_Af0yOlsisocUDzE1n1rbmwj1rEY2kVTkChPHgQTx7rBChQ&amp;oe=69E5EDFA&quot;,&quot;320&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/670559400_17944199712159373_4190896595535328962_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=109&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiRkVFRC5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=hYE4RRRyq-cQ7kNvwHTF0TK&amp;_nc_oc=AdrNQHF5_60oVEXTzM4qOnU0jed5eBa02B4y995x0FeTNNPB9G8DTuJR33bDQNfENHg&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQHm75TtgcDy4-IMKZrbnd3oIrHDbERO7UHyfBqiPsceCaqVLtMv3ZJF1IpuSQhbBA90Q01UImLX5Q&amp;oh=00_Af0yOlsisocUDzE1n1rbmwj1rEY2kVTkChPHgQTx7rBChQ&amp;oe=69E5EDFA&quot;,&quot;640&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/670559400_17944199712159373_4190896595535328962_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=109&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiRkVFRC5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=hYE4RRRyq-cQ7kNvwHTF0TK&amp;_nc_oc=AdrNQHF5_60oVEXTzM4qOnU0jed5eBa02B4y995x0FeTNNPB9G8DTuJR33bDQNfENHg&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQHm75TtgcDy4-IMKZrbnd3oIrHDbERO7UHyfBqiPsceCaqVLtMv3ZJF1IpuSQhbBA90Q01UImLX5Q&amp;oh=00_Af0yOlsisocUDzE1n1rbmwj1rEY2kVTkChPHgQTx7rBChQ&amp;oe=69E5EDFA&quot;}\">\n\t\t\t<span class=\"sbi-screenreader\">Nos alegra compartir que hemos recibido el reconoc<\/span>\n\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/trustlab.upct.es\/wp-content\/plugins\/instagram-feed\/img\/placeholder.png\" alt=\"Nos alegra compartir que hemos recibido el reconocimiento \u201cTop Cited Article 2025\u201d de Wiley por nuestro trabajo publicado en IET Collaborative Intelligent Manufacturing sobre un sistema blockchain basado en IoT aplicado al \u00e1mbito agrotech: \u201cAn orchestrated loT-based blockchain system to foster innovation in agritech\u201d, Igor Alexander Bello Tasic, Ph.D. Maria Dolores Cano Ba\u00f1os https:\/\/lnkd.in\/eqQJJHWR\n\nEn TRUST Lab, una de nuestras l\u00edneas de trabajo estrat\u00e9gicas es blockchain, una tecnolog\u00eda en la que llevamos a\u00f1os investigando y desarrollando soluciones en distintos contextos. Este caso en agricultura es solo un ejemplo del recorrido, la solidez y el impacto que seguimos construyendo en este \u00e1mbito.\n\n#blockchain #ciberseguridad #comunicacionesseguras #privacida #privacy\" aria-hidden=\"true\">\n\t\t<\/a>\n\t<\/div>\n<\/div><div class=\"sbi_item sbi_type_carousel sbi_new sbi_transition\"\n\tid=\"sbi_18091245494333944\" data-date=\"1774553163\">\n\t<div class=\"sbi_photo_wrap\">\n\t\t<a class=\"sbi_photo\" href=\"https:\/\/www.instagram.com\/p\/DWW_ycxjVB-\/\" target=\"_blank\" rel=\"noopener nofollow\"\n\t\t\tdata-full-res=\"https:\/\/scontent-ams2-1.cdninstagram.com\/v\/t51.82787-15\/658210424_17941721499159373_6247823670757129706_n.jpg?stp=dst-jpg_e35_tt6&#038;_nc_cat=103&#038;ccb=7-5&#038;_nc_sid=18de74&#038;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&#038;_nc_ohc=ZUotkTMzOzgQ7kNvwEdpUHU&#038;_nc_oc=Adq3wxrKt90K6dPsO4pdYSd2RuJ-xk7SJjyPK5cwpgtJ6FurUSJkdEKJRpYGcQZM6lc&#038;_nc_zt=23&#038;_nc_ht=scontent-ams2-1.cdninstagram.com&#038;edm=ANo9K5cEAAAA&#038;_nc_gid=mIuJDPqpmywEuyc7dufesw&#038;_nc_tpa=Q5bMBQHu2T2oNMp3LAViw-MYitMPgN0AK4Ou83lrIpMi2sgOI-B4aFPNs5PPDGJ0rMXMplhQaoBgKtVo6Q&#038;oh=00_Af2HHYhENmpXs4SYShNtHRuLH5JXWjnai1DUbDO61MT41Q&#038;oe=69E5C8A6\"\n\t\t\tdata-img-src-set=\"{&quot;d&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/658210424_17941721499159373_6247823670757129706_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=103&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=ZUotkTMzOzgQ7kNvwEdpUHU&amp;_nc_oc=Adq3wxrKt90K6dPsO4pdYSd2RuJ-xk7SJjyPK5cwpgtJ6FurUSJkdEKJRpYGcQZM6lc&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQHu2T2oNMp3LAViw-MYitMPgN0AK4Ou83lrIpMi2sgOI-B4aFPNs5PPDGJ0rMXMplhQaoBgKtVo6Q&amp;oh=00_Af2HHYhENmpXs4SYShNtHRuLH5JXWjnai1DUbDO61MT41Q&amp;oe=69E5C8A6&quot;,&quot;150&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/658210424_17941721499159373_6247823670757129706_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=103&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=ZUotkTMzOzgQ7kNvwEdpUHU&amp;_nc_oc=Adq3wxrKt90K6dPsO4pdYSd2RuJ-xk7SJjyPK5cwpgtJ6FurUSJkdEKJRpYGcQZM6lc&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQHu2T2oNMp3LAViw-MYitMPgN0AK4Ou83lrIpMi2sgOI-B4aFPNs5PPDGJ0rMXMplhQaoBgKtVo6Q&amp;oh=00_Af2HHYhENmpXs4SYShNtHRuLH5JXWjnai1DUbDO61MT41Q&amp;oe=69E5C8A6&quot;,&quot;320&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/658210424_17941721499159373_6247823670757129706_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=103&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=ZUotkTMzOzgQ7kNvwEdpUHU&amp;_nc_oc=Adq3wxrKt90K6dPsO4pdYSd2RuJ-xk7SJjyPK5cwpgtJ6FurUSJkdEKJRpYGcQZM6lc&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQHu2T2oNMp3LAViw-MYitMPgN0AK4Ou83lrIpMi2sgOI-B4aFPNs5PPDGJ0rMXMplhQaoBgKtVo6Q&amp;oh=00_Af2HHYhENmpXs4SYShNtHRuLH5JXWjnai1DUbDO61MT41Q&amp;oe=69E5C8A6&quot;,&quot;640&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/658210424_17941721499159373_6247823670757129706_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=103&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=ZUotkTMzOzgQ7kNvwEdpUHU&amp;_nc_oc=Adq3wxrKt90K6dPsO4pdYSd2RuJ-xk7SJjyPK5cwpgtJ6FurUSJkdEKJRpYGcQZM6lc&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQHu2T2oNMp3LAViw-MYitMPgN0AK4Ou83lrIpMi2sgOI-B4aFPNs5PPDGJ0rMXMplhQaoBgKtVo6Q&amp;oh=00_Af2HHYhENmpXs4SYShNtHRuLH5JXWjnai1DUbDO61MT41Q&amp;oe=69E5C8A6&quot;}\">\n\t\t\t<span class=\"sbi-screenreader\">Nuestra directora, Maria Dolores Cano Ba\u00f1os partic<\/span>\n\t\t\t<svg class=\"svg-inline--fa fa-clone fa-w-16 sbi_lightbox_carousel_icon\" aria-hidden=\"true\" aria-label=\"Clone\" data-fa-pro\u0192cessed=\"\" data-prefix=\"far\" data-icon=\"clone\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\">\n                    <path fill=\"currentColor\" d=\"M464 0H144c-26.51 0-48 21.49-48 48v48H48c-26.51 0-48 21.49-48 48v320c0 26.51 21.49 48 48 48h320c26.51 0 48-21.49 48-48v-48h48c26.51 0 48-21.49 48-48V48c0-26.51-21.49-48-48-48zM362 464H54a6 6 0 0 1-6-6V150a6 6 0 0 1 6-6h42v224c0 26.51 21.49 48 48 48h224v42a6 6 0 0 1-6 6zm96-96H150a6 6 0 0 1-6-6V54a6 6 0 0 1 6-6h308a6 6 0 0 1 6 6v308a6 6 0 0 1-6 6z\"><\/path>\n                <\/svg>\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/trustlab.upct.es\/wp-content\/plugins\/instagram-feed\/img\/placeholder.png\" alt=\"Nuestra directora, Maria Dolores Cano Ba\u00f1os particip\u00f3 hoy, en la Universidad Polit\u00e9cnica de Cartagena, en la jornada sobre Ciberseguridad: normativa y casos pr\u00e1cticos en la industria organizada por International Society of Automation (ISA). \nUna experiencia muy enriquecedora que ha proporcionado una visi\u00f3n de la realidad de la situaci\u00f3n actual de estas plantas industriales y sus procesos productivos, y la importancia que tiene el considerar la ciberseguridad como un elemento cr\u00edtico a la hora de evolucionar los entornos de producci\u00f3n a estos nuevos paradigmas, desde un punto de vista pr\u00e1ctico.\n\n#ciberseguridad #industria\" aria-hidden=\"true\">\n\t\t<\/a>\n\t<\/div>\n<\/div><div class=\"sbi_item sbi_type_carousel sbi_new sbi_transition\"\n\tid=\"sbi_18106292614838596\" data-date=\"1772809155\">\n\t<div class=\"sbi_photo_wrap\">\n\t\t<a class=\"sbi_photo\" href=\"https:\/\/www.instagram.com\/p\/DVjBW6IiJ16\/\" target=\"_blank\" rel=\"noopener nofollow\"\n\t\t\tdata-full-res=\"https:\/\/scontent-ams2-1.cdninstagram.com\/v\/t51.82787-15\/648191672_17938653987159373_8114183237067342852_n.jpg?stp=dst-jpg_e35_tt6&#038;_nc_cat=108&#038;ccb=7-5&#038;_nc_sid=18de74&#038;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&#038;_nc_ohc=EM0CXqg5qSgQ7kNvwHbYLsx&#038;_nc_oc=AdpUFTMlKzr_43gU7-Q0XyZ9ejcenqOtdx6g6M8ihlj4m8fQPFgezlGB5rtl9x4H2NU&#038;_nc_zt=23&#038;_nc_ht=scontent-ams2-1.cdninstagram.com&#038;edm=ANo9K5cEAAAA&#038;_nc_gid=mIuJDPqpmywEuyc7dufesw&#038;_nc_tpa=Q5bMBQGw7PFjbY56FKe7fufj_TQUh4imgBxwRJ3sbW6qUSX8pvqf5ZAg8UO2lIIJvfZ4_BWiORI79NyNfQ&#038;oh=00_Af3QxCshadlcRJ0PNzqV7fwAmC06QM5ctMmDROHolJJ8DQ&#038;oe=69E5E8D8\"\n\t\t\tdata-img-src-set=\"{&quot;d&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/648191672_17938653987159373_8114183237067342852_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=108&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=EM0CXqg5qSgQ7kNvwHbYLsx&amp;_nc_oc=AdpUFTMlKzr_43gU7-Q0XyZ9ejcenqOtdx6g6M8ihlj4m8fQPFgezlGB5rtl9x4H2NU&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQGw7PFjbY56FKe7fufj_TQUh4imgBxwRJ3sbW6qUSX8pvqf5ZAg8UO2lIIJvfZ4_BWiORI79NyNfQ&amp;oh=00_Af3QxCshadlcRJ0PNzqV7fwAmC06QM5ctMmDROHolJJ8DQ&amp;oe=69E5E8D8&quot;,&quot;150&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/648191672_17938653987159373_8114183237067342852_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=108&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=EM0CXqg5qSgQ7kNvwHbYLsx&amp;_nc_oc=AdpUFTMlKzr_43gU7-Q0XyZ9ejcenqOtdx6g6M8ihlj4m8fQPFgezlGB5rtl9x4H2NU&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQGw7PFjbY56FKe7fufj_TQUh4imgBxwRJ3sbW6qUSX8pvqf5ZAg8UO2lIIJvfZ4_BWiORI79NyNfQ&amp;oh=00_Af3QxCshadlcRJ0PNzqV7fwAmC06QM5ctMmDROHolJJ8DQ&amp;oe=69E5E8D8&quot;,&quot;320&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/648191672_17938653987159373_8114183237067342852_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=108&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=EM0CXqg5qSgQ7kNvwHbYLsx&amp;_nc_oc=AdpUFTMlKzr_43gU7-Q0XyZ9ejcenqOtdx6g6M8ihlj4m8fQPFgezlGB5rtl9x4H2NU&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQGw7PFjbY56FKe7fufj_TQUh4imgBxwRJ3sbW6qUSX8pvqf5ZAg8UO2lIIJvfZ4_BWiORI79NyNfQ&amp;oh=00_Af3QxCshadlcRJ0PNzqV7fwAmC06QM5ctMmDROHolJJ8DQ&amp;oe=69E5E8D8&quot;,&quot;640&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/648191672_17938653987159373_8114183237067342852_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=108&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=EM0CXqg5qSgQ7kNvwHbYLsx&amp;_nc_oc=AdpUFTMlKzr_43gU7-Q0XyZ9ejcenqOtdx6g6M8ihlj4m8fQPFgezlGB5rtl9x4H2NU&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQGw7PFjbY56FKe7fufj_TQUh4imgBxwRJ3sbW6qUSX8pvqf5ZAg8UO2lIIJvfZ4_BWiORI79NyNfQ&amp;oh=00_Af3QxCshadlcRJ0PNzqV7fwAmC06QM5ctMmDROHolJJ8DQ&amp;oe=69E5E8D8&quot;}\">\n\t\t\t<span class=\"sbi-screenreader\">Entrevista a la secretaria de estado\n\nTRUST Lab in<\/span>\n\t\t\t<svg class=\"svg-inline--fa fa-clone fa-w-16 sbi_lightbox_carousel_icon\" aria-hidden=\"true\" aria-label=\"Clone\" data-fa-pro\u0192cessed=\"\" data-prefix=\"far\" data-icon=\"clone\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\">\n                    <path fill=\"currentColor\" d=\"M464 0H144c-26.51 0-48 21.49-48 48v48H48c-26.51 0-48 21.49-48 48v320c0 26.51 21.49 48 48 48h320c26.51 0 48-21.49 48-48v-48h48c26.51 0 48-21.49 48-48V48c0-26.51-21.49-48-48-48zM362 464H54a6 6 0 0 1-6-6V150a6 6 0 0 1 6-6h42v224c0 26.51 21.49 48 48 48h224v42a6 6 0 0 1-6 6zm96-96H150a6 6 0 0 1-6-6V54a6 6 0 0 1 6-6h308a6 6 0 0 1 6 6v308a6 6 0 0 1-6 6z\"><\/path>\n                <\/svg>\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/trustlab.upct.es\/wp-content\/plugins\/instagram-feed\/img\/placeholder.png\" alt=\"Entrevista a la secretaria de estado\n\nTRUST Lab inicia hoy una serie de entrevistas, realizadas por nuestra responsable de comunicaci\u00f3n \u00c1ngela de la Llana Campos (@angeladelallanac) en las que pretendemos iniciar un claro debate sobre la importancia de la ciberseguridad en la sociedad actual. Conscientes de que todos tenemos la obligaci\u00f3n de protegernos antes las continuas amenazas a las que estamos sometidos en un mundo cada vez m\u00e1s virtual, nosotros continuamos trabajando para garantizar la seguridad en las redes de comunicaci\u00f3n. Para ello, nos mantenemos en contacto con grandes profesionales en la materia a los que hemos decidido entrevistar para compartir con la sociedad todos sus extensos y valiosos conocimientos. Estamos convencidos de que juntos somos m\u00e1s fuertes para poder conseguir un mundo m\u00e1s seguro.\nIniciamos esta serie de entrevistas con unas interesantes declaraciones de la Secretaria de Estado de Digitalizaci\u00f3n e Inteligencia Artificial Mar\u00eda Gonz\u00e1lez Veracruz (@mariagonver). \n\n@upctoficial\n#ciberseguridad #ia #innovaci\u00f3n #cybersecurity #ai\" aria-hidden=\"true\">\n\t\t<\/a>\n\t<\/div>\n<\/div><div class=\"sbi_item sbi_type_carousel sbi_new sbi_transition\"\n\tid=\"sbi_18070369706550883\" data-date=\"1772744396\">\n\t<div class=\"sbi_photo_wrap\">\n\t\t<a class=\"sbi_photo\" href=\"https:\/\/www.instagram.com\/p\/DVhF1s0jenG\/\" target=\"_blank\" rel=\"noopener nofollow\"\n\t\t\tdata-full-res=\"https:\/\/scontent-ams2-1.cdninstagram.com\/v\/t51.82787-15\/645743167_17938553586159373_3367323311937783869_n.jpg?stp=dst-jpg_e35_tt6&#038;_nc_cat=102&#038;ccb=7-5&#038;_nc_sid=18de74&#038;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&#038;_nc_ohc=kIO8WNagRCcQ7kNvwHNoM8h&#038;_nc_oc=Adq7AYrFt1R46-nOsFGOLnWvxf6meh2Ew6-8Ex-v2lwSl8rwFjJSIcSD7Pctlrv6Kls&#038;_nc_zt=23&#038;_nc_ht=scontent-ams2-1.cdninstagram.com&#038;edm=ANo9K5cEAAAA&#038;_nc_gid=mIuJDPqpmywEuyc7dufesw&#038;_nc_tpa=Q5bMBQEc3lMl9LvfKQoBKAUz41b1SyQfqP0Ae5z0bnk0mOo5icYc1zczHzo7bSBeOQSVFEQ_CzI0zlRkiA&#038;oh=00_Af14sI8UMIA5X0Wwml92LTn0eK2BvikOoEElsMYOUcwdYw&#038;oe=69E5CD76\"\n\t\t\tdata-img-src-set=\"{&quot;d&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/645743167_17938553586159373_3367323311937783869_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=102&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=kIO8WNagRCcQ7kNvwHNoM8h&amp;_nc_oc=Adq7AYrFt1R46-nOsFGOLnWvxf6meh2Ew6-8Ex-v2lwSl8rwFjJSIcSD7Pctlrv6Kls&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQEc3lMl9LvfKQoBKAUz41b1SyQfqP0Ae5z0bnk0mOo5icYc1zczHzo7bSBeOQSVFEQ_CzI0zlRkiA&amp;oh=00_Af14sI8UMIA5X0Wwml92LTn0eK2BvikOoEElsMYOUcwdYw&amp;oe=69E5CD76&quot;,&quot;150&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/645743167_17938553586159373_3367323311937783869_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=102&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=kIO8WNagRCcQ7kNvwHNoM8h&amp;_nc_oc=Adq7AYrFt1R46-nOsFGOLnWvxf6meh2Ew6-8Ex-v2lwSl8rwFjJSIcSD7Pctlrv6Kls&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQEc3lMl9LvfKQoBKAUz41b1SyQfqP0Ae5z0bnk0mOo5icYc1zczHzo7bSBeOQSVFEQ_CzI0zlRkiA&amp;oh=00_Af14sI8UMIA5X0Wwml92LTn0eK2BvikOoEElsMYOUcwdYw&amp;oe=69E5CD76&quot;,&quot;320&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/645743167_17938553586159373_3367323311937783869_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=102&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=kIO8WNagRCcQ7kNvwHNoM8h&amp;_nc_oc=Adq7AYrFt1R46-nOsFGOLnWvxf6meh2Ew6-8Ex-v2lwSl8rwFjJSIcSD7Pctlrv6Kls&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQEc3lMl9LvfKQoBKAUz41b1SyQfqP0Ae5z0bnk0mOo5icYc1zczHzo7bSBeOQSVFEQ_CzI0zlRkiA&amp;oh=00_Af14sI8UMIA5X0Wwml92LTn0eK2BvikOoEElsMYOUcwdYw&amp;oe=69E5CD76&quot;,&quot;640&quot;:&quot;https:\\\/\\\/scontent-ams2-1.cdninstagram.com\\\/v\\\/t51.82787-15\\\/645743167_17938553586159373_3367323311937783869_n.jpg?stp=dst-jpg_e35_tt6&amp;_nc_cat=102&amp;ccb=7-5&amp;_nc_sid=18de74&amp;efg=eyJlZmdfdGFnIjoiQ0FST1VTRUxfSVRFTS5iZXN0X2ltYWdlX3VybGdlbi5DMyJ9&amp;_nc_ohc=kIO8WNagRCcQ7kNvwHNoM8h&amp;_nc_oc=Adq7AYrFt1R46-nOsFGOLnWvxf6meh2Ew6-8Ex-v2lwSl8rwFjJSIcSD7Pctlrv6Kls&amp;_nc_zt=23&amp;_nc_ht=scontent-ams2-1.cdninstagram.com&amp;edm=ANo9K5cEAAAA&amp;_nc_gid=mIuJDPqpmywEuyc7dufesw&amp;_nc_tpa=Q5bMBQEc3lMl9LvfKQoBKAUz41b1SyQfqP0Ae5z0bnk0mOo5icYc1zczHzo7bSBeOQSVFEQ_CzI0zlRkiA&amp;oh=00_Af14sI8UMIA5X0Wwml92LTn0eK2BvikOoEElsMYOUcwdYw&amp;oe=69E5CD76&quot;}\">\n\t\t\t<span class=\"sbi-screenreader\">La catedr\u00e1tica de la Universidad Polit\u00e9cnica de Ca<\/span>\n\t\t\t<svg class=\"svg-inline--fa fa-clone fa-w-16 sbi_lightbox_carousel_icon\" aria-hidden=\"true\" aria-label=\"Clone\" data-fa-pro\u0192cessed=\"\" data-prefix=\"far\" data-icon=\"clone\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\">\n                    <path fill=\"currentColor\" d=\"M464 0H144c-26.51 0-48 21.49-48 48v48H48c-26.51 0-48 21.49-48 48v320c0 26.51 21.49 48 48 48h320c26.51 0 48-21.49 48-48v-48h48c26.51 0 48-21.49 48-48V48c0-26.51-21.49-48-48-48zM362 464H54a6 6 0 0 1-6-6V150a6 6 0 0 1 6-6h42v224c0 26.51 21.49 48 48 48h224v42a6 6 0 0 1-6 6zm96-96H150a6 6 0 0 1-6-6V54a6 6 0 0 1 6-6h308a6 6 0 0 1 6 6v308a6 6 0 0 1-6 6z\"><\/path>\n                <\/svg>\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/trustlab.upct.es\/wp-content\/plugins\/instagram-feed\/img\/placeholder.png\" alt=\"La catedr\u00e1tica de la Universidad Polit\u00e9cnica de Cartagena  Maria Dolores Cano Ba\u00f1os ha asistido hoy, acompa\u00f1ada de algunos miembros de su equipo, a las jornadas previas de los ejercicios MARSEC, organizadas por la Armada. \nUna interesante y fruct\u00edfera ma\u00f1ana de trabajo en la que los distintos actores participantes han interactuado y compartido conocimientos. \nLos miembros de TRUST Lab nos sentimos muy orgullosos de ser parte activa del ejercicio. \n#MARSEC26 \n#cybersecurity\n#securenetworks\n#securecommunications #privacy\" aria-hidden=\"true\">\n\t\t<\/a>\n\t<\/div>\n<\/div>\t<\/div>\n\n\t<div id=\"sbi_load\" >\n\n\t\t\t<button class=\"sbi_load_btn\"\n\t\t\ttype=\"button\" >\n\t\t\t<span class=\"sbi_btn_text\" >Load More<\/span>\n\t\t\t<span class=\"sbi_loader sbi_hidden\" style=\"background-color: rgb(255, 255, 255);\" aria-hidden=\"true\"><\/span>\n\t\t<\/button>\n\t\n\t\t\t<span class=\"sbi_follow_btn sbi_custom\" >\n\t\t\t<a target=\"_blank\"\n\t\t\t\trel=\"nofollow noopener\"  href=\"https:\/\/www.instagram.com\/trustlabupct\/\" style=\"background: rgb(64,139,209);\">\n\t\t\t\t<svg class=\"svg-inline--fa fa-instagram fa-w-14\" aria-hidden=\"true\" data-fa-processed=\"\" aria-label=\"Instagram\" data-prefix=\"fab\" data-icon=\"instagram\" role=\"img\" viewBox=\"0 0 448 512\">\n                    <path fill=\"currentColor\" d=\"M224.1 141c-63.6 0-114.9 51.3-114.9 114.9s51.3 114.9 114.9 114.9S339 319.5 339 255.9 287.7 141 224.1 141zm0 189.6c-41.1 0-74.7-33.5-74.7-74.7s33.5-74.7 74.7-74.7 74.7 33.5 74.7 74.7-33.6 74.7-74.7 74.7zm146.4-194.3c0 14.9-12 26.8-26.8 26.8-14.9 0-26.8-12-26.8-26.8s12-26.8 26.8-26.8 26.8 12 26.8 26.8zm76.1 27.2c-1.7-35.9-9.9-67.7-36.2-93.9-26.2-26.2-58-34.4-93.9-36.2-37-2.1-147.9-2.1-184.9 0-35.8 1.7-67.6 9.9-93.9 36.1s-34.4 58-36.2 93.9c-2.1 37-2.1 147.9 0 184.9 1.7 35.9 9.9 67.7 36.2 93.9s58 34.4 93.9 36.2c37 2.1 147.9 2.1 184.9 0 35.9-1.7 67.7-9.9 93.9-36.2 26.2-26.2 34.4-58 36.2-93.9 2.1-37 2.1-147.8 0-184.8zM398.8 388c-7.8 19.6-22.9 34.7-42.6 42.6-29.5 11.7-99.5 9-132.1 9s-102.7 2.6-132.1-9c-19.6-7.8-34.7-22.9-42.6-42.6-11.7-29.5-9-99.5-9-132.1s-2.6-102.7 9-132.1c7.8-19.6 22.9-34.7 42.6-42.6 29.5-11.7 99.5-9 132.1-9s102.7-2.6 132.1 9c19.6 7.8 34.7 22.9 42.6 42.6 11.7 29.5 9 99.5 9 132.1s2.7 102.7-9 132.1z\"><\/path>\n                <\/svg>\t\t\t\t<span>Follow on Instagram<\/span>\n\t\t\t<\/a>\n\t\t<\/span>\n\t\n<\/div>\n\t\t<span class=\"sbi_resized_image_data\" data-feed-id=\"*1\"\n\t\t  data-resized=\"{&quot;18106292614838596&quot;:{&quot;id&quot;:&quot;648191672_17938653987159373_8114183237067342852_n&quot;,&quot;ratio&quot;:&quot;0.75&quot;,&quot;sizes&quot;:{&quot;full&quot;:640,&quot;low&quot;:320,&quot;thumb&quot;:150},&quot;extension&quot;:&quot;.webp&quot;},&quot;18070369706550883&quot;:{&quot;id&quot;:&quot;645743167_17938553586159373_3367323311937783869_n&quot;,&quot;ratio&quot;:&quot;1.37&quot;,&quot;sizes&quot;:{&quot;full&quot;:640,&quot;low&quot;:320,&quot;thumb&quot;:150},&quot;extension&quot;:&quot;.webp&quot;},&quot;18091245494333944&quot;:{&quot;id&quot;:&quot;658210424_17941721499159373_6247823670757129706_n&quot;,&quot;ratio&quot;:&quot;1.33&quot;,&quot;sizes&quot;:{&quot;full&quot;:640,&quot;low&quot;:320,&quot;thumb&quot;:150},&quot;extension&quot;:&quot;.webp&quot;},&quot;18078202088394645&quot;:{&quot;id&quot;:&quot;670559400_17944199712159373_4190896595535328962_n&quot;,&quot;ratio&quot;:&quot;1.30&quot;,&quot;sizes&quot;:{&quot;full&quot;:640,&quot;low&quot;:320,&quot;thumb&quot;:150},&quot;extension&quot;:&quot;.webp&quot;}}\">\n\t<\/span>\n\t<\/div>\n\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ec4c0f elementor-widget elementor-widget-heading\" data-id=\"0ec4c0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Warning Signs (Without Panicking)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d23afb3 elementor-widget elementor-widget-text-editor\" data-id=\"d23afb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Before checking anything, it\u2019s important to recognize common warning signs. Sometimes the first clue is subtle.<\/p><h2>Legitimate Alerts vs. Phishing Emails: How to Tell the Difference<\/h2><p>There are legitimate notifications (for example, from your email provider or a social network) informing you about a login attempt or a password change. But there are also fake messages designed to steal your credentials.<\/p><p><strong>Quick indicators:<\/strong><\/p><ul><li><p>A real alert usually appears inside your account as well (under \u201cSecurity\u201d or \u201cActivity\u201d).<\/p><\/li><li><p>Phishing messages often create urgency (\u201clast chance,\u201d \u201cyour account will be closed today\u201d) and push you to click a link.<\/p><\/li><li><p>If in doubt, don\u2019t use the link in the email. Open the official app or manually type the website address into your browser.<\/p><\/li><\/ul><h2>Typical Suspicious Activity<\/h2><ul><li><p>Login attempts from unknown locations or devices.<\/p><\/li><li><p>Emails saying \u201cyour password has been changed\u201d when you didn\u2019t change it.<\/p><\/li><li><p>Changes to recovery methods (phone number or backup email).<\/p><\/li><li><p>Purchases, posts, or messages you didn\u2019t make.<\/p><\/li><\/ul><p>If any of these signs appear, move straight to verification and follow an immediate action checklist.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-264218b elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"264218b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2026\/02\/Diseno-sin-titulo-10-1.jpg\" class=\"attachment-large size-large wp-image-3685\" alt=\"\" srcset=\"https:\/\/trustlab.upct.es\/wp-content\/uploads\/2026\/02\/Diseno-sin-titulo-10-1.jpg 1024w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2026\/02\/Diseno-sin-titulo-10-1-300x169.jpg 300w, https:\/\/trustlab.upct.es\/wp-content\/uploads\/2026\/02\/Diseno-sin-titulo-10-1-768x432.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83bd02f elementor-widget elementor-widget-heading\" data-id=\"83bd02f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to Check If Your Password or Email Has Been Exposed in a Data Breach\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c02f5dc elementor-widget elementor-widget-text-editor\" data-id=\"c02f5dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>There\u2019s one key principle to keep in mind: most tools check whether your <strong>email address<\/strong> appears in known data breaches. Some password managers and browsers can also detect compromised passwords. In all cases, the basic rule is clear: <strong>never enter your password into random websites \u201cto check it.\u201d<\/strong> The standard approach is to check your email address and then secure the affected accounts.<\/p><hr \/><h2>Option 1: Check Breaches with Have I Been Pwned (Step by Step)<\/h2><p>One of the most widely used services for checking whether an email address appears in leaked databases is <strong>Have I Been Pwned (HIBP)<\/strong>. It aggregates publicly disclosed data breaches.<\/p><p><strong>Steps:<\/strong><\/p><ol><li><p>Go to the official website.<\/p><\/li><li><p>Enter the email address you want to check.<\/p><\/li><li><p>Review the result. If there\u2019s a match, scroll down to see which breaches are listed.<\/p><\/li><\/ol><p><strong>How to interpret the result:<\/strong><\/p><ul><li><p>If there are no matches, the status typically appears as \u201cgood news\u201d (often shown in green).<\/p><\/li><li><p>If there are matches, the result indicates that your email appears in one or more breaches (often shown in red).<\/p><\/li><\/ul><p>Important: If your email appears in a breach, it does <strong>not necessarily mean<\/strong> your current password is still the same as the leaked one. However, it is a clear signal to take action.<\/p><hr class=\"custom-cursor-default-hover\" \/><h2>Option 2: Review Saved Passwords in Chrome (Google Password Manager)<\/h2><p>Many people rely on their browser to store passwords. <strong>Chrome<\/strong> includes a built-in password manager with a security check feature that flags weak, reused, or compromised passwords.<\/p><p><strong>What to do:<\/strong><\/p><ol><li><p>Open the Passwords\/Security section in Chrome or access Google Password Manager.<\/p><\/li><li><p>Run the security check.<\/p><\/li><li><p>Follow the recommendations to change any affected passwords.<\/p><\/li><\/ol><p><strong>Advantage:<\/strong> This method is convenient and practical for non-technical users because it connects directly to the passwords already stored in the browser.<\/p><hr \/><h2>Option 3: Check in Safari \/ iPhone (Compromised Password Detection)<\/h2><p>In Apple environments, <strong>Safari<\/strong> and iCloud Keychain can automatically warn you about compromised passwords.<\/p><p>The logic is the same:<\/p><ol><li><p>Open the Passwords section in Settings (iPhone\/iPad) or Safari (Mac).<\/p><\/li><li><p>Check the Security Recommendations.<\/p><\/li><li><p>Change any passwords marked as compromised or vulnerable.<\/p><\/li><\/ol><p>This built-in system makes it easy to detect risks without needing external tools.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a671b0 elementor-widget elementor-widget-heading\" data-id=\"4a671b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Interpreting the Result (What \u201cAppears\u201d Actually Means \u2014 and What It Doesn\u2019t)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a6ede5 elementor-widget elementor-widget-text-editor\" data-id=\"6a6ede5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Knowing how to interpret the result prevents common mistakes like \u201cit doesn\u2019t appear, so everything is fine\u201d or \u201cit appears, so everything is lost.\u201d Neither assumption is accurate.<\/p><hr \/><h2>Case A: Your Email Appears in Breaches<\/h2><p>This means your email address is linked to a recorded data breach. The key here is to respond methodically:<\/p><ul><li><p>If the password associated with that service is still the same (or similar), the risk is high.<\/p><\/li><li><p>If that password was reused on other accounts, the risk increases significantly, because an attacker can test those credentials across multiple services (credential stuffing).<\/p><\/li><\/ul><p>The priority is containment: change the password on the affected service first, then on any other accounts where it was reused.<\/p><hr \/><h2>Case B: It Doesn\u2019t Appear, but There Are Warning Signs<\/h2><p>A \u201cno results\u201d status does <strong>not<\/strong> guarantee zero risk. There may still be:<\/p><ul><li><p>Recent breaches that haven\u2019t yet been added to public databases.<\/p><\/li><li><p>Phishing or malware attacks (without any public breach).<\/p><\/li><li><p>Password reuse on sites that haven\u2019t been detected.<\/p><\/li><\/ul><p>If there are warning signs (unusual logins, password change alerts, recovery info modifications), act immediately:<\/p><ol><li><p>Change the password.<\/p><\/li><li><p>Log out of all active sessions.<\/p><\/li><li><p>Enable two-factor authentication (2FA).<\/p><\/li><\/ol><p>Absence from a breach database does not override suspicious activity.<\/p><hr \/><h2>Case C: A Reused Password Appears (Highest-Risk Scenario)<\/h2><p>Password reuse is the single factor that multiplies damage the most.<\/p><p>If a leaked password was reused elsewhere, assume that <strong>every account where that password was used is at risk<\/strong>. Each one must be updated with a unique, strong password.<\/p><p>From a security perspective, this is no longer about one compromised service \u2014 it becomes an exposure cascade. The objective is to break that chain immediately.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9e19c6a elementor-widget elementor-widget-heading\" data-id=\"9e19c6a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What to Do If Your Password Has Been Exposed (10-Minute Checklist)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88ed6a8 elementor-widget elementor-widget-text-editor\" data-id=\"88ed6a8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This is the action plan that typically delivers the best results with the least effort. It\u2019s designed to be executed immediately.<\/p><hr \/><h2>1) Change the Password and Close Active Sessions<\/h2><ul><li><p>Change the password of the affected account to a <strong>unique, long password<\/strong> (ideally 12\u201316+ characters).<\/p><\/li><li><p>Look for options such as:<\/p><ul><li><p>\u201cLog out of all devices\u201d<\/p><\/li><li><p>\u201cActive sessions\u201d<\/p><\/li><li><p>\u201cConnected devices\u201d<\/p><\/li><\/ul><\/li><li><p>Terminate any sessions you don\u2019t recognize.<\/p><\/li><\/ul><p>This step is critical because changing a password does <strong>not always invalidate existing sessions automatically<\/strong>.<\/p><hr \/><h2>2) Enable 2FA\/MFA (Best Option Depending on the Case)<\/h2><p>Activating two-factor authentication significantly reduces the impact if someone knows your password.<\/p><p>Best practice:<\/p><ul><li><p>Prefer an authenticator app (more robust than SMS), such as Google Authenticator or Microsoft Authenticator.<\/p><\/li><li><p>Use SMS only if no stronger alternative is available.<\/p><\/li><li><p>Store recovery codes in a secure location.<\/p><\/li><\/ul><p>Security-focused guidance consistently treats this as a high-priority reinforcement measure.<\/p><hr \/><h2>3) Identify Where the Password Was Reused (High Priority)<\/h2><p>If password reuse is suspected:<\/p><p>Change passwords first on:<\/p><ul><li><p>Primary email account<\/p><\/li><li><p>Banking\/financial services<\/p><\/li><li><p>Social media<\/p><\/li><li><p>Payment platforms<\/p><\/li><\/ul><p>Then update:<\/p><ul><li><p>Online stores<\/p><\/li><li><p>Forums<\/p><\/li><li><p>Secondary services<\/p><\/li><\/ul><p>The core principle remains: a single breach can cascade into multiple account compromises if the same password was reused.<\/p><hr \/><h2>4) Review Access and Regain Full Control<\/h2><ul><li><p>Check for emails stating \u201cyour account was accessed\u201d or similar alerts.<\/p><\/li><li><p>Inspect your email settings for suspicious forwarding rules or automatic redirects.<\/p><\/li><li><p>Verify that recovery email and phone number have not been modified.<\/p><\/li><\/ul><p>If anything has been altered, prioritize securing your <strong>main email account first<\/strong>. In most ecosystems, email functions as the master recovery vector \u2014 effectively the key that allows password resets elsewhere.<\/p><hr \/><h3>Operational Objective<\/h3><p>This sequence focuses on:<\/p><ul><li><p>Session invalidation<\/p><\/li><li><p>Credential rotation<\/p><\/li><li><p>Attack surface reduction<\/p><\/li><li><p>Recovery channel protection<\/p><\/li><\/ul><p>Executed properly, it neutralizes the most common post-breach exploitation paths within minutes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-66279c4 elementor-widget elementor-widget-heading\" data-id=\"66279c4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">How to Prevent It from Happening Again (Without Overcomplicating Things)<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-978bf68 elementor-widget elementor-widget-text-editor\" data-id=\"978bf68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You don\u2019t need to become a cybersecurity expert. With <strong>three core habits<\/strong>, you can dramatically reduce your risk.<\/p><hr \/><h2>1\ufe0f\u20e3 Strong Passwords: A Simple Rule (Length + Uniqueness)<\/h2><p><strong>Long:<\/strong><br \/>A memorable passphrase is often better than a short, complex-looking password with random symbols.<\/p><p>Example logic:<\/p><ul><li><p>Longer = harder to brute-force.<\/p><\/li><li><p>Predictable structure = easier for you to remember.<\/p><\/li><\/ul><p><strong>Unique:<\/strong><br \/>One password per service \u2014 yes, even for \u201cunimportant\u201d accounts.<\/p><p>The reason is straightforward:<br \/>If one password leaks and it\u2019s reused, the compromise can spread across multiple platforms.<\/p><hr \/><h2>2\ufe0f\u20e3 Password Managers: Why They Help and How to Start<\/h2><p>A password manager allows you to:<\/p><ul><li><p>Generate long, unique passwords automatically.<\/p><\/li><li><p>Store them securely.<\/p><\/li><li><p>Eliminate mental \u201cpassword recycling.\u201d<\/p><\/li><\/ul><p>Common practical solutions include:<\/p><ul><li><p>Bitwarden<\/p><\/li><li><p>1Password<\/p><\/li><li><p>Google Password Manager<\/p><\/li><\/ul><p>How to begin (minimal friction approach):<\/p><ol><li><p>Install the manager.<\/p><\/li><li><p>Secure it with one strong master password.<\/p><\/li><li><p>Start updating passwords gradually \u2014 no need to fix everything in one day.<\/p><\/li><li><p>Prioritize email, banking, and primary accounts first.<\/p><\/li><\/ol><p>This single tool removes the biggest structural weakness: reuse.<\/p><hr \/><h2>3\ufe0f\u20e3 Passkeys: The Modern Alternative (Explained Simply)<\/h2><p>Passkeys are designed to reduce reliance on traditional passwords.<\/p><p>Instead of typing a password, authentication happens via:<\/p><ul><li><p>Device-based cryptographic keys.<\/p><\/li><li><p>Biometrics (Face ID, fingerprint) or device PIN.<\/p><\/li><\/ul><p>When a service supports passkeys, enabling them is usually a strong security upgrade \u2014 especially for critical accounts.<\/p><p>Major platforms like Google and Microsoft already support passkeys in many scenarios.<\/p><p><strong>Why they\u2019re safer:<\/strong><\/p><ul><li><p>They can\u2019t be reused across sites.<\/p><\/li><li><p>They\u2019re resistant to phishing.<\/p><\/li><li><p>There\u2019s no password to leak.<\/p><\/li><\/ul><hr \/><h2>The Bottom Line<\/h2><p>If you:<\/p><ul><li><p>Use long, unique passwords<\/p><\/li><li><p>Rely on a password manager<\/p><\/li><li><p>Activate passkeys when available<\/p><\/li><\/ul><p>You eliminate the most common real-world attack paths \u2014 without adding complexity to your daily life.<\/p><p>Security doesn\u2019t require expertise. It requires removing the obvious weaknesses.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1fce6b elementor-widget elementor-widget-heading\" data-id=\"f1fce6b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Common Mistakes That Leave the Door Open<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1609018 elementor-widget elementor-widget-text-editor\" data-id=\"1609018\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Changing Only One Account<\/h2><p>If a password was reused, changing it on just one account does <strong>not<\/strong> solve the problem.<\/p><p>An attacker can simply access another service where the same password is still active.<\/p><p>When reuse exists, the fix must be <strong>systemic<\/strong>: every account that used that password must be updated.<\/p><hr \/><h2>Reusing \u201cVariants\u201d of the Same Password<\/h2><p>Switching from:<\/p><ul><li><p><code>Summer2024!<\/code><br \/>to<\/p><\/li><li><p><code>Summer2025!<\/code><\/p><\/li><\/ul><p>is not meaningful protection.<\/p><p>Attackers routinely test predictable mutations:<\/p><ul><li><p>Year increments<\/p><\/li><li><p>Added symbols<\/p><\/li><li><p>Capitalization changes<\/p><\/li><\/ul><p>If there\u2019s a detectable pattern, automated tools will try it.<\/p><p>True protection requires <strong>completely different, unrelated passwords<\/strong>.<\/p><hr \/><h2>Storing Passwords in Insecure Places<\/h2><p>Common risky storage methods include:<\/p><ul><li><p>Unprotected notes apps<\/p><\/li><li><p>Shared documents (cloud drives, team folders)<\/p><\/li><li><p>Personal messaging threads<\/p><\/li><li><p>Plain text files on desktop<\/p><\/li><\/ul><p>These can be exposed through device compromise, account breaches, or accidental sharing.<\/p><p>A safer alternative is:<\/p><ul><li><p>A dedicated password manager (e.g., Bitwarden or 1Password)<\/p><\/li><li><p>The built-in system keychain (such as iCloud Keychain)<\/p><\/li><\/ul><p>The difference is structural: password managers encrypt data and are designed specifically for credential protection.<\/p><hr \/><h3>The Core Principle<\/h3><p>Security failures often persist not because of one weak point \u2014 but because the same weakness exists in multiple places.<\/p><p>Fixing the root pattern (reuse + insecure storage) removes the recurring risk.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afff898 elementor-widget elementor-widget-heading\" data-id=\"afff898\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aa01ce5 elementor-widget elementor-widget-text-editor\" data-id=\"aa01ce5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Knowing whether a password has been leaked shouldn\u2019t be dramatic or mysterious: you check your email with a reliable tool, review the passwords saved in your browser, and if there\u2019s any sign of exposure, you execute a clear action plan.<\/p><p>The single most effective long-term protection is simple: <strong>unique passwords + 2FA + a password manager<\/strong>. With that combination in place, even if a breach occurs, the overall impact is drastically reduced.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Data breaches happen. And they don\u2019t always come with a warning. That\u2019s why the most useful response isn\u2019t to panic, but to have a clear method to check and act within minutes. There\u2019s also a key detail that explains why this matters so much: reusing the same password across multiple websites turns a \u201csmall\u201d breach [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3685,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34],"tags":[],"class_list":["post-3687","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3687","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/comments?post=3687"}],"version-history":[{"count":3,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3687\/revisions"}],"predecessor-version":[{"id":3690,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/posts\/3687\/revisions\/3690"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media\/3685"}],"wp:attachment":[{"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/media?parent=3687"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/categories?post=3687"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/trustlab.upct.es\/en\/wp-json\/wp\/v2\/tags?post=3687"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}