lunes, 11 de junio de 2007

El empaquetado es la técnica más usada en el ocultamiento de malware


UPX, que apareció en un 15% de los casos, es el empaquetador más utilizado, seguido de PECompact y PE, que son utilizados por el 10% de los creadores de malware.


El 78% del nuevo malware usa algún tipo de empaquetado para impedir que las soluciones de seguridad puedan detectarlos. Así se desprende de un estudio realizado por PandaLabs.

Un packer o empaquetador es un programa que se utiliza para reducir el tamaño de un archivo ejecutable, generalmente, mediante la compresión del mismo. Ahora bien, ese mismo programa puede ser utilizado para proteger las copias que algunos códigos maliciosos dejan en los equipos o para hacerlos más difíciles de detectar por las soluciones antivirus durante su distribución.

Hay muchos programas empaquetadores. El más usado, según el estudio de PandaLabs, es UPX que aparece en un 15% del malware analizado. PECompact y PE, ambos con un 10%, son otros de los programas más utilizados para esta labor.

“Es, en definitiva, una técnica de ocultación. El uso, cada vez mayor, de este tipo de programas pone de manifiesto el interés de los criminales de la red porque sus creaciones pasen lo más desapercibidas posible", explica Luis Corrons, Director Técnico de PandaLabs.

En muchas ocasiones, además, estas herramientas permiten a los ciberdelincuentes unir en un solo archivo varios ficheros maliciosos. Esto, además de dificultar la detección, permite a un código malicioso descargar copias de otros ejemplares de una manera más efectiva.

“El problema es cuándo detectar estos códigos maliciosos. La mayoría están empaquetados con programas legales, por lo que no se puede discriminar entre goodware y malware sólo por el empaquetador utilizado. Entonces ¿cuál es la solución? En el caso de los correos, hay que contar con un sistema que detenga estos emails antes de llegar al PC. Por otro, las soluciones de seguridad han de ser capaces de detectar el malware empaquetado, antes de que el usuario lo ejecute", asegura Corrons.

Seguimos avanzando

Intel presenta chipsets ‘3 series’

Los chipsets Intel 3 Series permiten a los usuarios agregar hasta seis unidades externas a una PC para protección de datos y desempeño adicionales.

En su discurso de apertura en la exhibición de computadoras Computex, Sean Maloney, vicepresidente ejecutivo de Intel Corporation, dio a conocer la nueva familia de chipsets Intel 3 Series, junto con otros planes de tecnología que rodean a los procesadores Intel Core 2 Duo y Quad de la compañía para usuarios de PCs para el hogar y los negocios.

“Hay mucha emoción y anticipación de nuestros procesadores Hi-k de 45 nm de próxima aparición basados en la micro arquitectura Intel Core", señaló Maloney. “Los chipsets Intel 3 Series sientan las bases para una experiencia emocionante con medios enriquecidos para los sistemas actuales y los que salgan al mercado más tarde en este año".

Maloney dio a conocer también los planes para producir un procesador móvil Intel Core 2 Extreme que será presentado por Intel en el tercer trimestre de este año. El plan se presenta después de la aparición de la marca Extreme Edition de la compañía para PCs de escritorio en el 2003 y la extiende a laptops, que continúa siendo el segmento del mercado de la computación de más rápido crecimiento. El chip de próxima aparición está pensado para ser el procesador Dual-Core móvil de más alto desempeño de la compañía que aún integra características de ahorro de energía para diseños compatibles con notebooks.

Los chipsets Intel 3 Series admiten memoria DDR2 hasta de 800 MHz o bien memoria DDR3 con velocidades de transferencia de datos de hasta 1,333 MHz, lo que hace posible un acceso a alta velocidad a archivos y una PC con mayor capacidad de respuesta. Asimismo, los chipsets son compatibles con el estándar PCI Express 2.0, que duplica el ancho de banda disponible para tarjetas gráficas y que están diseñados para ser compatibles con Intel Turbo Memory.

Bueno Xbox incorporará control similar al de Wii

En el marco de una presentación conjunta con Steve Jobs, Bill Gates reveló que Xbox incorporará a futuro un sensor de movimientos

Durante una conversación pública sostenida con Steve Jobs en el marco de la feria All Things Digital, Bill Gates indicó que Microsoft trabaja en el desarrollo de un controlador sensible al movimiento, que será incorporado a futuras versiones de la consola Xbox.

Sin embargo, Gates no admite que el controlador será similar al de Wii. Anteriormente, Microsoft ha criticado la consola de Nintendo llegando incluso a la ridiculización.

"No, no tienen nada que ver. No puedes coger tu raqueta de tenis y jugar con ella. No puedes estar sentado con tus amigos y hacer cosas totalmente naturales", indicó Gates.

Tecnología intuitiva
Gates precisa que mientras Wii está basada en un esquema de posicionamiento 3D, Microsoft habla de un controlador con reconocimiento de video; es decir, una cámara que visualiza e interpreta imágenes para hacerse una idea de lo que está ocurriendo.

Si la visión esbozada por Gates se hace realidad, la solución interactiva del futuro consistirá de una cámra que verá al usuario portando una raqueta de tenis, y "entenderá" que este desea jugar.

jueves, 7 de junio de 2007

Creating a Home or Small Office Server Using Apple's AirPort Extreme Base Station

The latest generation of Apple’s AirPort Extreme base station truly deserves the word extreme in its name. It is one of the first 802.11n wireless routers on the market and it delivers incredible performance when paired with a Mac (or PC) featuring 802.11n support, as well as a much wider range than previous models. Speed isn’t the only reason why the $179 base station is extreme. The device is actually much more than a wireless router. It includes a USB port that can be used to wirelessly share printers or even hard drives.

For home users or small business owners, this amazing combination of features for a relatively low price point is a great tool. Many small businesses need a solution for sharing files, but don’t have the need or resources to set up a full-blown server. While network-attached storage devices are also an option, they are often more expensive, and many don’t offer easy Mac-friendly setup tools.

Easy Setup

Installing the new base station is a fairly simple process—even more so than Apple’s previous base stations. Like past preceding models, the base station is configured by using an application rather than a web-based interface, which is used with most home or small office routers. Unlike earlier base stations, which have shipped with both a setup assistant and more advanced administration tool, the newest AirPort Extreme base station ships with a single tool called AirPort Utility (a version is included for both Mac OS X and Windows) that can also be used to manage previous generations of base stations including the highly portable AirPort Express. Although it is a single utility, AirPort Utility offers both a guided setup interface that is easy to navigate, even for users with limited technical or network experience.

Sharing Hard Drives

Using the AirPort Extreme base station as a file server provides a great solution for families as well as small office users. It can provide a space for shared files as well as a space for backups. Using a USB hub, you can attach multiple hard drives, enabling you to easily expand your storage needs.

Although the base station can act as a file server for attached hard drive, you will need to first format the drive using a computer. The base station can access drives formatted by either a Mac or Windows, but they must be formatted as Mac OS X Extended or FAT 32, respectively. Once a drive is formatted, simply attach it to the base station’s USB port (or an attached USB hub).

Attached drives are automatically detected and shared. By default, hard drives are shared with the same password used to configure the base station. You can, however, choose to use a separate password to allow access to the shared drive(s). (This is a good idea if you don’t want your kids or employees to be able to change the base station’s configuration.) Or you can set up individual user accounts. You can also choose to allow guest access so that anyone on your network has access to the disk (and you can specify whether guests have read and write or read-only access).

When using user accounts, you also can specify whether users have no access, read-only access, or full read and write access to shared drives. If you use user accounts, a Users folder is created at the root level of the shared drive. Each user account that you create is assigned a user folder that only that user can access. This procedure provides an easy solution to giving users private storage space and preventing one user from deleting another user’s files.

In addition to sharing files on the network (wired and wireless) that is created by the base station, there is the option of sharing files over the base station’s WAN port (the one that connects to your Internet connection). If your base station is part of a larger network (such as in a school or business environment), this is a great feature because it allows you to enable access to other people connected to that larger network. It can also be used if you are not part of a larger network and want to access your shared hard drive from another location via the Internet (you simply need the IP address that the base station receives from your Internet provider, which can be found on then Internet tab of its configuration dialog box).

Choosing to make your shared hard drive available over the Internet poses security risks, however. Depending on your Internet connection, simply turning this option on can make your shared drive visible to a large number of people using the same provider. This is why you should never enable the Advertise Disks Globally option using Bonjour (Apple’s zero-configuration network technology) if you choose to share your hard drive in this manner. Ensure that guest access is turned off; you should use either a separate disk password or user accounts to secure hard drives, which can offer some security for your base station’s configuration password if someone uses a password-cracking tool to access your shared hard drive. If you do use this option, you should also use it sparingly and disable it whenever you don’t need to provide remote access.

Being a cross-platform device, the base station can share disks with both Macs and Window PCs (regardless of the format of the drive). This is a great touch because many homes and offices have both Macs and PCs. It truly makes the base station a one-stop solution, even if you have a single Mac and multiple PCs or—even no Mac at all.

Connecting to Shared Disks

Apple includes an AirPort Disk Utility that can be used to access shared hard drives. You can also find them by browsing your network as you would to find other file servers or computers with file sharing enabled. The AirPort Disk Utility includes a menu bar indicator for Mac OS X and, by default, automatically detects (and attempts to connect to) any shared hard drives. If you choose to manually browse for shared drives and you are using a password instead of user accounts, you are prompted for a user name and password when connecting. Simply leave the user name section of the dialog box blank.

Sharing Printers

Like AirPort Express, the current AirPort Extreme base station can be used to share attached USB printers. The process is even easier than sharing a hard drive. Simply attach the printer, and the base station makes it available. Computers can locate and access the printer via Bonjour. You can elect to set up the printer using Mac OS X’s Printer Setup Utility or choose it from the Print dialog box’s Printer menu (you’ll find it in the Bon Jour Printers submenu). Windows computers can locate and use printers via Apple’s Bonjour for Windows.

As with shared hard drives, you can also elect to share the printer over the base station’s WAN port, and the base station can support multiple printers through the use of a USB hub. A mix of shared printers and hard drives is also supported when using a USB hub.


Introduction to Technical Analysis

Technical analysis. These words may conjure up many different mental images. Perhaps you think of the stereotypical technical analyst, alone in a windowless office, slouched over stacks of hand-drawn charts of stock prices. Or, maybe you think of the sophisticated multicolored computerized chart of your favorite stock you recently saw. Perhaps you begin dreaming about all the money you could make if you knew the secrets to predicting stock prices. Or, perhaps you remember sitting in a finance class and hearing your professor say that technical analysis "is a waste of time." In this book, we examine some of the perceptions, and misperceptions, of technical analysis.

If you are new to the study of technical analysis, you may be wondering just what technical analysis is. In its basic form, technical analysis is the study of past market data, primarily price and volume data; this information is used to make trading or investing decisions. Technical analysis is rooted in basic economic theory. Consider the basic assumptions presented by Robert D. Edwards and John Magee in the classic book, Technical Analysis of Stock Trends:

  • Stock prices are determined solely by the interaction of demand and supply.
  • Stock prices tend to move in trends.
  • Shifts in demand and supply cause reversals in trends.
  • Shifts in demand and supply can be detected in charts.
  • Chart patterns tend to repeat themselves.

Technical analysts study the action of the market itself rather than the goods in which the market deals. The technical analyst believes that "the market is always correct." In other words, rather than trying to consider all the factors that will influence the demand for Gadget International's newest electronic gadget and all the items that will influence the company's cost and supply curve to determine an outlook for the stock's price, the technical analyst believes that all of these factors are already factored into the demand and supply curves and, thus, the price of the company's stock.

Students new to any discipline often ask, "How can I use the knowledge of this discipline?" Students new to technical analysis are no different. Technical analysis is used in two major ways: predictive and reactive. Those who use technical analysis for predictive purposes use the analysis to make predictions about future market moves. Generally, these individuals make money by selling their predictions to others. Market letter writers in print or on the web and the technical market gurus who frequent the financial news fall into this category. The predictive technical analysts include the more well-known names in the industry; these individuals like publicity because it helps market their services.

On the other hand, those who use technical analysis in a reactive mode are usually not well known. Traders and investors use techniques of technical analysis to react to particular market conditions to make their decisions. For example, a trader may use a moving average crossover to signal when a long position should be taken. In other words, the trader is watching the market and reacting when a certain technical condition is met. These traders and investors are making money by making profitable trades for their own or clients' portfolios. Some of them may even find that publicity distracts them from their underlying work.

The focus of this book is to explain the basic principles and techniques for reacting to the market. We do not attempt to predict the market, nor do we provide you with the Holy Grail or a promise of a method that will make you millions overnight. Instead, we want to provide you with background, basic tools, and techniques that you will need to be a competent technical analyst.

As we will see when we study the history of technical analysis, the interest in technical analysis in the U.S. dates back over 100 years, when Charles H. Dow began writing newsletters that later turned into the Wall Street Journal and developing the various Dow averages to measure the stock market. Since that time, much has been written about technical analysis. Today, there are entire periodicals, such as Technical Analysis of Stock and Commodities and the Journal of Technical Analysis, devoted to the study of the subject. In addition, there are many articles appearing in other publications, including academic journals. There are even a number of excellent books on the market. As you can see from this book's extensive bibliography, which is in no way a complete list of every published item on technical analysis, a massive quantity of material about technical analysis exists.

So, why does the world need another book on technical analysis? We began looking through the multitude of materials on technical analysis a few years ago, searching for resources to use in educational settings. We noticed that many specialized books existed on the topic, but there was no resource to provide the student of technical analysis with a comprehensive summation of the body of knowledge. We decided to provide a coherent, logical framework for this material that could be used as a textbook and a reference book.

Our intent in writing this book is to provide the student of technical analysis, whether a novice college student or an experienced practitioner, with a systematic study of the field of technical analysis. Over the past century, much has been written about the topic. The classic works of Charles Dow and the timeless book by Edwards and Magee still contain valuable information for the student of technical analysis. The basic principles of these early authors are still valid today. However, the evolving financial marketplace and the availability of computer power have led to a substantial growth in the tools and information available to the technical analyst.

Many technical analysts have learned their trade from the mentors with whom they have worked. Numerous individuals who are interested in studying technical analysis today, however, do not have access to such a mentor. In addition, as the profession has advanced, many specific techniques have developed. The result is that the techniques and methods of technical analysis often appear to be a hodge-podge of tools, ideas, and even folklore, rather a part of a coherent body of knowledge.

Many books on the market assume a basic understanding of technical analysis or focus on particular financial markets or instruments. Our intent is to provide the reader with a basic reference to support a life-long study of the discipline. We have attempted to provide enough background information and terminology that you can easily read this book without having to refer to other references for background information. We have also included a large number of references for further reading so that you can continue learning in the specialized areas that interest you.

Another unique characteristic of this book is the joining of the practitioner and the academic. Technical analysis is widely practiced, both by professional traders and investors and by individuals managing their own money. However, this widespread practice has not been matched by academic acknowledgment of the benefits of technical analysis. Academics have been slow to study technical analysis; most of the academic studies of technical analysis have lacked a thorough understanding of the actual practice of technical analysis. It is our hope not only to bring together a practitioner-academic author team but also to provide a book that promotes discussion and understanding between these two groups.

Whether you are a novice or experienced professional, we are confident that you will find this book helpful. For the student new to technical analysis, this book will provide you with the basic knowledge and building blocks to begin a life-long study of technical analysis. For the more experienced technician, you will find this book to be an indispensable guide, helping you to organize your knowledge, question your assumptions and beliefs, and implement new techniques.

We begin this book with a look at the background and history of technical analysis. In this part, we discuss not only the basic principles of technical analysis but also the technical analysis controversy—the debate between academics and practitioners regarding the efficiency of financial markets and the merit of technical analysis. This background information is especially useful to those who are new to technical analysis and those who are studying the subject in an educational setting. For those with more experience with the field or with little interest in the academic arguments about market efficiency, a quick reading of this first part will probably suffice.

In the second part of the book, we focus on markets and market indicators. Chapter 5, "An Overview of Markets," provides a basic overview of how markets work. Market vocabulary and trading mechanics are introduced in this chapter. For the student who is unfamiliar with this terminology, a thorough understanding of this chapter will provide the necessary background for the remaining chapters. Our focus in Chapter 6, "Dow Theory," is on the development and principles of Dow Theory. Although Dow Theory was developed a century ago, much of modern-day technical analysis is based on these classic principles. A thorough understanding of these timeless principles helps keep the technical analyst focused on the key concepts that lead to making money in the market. In Chapter 7, "Sentiment," we focus on sentiment; the psychology of market players is a major concept in this chapter. In Chapter 8, "Measuring Market Strength," we discuss methods for gauging overall market strength. Chapter 9, "Temporal Patterns and Cycles," focuses on temporal tendencies, the tendency for the market to move in particular directions during particular times, such as election year cycles and seasonal stock market patterns. Because the main fuel for the market is money, Chapter 10, "Flow of Funds," focuses on the flow of funds. In this chapter, we look at measures of market liquidity and how the Federal Reserve can influence liquidity.

The third part of the book focuses on trend analysis. In many ways, this part can be thought of as the heart of technical analysis. If we see that the market is trending upward, we can profitably ride that trend upward. If we determine that the market is trending downward, we can even profit by taking a short position. In fact, the most difficult time to profit in the market is when there is no definitive upward or downward trend. Over the years, technical analysts have developed a number of techniques to help them visually determine when a trend is in place. These charting techniques are the focus of Chapter 11, "History and Construction of Charts." In Chapter 12, "Trends—The Basics," we discuss how to draw trend lines and determine support and resistance lines using these charts. In Chapter 13, "Breakouts, Stops, and Retracements," we focus on determining breakouts. These breakouts will help us recognize a trend change as soon as possible. We also discuss the importance of protective stops in this chapter. Moving averages, a useful mathematical technique for determining the existence of trends, are presented in Chapter 14, "Moving Averages."

The fourth part of this book focuses on chart pattern analysis—the item that first comes to mind when many people think of technical analysis. In Chapter 15, "Bar Chart Patterns," we cover classic bar chart patterns; in Chapter 16, "Point-and-Figure Chart Patterns," we focus on point-and-figure chart patterns. Short-term patterns, including candlestick patterns, are covered in Chapter 17, "Short-Term Patterns."

Part V, "Trend Confirmation," deals with the concept of confirmation. We consider price oscillators and momentum measures in Chapter 18, "Confirmation." Building upon the concept of trends from earlier chapters, we look at how volume plays a role in confirming the trend, giving us more confidence that a trend is indeed occurring.

Next, we turn our attention to the relationship between cycle theory and technical analysis. In Chapter 19, "Cycles," we discuss the basic principles of cycle theory and the characteristics of cycles. Some technical analysts believe that cycles seen in the stock market have a scientific basis; for example, R. N. Elliott claimed that the basic harmony found in nature occurs in the stock market. Chapter 20, "Elliott, Fibonacci, and Gann," introduces the basic concepts of Elliott Wave Theory, a school of thought that adheres to Elliott's premise that stock price movements form discernible wave patterns.

Once we know the basic techniques of technical analysis, the question becomes, "Which particular securities will we trade?" Selection decisions are the focus of Chapter 21, "Selection of Markets and Issues: Trading and Investing." In this chapter, we discuss the intermarket relationships that will help us determine on which market to focus by determining which market is most likely to show strong performance. We also discuss individual security selection, measures of relative strength, and how successful practitioners have used these methods to construct portfolios.

As technical analysts, we need methods of measuring our success. After all, our main objective is making money. Although this is a straightforward objective, determining whether we are meeting our objective is not quite so straightforward. Proper measurement of trading and investment strategies requires appropriate risk measurement and an understanding of basic statistical techniques. The last couple of chapters help put all the tools and techniques we present throughout the book into practice. Chapter 22, "System Design and Testing," is devoted to developing and testing trading systems. At this point, we look at how we can test the tools and indicators covered throughout the book to see if they will make money for us—our main objective—in the particular way we would like to trade. Finally, Chapter 23, "Money and Risk Management," deals with money management and avoiding capital loss.

For those who need a brush-up in basic statistics or wish to understand some of the statistical concepts introduced throughout the book, Dr. Richard J. Bauer, Jr.(Professor of Finance, Bill Greehey School of Business, St. Mary's University, San Antonio, TX) provides a tutorial on basic statistical techniques of interest to the technical analyst in Appendix A, "Basic Statistics"

For those who are unfamiliar with the terms and language used in trading, Appendix B provides brief definitions of specific order types and commonly used terms in order entry.

As with all skills, learning technical analysis requires practice. We have provided a number of review questions and problems at the end of the chapters to help you begin thinking about and applying some of the concepts on your own. The extensive bibliography will direct you to further readings in the areas of technical analysis that are of particular interest to you.

Another way of honing your technical skills is participating in a professional organization that is focused on technical analysis. In the United States, the Market Technicians Association (MTA) provides a wide variety of seminars, lectures, and publications for technical analysis professionals. The MTA also sponsors the Chartered Market Technician (CMT) program. Professionals wishing to receive the prestigious CMT designation must pass three examinations and adhere to a strict code of professional conduct. More information about the MTA and the CMT program may be found at the web site: www.mta.org. The International Federation of Technical Analysts, Inc. (IFTA) is a global organization of market analysis societies and associations. IFTA, and its member associations worldwide, sponsor a number of seminars and publications. IFTA offers a professional certification, the Certified Financial Technician, and a Masters-level degree, the Master of Financial Technical Analysis. The details of these certifications, along with contact information for IFTA's member associations around the world, can be found at their web site: www.ifta.org.

Technical analysis is a complex, ever-expanding discipline. The globalization of markets, the creation of new securities, and the availability of inexpensive computer power are opening even more opportunities in this field. Whether you use the information professionally or for your own personal trading or investing, we hope that this book will serve as a stepping-stone to your study and exploration of the field of technical analysis.

Bien para diseñadores

Ya esta disponible Plug-In de Photoshop para Google 3D Warehouse

Google 3D Warehouse es un servicio gratuito de Google que permite la búsqueda y descarga de modelos y contenido 3D por medio de exploradores Web estándar y ahora, con este plug-in, también desde Photoshop CS3 Extended.

Adobe Systems y Google anunciaron el plug-in de Photoshop CS3 Extended para Google 3D Warehouse, para permitir a los usuarios de Adobe aprovechar el conjunto de herramientas para composición, pintura y edición de imágenes de contenido 3D.

Con el plug-in, los usuarios podrán escoger y descargar contenido 3D gratuito desde Google 3D Warehouse, el depósito online gratuito de Google para modelos y contenido 3D, directamente desde Photoshop CS3 Extended. Una vez descargado, el contenido 3D puede ser ubicado, manipulado.

“Estamos felices de trabajar con Adobe en el plug-in de Photoshop Extended para Google 3D Warehouse. Con este plug-in, los usuarios de Photoshop CS3 Extended pueden participar en la comunidad de 3D Warehouse, con la habilidad para buscar, almacenar y compartir miles de modelos y contenido 3D", dijo Mark Limber, gerente de producto en Google.

“Nuestro trabajo con Google ofrece contenido 3D directamente a la experiencia Photoshop CS3 Extended, permitiendo mayor eficacia de edición y enriqueciendo el proceso de visualización en general", dijo Kevin Connor, director senior de administración de producto para Productos de Imagen Digital Profesional en Adobe.

y Donde estan los antirus.

Señores tantos parches y tantas actualizaciones para nada a pesar de tener antivirus se ha determinado que Un 58% de los usuarios tiene malware en su ordenador.

La web de la campaña de Panda ha recibido más de 30.000 denuncias referidas a 194 casos de phishing y más de 200 ofertas de trabajo falsas.

Un 58% de los usuarios que han analizado sus ordenadores con NanoScan beta y TotalScan beta durante la “2ª campaña contra el fraude online y por la seguridad en la red" tenía malware en su ordenador.

Otro dato importante recogido durante los más de dos meses que ya dura la campaña refleja que el 54% de los PC que contaban con una solución de seguridad instalada y actualizada estaban infectados. Esta cifra aumenta hasta el 65% en el caso de los ordenadores sin ningún tipo de protección.

“Esto no significa que las soluciones de seguridad fallen, lo que significa es que no son suficiente y deben ser complementadas con herramientas que sean capaces de detectar más malware", explica José María Hernández, Vicepresidente de Expansión Internacional de Panda Software.

El 33% de todos los usuarios que analizaron sus ordenadores con algunas de las herramientas online de Panda Software tenía adware en su ordenador. Además, un 27% de ellos tenía troyanos y un 7% estaba infectado con spyware.

Durante el tiempo que lleva activa, la campaña ha registrado más de 190 casos de phishing. Los bancos que más veces han sido suplantados han sido, a nivel español, Banesto (56 veces), Banco Popular (30) y Grupo Santander (24); y a nivel mundial, BB&T (72 veces), Barclays (64) y Bank of America (49).

Además, se han registrado 104 casos de loterías falsas y más de 200 falsas ofertas de trabajo. Una de esas ofertas, detectada la última semana, era especialmente peligrosa, ya que simulaba venir de la Comisión de Empleo de la UE.
Búsqueda personalizada