{"id":91514,"date":"2024-10-07T11:00:00","date_gmt":"2024-10-07T09:00:00","guid":{"rendered":"https:\/\/blog.mailfence.com\/spam-vs-phishing-cual-es-la-diferencia\/"},"modified":"2025-09-17T12:01:50","modified_gmt":"2025-09-17T10:01:50","slug":"spam-vs-phishing-cual-es-la-diferencia","status":"publish","type":"post","link":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/","title":{"rendered":"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia?"},"content":{"rendered":"\n<p>Spam vs. phishing: \u00bfconoce la diferencia? Cada d\u00eda se hace p\u00fablica <a href=\"https:\/\/www.varonis.com\/blog\/data-breach-statistics\" target=\"_blank\" rel=\"noreferrer noopener\">una nueva violaci\u00f3n o filtraci\u00f3n de datos<\/a>. Esto significa que, por desgracia, la mayor\u00eda de nuestras direcciones de correo electr\u00f3nico est\u00e1n ahora disponibles libremente en la \u00abdark web\u00bb, lo que las convierte en un blanco f\u00e1cil para el spam y los intentos de phishing.<\/p>\n\n\n\n<p>En esta gu\u00eda, trataremos todo lo que necesita saber sobre el spam vs. el phishing, qu\u00e9 los diferencia y c\u00f3mo evitar ser v\u00edctima de uno de ellos. \u00a1Empecemos!<\/p>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100846\" class=\"elementor elementor-100846 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence &#8211; Su paquete de productividad seguro<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recupere su privacidad con<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Mensajes<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Calendarios<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Documentos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Grupos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/es\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Obtener Mailfence gratis<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-que-es-el-spam\">\u00bfQu\u00e9 es el spam?<\/h2>\n\n\n\n<p>El correo basura (o \u00abcorreo basura\u00bb, o \u00abspamming\u00bb) se refiere a los correos electr\u00f3nicos no solicitados.<\/p>\n\n\n\n<p><strong>Estos mensajes son en su mayor\u00eda promocionales y est\u00e1n dirigidos a impulsar productos o servicios.<\/strong><\/p>\n\n\n\n<p>Los correos basura pueden ser desde una simple molestia hasta comprometer realmente su seguridad. De hecho, a veces pueden contener enlaces da\u00f1inos o malware (lo que podr\u00eda convertirlos en un intento de phishing, pero hablaremos de ello m\u00e1s adelante).<\/p>\n\n\n\n<p>Es importante tener en cuenta que el correo spam es una noci\u00f3n subjetiva. Lo que algunos consideran \u00abspam\u00bb puede no serlo para otros. T\u00e9cnicamente, el correo spam se refiere a los correos electr\u00f3nicos <em>no solicitados<\/em>. Sin embargo, el t\u00e9rmino ha adquirido un significado m\u00e1s amplio en los \u00faltimos a\u00f1os. Veamos un ejemplo:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing1.jpg\" alt=\"Spam vs Phishing - Imagen 1\" class=\"wp-image-90579\" style=\"width:566px;height:auto\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing1.jpg 600w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing1-300x300.jpg 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing1-150x150.jpg 150w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><figcaption class=\"wp-element-caption\"><em>Correos electr\u00f3nicos que he recibido despu\u00e9s de suscribirme a un bolet\u00edn de noticias<\/em><\/figcaption><\/figure>\n\n\n\n<p>En este ejemplo, me suscrib\u00ed a <a href=\"http:\/\/go.tim.blog\/5-bullet-friday-1\/\" target=\"_blank\" rel=\"noreferrer noopener\">un popular bolet\u00edn de Tim Ferris<\/a>. Sin embargo, al cabo de un tiempo, dej\u00e9 de leer los correos que recib\u00eda. Ahora podr\u00eda considerar a este remitente \u00abspam\u00bb, aunque inicialmente me hubiera suscrito a sus correos electr\u00f3nicos.  <\/p>\n\n\n\n<p>Del mismo modo, cuando pide un producto en un sitio web nuevo, puede que (sin saberlo) acepte recibir sus correos electr\u00f3nicos de marketing, boletines informativos, noticias sobre productos, etc. En este caso, aunque t\u00e9cnicamente se haya suscrito a esos correos electr\u00f3nicos, podr\u00eda considerarlos r\u00e1pidamente como spam.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ejemplo-de-correo-spam\">Ejemplo de correo spam<\/h3>\n\n\n\n<p><strong>Por \u00faltimo, est\u00e1 el caso de los correos electr\u00f3nicos verdaderamente no solicitados.<\/strong><\/p>\n\n\n\n<p>Esto ocurre cuando <a href=\"https:\/\/blog.mailfence.com\/es\/la-privacidad-en-internet-es-importante\/\" target=\"_blank\" rel=\"noreferrer noopener\">sus datos se filtran o se comparten<\/a> con anunciantes. Entonces empieza a recibir correos electr\u00f3nicos de remitentes de los que nunca ha o\u00eddo hablar. En el 99% de los casos, estos correos quieren venderle algo. O pueden pedirle alg\u00fan tipo de colaboraci\u00f3n.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"706\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1024x706.png\" alt=\"Spam vs Phishing - Un ejemplo cl\u00e1sico de correo basura\" class=\"wp-image-90573\" style=\"width:753px;height:auto\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1024x706.png 1024w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-300x207.png 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-768x530.png 768w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image.png 1125w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\"><em>Un ejemplo cl\u00e1sico de correo basura<\/em><\/figcaption><\/figure>\n\n\n\n<p>\u00bfEn resumidas cuentas? Los correos spam pueden ser irritantes, pero no deben confundirse con verdaderas estafas o intentos de phishing. Esto es lo que vamos a explorar en la siguiente secci\u00f3n.  <\/p>\n\n\n\n<p><em>Consulte esta gu\u00eda para saber m\u00e1s sobre <a href=\"https:\/\/blog.mailfence.com\/es\/respondiendo-a-tus-comentarios-una-actualizacion-antispam\/\" target=\"_blank\" rel=\"noreferrer noopener\">c\u00f3mo Mailfence gestiona los correos spam<\/a>.<\/em><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-que-es-el-phishing\">\u00bfQu\u00e9 es el phishing?<\/h2>\n\n\n\n<p>El phishing es un tipo de ataque dise\u00f1ado para enga\u00f1ar a las personas para que compartan datos personales como:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>contrase\u00f1as;<\/li>\n\n\n\n<li>datos financieros<\/li>\n\n\n\n<li>u otra informaci\u00f3n confidencial.<\/li>\n<\/ul>\n\n\n\n<p><strong>El t\u00e9rmino phishing viene del t\u00e9rmino en ingl\u00e9s \u00abfishing\u00bb, que significa literalmente \u00abpescar\u00bb. Los atacantes atraen a la gente a trampas, de forma similar a como se atrapa a los peces con cebo.<\/strong><\/p>\n\n\n\n<p>El uso de \u00abph\u00bb en lugar de \u00abf\u00bb probablemente tiene su origen en la cultura hacker, donde las graf\u00edas alternativas eran habituales.<\/p>\n\n\n\n<p>Los ataques de phishing a menudo parecen proceder de fuentes fiables, como bancos o servicios online populares, pero en realidad est\u00e1n dise\u00f1ados por ciberdelincuentes para robar su informaci\u00f3n. Los ataques de phishing se basan en crear urgencia o p\u00e1nico para manipular a las v\u00edctimas para que hagan clic en enlaces da\u00f1inos o compartan datos confidenciales.<\/p>\n\n\n\n<p><strong>Tenemos una <a href=\"https:\/\/blog.mailfence.com\/es\/que-es-el-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\">gu\u00eda completa sobre c\u00f3mo detectar los ataques de phishing por correo electr\u00f3nico<\/a>, pero esto es lo que debe saber:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Un atacante env\u00eda una cantidad masiva de correos electr\u00f3nicos a personas al azar. Estos mensajes son todos id\u00e9nticos y contienen un enlace que apunta a <a href=\"https:\/\/blog.mailfence.com\/es\/que-es-el-spoofing-de-correo-electronico-y-como-identificarlo\/\" target=\"_blank\" rel=\"noreferrer noopener\">un sitio web falso<\/a> para inducir al lector a dejar sus credenciales; <br><\/li>\n\n\n\n<li>Un ataque de phishing suele incluir amenazas de que cerrar\u00e1n una cuenta suya si no toma medidas. O puede decirle que su seguridad se ha visto comprometida de alg\u00fan modo; <br><\/li>\n\n\n\n<li>En caso de que reciba un mensaje de una organizaci\u00f3n de confianza, compruebe dos veces la direcci\u00f3n de correo electr\u00f3nico del remitente. El atacante podr\u00eda estar utilizando una variaci\u00f3n muy sutil basada en la direcci\u00f3n de correo electr\u00f3nico leg\u00edtima de la organizaci\u00f3n.<\/li>\n<\/ul>\n\n\n\n<p>Los esquemas modernos de phishing <a href=\"https:\/\/supertokens.com\/blog\/phishing-attacks-in-2024\" target=\"_blank\" rel=\"noreferrer noopener\">son cada vez m\u00e1s sofisticados<\/a>, imitando la apariencia de comunicaciones leg\u00edtimas hasta un grado inquietante. Por eso es crucial que compruebe dos veces cualquier enlace antes de hacer clic en \u00e9l (pero hablaremos de ello m\u00e1s adelante).<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-diferencias-clave-de-spam-vs-phishing\">Diferencias clave de spam vs. phishing<\/h2>\n\n\n\n<p>Aunque el spam y el phishing pueden parecer similares, se diferencian en varios aspectos importantes.<\/p>\n\n\n\n<p><strong>En cuanto a los objetivos, los correos spam est\u00e1n dise\u00f1ados con fines publicitarios. Suelen ser poco sofisticados e intentan llegar al mayor n\u00famero posible de personas sin una orientaci\u00f3n espec\u00edfica. <\/strong><\/p>\n\n\n\n<p>Por otra parte, el phishing es una forma de ataque mucho m\u00e1s selectiva y malintencionada. Por ejemplo, la <a href=\"https:\/\/www.twingate.com\/blog\/tips\/ledger-data-breach\" target=\"_blank\" rel=\"noreferrer noopener\">famosa filtraci\u00f3n de datos de Ledger<\/a> expuso las direcciones de correo electr\u00f3nico de miles de titulares de criptomonedas. Estas personas fueron objeto de varios ataques de phishing centrados en la criptomoneda. He aqu\u00ed un ejemplo:<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"992\" height=\"845\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1.png\" alt=\"Spam vs Phishing - Ejemplo de ataque de phishing contra criptomonedas\" class=\"wp-image-90585\" style=\"width:669px;height:auto\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1.png 992w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1-300x256.png 300w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-1-768x654.png 768w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\" \/><figcaption class=\"wp-element-caption\"><em>Ejemplo de ataque de phishing contra criptomonedas<\/em><\/figcaption><\/figure>\n\n\n\n<p>Como puede ver, este tipo de ataque puede ser muy refinado en cuanto a su dise\u00f1o y a qui\u00e9n va dirigido. Los ataques de phishing suelen imitar las comunicaciones leg\u00edtimas, copiando la marca y el estilo de comunicaci\u00f3n de un remitente de confianza.<\/p>\n\n\n\n<p>En algunos casos, los ataques de phishing pueden estar hiperdirigidos a una persona concreta. En este caso, se denominan ataques de <a href=\"https:\/\/blog.mailfence.com\/es\/diferencia-entre-spear-phishing-y-phishing\/\" target=\"_blank\" rel=\"noreferrer noopener\"><em>Spear phishing<\/em><\/a>, o \u00abphishing dirigido\u00bb.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-enfrentarse-al-spam-y-al-phishing\">Enfrentarse al spam y al phishing<\/h2>\n\n\n\n<p>La forma de abordar el spam frente a los ataques de phishing es bastante diferente. Esto es lo que puedes hacer en ambos casos. <\/p>\n\n\n\n<p><strong>Para protegerse del spam, active los filtros de spam en su servicio de correo electr\u00f3nico.<\/strong><\/p>\n\n\n\n<p>Esta es la forma m\u00e1s eficaz de filtrar los correos electr\u00f3nicos no deseados. En Mailfence, <a href=\"https:\/\/kb.mailfence.com\/categories\/abuse-and-spam\/\" target=\"_blank\" rel=\"noreferrer noopener\">nuestros potentes filtros antispam<\/a> est\u00e1n activados por defecto cuando crea su cuenta. Si observa que ha llegado a su bandeja de entrada un correo no deseado, puede marcarlo como spam <strong>haciendo clic con el bot\u00f3n derecho sobre \u00e9l<\/strong> &gt; <strong>Marcar<\/strong> &gt; <strong>Spam<\/strong>. En algunos casos, nuestro filtro antispam puede marcar algo que en realidad no es spam, en cuyo caso tendr\u00e1 que <a href=\"https:\/\/blog.mailfence.com\/es\/como-poner-en-lista-blanca-direcciones-de-correo-electronico\/\" target=\"_blank\" rel=\"noreferrer noopener\">poner al remitente en la lista blanca<\/a>.<\/p>\n\n\n\n<p><strong>Cuando se trate de phishing, verifique siempre cuidadosamente la direcci\u00f3n de correo electr\u00f3nico del remitente.<\/strong><\/p>\n\n\n\n<p>Si hay alguna sensaci\u00f3n de amenaza o urgencia en el correo electr\u00f3nico, asuma que se trata de un ataque de phishing. Los correos electr\u00f3nicos de phishing suelen utilizar direcciones muy parecidas a las leg\u00edtimas, con ligeras variaciones. Si no est\u00e1 seguro, coteje la direcci\u00f3n con un correo electr\u00f3nico que sepa con certeza que es leg\u00edtimo.<\/p>\n\n\n\n<p>Si a\u00fan no est\u00e1 seguro, contacte con el servicio de atenci\u00f3n al cliente a trav\u00e9s de su formulario de contacto oficial, direcci\u00f3n de correo electr\u00f3nico de asistencia o n\u00famero de tel\u00e9fono. En cualquier caso, NUNCA haga clic en un enlace o bot\u00f3n sin estar 100% seguro de que el remitente es leg\u00edtimo.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"779\" height=\"1024\" src=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-2-779x1024.png\" alt=\"Spam vs Phishing - Ataque de Phishing contra Ledger\" class=\"wp-image-90590\" style=\"width:641px;height:auto\" srcset=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-2-779x1024.png 779w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-2-228x300.png 228w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-2-768x1009.png 768w, https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/image-2.png 800w\" sizes=\"auto, (max-width: 779px) 100vw, 779px\" \/><figcaption class=\"wp-element-caption\"><em>Ejemplo de ataque de phishing suplantando a Ledger<\/em><\/figcaption><\/figure>\n\n\n\n<p>En el ejemplo anterior, el correo electr\u00f3nico procede del dominio \u00abledgersupport.io\u00bb, un <a href=\"https:\/\/serhack.me\/articles\/practical-analysis-ledger-phishing-email\/\" target=\"_blank\" rel=\"noreferrer noopener\">dominio creado apenas un d\u00eda antes<\/a> y no vinculado en modo alguno con Ledger.<\/p>\n\n\n\n<p>Adem\u00e1s, <a href=\"\/es\/?p=90083\" target=\"_blank\" rel=\"noreferrer noopener\">utilizar la autenticaci\u00f3n de dos factores<\/a> en sus cuentas a\u00f1ade una capa adicional de seguridad. En caso de que los atacantes consigan acceder a sus credenciales de inicio de sesi\u00f3n, seguir\u00e1n sin poder entrar en su cuenta.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-eso-es-todo-para-esta-guia-sobre-spam-vs-phishing\">\u00a1Eso es todo para esta Gu\u00eda sobre Spam vs. Phishing!<\/h2>\n\n\n\n<p>Con esto terminamos esta gu\u00eda sobre spam vs. phishing. Aunque tanto el spam como el phishing son formas de comunicaci\u00f3n no deseada, difieren mucho en su intenci\u00f3n e impacto. Esperamos que esta gu\u00eda le haya ayudado a comprender la diferencia entre ambos y evite que se convierta en una v\u00edctima en el futuro.<\/p>\n\n\n\n<p>Mantenerse seguro en Internet empieza por un correo electr\u00f3nico privado y seguro. En Mailfence, nos enorgullecemos de ser uno de los servicios de correo electr\u00f3nico m\u00e1s privados y seguros. No s\u00f3lo eso, sino que su cuenta gratuita tambi\u00e9n incluye <a href=\"https:\/\/blog.mailfence.com\/es\/intercambio-seguro-de-archivos\/\" target=\"_blank\" rel=\"noreferrer noopener\">almacenamiento en l\u00ednea para tus documentos m\u00e1s importantes<\/a>, un <a href=\"https:\/\/blog.mailfence.com\/es\/calendario-online-seguro\/\" target=\"_blank\" rel=\"noreferrer noopener\">calendario<\/a>, <a href=\"https:\/\/blog.mailfence.com\/es\/software-seguro-para-gestion-de-contactos\/\" target=\"_blank\" rel=\"noreferrer noopener\">gesti\u00f3n de contactos<\/a> y mucho m\u00e1s. Cree su cuenta gratuita hoy mismo, sin compromiso.<\/p>\n\n\n\t\t<div data-elementor-type=\"section\" data-elementor-id=\"100846\" class=\"elementor elementor-100846 elementor-100761\" data-elementor-post-type=\"elementor_library\">\n\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-124e1725 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"124e1725\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-654e4e21\" data-id=\"654e4e21\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3a3b1a23 elementor-widget elementor-widget-text-editor\" data-id=\"3a3b1a23\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><b>Mailfence &#8211; Su paquete de productividad seguro<\/b><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2c004279 elementor-widget elementor-widget-text-editor\" data-id=\"2c004279\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Recupere su privacidad con<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e0dd6 elementor-icon-list--layout-inline elementor-align-center elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"83e0dd6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items elementor-inline-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-envelope-open-text\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M176 216h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16c0 8.84 7.16 16 16 16zm-16 80c0 8.84 7.16 16 16 16h160c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16H176c-8.84 0-16 7.16-16 16v16zm96 121.13c-16.42 0-32.84-5.06-46.86-15.19L0 250.86V464c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V250.86L302.86 401.94c-14.02 10.12-30.44 15.19-46.86 15.19zm237.61-254.18c-8.85-6.94-17.24-13.47-29.61-22.81V96c0-26.51-21.49-48-48-48h-77.55c-3.04-2.2-5.87-4.26-9.04-6.56C312.6 29.17 279.2-.35 256 0c-23.2-.35-56.59 29.17-73.41 41.44-3.17 2.3-6 4.36-9.04 6.56H96c-26.51 0-48 21.49-48 48v44.14c-12.37 9.33-20.76 15.87-29.61 22.81A47.995 47.995 0 0 0 0 200.72v10.65l96 69.35V96h320v184.72l96-69.35v-10.65c0-14.74-6.78-28.67-18.39-37.77z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Mensajes<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-calendar-alt\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M148 288h-40c-6.6 0-12-5.4-12-12v-40c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v40c0 6.6-5.4 12-12 12zm108-12v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 96v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm-96 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm192 0v-40c0-6.6-5.4-12-12-12h-40c-6.6 0-12 5.4-12 12v40c0 6.6 5.4 12 12 12h40c6.6 0 12-5.4 12-12zm96-260v352c0 26.5-21.5 48-48 48H48c-26.5 0-48-21.5-48-48V112c0-26.5 21.5-48 48-48h48V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h128V12c0-6.6 5.4-12 12-12h40c6.6 0 12 5.4 12 12v52h48c26.5 0 48 21.5 48 48zm-48 346V160H48v298c0 3.3 2.7 6 6 6h340c3.3 0 6-2.7 6-6z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Calendarios<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-far-folder\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M464 128H272l-54.63-54.63c-6-6-14.14-9.37-22.63-9.37H48C21.49 64 0 85.49 0 112v288c0 26.51 21.49 48 48 48h416c26.51 0 48-21.49 48-48V176c0-26.51-21.49-48-48-48zm0 272H48V112h140.12l54.63 54.63c6 6 14.14 9.37 22.63 9.37H464v224z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Documentos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-users-cog\" viewBox=\"0 0 640 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M610.5 341.3c2.6-14.1 2.6-28.5 0-42.6l25.8-14.9c3-1.7 4.3-5.2 3.3-8.5-6.7-21.6-18.2-41.2-33.2-57.4-2.3-2.5-6-3.1-9-1.4l-25.8 14.9c-10.9-9.3-23.4-16.5-36.9-21.3v-29.8c0-3.4-2.4-6.4-5.7-7.1-22.3-5-45-4.8-66.2 0-3.3.7-5.7 3.7-5.7 7.1v29.8c-13.5 4.8-26 12-36.9 21.3l-25.8-14.9c-2.9-1.7-6.7-1.1-9 1.4-15 16.2-26.5 35.8-33.2 57.4-1 3.3.4 6.8 3.3 8.5l25.8 14.9c-2.6 14.1-2.6 28.5 0 42.6l-25.8 14.9c-3 1.7-4.3 5.2-3.3 8.5 6.7 21.6 18.2 41.1 33.2 57.4 2.3 2.5 6 3.1 9 1.4l25.8-14.9c10.9 9.3 23.4 16.5 36.9 21.3v29.8c0 3.4 2.4 6.4 5.7 7.1 22.3 5 45 4.8 66.2 0 3.3-.7 5.7-3.7 5.7-7.1v-29.8c13.5-4.8 26-12 36.9-21.3l25.8 14.9c2.9 1.7 6.7 1.1 9-1.4 15-16.2 26.5-35.8 33.2-57.4 1-3.3-.4-6.8-3.3-8.5l-25.8-14.9zM496 368.5c-26.8 0-48.5-21.8-48.5-48.5s21.8-48.5 48.5-48.5 48.5 21.8 48.5 48.5-21.7 48.5-48.5 48.5zM96 224c35.3 0 64-28.7 64-64s-28.7-64-64-64-64 28.7-64 64 28.7 64 64 64zm224 32c1.9 0 3.7-.5 5.6-.6 8.3-21.7 20.5-42.1 36.3-59.2 7.4-8 17.9-12.6 28.9-12.6 6.9 0 13.7 1.8 19.6 5.3l7.9 4.6c.8-.5 1.6-.9 2.4-1.4 7-14.6 11.2-30.8 11.2-48 0-61.9-50.1-112-112-112S208 82.1 208 144c0 61.9 50.1 112 112 112zm105.2 194.5c-2.3-1.2-4.6-2.6-6.8-3.9-8.2 4.8-15.3 9.8-27.5 9.8-10.9 0-21.4-4.6-28.9-12.6-18.3-19.8-32.3-43.9-40.2-69.6-10.7-34.5 24.9-49.7 25.8-50.3-.1-2.6-.1-5.2 0-7.8l-7.9-4.6c-3.8-2.2-7-5-9.8-8.1-3.3.2-6.5.6-9.8.6-24.6 0-47.6-6-68.5-16h-8.3C179.6 288 128 339.6 128 403.2V432c0 26.5 21.5 48 48 48h255.4c-3.7-6-6.2-12.8-6.2-20.3v-9.2zM173.1 274.6C161.5 263.1 145.6 256 128 256H64c-35.3 0-64 28.7-64 64v32c0 17.7 14.3 32 32 32h65.9c6.3-47.4 34.9-87.3 75.2-109.4z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\"><b>Grupos<\/b><\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-436babb elementor-align-center elementor-widget elementor-widget-button\" data-id=\"436babb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/mailfence.com\/es\/#pricing\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Obtener Mailfence gratis<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\n\n\n<p>\u00bfTiene alguna pregunta? No dude en <a href=\"https:\/\/kb.mailfence.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">consultar nuestra Base de conocimientos<\/a>, o escr\u00edbanos a support@mailfence.com.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Spam vs. phishing: \u00bfconoce la diferencia? Cada d\u00eda se hace p\u00fablica una nueva violaci\u00f3n o filtraci\u00f3n de datos. Esto significa que, por desgracia, la mayor\u00eda de nuestras direcciones de correo electr\u00f3nico est\u00e1n ahora disponibles libremente en la \u00abdark web\u00bb, lo que las convierte en un blanco f\u00e1cil para el spam y los intentos de phishing. [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":90784,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[857],"tags":[],"class_list":["post-91514","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia? | Mailfence Blog<\/title>\n<meta name=\"description\" content=\"Spam vs phishing: \u00bfconoce la diferencia? Le contamos todo lo que necesita saber sobre estas amenazas comunes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia? | Mailfence Blog\" \/>\n<meta property=\"og:description\" content=\"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia? | Mailfence Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/\" \/>\n<meta property=\"og:site_name\" content=\"Mailfence Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mailfence\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-07T09:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-17T10:01:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simon Haven\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mailfence\" \/>\n<meta name=\"twitter:site\" content=\"@mailfence\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simon Haven\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/\"},\"author\":{\"name\":\"Simon Haven\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/person\\\/7c696c144245600fafc3c44d1d652d2f\"},\"headline\":\"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia?\",\"datePublished\":\"2024-10-07T09:00:00+00:00\",\"dateModified\":\"2025-09-17T10:01:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/\"},\"wordCount\":1527,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/spam-vs-phishing-1.jpg\",\"articleSection\":[\"Seguridad\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/\",\"name\":\"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia? | Mailfence Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/spam-vs-phishing-1.jpg\",\"datePublished\":\"2024-10-07T09:00:00+00:00\",\"dateModified\":\"2025-09-17T10:01:50+00:00\",\"description\":\"Spam vs phishing: \u00bfconoce la diferencia? Le contamos todo lo que necesita saber sobre estas amenazas comunes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/spam-vs-phishing-1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/spam-vs-phishing-1.jpg\",\"width\":600,\"height\":600,\"caption\":\"spam vs phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/spam-vs-phishing-cual-es-la-diferencia\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Homepage\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Seguridad\",\"item\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/category\\\/seguridad\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/\",\"name\":\"Mailfence Blog\",\"description\":\"Mailfence Blog. Get the latest news about secure email and Internet privacy.\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#organization\",\"name\":\"Mailfence\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"contentUrl\":\"https:\\\/\\\/blog.mailfence.com\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/Mailfence_logo_pict_and_word_BOUNDED_small.png\",\"width\":1812,\"height\":358,\"caption\":\"Mailfence\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mailfence\\\/\",\"https:\\\/\\\/x.com\\\/mailfence\",\"https:\\\/\\\/www.reddit.com\\\/r\\\/Mailfence\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/mailfence\",\"https:\\\/\\\/www.instagram.com\\\/mailfence_\\\/\",\"https:\\\/\\\/www.youtube.com\\\/@mailfence\",\"https:\\\/\\\/en.wikipedia.org\\\/wiki\\\/Mailfence\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/#\\\/schema\\\/person\\\/7c696c144245600fafc3c44d1d652d2f\",\"name\":\"Simon Haven\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g\",\"caption\":\"Simon Haven\"},\"description\":\"Simon crafts informative and engaging content that empowers users to take control of their online privacy. His areas of expertise include SEO, content creation and social media management.\",\"url\":\"https:\\\/\\\/blog.mailfence.com\\\/es\\\/author\\\/simon\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia? | Mailfence Blog","description":"Spam vs phishing: \u00bfconoce la diferencia? Le contamos todo lo que necesita saber sobre estas amenazas comunes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/","og_locale":"es_ES","og_type":"article","og_title":"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia? | Mailfence Blog","og_description":"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia? | Mailfence Blog","og_url":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/","og_site_name":"Mailfence Blog","article_publisher":"https:\/\/www.facebook.com\/mailfence\/","article_published_time":"2024-10-07T09:00:00+00:00","article_modified_time":"2025-09-17T10:01:50+00:00","og_image":[{"width":600,"height":600,"url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg","type":"image\/jpeg"}],"author":"Simon Haven","twitter_card":"summary_large_image","twitter_creator":"@mailfence","twitter_site":"@mailfence","twitter_misc":{"Escrito por":"Simon Haven","Tiempo de lectura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/#article","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/"},"author":{"name":"Simon Haven","@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/person\/7c696c144245600fafc3c44d1d652d2f"},"headline":"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia?","datePublished":"2024-10-07T09:00:00+00:00","dateModified":"2025-09-17T10:01:50+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/"},"wordCount":1527,"publisher":{"@id":"https:\/\/blog.mailfence.com\/es\/#organization"},"image":{"@id":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg","articleSection":["Seguridad"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/","url":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/","name":"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia? | Mailfence Blog","isPartOf":{"@id":"https:\/\/blog.mailfence.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/#primaryimage"},"image":{"@id":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg","datePublished":"2024-10-07T09:00:00+00:00","dateModified":"2025-09-17T10:01:50+00:00","description":"Spam vs phishing: \u00bfconoce la diferencia? Le contamos todo lo que necesita saber sobre estas amenazas comunes.","breadcrumb":{"@id":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/#primaryimage","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2024\/10\/spam-vs-phishing-1.jpg","width":600,"height":600,"caption":"spam vs phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mailfence.com\/es\/spam-vs-phishing-cual-es-la-diferencia\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Homepage","item":"https:\/\/blog.mailfence.com\/es\/"},{"@type":"ListItem","position":2,"name":"Seguridad","item":"https:\/\/blog.mailfence.com\/es\/category\/seguridad\/"},{"@type":"ListItem","position":3,"name":"Spam vs. Phishing: \u00bfCu\u00e1l es la diferencia?"}]},{"@type":"WebSite","@id":"https:\/\/blog.mailfence.com\/es\/#website","url":"https:\/\/blog.mailfence.com\/es\/","name":"Mailfence Blog","description":"Mailfence Blog. Get the latest news about secure email and Internet privacy.","publisher":{"@id":"https:\/\/blog.mailfence.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mailfence.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/blog.mailfence.com\/es\/#organization","name":"Mailfence","url":"https:\/\/blog.mailfence.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","contentUrl":"https:\/\/blog.mailfence.com\/wp-content\/uploads\/2022\/08\/Mailfence_logo_pict_and_word_BOUNDED_small.png","width":1812,"height":358,"caption":"Mailfence"},"image":{"@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mailfence\/","https:\/\/x.com\/mailfence","https:\/\/www.reddit.com\/r\/Mailfence\/","https:\/\/www.linkedin.com\/company\/mailfence","https:\/\/www.instagram.com\/mailfence_\/","https:\/\/www.youtube.com\/@mailfence","https:\/\/en.wikipedia.org\/wiki\/Mailfence"]},{"@type":"Person","@id":"https:\/\/blog.mailfence.com\/es\/#\/schema\/person\/7c696c144245600fafc3c44d1d652d2f","name":"Simon Haven","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/aa01160a49095a6d9753e38702ea2778680af310e4a9e030b40ae5450ddf79ad?s=96&d=blank&r=g","caption":"Simon Haven"},"description":"Simon crafts informative and engaging content that empowers users to take control of their online privacy. His areas of expertise include SEO, content creation and social media management.","url":"https:\/\/blog.mailfence.com\/es\/author\/simon\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts\/91514","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/comments?post=91514"}],"version-history":[{"count":14,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts\/91514\/revisions"}],"predecessor-version":[{"id":103299,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/posts\/91514\/revisions\/103299"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/media\/90784"}],"wp:attachment":[{"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/media?parent=91514"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/categories?post=91514"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mailfence.com\/es\/wp-json\/wp\/v2\/tags?post=91514"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}