O mercado negro dos crimes cibernéticos no Brasil. Ronaldo Lima Aline Bueno

Size: px
Start display at page:

Download "O mercado negro dos crimes cibernéticos no Brasil. Ronaldo Lima Aline Bueno"

Transcription

1 O mercado negro dos crimes cibernéticos no Brasil Ronaldo Lima Aline Bueno

2 Agenda O mercado negro dos crimes cibernéticos no Brasil Cenário O mercado negro brasileiro Como eles trabalham Crimeware Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 2

3 Alguns números A Febraban estima que fraudes eletrônicas tenham causado prejuízos de cerca de R$1.4 billhão aos bancos em O número de transações bancárias online (Internet Banking and Mobile Banking) ultrapassou o número de transações feitas em agências bancária. O Brasil já é o segundo maior mercado de cartões de crédito e débito do mundo. Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 3

4 Crimes cibérnéticos e bancos brasileiros Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 4

5 O Mercado Negro Brasileiro Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 5

6 Redes sociais Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 6

7 Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 7

8 Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 8

9 Testador de Cartão de Crédito Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 9

10 Testador de Cartão de Crédito Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 10

11 Websites/Blogs Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 11

12 Websites/Blogs Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 12

13 Websites/Blogs Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 13

14 Canais de IRC Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 14

15 Fórums Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 15

16 Fórums Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 16

17 Negociações Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 17

18 Negociações Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 18

19 Como eles trabalham Não gostam de pagar por hosting Free, invadido, dropbox, google code, google drive... Pouco uso de servidores dedicados UOL HOST + DB Linguagens: + populares: Delphi, Visual Basic, PHP usos específicos: Applet Java (drive by download), AutoIt (crypters) Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 19

20 Distribuição de malware Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 20

21 Ferramentas / Crimeware Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 21

22 Crypter Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 22

23 Envio de SPAM Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 23

24 Envio de SPAM Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 24

25 Sugador Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 25

26 Sugador Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 26

27 Extensão Maliciosa Google Chrome Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 27

28 Extensão Maliciosa Google Chrome Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 28

29 Spy Net RAT (Remote Access Tool) Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 29

30 Spy Net RAT Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 30

31 Spy Net RAT Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 31

32 KL Remota Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 32

33 KL Remota Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 33

34 KL Remota Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 34

35 Botnet Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 35

36 Botnet Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 36

37 Botnet Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 37

38 Atendimento ao vivo para os clientes Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 38

39 Painel de Administração Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 39

40 Painel de Administração Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 40

41 Painel de Administração Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 41

42 Conclusões e Projeções Impunidade = criminosos agem sem medo Uso de ferramentas personalizadas (criatividade) Reuso de código disponível na web Tendências: automatização, profissionalização, mercados estrangeiros Ainda há espaço para o crescimento de Internet Banking... Vamos trocar informações técnicas! Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 42

43 Obrigado! Ronaldo Aline Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 43

TRANSFERÊNCIAS BANCÁRIAS INTERNACIONAIS

TRANSFERÊNCIAS BANCÁRIAS INTERNACIONAIS Os clientes Markets.com podem reforçar a sua conta por transferência através de vários bancos à volta do mundo. Veja a lista abaixo para mais detalhes: TRANSFERÊNCIAS BANCÁRIAS INTERNACIONAIS ROYAL BANK

More information

Empresas líderes usam TI como direcionador de inovação e mudança

Empresas líderes usam TI como direcionador de inovação e mudança Convivendo com a Complexidade Simplificando a T.I. Cyro Diehl 1 71% das Empresas Dizem que inovação é o fator #1 de competitividade Empresas líderes usam TI como direcionador de inovação e mudança Contudo,

More information

Viagem da Austrália July 2013 13 a 23 de Julho

Viagem da Austrália July 2013 13 a 23 de Julho Viagem da Austrália July 2013 13 a 23 de Julho P O Box 40827 Kerikeri NEW ZEALAND Phone: 64 9 407 9514 Fax: 64 9 407 9114 Nós (Nomes dos pais) gostaríamos de autorizar a participação do nosso(a) filho

More information

Learn-Portuguese-Now.com presents... 100 PHRASES. What Did You Say? by Charlles Nunes

Learn-Portuguese-Now.com presents... 100 PHRASES. What Did You Say? by Charlles Nunes Learn-Portuguese-Now.com presents... English-Portuguese Flash Cards 100 PHRASES What Did You Say? by Charlles Nunes English-Portuguese Flash Cards 100 Phrases Congratulations! By downloading this volume

More information

Certification Protocol For Certifica Minas Café - UTZ Certified

Certification Protocol For Certifica Minas Café - UTZ Certified Certification Protocol For Certifica Minas Café - UTZ Certified Certification Protocol Version 1.1, February 2014 www.utzcertified.org Copies of this document are available for free in electronic format

More information

EU project to bridge digital divide in Latin America

EU project to bridge digital divide in Latin America Publication: Cordis Date: 05 06 07 EU project to bridge digital divide in Latin America As information and communication technologies bring many benefits to societies, an EU funded project is aiming to

More information

Enter Here -> Fernando DLn Posicionamiento Web Mercado De Afiliados - User Experience > Click Now <

Enter Here -> Fernando DLn Posicionamiento Web Mercado De Afiliados - User Experience > Click Now < Posicionamiento web blogger, good affiliate marketing books, manual de posicionamiento web seo, can i do affiliate marketing on facebook, posicionar tu web en google. Enter Here -> Fernando DLn Posicionamiento

More information

The Brazilian Underground Market

The Brazilian Underground Market A Trend Micro Research Paper Cybercriminal Underground Economy Series The Brazilian Underground Market The Market for Cybercriminal Wannabes? Fernando Mercês Forward-Looking Threat Research Team CONTENTS

More information

Viagem da Ilha do Sul FERIAS Abril 2013

Viagem da Ilha do Sul FERIAS Abril 2013 P O Box 40827 Kerikeri NEW ZEALAND Phone: 64 9 407 9514 Fax: 64 9 407 9114 Viagem da Ilha do Sul FERIAS Abril 2013 Nós (Nomes dos pais) gostaríamos de autorizar a participação do nosso(a) filho (a) Na

More information

Tenha um domínio do REGEDIT do Windows

Tenha um domínio do REGEDIT do Windows www.hackerdopc.blogspot.com Tenha um domínio do REGEDIT do Windows #01 Bloquear acesso ao Painel de Controle NoControlPanel #02 Forçar o estilo clássico no Painel de Controle ForceClassicControlPanel /t

More information

Inovando sistemas com arquiteturas elásticas

Inovando sistemas com arquiteturas elásticas Inovando sistemas com arquiteturas elásticas Renato Bognar Principal System Engineer 1 Agenda Quais são os desafios de construir ua aplicação? Quais os pontos de atenção? Vai construir Apps móveis? Desfazendo

More information

O que interessa não é o servidor web GTS 13 São Paulo, Brasil

O que interessa não é o servidor web GTS 13 São Paulo, Brasil O que interessa não é o servidor web GTS 13 São Paulo, Brasil Luiz Eduardo DoS Santos CISSP GISP GCIH CEH CWNE Senior Security Engineer Latin America O que interessa não é (apenas) o servidor web GTS 13

More information

ArcHC_3D research case studies (FCT:PTDC/AUR/66476/2006) Casos de estudo do projecto ArcHC_3D (FCT:PTDC/AUR/66476/2006)

ArcHC_3D research case studies (FCT:PTDC/AUR/66476/2006) Casos de estudo do projecto ArcHC_3D (FCT:PTDC/AUR/66476/2006) ArcHC_3D research case studies (FCT:PTDC/AUR/66476/2006) Casos de estudo do projecto ArcHC_3D (FCT:PTDC/AUR/66476/2006) 1 Casa de Valflores - Loures 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Capela de S. Frutuoso

More information

Marcelo L. Braunstein Business Development Manager IBM Latin America marcelol@br.ibm.com

Marcelo L. Braunstein Business Development Manager IBM Latin America marcelol@br.ibm.com Marcelo L. Braunstein Business Development Manager IBM Latin America marcelol@br.ibm.com Education Research LA Grid Collaboration Talent Development 1 Education Research Collaboration Talent Development

More information

Seu servidor deverá estar com a versão 3.24 ou superior do Mikrotik RouterOS e no mínimo 4 (quatro) placas de rede.

Seu servidor deverá estar com a versão 3.24 ou superior do Mikrotik RouterOS e no mínimo 4 (quatro) placas de rede. Provedor de Internet e Serviços - (41) 3673-5879 Balance PCC para 3 links adsl com modem em bridge (2 links de 8mb, 1 link de 2mb). Seu servidor deverá estar com a versão 3.24 ou superior do Mikrotik RouterOS

More information

C COMO PROGRAMAR DEITEL PDF

C COMO PROGRAMAR DEITEL PDF C COMO PROGRAMAR DEITEL PDF ==> Download: C COMO PROGRAMAR DEITEL PDF C COMO PROGRAMAR DEITEL PDF - Are you searching for C Como Programar Deitel Books? Now, you will be happy that at this time C Como

More information

Clientes utilizando SAP em Oracle Database 11g Release

Clientes utilizando SAP em Oracle Database 11g Release Clientes utilizando SAP em Oracle Database 11g Release Elizabeth Faria Sales Consulting Manager 1 Agenda Certificação do Oracle 11g para SAP Novidades do Oracle 11g R2 para SAP Uso

More information

marcelol@br.ibm.com (55-21)546-3500 T/L: 831-3500 http://www.s390.ibm.com/brasil/

marcelol@br.ibm.com (55-21)546-3500 T/L: 831-3500 http://www.s390.ibm.com/brasil/ Apresentação para: Exploradores do OS/390 Marcelo L. Braunstein marcelol@br.ibm.com (55-21)546-3500 T/L: 831-3500 http://www.s390.ibm.com/brasil/ 10/99 9:00 Abertura 9:15 Torne sua empresa mais competitiva

More information

Copyright 2013 wolfssl Inc. All rights reserved. 2

Copyright 2013 wolfssl Inc. All rights reserved. 2 - - Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 3 Copyright 2013 wolfssl Inc. All rights reserved.

More information

A tecnologia transforma a vida das pessoas e das empresas e o Big data revoluciona o marketing

A tecnologia transforma a vida das pessoas e das empresas e o Big data revoluciona o marketing A tecnologia transforma a vida das pessoas e das empresas e o Big data revoluciona o marketing Cezar Taurion Executivo de Novas Tecnologias Chief Evangelist ctaurion@br.ibm.com TUDO EM TEMPO REAL TECNOLOGIA

More information

SBGames 2007 Relato Computing Track Full Papers

SBGames 2007 Relato Computing Track Full Papers SBGames 2007 Relato Computing Track Full Papers Marcelo Walter, Bruno Feijó, Jorge Barbosa 9/novembro/2007 Estatísticas 55 papers sem problemas 4 papers com problemas (fora do prazo, artigo não submetido)

More information

The Impacts of Trade Facilitation on the Economy of Brazil and its Manufacturing Sector

The Impacts of Trade Facilitation on the Economy of Brazil and its Manufacturing Sector The Impacts of Trade Facilitation on the Economy of Brazil and its Manufacturing Sector Lucas Ferraz Professor of São Paulo School of Economics at Getulio Vargas Foundation Head of Economic Modeling at

More information

Mitos sobre proteção de redes WiFi. Nelson Murilo http://twitter.com/nelsonmurilo

Mitos sobre proteção de redes WiFi. Nelson Murilo http://twitter.com/nelsonmurilo Mitos sobre proteção de redes WiFi Nelson Murilo http://twitter.com/nelsonmurilo Agenda Descrição dos mitos Onde eles falham O que funciona Nome da rede CH 10 ][ Elapsed: 9 mins ][ 2009-08-28 14:24 BSSID

More information

Introdução aos Sistemas Distribuídos

Introdução aos Sistemas Distribuídos O que é um Sistema Distribuído? Introdução aos Sistemas Distribuídos Um sistema distribuído consiste num conjunto de máquinas que trabalham de forma coordenada e conjunta para resolver um determinado problema.

More information

Click Here -> Multinivel - Cómo afiliar de 5 a 20 nuevos socios al mes en tu multinivel

Click Here -> Multinivel - Cómo afiliar de 5 a 20 nuevos socios al mes en tu multinivel Empresas que trabalham com marketing multinivel no brasil, empresas marketing multinivel gratis, social media marketing plan strategy. Click Here -> Multinivel - Cómo afiliar de 5 a 20 nuevos socios al

More information

The Internet of Things Regional Forum Brazil Wrap up Session. Severiano Leão Macedo Junior IoT PSS da CISCO Brasil June 16th, 2016

The Internet of Things Regional Forum Brazil Wrap up Session. Severiano Leão Macedo Junior IoT PSS da CISCO Brasil June 16th, 2016 The Internet of Things Regional Forum Brazil Wrap up Session Severiano Leão Macedo Junior IoT PSS da CISCO Brasil June 16th, 2016 IoT Key Enabler of Digitization Across Industries IoT Enabling Transformation

More information

Worldwide, 3.3 million deaths in 2012 were due to harmful use of alcohol

Worldwide, 3.3 million deaths in 2012 were due to harmful use of alcohol WHO calls on governments to do more to prevent alcohol-related deaths and diseases Worldwide, 3.3 million deaths in 2012 were due to harmful use of alcohol 12 MAY 2014 GENEVA Worldwide, 3.3 million deaths

More information

Challenges and opportunities in the Digital World: Brazil perspective

Challenges and opportunities in the Digital World: Brazil perspective Challenges and opportunities in the Digital World: Brazil perspective Virgilio A. F. Almeida National Secretary for Information Technology Policies Ministry of Science, Technology and Innovation São Paulo,

More information

Endnote Web tutorial for BJCVS/RBCCV

Endnote Web tutorial for BJCVS/RBCCV Oliveira MAB, SPECIAL et al. - Endnote ARTICLE Web tutorial for BJCVS/RBCCV Endnote Web tutorial for BJCVS/RBCCV Tutorial do Endnote Web para o BJCVS/RBCCV Marcos Aurélio Barboza de Oliveira 1, MD, PhD;

More information

Logística Empresarial - Uma disciplina Vital. Missão da Logística. Supply Chain Management Gerenciamento da Cadeia de Suprimentos. Capítulo 1 - Ballou

Logística Empresarial - Uma disciplina Vital. Missão da Logística. Supply Chain Management Gerenciamento da Cadeia de Suprimentos. Capítulo 1 - Ballou Logística Empresarial - Uma disciplina Vital Supply Chain Management Gerenciamento da Cadeia de Suprimentos Capítulo 1 - Ballou Missão da Logística A missão da logística é dispor da mercadoria ou o serviço

More information

MEET THE MARKET 2015

MEET THE MARKET 2015 MEET THE MARKET 2015 Ambassador Alex Ellis < Picture to go here > Inga Beale CEO Lloyd s 3 The Navigators Group, Inc. Lloyd s Meet the Market 2015 Rio De Janeiro Stephen Coward President, Navigators Technical

More information

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.

Spyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc. Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References

More information

SUITABILITY OF RELATIVE HUMIDITY AS AN ESTIMATOR OF LEAF WETNESS DURATION

SUITABILITY OF RELATIVE HUMIDITY AS AN ESTIMATOR OF LEAF WETNESS DURATION SUITABILITY OF RELATIVE HUMIDITY AS AN ESTIMATOR OF LEAF WETNESS DURATION PAULO C. SENTELHAS 1, ANNA DALLA MARTA 2, SIMONE ORLANDINI 2, EDUARDO A. SANTOS 3, TERRY J. GILLESPIE 3, MARK L. GLEASON 4 1 Departamento

More information

Gerando Rotas BGP. Tutorial BGP - GTER

Gerando Rotas BGP. Tutorial BGP - GTER Gerando Rotas BGP 1 BGP Gerando rotas internas BGP 192.168.1.0/24 Injetar agregado 192.168.0.0/21 192.168.2.0/24 10.0.0.4 mexico 10.0.0.2 OSPF AS 65000 10.0.0.5 chile PONTO DE OBSERVAÇÃO 192.168.8.0/24

More information

Coverage of the Brazilian population 18 years and older by private health plans: an analysis of data from the World Health Survey

Coverage of the Brazilian population 18 years and older by private health plans: an analysis of data from the World Health Survey ARTIGO ARTICLE S119 Coverage of the Brazilian population 18 years and older by private health plans: an analysis of data from the World Health Survey Cobertura da população brasileira com 18 anos ou mais

More information

Symfony2: estudo de caso IngressoPrático

Symfony2: estudo de caso IngressoPrático Symfony2: estudo de caso IngressoPrático Symfony2 is a reusable set of standalone, decoupled and cohesive PHP components that solve common web development problems Fabien Potencier, What is Symfony2? 2/73

More information

Competitive intelligence: functional practices, goals and infrastructure of companies in Brazil

Competitive intelligence: functional practices, goals and infrastructure of companies in Brazil Competitive intelligence: functional practices, goals and infrastructure of companies in Brazil Inteligência competitiva: práticas funcionais, objetivos e infraestrutura em empresas no Brasil Frederico

More information

Testes de Software. com python

Testes de Software. com python Testes de Software com python Wednesday, August 24, 2011 eu sou... Tarsis Azevedo blog.tarsisazevedo.com @tarsisazevedo desenvolvedor globo.com #cobrateam Wednesday, August 24, 2011 globo.com Python/Ruby/Java/PHP/C/Perl

More information

CRM: customer relationship management: o revolucionário marketing de relacionamento com o cliente P

CRM: customer relationship management: o revolucionário marketing de relacionamento com o cliente P CRM: customer relationship management: o revolucionário marketing de relacionamento com o cliente Download: CRM: customer relationship management: o revolucionário marketing de relacionamento com o cliente

More information

03 infra TI RAID. MTBF; RAID Protection; Mirroring and Parity; RAID levels; write penalty

03 infra TI RAID. MTBF; RAID Protection; Mirroring and Parity; RAID levels; write penalty 03 infra TI RAID MTBF; RAID Protection; Mirroring and Parity; RAID levels; write penalty Por que RAID? Redundant Array Inexpensive Disks x Redudant Array Independent Disks Performance limitation of disk

More information

XMLs para o e-rede estamos todos ligados

XMLs para o e-rede estamos todos ligados Manual de XMLs para o e-rede estamos todos ligados Cenários 01 02 03 04 Crédito 17 1.1 Setup 17 Request 17 Response 18 Crédito com Risco 19 2.1 Setup 19 Request 19 Response 21 Crédito com Risco 3DS 22

More information

How To Improve Service Management For Effective It Governance

How To Improve Service Management For Effective It Governance Universidade de São Paulo Brasil Centro de Computação Eletrônica (CCE) Improving Service Management for Effective IT Governance Mauro Cesar Bernardes mcesar@usp.br Tereza Cristina M.B. Carvalho carvalho@larc.usp.br

More information

Boletim Técnico. Esta implementação consiste em atender a legislação do intercâmbio eletrônico na versão 4.0 adotado pela Unimed do Brasil.

Boletim Técnico. Esta implementação consiste em atender a legislação do intercâmbio eletrônico na versão 4.0 adotado pela Unimed do Brasil. Produto : Totvs + Foundation Saúde + 11.5.3 Chamado : TFOQEI Data da criação : 27/08/12 Data da revisão : 10/09/12 País(es) : Brasil Banco(s) de Dados : Esta implementação consiste em atender a legislação

More information

REDES DE ARMAZENAMENTO E ALTA DISPONIBILIDADE

REDES DE ARMAZENAMENTO E ALTA DISPONIBILIDADE REDES DE ARMAZENAMENTO E ALTA DISPONIBILIDADE O que é SAN? SAN Storage Área Network Rede de armazenamento. É uma rede de alta velocidade dedicada que possui servidores e recursos compartilhados de STORAGE

More information

Evaluation of a Segmental Durations Model for TTS

Evaluation of a Segmental Durations Model for TTS Speech NLP Session Evaluation of a Segmental Durations Model for TTS João Paulo Teixeira, Diamantino Freitas* Instituto Politécnico de Bragança *Faculdade de Engenharia da Universidade do Porto Overview

More information

Once you have gathered all the information required please send to Key Travel s visa department

Once you have gathered all the information required please send to Key Travel s visa department Dear Applicant, Thank you for choosing Key Travel to handle your visa application to Angola Your visa pack contains: Embassy Information Visa requirements for Business and Tourist applications Application

More information

GENERAL MEETING OF MARTIFER - SGPS, S.A. 10 th April 2013

GENERAL MEETING OF MARTIFER - SGPS, S.A. 10 th April 2013 [This translation into English of the Portuguese document was made only for the convenience of non- Portuguese speaking shareholders. For all intents and purposes, the Portuguese version shall prevail.]

More information

Microsoft Azure: Opção de Nuvem para Todo o Desenvolvedor. Danilo Bordini & Osvaldo Daibert Microsoft Brasil @dbordini @daibert

Microsoft Azure: Opção de Nuvem para Todo o Desenvolvedor. Danilo Bordini & Osvaldo Daibert Microsoft Brasil @dbordini @daibert Microsoft Azure: Opção de Nuvem para Todo o Desenvolvedor Danilo Bordini & Osvaldo Daibert Microsoft Brasil @dbordini @daibert Open Source on Microsoft Azure Two categories Compute Data IaaS, PaaS, and

More information

Download, For Free, 2012 silverpop email marketing metrics benchmark study ebook. More Details: http://f-ebook.esy.es/freead8291/pdx/fph1

Download, For Free, 2012 silverpop email marketing metrics benchmark study ebook. More Details: http://f-ebook.esy.es/freead8291/pdx/fph1 Download, For Free, 2012 silverpop email marketing metrics benchmark study ebook Download, For Free, 2012 silverpop email marketing metrics benchmark study ebook More Details: http://f-ebook.esy.es/freead8291/pdx/fph1

More information

BtoB MKT Trends. El Escenario Online. Luciana Sario. Gerente de Marketing IDC Latin America 2009 IDC W W W. I D C. C O M / G M S 1

BtoB MKT Trends. El Escenario Online. Luciana Sario. Gerente de Marketing IDC Latin America 2009 IDC W W W. I D C. C O M / G M S 1 BtoB MKT Trends El Escenario Online Luciana Sario Gerente de Marketing IDC Latin America 2009 IDC W W W. I D C. C O M / G M S 1 Audio Test Estamos haciendo un Audio Test y estoy hablando en este momento

More information

Estrategias para la Reducción de Riesgos y Ciber Ataques

Estrategias para la Reducción de Riesgos y Ciber Ataques Estrategias para la Reducción de Riesgos y Ciber Ataques Luis Zamora Consultor en Tecnología 1 This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality,

More information

Development and Implementation of Tickets For Fun E-commerce Merchandising Stores.

Development and Implementation of Tickets For Fun E-commerce Merchandising Stores. Rafael Koch Rossi Digital Marketing and Project Analyst at Tickets For Fun rkrossi@gmail.com Summary Digital Marketing Professional with broad experience on digital consumer, social media behavior, metrics

More information

How to Secure TYPO3 Installations

How to Secure TYPO3 Installations How to Secure TYPO3 Installations Jochen Weiland April 2011 "Viagra Hack" Searching for "Viagra" lists unrelated pages in Google Beispiel Beispiel "Exclusive: Many TYPO3 Sites have been hacked" April 27,

More information

Voice over IP at the Portuguese NREN

Voice over IP at the Portuguese NREN Voice over IP at the Portuguese NREN Instituto Superior Técnico Lisboa - March, 22 2006 sip:voip@fccn.pt 1 FCCN FCCN runs and manages the Portuguese NREN, TLD.pt and Portuguese IX; More than 100 Higher

More information

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework

Detecting and Exploiting XSS with Xenotix XSS Exploit Framework Detecting and Exploiting XSS with Xenotix XSS Exploit Framework ajin25@gmail.com keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.

More information

If you have any questions during your application process, please call 1-800-799-6560 to speak with a customer service representative.

If you have any questions during your application process, please call 1-800-799-6560 to speak with a customer service representative. Dear Valued Client, Thank you for choosing CVSC for your passport and travel visa need. The following visa application kit provides information ensuring that your visa application is smoothly processed.

More information

EDUCATIONAL POSSIBILITIES OF THE USE OF YOUTUBE VIDEO ANNOTATIONS

EDUCATIONAL POSSIBILITIES OF THE USE OF YOUTUBE VIDEO ANNOTATIONS EDUCATIONAL POSSIBILITIES OF THE USE OF YOUTUBE VIDEO ANNOTATIONS Rio de Janeiro - RJ - April 2004 Adriana Dallacosta - Brazilian Army Culture and Education Department - adrianadalla@uol.com.br Class -

More information

NADABAS. Report from a short term mission to the National Statistical Institute of Mozambique, Maputo Mozambique. 16-27 April 2012

NADABAS. Report from a short term mission to the National Statistical Institute of Mozambique, Maputo Mozambique. 16-27 April 2012 MZ:2012:04r NADABAS Report from a short term mission to the National Statistical Institute of Mozambique, Maputo Mozambique 16-27 April 2012 within the frame work of the AGREEMENT ON CONSULTING ON INSTITUTIONAL

More information

Improving Organizational Management through Social Networking

Improving Organizational Management through Social Networking Improving Organizational Management through Social Networking Ezequiel Ferreira dos Santos Master's Degree in Business Administration Universidade Nove de Julho - Uninove Memorial Campus. São Paulo, Brasil.

More information

SUPPORT PROGRAM TRANSLATION AND PUBLICATION OF BRAZILIAN AUTHORS

SUPPORT PROGRAM TRANSLATION AND PUBLICATION OF BRAZILIAN AUTHORS SUPPORT PROGRAM TRANSLATION AND PUBLICATION OF BRAZILIAN AUTHORS The Brazilian National Library Foundation hereby announces that it will offer grants to foreign publishing houses that wish to translate,

More information

O que é WinRDBI O WinRDBI (Windows Relational DataBase Interpreter) é uma ferramenta educacional utilizada pela Universidade do Estado do Arizona, e que fornece uma abordagem ativa para entender as capacidades

More information

The anatomy of an online banking fraud

The anatomy of an online banking fraud The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to valentin@xenuser.org (March2010) I. What this document is about II. Introduction III. The anatomy of an

More information

CERT.br Incident Handling and Network Monitoring Activities

CERT.br Incident Handling and Network Monitoring Activities CERT.br Incident Handling and Network Monitoring Activities Cristine Hoepers General Manager cristine@cert.br! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br

More information

Female 13-18, fans of the TV series, 30-40

Female 13-18, fans of the TV series, 30-40 Synopsis: Baseado no livro homônimo de Maria Mariana, que também originou a peça teatra Marketing Positioning: Female 13-18, fans of the TV series, 30-40 Cast: Sophia Abrahão, Bella Camero, Malu Rodrigues,

More information

Mobile First, Cloud First

Mobile First, Cloud First DX VIPP Pilot available 15 countries worldwide 4 industry verticals Healthcare Manufacturing H Government Retail US Germany India UK Israel Canada Netherlands Australia France Russia Brazil Italy China

More information

Use of the Internet as a source of information about plastic surgery in Bahia, Brazil

Use of the Internet as a source of information about plastic surgery in Bahia, Brazil ORIGINAL ARTICLE Use of the Internet as a source of Vendramin information Franco T FS et about al. et al. plastic surgery in Bahia, Brazil Use of the Internet as a source of information about plastic surgery

More information

Tourist Visa for Angola. Thank you for requesting an application pack for a tourist visa for Angola.

Tourist Visa for Angola. Thank you for requesting an application pack for a tourist visa for Angola. Tourist Visa for Angola Thank you for requesting an application pack for a tourist visa for Angola. To obtain your visa the following are required: Passport (valid for at least 9 months) 2 clear pages

More information

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer

Advanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer Agenda Modern malware a targets Account credentials Financial

More information

Currently pursuing a Master s degree in Criminal Law at the Faculty of Law of the University of Lisbon.

Currently pursuing a Master s degree in Criminal Law at the Faculty of Law of the University of Lisbon. DAVID SILVA RAMALHO Date and Place of Birth: 1988, Lisbon Bar Membership number: 52872L E-mail: dsr@servulo.com QUALIFICATIONS Currently pursuing a Master s degree in Criminal Law at the Faculty of Law

More information

How to work with a video clip in EJA English classes?

How to work with a video clip in EJA English classes? How to work with a video clip in EJA English classes? Introduction Working with projects implies to take into account the students interests and needs, to build knowledge collectively, to focus on the

More information

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org

Some Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org Some Perspectives On Cybersecurity Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org Agenda What is the Internet Society (ISOC) On the IETF Cyber Security Themes

More information

SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS

SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS Minnesota Department of Commerce July 2014 GENERIC FIRM INFORMATION Has your firm been the subject of a cyber-security

More information

Prova Escrita de Inglês

Prova Escrita de Inglês EXAME FINAL NACIONAL DO ENSINO SECUNDÁRIO Prova Escrita de Inglês 11.º Ano de Escolaridade Continuação bienal Decreto-Lei n.º 139/2012, de 5 de julho Prova 550/1.ª Fase 8 Páginas Duração da Prova: 120

More information

Un mundo de Clouds: Seguridad y Adopción. Cisco + Intel. Pilar Santamaria. Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa

Un mundo de Clouds: Seguridad y Adopción. Cisco + Intel. Pilar Santamaria. Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa Un mundo de Clouds: Seguridad y Adopción Cisco + Intel Pilar Santamaria Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad

More information

Incremental Housing in Brazil: Research and Design methods

Incremental Housing in Brazil: Research and Design methods Andréa Mussi, Incremental Housing in Brazil: Research and Design methods PhD Student* at PROPAR / Faculty of Architecture, Federal University Rio Grande do Sul, Porto Alegre, RS, Brazil Cooperation with

More information

Mobile Payment Technology and Competitiveness In the Credit Card Chain

Mobile Payment Technology and Competitiveness In the Credit Card Chain The Flagship Research Journal of International Conference of the Production and Operations Management Society Volume 2 Number 2 July - December 2009 Mobile Payment Technology and Competitiveness In the

More information

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd michaels@radware.com

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd michaels@radware.com Protection against DDoS and WEB attacks Michael Soukonnik Radware Ltd michaels@radware.com Landscape Ponemon Research 2012: Cyber security threats Cyber security threats according to risk mitigation priority

More information

IBM zenterprise The Modern Mainframe

IBM zenterprise The Modern Mainframe IBM zenterprise The Modern Mainframe Passado, presente e Futuro Fernando Ferreira ATS - zchampion IBM Academy History and technology are sometimes opposite terms. Why IBM can have history and technology

More information

Capybara. Exemplos de configuração. Com cucumber-rails. Com cucumber sem Rails. Tags para uso de JS. Nos steps do cucumber. Utilizando com RSpec

Capybara. Exemplos de configuração. Com cucumber-rails. Com cucumber sem Rails. Tags para uso de JS. Nos steps do cucumber. Utilizando com RSpec Capybara Exemplos de configuração Com cucumber-rails Com cucumber sem Rails rails generate cucumber:install -- capybara require 'capybara/cucumber' Capybara.app = MyRackApp Nos steps do cucumber When /I

More information

Streamlining Web and Email Security

Streamlining Web and Email Security How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor

More information

Slides for Chapter 10: Peer-to-Peer Systems

Slides for Chapter 10: Peer-to-Peer Systems Slides for Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Figure 10.1: Distinctions between IP and overlay

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

Classe AGI - PHP 5.x

Classe AGI - PHP 5.x Classe AGI - PHP 5.x Contents Package AGI Procedural Elements 2 agi_lib_v5x.php 2 Package AGI Classes 3 Class AGI 3 Constructor construct 3 Method exec_command 4 Method getagi_env 4 Method getdebug 4 Method

More information

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003 Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while

More information

NUIT Tech Talk. Peeking Behind the Curtain of Security. Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance

NUIT Tech Talk. Peeking Behind the Curtain of Security. Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance NUIT Tech Talk Peeking Behind the Curtain of Security Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance Definitions Malware: The Virus/Trojan software we ve all come

More information

2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program

2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program 2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program WHERE: CENTRO EUROPA-Banco Popular de PR TRAINING CENTER (Frente Centro Bellas Artes, Ave Ponce De León, Santurce

More information

MOBILE FINANCIAL SERVICES. GUSTAVO CHAPARRO Gemalto

MOBILE FINANCIAL SERVICES. GUSTAVO CHAPARRO Gemalto MOBILE FINANCIAL SERVICES GUSTAVO CHAPARRO Gemalto Mobile Financial Services Speed and ease of access Internet Cost per transaction IVRs US$ 1,19 ATMs POS Branch Office US$ 0,62 US$ 0,40 US$ 0,28 US$ 0,10

More information

STRATEGIC PLAN FOR BRAZILIAN FRUITS: A PROPOSAL TO INCREASE THE COMPETITIVENESS OF THE SECTOR IN THE INTERNATIONAL MARKET

STRATEGIC PLAN FOR BRAZILIAN FRUITS: A PROPOSAL TO INCREASE THE COMPETITIVENESS OF THE SECTOR IN THE INTERNATIONAL MARKET STRATEGIC PLAN FOR BRAZILIAN FRUITS: A PROPOSAL TO INCREASE THE COMPETITIVENESS OF THE SECTOR IN THE INTERNATIONAL MARKET JOSÉ GUILHERME AMBRÓSIO NOGUEIRA School of Economics and Business (FEARP) University

More information

New words to remember

New words to remember Finanza Toolbox Materials Credit Cards, Debit Cards and ATM Cards New words to remember charging minimum payment credit limit interest PIN check register What is a Credit Card? A credit card is a thin

More information

Website and Email Orientation Book

Website and Email Orientation Book BC Regional Service Committee of Narcotics Anonymous Website and Email Orientation Book Making the website part of Service BCRSCNA 2013 P a g e 1 Welcome to the BC Regional website and email service. This

More information

Preguntas + frecuentes sobre Embarcadero Delphi Prism XE

Preguntas + frecuentes sobre Embarcadero Delphi Prism XE Preguntas + frecuentes sobre Embarcadero Delphi Prism XE Danysoft Representante exclusivo en la península ibérica What is Delphi Prism XE? Embarcadero Delphi Prism XE provides a cross platform development

More information

Profissionais que pretendam desempenhar funções de Administrador de software como serviço (SaaS) ou de aplicações cloud.

Profissionais que pretendam desempenhar funções de Administrador de software como serviço (SaaS) ou de aplicações cloud. MCSA Office 365 [Ativar Portugal] Microsoft - Percursos Com certificação Nível: Avançado Duração: 41h Sobre o curso A GALILEU integrou na sua oferta formativa o Percurso de Formação e Certificação MCSA

More information

Company Profile 2 0 1 5

Company Profile 2 0 1 5 Company Profile 2 0 1 5 TABLE OF CONTENTS 1. Business Background...... 1 1.1 Vision....... 1 1.2 Mission. 1 1.3 Goals.. 1 2. Corporate Information. 2 3. Scope of Expertise 3 3. Services Offered.... 4 Portfolio

More information

Protecting against Mobile Attacks

Protecting against Mobile Attacks 2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537 2 Agenda Attacks moving to mobile

More information

(` Online Read Introduo ao Disciplined Agile Delivery: A Pequena Jornada de um Time gil do Scrum ao Continuous Delivery (Portuguese...

(` Online Read Introduo ao Disciplined Agile Delivery: A Pequena Jornada de um Time gil do Scrum ao Continuous Delivery (Portuguese... (` Online Read Introduo ao Disciplined Agile Delivery: A Pequena Jornada de um Time gil do Scrum ao Continuous Delivery (Portuguese... to get free ebooks ID:ruojde Click Here to Read Introduo ao Disciplined

More information

An Overview of the Gas Master Plan MOZAMBIQUE GAS & OIL SEMINAR

An Overview of the Gas Master Plan MOZAMBIQUE GAS & OIL SEMINAR An Overview of the Gas Master Plan MOZAMBIQUE GAS & OIL SEMINAR Johannesburg, 21 st August 2014 The Extractive Industry in Mozambique Mozambique is a country with vast potential and a variety of mineral

More information

Remote Desktop Web Access. Using Remote Desktop Web Access

Remote Desktop Web Access. Using Remote Desktop Web Access Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off

More information

Online Products. Maximize your participation with the. The World s Leading Events Organizer

Online Products. Maximize your participation with the. The World s Leading Events Organizer The World s Leading Events Organizer Wherever in the world you want to do business...... our events deliver contacts, content and communities with the power to transform your business Maximize your participation

More information

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry

More information