O mercado negro dos crimes cibernéticos no Brasil. Ronaldo Lima Aline Bueno
|
|
- Janis Rogers
- 8 years ago
- Views:
Transcription
1 O mercado negro dos crimes cibernéticos no Brasil Ronaldo Lima Aline Bueno
2 Agenda O mercado negro dos crimes cibernéticos no Brasil Cenário O mercado negro brasileiro Como eles trabalham Crimeware Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 2
3 Alguns números A Febraban estima que fraudes eletrônicas tenham causado prejuízos de cerca de R$1.4 billhão aos bancos em O número de transações bancárias online (Internet Banking and Mobile Banking) ultrapassou o número de transações feitas em agências bancária. O Brasil já é o segundo maior mercado de cartões de crédito e débito do mundo. Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 3
4 Crimes cibérnéticos e bancos brasileiros Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 4
5 O Mercado Negro Brasileiro Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 5
6 Redes sociais Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 6
7 Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 7
8 Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 8
9 Testador de Cartão de Crédito Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 9
10 Testador de Cartão de Crédito Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 10
11 Websites/Blogs Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 11
12 Websites/Blogs Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 12
13 Websites/Blogs Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 13
14 Canais de IRC Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 14
15 Fórums Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 15
16 Fórums Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 16
17 Negociações Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 17
18 Negociações Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 18
19 Como eles trabalham Não gostam de pagar por hosting Free, invadido, dropbox, google code, google drive... Pouco uso de servidores dedicados UOL HOST + DB Linguagens: + populares: Delphi, Visual Basic, PHP usos específicos: Applet Java (drive by download), AutoIt (crypters) Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 19
20 Distribuição de malware Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 20
21 Ferramentas / Crimeware Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 21
22 Crypter Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 22
23 Envio de SPAM Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 23
24 Envio de SPAM Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 24
25 Sugador Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 25
26 Sugador Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 26
27 Extensão Maliciosa Google Chrome Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 27
28 Extensão Maliciosa Google Chrome Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 28
29 Spy Net RAT (Remote Access Tool) Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 29
30 Spy Net RAT Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 30
31 Spy Net RAT Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 31
32 KL Remota Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 32
33 KL Remota Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 33
34 KL Remota Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 34
35 Botnet Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 35
36 Botnet Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 36
37 Botnet Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 37
38 Atendimento ao vivo para os clientes Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 38
39 Painel de Administração Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 39
40 Painel de Administração Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 40
41 Painel de Administração Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 41
42 Conclusões e Projeções Impunidade = criminosos agem sem medo Uso de ferramentas personalizadas (criatividade) Reuso de código disponível na web Tendências: automatização, profissionalização, mercados estrangeiros Ainda há espaço para o crescimento de Internet Banking... Vamos trocar informações técnicas! Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 42
43 Obrigado! Ronaldo Aline Proprietary and Confidential Information. Copyright 2014, isight Partners, Inc. All Rights Reserved 43
TRANSFERÊNCIAS BANCÁRIAS INTERNACIONAIS
Os clientes Markets.com podem reforçar a sua conta por transferência através de vários bancos à volta do mundo. Veja a lista abaixo para mais detalhes: TRANSFERÊNCIAS BANCÁRIAS INTERNACIONAIS ROYAL BANK
More informationEmpresas líderes usam TI como direcionador de inovação e mudança
Convivendo com a Complexidade Simplificando a T.I. Cyro Diehl 1 71% das Empresas Dizem que inovação é o fator #1 de competitividade Empresas líderes usam TI como direcionador de inovação e mudança Contudo,
More informationViagem da Austrália July 2013 13 a 23 de Julho
Viagem da Austrália July 2013 13 a 23 de Julho P O Box 40827 Kerikeri NEW ZEALAND Phone: 64 9 407 9514 Fax: 64 9 407 9114 Nós (Nomes dos pais) gostaríamos de autorizar a participação do nosso(a) filho
More informationLearn-Portuguese-Now.com presents... 100 PHRASES. What Did You Say? by Charlles Nunes
Learn-Portuguese-Now.com presents... English-Portuguese Flash Cards 100 PHRASES What Did You Say? by Charlles Nunes English-Portuguese Flash Cards 100 Phrases Congratulations! By downloading this volume
More informationCertification Protocol For Certifica Minas Café - UTZ Certified
Certification Protocol For Certifica Minas Café - UTZ Certified Certification Protocol Version 1.1, February 2014 www.utzcertified.org Copies of this document are available for free in electronic format
More informationEU project to bridge digital divide in Latin America
Publication: Cordis Date: 05 06 07 EU project to bridge digital divide in Latin America As information and communication technologies bring many benefits to societies, an EU funded project is aiming to
More informationEnter Here -> Fernando DLn Posicionamiento Web Mercado De Afiliados - User Experience > Click Now <
Posicionamiento web blogger, good affiliate marketing books, manual de posicionamiento web seo, can i do affiliate marketing on facebook, posicionar tu web en google. Enter Here -> Fernando DLn Posicionamiento
More informationThe Brazilian Underground Market
A Trend Micro Research Paper Cybercriminal Underground Economy Series The Brazilian Underground Market The Market for Cybercriminal Wannabes? Fernando Mercês Forward-Looking Threat Research Team CONTENTS
More informationViagem da Ilha do Sul FERIAS Abril 2013
P O Box 40827 Kerikeri NEW ZEALAND Phone: 64 9 407 9514 Fax: 64 9 407 9114 Viagem da Ilha do Sul FERIAS Abril 2013 Nós (Nomes dos pais) gostaríamos de autorizar a participação do nosso(a) filho (a) Na
More informationTenha um domínio do REGEDIT do Windows
www.hackerdopc.blogspot.com Tenha um domínio do REGEDIT do Windows #01 Bloquear acesso ao Painel de Controle NoControlPanel #02 Forçar o estilo clássico no Painel de Controle ForceClassicControlPanel /t
More informationInovando sistemas com arquiteturas elásticas
Inovando sistemas com arquiteturas elásticas Renato Bognar Principal System Engineer 1 Agenda Quais são os desafios de construir ua aplicação? Quais os pontos de atenção? Vai construir Apps móveis? Desfazendo
More informationO que interessa não é o servidor web GTS 13 São Paulo, Brasil
O que interessa não é o servidor web GTS 13 São Paulo, Brasil Luiz Eduardo DoS Santos CISSP GISP GCIH CEH CWNE Senior Security Engineer Latin America O que interessa não é (apenas) o servidor web GTS 13
More informationArcHC_3D research case studies (FCT:PTDC/AUR/66476/2006) Casos de estudo do projecto ArcHC_3D (FCT:PTDC/AUR/66476/2006)
ArcHC_3D research case studies (FCT:PTDC/AUR/66476/2006) Casos de estudo do projecto ArcHC_3D (FCT:PTDC/AUR/66476/2006) 1 Casa de Valflores - Loures 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Capela de S. Frutuoso
More informationMarcelo L. Braunstein Business Development Manager IBM Latin America marcelol@br.ibm.com
Marcelo L. Braunstein Business Development Manager IBM Latin America marcelol@br.ibm.com Education Research LA Grid Collaboration Talent Development 1 Education Research Collaboration Talent Development
More informationSeu servidor deverá estar com a versão 3.24 ou superior do Mikrotik RouterOS e no mínimo 4 (quatro) placas de rede.
Provedor de Internet e Serviços - (41) 3673-5879 Balance PCC para 3 links adsl com modem em bridge (2 links de 8mb, 1 link de 2mb). Seu servidor deverá estar com a versão 3.24 ou superior do Mikrotik RouterOS
More informationC COMO PROGRAMAR DEITEL PDF
C COMO PROGRAMAR DEITEL PDF ==> Download: C COMO PROGRAMAR DEITEL PDF C COMO PROGRAMAR DEITEL PDF - Are you searching for C Como Programar Deitel Books? Now, you will be happy that at this time C Como
More informationClientes utilizando SAP em Oracle Database 11g Release
Clientes utilizando SAP em Oracle Database 11g Release Elizabeth Faria Sales Consulting Manager 1 Agenda Certificação do Oracle 11g para SAP Novidades do Oracle 11g R2 para SAP Uso
More informationmarcelol@br.ibm.com (55-21)546-3500 T/L: 831-3500 http://www.s390.ibm.com/brasil/
Apresentação para: Exploradores do OS/390 Marcelo L. Braunstein marcelol@br.ibm.com (55-21)546-3500 T/L: 831-3500 http://www.s390.ibm.com/brasil/ 10/99 9:00 Abertura 9:15 Torne sua empresa mais competitiva
More informationCopyright 2013 wolfssl Inc. All rights reserved. 2
- - Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 2 Copyright 2013 wolfssl Inc. All rights reserved. 3 Copyright 2013 wolfssl Inc. All rights reserved.
More informationA tecnologia transforma a vida das pessoas e das empresas e o Big data revoluciona o marketing
A tecnologia transforma a vida das pessoas e das empresas e o Big data revoluciona o marketing Cezar Taurion Executivo de Novas Tecnologias Chief Evangelist ctaurion@br.ibm.com TUDO EM TEMPO REAL TECNOLOGIA
More informationSBGames 2007 Relato Computing Track Full Papers
SBGames 2007 Relato Computing Track Full Papers Marcelo Walter, Bruno Feijó, Jorge Barbosa 9/novembro/2007 Estatísticas 55 papers sem problemas 4 papers com problemas (fora do prazo, artigo não submetido)
More informationThe Impacts of Trade Facilitation on the Economy of Brazil and its Manufacturing Sector
The Impacts of Trade Facilitation on the Economy of Brazil and its Manufacturing Sector Lucas Ferraz Professor of São Paulo School of Economics at Getulio Vargas Foundation Head of Economic Modeling at
More informationMitos sobre proteção de redes WiFi. Nelson Murilo http://twitter.com/nelsonmurilo
Mitos sobre proteção de redes WiFi Nelson Murilo http://twitter.com/nelsonmurilo Agenda Descrição dos mitos Onde eles falham O que funciona Nome da rede CH 10 ][ Elapsed: 9 mins ][ 2009-08-28 14:24 BSSID
More informationIntrodução aos Sistemas Distribuídos
O que é um Sistema Distribuído? Introdução aos Sistemas Distribuídos Um sistema distribuído consiste num conjunto de máquinas que trabalham de forma coordenada e conjunta para resolver um determinado problema.
More informationClick Here -> Multinivel - Cómo afiliar de 5 a 20 nuevos socios al mes en tu multinivel
Empresas que trabalham com marketing multinivel no brasil, empresas marketing multinivel gratis, social media marketing plan strategy. Click Here -> Multinivel - Cómo afiliar de 5 a 20 nuevos socios al
More informationThe Internet of Things Regional Forum Brazil Wrap up Session. Severiano Leão Macedo Junior IoT PSS da CISCO Brasil June 16th, 2016
The Internet of Things Regional Forum Brazil Wrap up Session Severiano Leão Macedo Junior IoT PSS da CISCO Brasil June 16th, 2016 IoT Key Enabler of Digitization Across Industries IoT Enabling Transformation
More informationWorldwide, 3.3 million deaths in 2012 were due to harmful use of alcohol
WHO calls on governments to do more to prevent alcohol-related deaths and diseases Worldwide, 3.3 million deaths in 2012 were due to harmful use of alcohol 12 MAY 2014 GENEVA Worldwide, 3.3 million deaths
More informationChallenges and opportunities in the Digital World: Brazil perspective
Challenges and opportunities in the Digital World: Brazil perspective Virgilio A. F. Almeida National Secretary for Information Technology Policies Ministry of Science, Technology and Innovation São Paulo,
More informationEndnote Web tutorial for BJCVS/RBCCV
Oliveira MAB, SPECIAL et al. - Endnote ARTICLE Web tutorial for BJCVS/RBCCV Endnote Web tutorial for BJCVS/RBCCV Tutorial do Endnote Web para o BJCVS/RBCCV Marcos Aurélio Barboza de Oliveira 1, MD, PhD;
More informationLogística Empresarial - Uma disciplina Vital. Missão da Logística. Supply Chain Management Gerenciamento da Cadeia de Suprimentos. Capítulo 1 - Ballou
Logística Empresarial - Uma disciplina Vital Supply Chain Management Gerenciamento da Cadeia de Suprimentos Capítulo 1 - Ballou Missão da Logística A missão da logística é dispor da mercadoria ou o serviço
More informationMEET THE MARKET 2015
MEET THE MARKET 2015 Ambassador Alex Ellis < Picture to go here > Inga Beale CEO Lloyd s 3 The Navigators Group, Inc. Lloyd s Meet the Market 2015 Rio De Janeiro Stephen Coward President, Navigators Technical
More informationSpyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
More informationSUITABILITY OF RELATIVE HUMIDITY AS AN ESTIMATOR OF LEAF WETNESS DURATION
SUITABILITY OF RELATIVE HUMIDITY AS AN ESTIMATOR OF LEAF WETNESS DURATION PAULO C. SENTELHAS 1, ANNA DALLA MARTA 2, SIMONE ORLANDINI 2, EDUARDO A. SANTOS 3, TERRY J. GILLESPIE 3, MARK L. GLEASON 4 1 Departamento
More informationGerando Rotas BGP. Tutorial BGP - GTER
Gerando Rotas BGP 1 BGP Gerando rotas internas BGP 192.168.1.0/24 Injetar agregado 192.168.0.0/21 192.168.2.0/24 10.0.0.4 mexico 10.0.0.2 OSPF AS 65000 10.0.0.5 chile PONTO DE OBSERVAÇÃO 192.168.8.0/24
More informationCoverage of the Brazilian population 18 years and older by private health plans: an analysis of data from the World Health Survey
ARTIGO ARTICLE S119 Coverage of the Brazilian population 18 years and older by private health plans: an analysis of data from the World Health Survey Cobertura da população brasileira com 18 anos ou mais
More informationSymfony2: estudo de caso IngressoPrático
Symfony2: estudo de caso IngressoPrático Symfony2 is a reusable set of standalone, decoupled and cohesive PHP components that solve common web development problems Fabien Potencier, What is Symfony2? 2/73
More informationCompetitive intelligence: functional practices, goals and infrastructure of companies in Brazil
Competitive intelligence: functional practices, goals and infrastructure of companies in Brazil Inteligência competitiva: práticas funcionais, objetivos e infraestrutura em empresas no Brasil Frederico
More informationTestes de Software. com python
Testes de Software com python Wednesday, August 24, 2011 eu sou... Tarsis Azevedo blog.tarsisazevedo.com @tarsisazevedo desenvolvedor globo.com #cobrateam Wednesday, August 24, 2011 globo.com Python/Ruby/Java/PHP/C/Perl
More informationCRM: customer relationship management: o revolucionário marketing de relacionamento com o cliente P
CRM: customer relationship management: o revolucionário marketing de relacionamento com o cliente Download: CRM: customer relationship management: o revolucionário marketing de relacionamento com o cliente
More information03 infra TI RAID. MTBF; RAID Protection; Mirroring and Parity; RAID levels; write penalty
03 infra TI RAID MTBF; RAID Protection; Mirroring and Parity; RAID levels; write penalty Por que RAID? Redundant Array Inexpensive Disks x Redudant Array Independent Disks Performance limitation of disk
More informationXMLs para o e-rede estamos todos ligados
Manual de XMLs para o e-rede estamos todos ligados Cenários 01 02 03 04 Crédito 17 1.1 Setup 17 Request 17 Response 18 Crédito com Risco 19 2.1 Setup 19 Request 19 Response 21 Crédito com Risco 3DS 22
More informationHow To Improve Service Management For Effective It Governance
Universidade de São Paulo Brasil Centro de Computação Eletrônica (CCE) Improving Service Management for Effective IT Governance Mauro Cesar Bernardes mcesar@usp.br Tereza Cristina M.B. Carvalho carvalho@larc.usp.br
More informationBoletim Técnico. Esta implementação consiste em atender a legislação do intercâmbio eletrônico na versão 4.0 adotado pela Unimed do Brasil.
Produto : Totvs + Foundation Saúde + 11.5.3 Chamado : TFOQEI Data da criação : 27/08/12 Data da revisão : 10/09/12 País(es) : Brasil Banco(s) de Dados : Esta implementação consiste em atender a legislação
More informationREDES DE ARMAZENAMENTO E ALTA DISPONIBILIDADE
REDES DE ARMAZENAMENTO E ALTA DISPONIBILIDADE O que é SAN? SAN Storage Área Network Rede de armazenamento. É uma rede de alta velocidade dedicada que possui servidores e recursos compartilhados de STORAGE
More informationEvaluation of a Segmental Durations Model for TTS
Speech NLP Session Evaluation of a Segmental Durations Model for TTS João Paulo Teixeira, Diamantino Freitas* Instituto Politécnico de Bragança *Faculdade de Engenharia da Universidade do Porto Overview
More informationOnce you have gathered all the information required please send to Key Travel s visa department
Dear Applicant, Thank you for choosing Key Travel to handle your visa application to Angola Your visa pack contains: Embassy Information Visa requirements for Business and Tourist applications Application
More informationGENERAL MEETING OF MARTIFER - SGPS, S.A. 10 th April 2013
[This translation into English of the Portuguese document was made only for the convenience of non- Portuguese speaking shareholders. For all intents and purposes, the Portuguese version shall prevail.]
More informationMicrosoft Azure: Opção de Nuvem para Todo o Desenvolvedor. Danilo Bordini & Osvaldo Daibert Microsoft Brasil @dbordini @daibert
Microsoft Azure: Opção de Nuvem para Todo o Desenvolvedor Danilo Bordini & Osvaldo Daibert Microsoft Brasil @dbordini @daibert Open Source on Microsoft Azure Two categories Compute Data IaaS, PaaS, and
More informationDownload, For Free, 2012 silverpop email marketing metrics benchmark study ebook. More Details: http://f-ebook.esy.es/freead8291/pdx/fph1
Download, For Free, 2012 silverpop email marketing metrics benchmark study ebook Download, For Free, 2012 silverpop email marketing metrics benchmark study ebook More Details: http://f-ebook.esy.es/freead8291/pdx/fph1
More informationBtoB MKT Trends. El Escenario Online. Luciana Sario. Gerente de Marketing IDC Latin America 2009 IDC W W W. I D C. C O M / G M S 1
BtoB MKT Trends El Escenario Online Luciana Sario Gerente de Marketing IDC Latin America 2009 IDC W W W. I D C. C O M / G M S 1 Audio Test Estamos haciendo un Audio Test y estoy hablando en este momento
More informationEstrategias para la Reducción de Riesgos y Ciber Ataques
Estrategias para la Reducción de Riesgos y Ciber Ataques Luis Zamora Consultor en Tecnología 1 This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality,
More informationDevelopment and Implementation of Tickets For Fun E-commerce Merchandising Stores.
Rafael Koch Rossi Digital Marketing and Project Analyst at Tickets For Fun rkrossi@gmail.com Summary Digital Marketing Professional with broad experience on digital consumer, social media behavior, metrics
More informationHow to Secure TYPO3 Installations
How to Secure TYPO3 Installations Jochen Weiland April 2011 "Viagra Hack" Searching for "Viagra" lists unrelated pages in Google Beispiel Beispiel "Exclusive: Many TYPO3 Sites have been hacked" April 27,
More informationVoice over IP at the Portuguese NREN
Voice over IP at the Portuguese NREN Instituto Superior Técnico Lisboa - March, 22 2006 sip:voip@fccn.pt 1 FCCN FCCN runs and manages the Portuguese NREN, TLD.pt and Portuguese IX; More than 100 Higher
More informationDetecting and Exploiting XSS with Xenotix XSS Exploit Framework
Detecting and Exploiting XSS with Xenotix XSS Exploit Framework ajin25@gmail.com keralacyberforce.in Introduction Cross Site Scripting or XSS vulnerabilities have been reported and exploited since 1990s.
More informationIf you have any questions during your application process, please call 1-800-799-6560 to speak with a customer service representative.
Dear Valued Client, Thank you for choosing CVSC for your passport and travel visa need. The following visa application kit provides information ensuring that your visa application is smoothly processed.
More informationEDUCATIONAL POSSIBILITIES OF THE USE OF YOUTUBE VIDEO ANNOTATIONS
EDUCATIONAL POSSIBILITIES OF THE USE OF YOUTUBE VIDEO ANNOTATIONS Rio de Janeiro - RJ - April 2004 Adriana Dallacosta - Brazilian Army Culture and Education Department - adrianadalla@uol.com.br Class -
More informationNADABAS. Report from a short term mission to the National Statistical Institute of Mozambique, Maputo Mozambique. 16-27 April 2012
MZ:2012:04r NADABAS Report from a short term mission to the National Statistical Institute of Mozambique, Maputo Mozambique 16-27 April 2012 within the frame work of the AGREEMENT ON CONSULTING ON INSTITUTIONAL
More informationImproving Organizational Management through Social Networking
Improving Organizational Management through Social Networking Ezequiel Ferreira dos Santos Master's Degree in Business Administration Universidade Nove de Julho - Uninove Memorial Campus. São Paulo, Brasil.
More informationSUPPORT PROGRAM TRANSLATION AND PUBLICATION OF BRAZILIAN AUTHORS
SUPPORT PROGRAM TRANSLATION AND PUBLICATION OF BRAZILIAN AUTHORS The Brazilian National Library Foundation hereby announces that it will offer grants to foreign publishing houses that wish to translate,
More informationO que é WinRDBI O WinRDBI (Windows Relational DataBase Interpreter) é uma ferramenta educacional utilizada pela Universidade do Estado do Arizona, e que fornece uma abordagem ativa para entender as capacidades
More informationThe anatomy of an online banking fraud
The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to valentin@xenuser.org (March2010) I. What this document is about II. Introduction III. The anatomy of an
More informationCERT.br Incident Handling and Network Monitoring Activities
CERT.br Incident Handling and Network Monitoring Activities Cristine Hoepers General Manager cristine@cert.br! Computer Emergency Response Team Brazil - CERT.br Network Information Center Brazil - NIC.br
More informationFemale 13-18, fans of the TV series, 30-40
Synopsis: Baseado no livro homônimo de Maria Mariana, que também originou a peça teatra Marketing Positioning: Female 13-18, fans of the TV series, 30-40 Cast: Sophia Abrahão, Bella Camero, Malu Rodrigues,
More informationMobile First, Cloud First
DX VIPP Pilot available 15 countries worldwide 4 industry verticals Healthcare Manufacturing H Government Retail US Germany India UK Israel Canada Netherlands Australia France Russia Brazil Italy China
More informationUse of the Internet as a source of information about plastic surgery in Bahia, Brazil
ORIGINAL ARTICLE Use of the Internet as a source of Vendramin information Franco T FS et about al. et al. plastic surgery in Bahia, Brazil Use of the Internet as a source of information about plastic surgery
More informationTourist Visa for Angola. Thank you for requesting an application pack for a tourist visa for Angola.
Tourist Visa for Angola Thank you for requesting an application pack for a tourist visa for Angola. To obtain your visa the following are required: Passport (valid for at least 9 months) 2 clear pages
More informationAdvanced Online Threat Protection: Defending. Malware and Fraud. Andrew Bagnato Senior Systems Engineer
Advanced Online Threat Protection: Defending Your Online Banking Customers Against Modern Malware and Fraud Andrew Bagnato Senior Systems Engineer Agenda Modern malware a targets Account credentials Financial
More informationCurrently pursuing a Master s degree in Criminal Law at the Faculty of Law of the University of Lisbon.
DAVID SILVA RAMALHO Date and Place of Birth: 1988, Lisbon Bar Membership number: 52872L E-mail: dsr@servulo.com QUALIFICATIONS Currently pursuing a Master s degree in Criminal Law at the Faculty of Law
More informationHow to work with a video clip in EJA English classes?
How to work with a video clip in EJA English classes? Introduction Working with projects implies to take into account the students interests and needs, to build knowledge collectively, to focus on the
More informationSome Perspectives On Cybersecurity. Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org
Some Perspectives On Cybersecurity Shernon Osepa Manager Regional Affairs Latin America & Caribbean www.internetsociety.org Agenda What is the Internet Society (ISOC) On the IETF Cyber Security Themes
More informationSURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS
SURVEY RESULTS CYBER-SECURITY PRACTICES OF MINNESOTA REGISTERD INVESTMENT ADVISERS Minnesota Department of Commerce July 2014 GENERIC FIRM INFORMATION Has your firm been the subject of a cyber-security
More informationProva Escrita de Inglês
EXAME FINAL NACIONAL DO ENSINO SECUNDÁRIO Prova Escrita de Inglês 11.º Ano de Escolaridade Continuação bienal Decreto-Lei n.º 139/2012, de 5 de julho Prova 550/1.ª Fase 8 Páginas Duração da Prova: 120
More informationUn mundo de Clouds: Seguridad y Adopción. Cisco + Intel. Pilar Santamaria. Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa
Un mundo de Clouds: Seguridad y Adopción Cisco + Intel Pilar Santamaria Directora de Desarrollo Neg. y Ciberseguridad, Región Sur de Europa Tendencias: Movilidad y Datos Adopción y Estrategia Seguridad
More informationIncremental Housing in Brazil: Research and Design methods
Andréa Mussi, Incremental Housing in Brazil: Research and Design methods PhD Student* at PROPAR / Faculty of Architecture, Federal University Rio Grande do Sul, Porto Alegre, RS, Brazil Cooperation with
More informationMobile Payment Technology and Competitiveness In the Credit Card Chain
The Flagship Research Journal of International Conference of the Production and Operations Management Society Volume 2 Number 2 July - December 2009 Mobile Payment Technology and Competitiveness In the
More informationProtection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd michaels@radware.com
Protection against DDoS and WEB attacks Michael Soukonnik Radware Ltd michaels@radware.com Landscape Ponemon Research 2012: Cyber security threats Cyber security threats according to risk mitigation priority
More informationIBM zenterprise The Modern Mainframe
IBM zenterprise The Modern Mainframe Passado, presente e Futuro Fernando Ferreira ATS - zchampion IBM Academy History and technology are sometimes opposite terms. Why IBM can have history and technology
More informationCapybara. Exemplos de configuração. Com cucumber-rails. Com cucumber sem Rails. Tags para uso de JS. Nos steps do cucumber. Utilizando com RSpec
Capybara Exemplos de configuração Com cucumber-rails Com cucumber sem Rails rails generate cucumber:install -- capybara require 'capybara/cucumber' Capybara.app = MyRackApp Nos steps do cucumber When /I
More informationStreamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
More informationSlides for Chapter 10: Peer-to-Peer Systems
Slides for Chapter 10: Peer-to-Peer Systems From Coulouris, Dollimore and Kindberg Distributed Systems: Concepts and Design Edition 4, Addison-Wesley 2005 Figure 10.1: Distinctions between IP and overlay
More informationBeyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
More informationClasse AGI - PHP 5.x
Classe AGI - PHP 5.x Contents Package AGI Procedural Elements 2 agi_lib_v5x.php 2 Package AGI Classes 3 Class AGI 3 Constructor construct 3 Method exec_command 4 Method getagi_env 4 Method getdebug 4 Method
More informationLectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003
Lectures 9 Advanced Operating Systems Fundamental Security Computer Systems Administration TE2003 Lecture overview At the end of lecture 9 students can identify, describe and discuss: Main factors while
More informationNUIT Tech Talk. Peeking Behind the Curtain of Security. Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance
NUIT Tech Talk Peeking Behind the Curtain of Security Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance Definitions Malware: The Virus/Trojan software we ve all come
More information2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program
2013 ASIS PUERTO RICO CHAPTER Inc. PRESENTS: 2013 SECURITY PROGRAM DESIGN 2-Day Program WHERE: CENTRO EUROPA-Banco Popular de PR TRAINING CENTER (Frente Centro Bellas Artes, Ave Ponce De León, Santurce
More informationMOBILE FINANCIAL SERVICES. GUSTAVO CHAPARRO Gemalto
MOBILE FINANCIAL SERVICES GUSTAVO CHAPARRO Gemalto Mobile Financial Services Speed and ease of access Internet Cost per transaction IVRs US$ 1,19 ATMs POS Branch Office US$ 0,62 US$ 0,40 US$ 0,28 US$ 0,10
More informationSTRATEGIC PLAN FOR BRAZILIAN FRUITS: A PROPOSAL TO INCREASE THE COMPETITIVENESS OF THE SECTOR IN THE INTERNATIONAL MARKET
STRATEGIC PLAN FOR BRAZILIAN FRUITS: A PROPOSAL TO INCREASE THE COMPETITIVENESS OF THE SECTOR IN THE INTERNATIONAL MARKET JOSÉ GUILHERME AMBRÓSIO NOGUEIRA School of Economics and Business (FEARP) University
More informationNew words to remember
Finanza Toolbox Materials Credit Cards, Debit Cards and ATM Cards New words to remember charging minimum payment credit limit interest PIN check register What is a Credit Card? A credit card is a thin
More informationWebsite and Email Orientation Book
BC Regional Service Committee of Narcotics Anonymous Website and Email Orientation Book Making the website part of Service BCRSCNA 2013 P a g e 1 Welcome to the BC Regional website and email service. This
More informationPreguntas + frecuentes sobre Embarcadero Delphi Prism XE
Preguntas + frecuentes sobre Embarcadero Delphi Prism XE Danysoft Representante exclusivo en la península ibérica What is Delphi Prism XE? Embarcadero Delphi Prism XE provides a cross platform development
More informationProfissionais que pretendam desempenhar funções de Administrador de software como serviço (SaaS) ou de aplicações cloud.
MCSA Office 365 [Ativar Portugal] Microsoft - Percursos Com certificação Nível: Avançado Duração: 41h Sobre o curso A GALILEU integrou na sua oferta formativa o Percurso de Formação e Certificação MCSA
More informationCompany Profile 2 0 1 5
Company Profile 2 0 1 5 TABLE OF CONTENTS 1. Business Background...... 1 1.1 Vision....... 1 1.2 Mission. 1 1.3 Goals.. 1 2. Corporate Information. 2 3. Scope of Expertise 3 3. Services Offered.... 4 Portfolio
More informationProtecting against Mobile Attacks
2014-APR-17 Protecting against Mobile Attacks Frankie Wong Security Analyst, HKCERT 1 Image source: http://www.techweekeurope.co.uk/news/mobile-malware-record-mcafee-125537 2 Agenda Attacks moving to mobile
More information(` Online Read Introduo ao Disciplined Agile Delivery: A Pequena Jornada de um Time gil do Scrum ao Continuous Delivery (Portuguese...
(` Online Read Introduo ao Disciplined Agile Delivery: A Pequena Jornada de um Time gil do Scrum ao Continuous Delivery (Portuguese... to get free ebooks ID:ruojde Click Here to Read Introduo ao Disciplined
More informationAn Overview of the Gas Master Plan MOZAMBIQUE GAS & OIL SEMINAR
An Overview of the Gas Master Plan MOZAMBIQUE GAS & OIL SEMINAR Johannesburg, 21 st August 2014 The Extractive Industry in Mozambique Mozambique is a country with vast potential and a variety of mineral
More informationRemote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
More informationOnline Products. Maximize your participation with the. The World s Leading Events Organizer
The World s Leading Events Organizer Wherever in the world you want to do business...... our events deliver contacts, content and communities with the power to transform your business Maximize your participation
More informationCybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
More information