Tecnologia da Informática Márcio Francisco Dutra e Campos

Posts Tagged ‘segurança’

The future is the Internet of Things

10.30.2015 · Posted in Eng. Computação

“Even before there was a World Wide Web, there was an Internet of Things”. “IoT is about to explode, perhaps literally, if privacy and security issues aren’t fixed”. Leia o artigo em: http://arstechnica.com/unite/2015/10/the-future-is-the-internet-of-things-deal-with-it/ ...

Comments Off on The future is the Internet of Things Tags: ,

How Diffie-Hellman Fails in Practice

10.16.2015 · Posted in Eng. Computação

A troca de chaves é o calcanhar de Aquiles dos mecanismos de criptografia. O Algoritmo de Diffie-Hellman tem sido utilizado há anos para compartilhar chaves secretas e, até então, era tido como um mecanismo “seguro”. Mas, como afirmam os hackers, “não existe rede, algoritmo, protocolo ou aplicação segura”. O NSA que o diga. Leia o artigo ...

Comments Off on How Diffie-Hellman Fails in Practice Tags: , ,

Computer Virus Catalog

07.26.2014 · Posted in Direito Virtual, Eng. Computação

Computer viruses have come a long way, starting as the practical jokes of computing’s early days and ending up as modern military weapons. A site calledComputer Virus Catalog is walking through the history one virus at a time, pairing each one with a fitting illustration. Leia mais em: An illustrated history of the computer virus http://www.computerviruscatalog.com/ ...

Reset the Password on Every Operating System

07.11.2014 · Posted in Eng. Computação

Passwords can be reset or bypassed on every operating system. On Windows, Linux, and Mac OS X, you can gain access to a computer’s unencrypted files after resetting the password — the password doesn’t actually prevent access to your files. On other devices where you can’t gain access to the files, you can still reset the ...

Relatório Norton 2013

“O Relatório da Norton 2013 (Norton Report), anteriormente chamado de Norton Cibercrime Report, é um dos maiores estudos do mundo sobre cibercrime com foco nos consumidores, baseado nas experiências relatadas por mais de 13 mil usuários adultos em 24 países, incluindo Brasil, Colombia e México. O objetivo do estudo é comprender como o crime virtual ...

Acoustical Mesh Network

12.20.2013 · Posted in Eng. Computação, Eng. Eletrônica

Mais uma ameaça: Acoustical Mesh Network. “Scientist-developed malware covertly jumps air gaps using inaudible sound” Leia mais sobre o assunto em: http://arstechnica.com/security/2013/12/scientist-developed-malware-covertly-jumps-air-gaps-using-inaudible-sound/ http://arstechnica.com/security/2013/12/new-attack-steals-e-mail-decryption-keys-by-capturing-computer-sounds/ ...

Buffer Overflow Attack Explained

07.01.2013 · Posted in Eng. Computação

“Buffer overflow attacks have been there for a long time. It still exists today partly because of programmers carelessness while writing a code. The reason I said ‘partly’ because sometimes a well written code can be exploited with buffer overflow attacks, as it also depends upon the dedication and intelligence level of the attacker.” Leia ...