• /content/pt-br/images/repository/fall-back/37.jpg

    O que são ferramentas maliciosas?

    Malicious Tools are malicious software programs that have been designed for automatically creating viruses, worms or Trojans , conducting DoS attacks on remote servers, hacking other computers, and more...

    Read More
  • /content/pt-br/images/repository/fall-back/55.jpg

    Crime virtual

    Perhaps the most dangerous types of malware creators are the hackers and groups of hackers that create malicious software programs in an effort to meet their own specific criminal objectives...

    Read More
  • /content/pt-br/images/repository/fall-back/15.jpg

    Vandalismo de computadores

    In everyday life, there are vandals that seem to enjoy destroying things – even though it can be hard to understand how they derive any tangible benefit from their acts of vandalism. Unfortunately, the same type of behaviour is also present in cyberspace...

    Read More
  • /content/pt-br/images/repository/fall-back/39.jpg

    Apropriação indevida

    The fact that Kaspersky Lab has not recorded malware that uses exploits in Android to perform a drive-by attack may seem positive, but only at a first glance.The fact that Kaspersky Lab has not recorded malware that uses exploits in Android to perform a drive...

    Read More
  • /content/pt-br/images/repository/fall-back/31.jpg

    O que é pornware?

    Pornware é o nome dado a uma classe de programas que exibem material pornográfico em um dispositivo. Além dos programas que os usuários podem instalar por conta própria em seus computadores e dispositivos móveis, com o intuito de procurar e exibir materiais pornográficos, o pornware também abrange programas instalados maliciosamente, sem que o usuário saiba de sua presença.

    Read More
  • /content/pt-br/images/repository/fall-back/17.jpg

    Quem cria malwares?

    If you’re mystified as to why someone would want to put so much effort into attacking your computer or your mobile device, let’s take a moment to consider the type of people that become malware creators… and how they benefit from creating malware...

    Read More
  • /content/pt-br/images/repository/fall-back/32.jpg

    Mercado paralelo

    In addition to students writing computer viruses and cybercriminals developing malicious software for personal gain, there are also threats from ‘grey business’ operations that undertake activities that are on the edge of – or just beyond – what’s legal.

    Read More
  • /content/pt-br/images/repository/fall-back/04.jpg

    Danos causados por malware

    Computer viruses, worms and Trojan viruses can cause many different types of damage to computers, networks, mobile devices and data.

    Read More
  • /content/pt-br/images/repository/fall-back/25.jpg

    Disponibilidade de documentação

    Most Operating System (OS) providers will ensure that they publish sufficient technical information – to enable legitimate programmers to write applications that run on the OS. However, this same documentation can also be used by malware creators, in order to develop computer viruses, worms and Trojans that attack computers that are running the OS.

    Read More
  • /content/pt-br/images/repository/fall-back/12.jpg

    Combinação entre técnicas de engenharia social e implementação de malware

    Cybercriminals will often use a combination of social engineering methods and malware implementation techniques – in order to maximise the chances of infecting users’ computers...

    Read More
Resources not available.