<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-2154861288917908709</id><updated>2024-12-19T00:21:12.940-03:00</updated><category term="C - Noticias"/><category term="B-Dicas"/><category term="A- Opinião do Autor"/><category term="Videos"/><category term="F - Palestras"/><category term="E - Comentários"/><category term="Links"/><category term="D - CSI"/><category term="G - Politica de Privacidade"/><category term="Pilares da Segurança"/><category term="Redes - Termos Técnicos"/><category term="Virus"/><title type='text'>Segurança da Informação ®</title><subtitle type='html'>&quot;O Maior risco é acreditar que não existe risco&quot;</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>167</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-8655780928591168612</id><published>2015-12-21T18:57:00.001-02:00</published><updated>2015-12-21T18:57:14.471-02:00</updated><title type='text'>Cibercriminosos usam currículos falsos para entregar malware</title><content type='html'>&lt;br /&gt;
&lt;h2&gt;
&lt;b&gt;Com a crise e o&amp;nbsp;consequente&amp;nbsp;aumento da taxa de desemprego,&amp;nbsp;departamentos de RH passam a receber mais currículos, criando oportunidades para golpistas atacarem empresas.&lt;/b&gt;&lt;/h2&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZD8gAstZAgoF4Mk3QK5UqdnGd3VDl6dWiMbcMxS3JuwXe92W2Q-5_WHr_BiqIKChqIqw8rG58L88uIn4GhX8tmLsnPsRwFS7trnlj6Vc_R8C6j35OZHrekjXkf0gIhy-h03YGiHqH8c/s1600/D%25C3%25BAvidas.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;233&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZD8gAstZAgoF4Mk3QK5UqdnGd3VDl6dWiMbcMxS3JuwXe92W2Q-5_WHr_BiqIKChqIqw8rG58L88uIn4GhX8tmLsnPsRwFS7trnlj6Vc_R8C6j35OZHrekjXkf0gIhy-h03YGiHqH8c/s320/D%25C3%25BAvidas.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 13.3333px;&quot;&gt;Os cibercriminosos brasileiros costumam moldar seus ataques aos temas atuais e, assim, enganar o maior número possível de vítimas. Com a situação econômica brasileira em crise e o aumento da taxa de desemprego, os departamentos de Recursos Humanos passam a receber mais currículos, criando oportunidades para golpistas atacarem e infectarem empresas.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; box-shadow: none; box-sizing: border-box; color: #333333; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 13.3333px; outline: 0px !important; text-shadow: none;&quot;&gt;
&lt;div style=&quot;box-shadow: none; box-sizing: border-box; outline: 0px !important; text-shadow: none;&quot;&gt;
&lt;span style=&quot;box-shadow: none; box-sizing: border-box; font-family: Arial, Verdana; font-size: 14px !important; outline: 0px !important; text-shadow: none;&quot;&gt;&lt;br style=&quot;box-shadow: none; box-sizing: border-box; outline: 0px !important; text-shadow: none;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;box-shadow: none; box-sizing: border-box; outline: 0px !important; text-shadow: none;&quot;&gt;
&lt;span style=&quot;box-shadow: none; box-sizing: border-box; font-family: Arial, Verdana; font-size: 14px !important; outline: 0px !important; text-shadow: none;&quot;&gt;O objetivo das mensagens é enganar usuários, incentivando-os a abrir um currículo falso em anexo ou a clicar num link malicioso que irá instalar cavalos de troia para roubar credenciais de acesso de internet banking.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;Leia a matéria na integra aqui:&amp;nbsp;&lt;a href=&quot;http://itforum365.com.br/noticias/detalhe/117994/cibercriminosos-usam-curriculos-falsos-para-entregar-malware&quot; target=&quot;_blank&quot;&gt;itforum365.com.br&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/8655780928591168612/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/12/cibercriminosos-usam-curriculos-falsos.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/8655780928591168612'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/8655780928591168612'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/12/cibercriminosos-usam-curriculos-falsos.html' title='Cibercriminosos usam currículos falsos para entregar malware'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZD8gAstZAgoF4Mk3QK5UqdnGd3VDl6dWiMbcMxS3JuwXe92W2Q-5_WHr_BiqIKChqIqw8rG58L88uIn4GhX8tmLsnPsRwFS7trnlj6Vc_R8C6j35OZHrekjXkf0gIhy-h03YGiHqH8c/s72-c/D%25C3%25BAvidas.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-3469178975767655279</id><published>2015-09-09T21:46:00.000-03:00</published><updated>2015-09-09T21:46:01.550-03:00</updated><title type='text'>Como manter a segurança da informação mesmo sem usar senhas</title><content type='html'>&lt;div class=&quot;field field-name-body field-type-text-with-summary field-label-hidden&quot; style=&quot;background-color: white; border: 0px; color: #333333; font-family: Lato, sans-serif; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;div class=&quot;field-items&quot; style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;div class=&quot;field-item even&quot; property=&quot;content:encoded&quot; style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 16px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq3mRGxtDMMUZafeoqt0GLmG2Ueoe77Zguplg_YWQ4yVhLrmiv00NDy3Tt-YPLD3hwqRYkwpAOMTm8NV_xYB5GzK0k2jP_RReX5UB5vMegoaQAoLrpktZOh0H4TVCKS4XAUgGM0SpM9WQ/s1600/biometria-seguranca_0.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq3mRGxtDMMUZafeoqt0GLmG2Ueoe77Zguplg_YWQ4yVhLrmiv00NDy3Tt-YPLD3hwqRYkwpAOMTm8NV_xYB5GzK0k2jP_RReX5UB5vMegoaQAoLrpktZOh0H4TVCKS4XAUgGM0SpM9WQ/s320/biometria-seguranca_0.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; clear: left; color: #666666; line-height: 26px; list-style: none; margin-bottom: 10px; outline: none; padding: 0px; text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;Fonte:http://computerworld.com.br/&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; clear: left; color: #666666; font-size: 24px; line-height: 26px; list-style: none; margin-bottom: 10px; outline: none; padding: 0px;&quot;&gt;
Além da biometria, empresas vêm aderindo também a diversas outras tecnologias que ampliam seus níveis de proteção&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px; clear: left; color: #666666; font-family: Lato, sans-serif; font-size: 24px; line-height: 26px; list-style: none; margin-bottom: 10px; outline: none; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;autor&quot; style=&quot;background-color: white; border: 0px; color: #333333; font-family: Lato, sans-serif; font-size: 16px; font-weight: bold; line-height: 19px; list-style: none; margin: 0px; outline: none; padding: 0px;&quot;&gt;
&lt;a href=&quot;http://computerworld.com.br/autor/leonardo-nascimento&quot; style=&quot;border: 0px; color: black; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none;&quot;&gt;Leonardo Nascimento*&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;dataHoraMateria&quot; style=&quot;background-color: white; border: 0px; color: #333333; font-family: Lato, sans-serif; font-size: 14px; line-height: 16px; list-style: none; margin: 0px 0px 20px; outline: none; padding: 0px;&quot;&gt;
09 de Setembro de 2015 - 08h35&lt;/div&gt;
&lt;div class=&quot;dataHoraMateria&quot; style=&quot;background-color: white; border: 0px; color: #333333; font-family: Lato, sans-serif; font-size: 14px; line-height: 16px; list-style: none; margin: 0px 0px 20px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: 17px; line-height: 22px;&quot;&gt;Senhas, credenciais, senhas novamente e mais dados de acesso. É assim que nos deparamos mediante o avanço da tecnologia, com cada vez mais recursos sendo entregues em nossas mãos, tanto na vida pessoal quanto profissional.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;dataHoraMateria&quot; style=&quot;background-color: white; border: 0px; color: #333333; font-family: Lato, sans-serif; font-size: 14px; line-height: 16px; list-style: none; margin: 0px 0px 20px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: 17px; line-height: 22px;&quot;&gt;Quando uma pessoa é inserida no mundo corporativo, recebe diversos acessos (usuários e senhas), que a possibilita acessar os sistemas e recursos necessários para ter produtividade nas empresas. Esse fator dificulta muito a vida dos usuários, que precisam administrar cada vez mais senhas corporativas, além de suas senhas pessoais, que vão desde o desbloqueio de smartphones até o acesso a contas bancárias.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;dataHoraMateria&quot; style=&quot;background-color: white; border: 0px; color: #333333; font-family: Lato, sans-serif; font-size: 14px; line-height: 16px; list-style: none; margin: 0px 0px 20px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: 17px; line-height: 22px;&quot;&gt;Além de gerar uma complexidade para serem gerenciadas, essas senhas não oferecem uma segurança eficaz. Em muitos casos, os usuários buscam colocar senhas padrões, como o número do seu telefone, nome da empresa, dados pessoais e isso faz com que se tornem fáceis de serem adivinhadas por pessoas má intencionadas. Isso facilita o acesso à informação da corporação por meio de uma falha humana e ao mesmo tempo tecnológica.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;dataHoraMateria&quot; style=&quot;background-color: white; border: 0px; color: #333333; font-family: Lato, sans-serif; font-size: 14px; line-height: 16px; list-style: none; margin: 0px 0px 20px; outline: none; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-size: 17px; line-height: 22px;&quot;&gt;Continue lendo a matéria aqui:&amp;nbsp;&lt;a href=&quot;http://computerworld.com.br/como-manter-seguranca-da-informacao-mesmo-sem-usar-senhas&quot; target=&quot;_blank&quot;&gt;Como manter seguranca da informacao mesmo sem usar senhas&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/3469178975767655279/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/09/como-manter-seguranca-da-informacao.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3469178975767655279'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3469178975767655279'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/09/como-manter-seguranca-da-informacao.html' title='Como manter a segurança da informação mesmo sem usar senhas'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhq3mRGxtDMMUZafeoqt0GLmG2Ueoe77Zguplg_YWQ4yVhLrmiv00NDy3Tt-YPLD3hwqRYkwpAOMTm8NV_xYB5GzK0k2jP_RReX5UB5vMegoaQAoLrpktZOh0H4TVCKS4XAUgGM0SpM9WQ/s72-c/biometria-seguranca_0.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-879272100611738459</id><published>2015-08-27T14:44:00.000-03:00</published><updated>2015-08-27T14:44:17.978-03:00</updated><title type='text'>Windows 10: Golpe engana usuários com falsa atualização para o sistema</title><content type='html'>&lt;span id=&quot;goog_1788815791&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1788815792&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJPOxs8_HEIK4hbELA6BBzwjg52ZIjA6pVt-BJGFrjkLP5MsM-Xz3xYtQoj00xs-SdIDa1T-lleYlZFZu2pCBoSmk7A2I8IbaeDSYa-QBVh23LrZ-mBnykYI8RQ-pFWMkbYD8q3xgkwQI/s1600/Windows10.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;228&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJPOxs8_HEIK4hbELA6BBzwjg52ZIjA6pVt-BJGFrjkLP5MsM-Xz3xYtQoj00xs-SdIDa1T-lleYlZFZu2pCBoSmk7A2I8IbaeDSYa-QBVh23LrZ-mBnykYI8RQ-pFWMkbYD8q3xgkwQI/s400/Windows10.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;post-author&quot; style=&quot;background-color: white; color: #666666; display: inline; font-family: &#39;Segoe UI&#39;, &#39;Lucida Grande&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; margin-left: 36px; padding: 6px 0px; position: relative;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;a href=&quot;http://social.technet.microsoft.com/profile/Teresa%20Zancanelli%20Ghiorzoe&quot; style=&quot;color: #00749e; cursor: pointer; font-weight: normal; outline: none; text-decoration: none;&quot;&gt;Teresa Zancanelli Ghiorzoe&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #2a2a2a; font-family: &#39;Segoe UI&#39;, &#39;Lucida Grande&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 12.1104001998901px;&quot;&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;post-date&quot; style=&quot;background-color: white; color: #666666; display: inline; font-family: &#39;Segoe UI&#39;, &#39;Lucida Grande&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 12px; font-weight: bold; padding: 6px 0px; position: relative;&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
11 Aug 2015 9:07 AM&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2a2a2a; font-family: &#39;Segoe UI&#39;, &#39;Lucida Grande&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 12.1104001998901px; line-height: 18.165599822998px;&quot;&gt;
&lt;span style=&quot;font-family: arial, helvetica, sans-serif; font-size: x-small;&quot;&gt;Por :&amp;nbsp;&lt;a href=&quot;http://codigofonte.uol.com.br/perfil/caquino&quot; style=&quot;color: #00749e; cursor: pointer; outline: none; text-decoration: none;&quot;&gt;Carlos L. A. da Silva&amp;nbsp;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2a2a2a; font-family: &#39;Segoe UI&#39;, &#39;Lucida Grande&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 12.1104001998901px; line-height: 18.165599822998px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2a2a2a; font-family: &#39;Segoe UI&#39;, &#39;Lucida Grande&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 12.1104001998901px; line-height: 18.165599822998px;&quot;&gt;
&lt;span style=&quot;font-family: arial, helvetica, sans-serif; font-size: x-small;&quot;&gt;Um novo golpe de&amp;nbsp;&lt;i&gt;phishing&lt;/i&gt;&amp;nbsp;está enganando usuários que estão ansiosos para instalar o novo Windows 10.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-family: arial, helvetica, sans-serif; font-size: x-small;&quot;&gt;E-mail falso acaba sequestrando todos os dados de sua vítima.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2a2a2a; font-family: &#39;Segoe UI&#39;, &#39;Lucida Grande&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 12.1104001998901px; line-height: 18.165599822998px;&quot;&gt;
&lt;span style=&quot;font-family: arial, helvetica, sans-serif; font-size: x-small;&quot;&gt;Pesquisadores da Cisco alertam que o golpe imita um e-mail vindo da própria Microsoft oferecendo uma atualização instantânea para o novo sistema operacional.&lt;/span&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif; font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2a2a2a; font-family: &#39;Segoe UI&#39;, &#39;Lucida Grande&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 12.1104001998901px; line-height: 18.165599822998px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2a2a2a; font-family: &#39;Segoe UI&#39;, &#39;Lucida Grande&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 12.1104001998901px; line-height: 18.165599822998px;&quot;&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;strong&gt;&lt;span style=&quot;font-family: arial, helvetica, sans-serif;&quot;&gt;&lt;span lang=&quot;PT-BR&quot; style=&quot;background: lime; color: #333333; font-family: Arial, sans-serif; line-height: 17.1200008392334px;&quot;&gt;A Microsoft já informou que não utiliza e-mail para promover suas atualizações em nenhuma hipótese.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2a2a2a; font-family: &#39;Segoe UI&#39;, &#39;Lucida Grande&#39;, Verdana, Arial, Helvetica, sans-serif; font-size: 12.1104001998901px; line-height: 18.165599822998px;&quot;&gt;
&lt;br /&gt;
Leia a matéria na integra aqui:&amp;nbsp;&lt;a href=&quot;http://blogs.technet.com/b/risco/archive/2015/08/11/windows-10-golpe-engana-usu-225-rios-com-falsa-atualiza-231-227-o-para-o-sistema.aspx&quot; target=&quot;_blank&quot;&gt;Golpe engana usuários com falsa atualização para o sistema&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/879272100611738459/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/08/windows-10-golpe-engana-usuarios-com.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/879272100611738459'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/879272100611738459'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/08/windows-10-golpe-engana-usuarios-com.html' title='Windows 10: Golpe engana usuários com falsa atualização para o sistema'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJPOxs8_HEIK4hbELA6BBzwjg52ZIjA6pVt-BJGFrjkLP5MsM-Xz3xYtQoj00xs-SdIDa1T-lleYlZFZu2pCBoSmk7A2I8IbaeDSYa-QBVh23LrZ-mBnykYI8RQ-pFWMkbYD8q3xgkwQI/s72-c/Windows10.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-6854062340985565486</id><published>2015-07-24T23:43:00.000-03:00</published><updated>2015-07-24T23:43:33.016-03:00</updated><title type='text'>Seu nome, CPF e endereço podem estar disponíveis neste site sem que você saiba</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2AaaGRnOFKlMjSLwWxFVDE0w1DAJ9w3KARl_YhsLIl_DxzzSa9XRW4qgWElm3zqmyGyxKUuYMta2GS6Zy0xwB7OaVje8R1MJWVs_BF8Tv1jKqKscz1nJs6z4W1fMfjNWnQSzM4scb5Zs/s1600/Tudo_Sobre_Todos.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;181&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2AaaGRnOFKlMjSLwWxFVDE0w1DAJ9w3KARl_YhsLIl_DxzzSa9XRW4qgWElm3zqmyGyxKUuYMta2GS6Zy0xwB7OaVje8R1MJWVs_BF8Tv1jKqKscz1nJs6z4W1fMfjNWnQSzM4scb5Zs/s320/Tudo_Sobre_Todos.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Que nossas informações supostamente confidenciais correm o risco de vazamento, não é uma novidade, Até o Planalto teve suas informações exploradas pelos USA.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Mas ter a sua Informação exposta com detalhes e a um custo muito baixo, para quem desejar...&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
É o que o site http://tudosobretodos.se/ até o momento esta fazendo!&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Vejam reportagem completa do site da Info Abril e teste você mesmo:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Matéria Info Abril:&lt;/div&gt;
&lt;div class=&quot;nome-autor&quot; style=&quot;background-color: white; box-sizing: border-box; color: #595959; display: inline-block; font-family: &#39;Open Sans&#39;; font-size: 16.7999992370605px; line-height: 24px;&quot;&gt;
&lt;a href=&quot;http://info.abril.com.br/autores/lucas-agrela/&quot; rel=&quot;author&quot; style=&quot;background-color: transparent; box-sizing: border-box; color: black; outline-offset: -2px; outline: -webkit-focus-ring-color auto 5px;&quot;&gt;Lucas Agrela&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #595959; font-family: &#39;Open Sans&#39;; font-size: 16.7999992370605px; line-height: 24px;&quot;&gt;, de&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://info.abril.com.br/&quot; style=&quot;background-color: white; box-sizing: border-box; color: black; font-family: &#39;Open Sans&#39;; font-size: 16.7999992370605px; line-height: 24px; text-decoration: none;&quot;&gt;INFO Online&lt;/a&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: &#39;Open Sans&#39;; font-size: 18.2000007629395px; line-height: 26.0000019073486px;&quot;&gt;&lt;i&gt;&quot;O que você acha&amp;nbsp;de ter o seu nome, CPF e endereço disponibilizados em uma base de dados online acessível por qualquer um? E mais: essa empresa lucra com isso, vendendo informações mais detalhadas de cidadãos por até 80 reais.&quot;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b&gt;Matéria na integra aqui&lt;/b&gt;: &lt;a href=&quot;http://info.abril.com.br/noticias/internet/2015/07/seu-nome-cpf-e-endereco-completos-podem-estar-disponiveis-neste-site-sem-que-voce-saiba-disso.shtml&quot; target=&quot;_blank&quot;&gt;Seu-nome-cpf-e-endereco-completos-podem-estar-disponiveis-neste-site&lt;/a&gt;&amp;nbsp;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/6854062340985565486/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/07/seu-nome-cpf-e-endereco-podem-estar.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/6854062340985565486'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/6854062340985565486'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/07/seu-nome-cpf-e-endereco-podem-estar.html' title='Seu nome, CPF e endereço podem estar disponíveis neste site sem que você saiba'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2AaaGRnOFKlMjSLwWxFVDE0w1DAJ9w3KARl_YhsLIl_DxzzSa9XRW4qgWElm3zqmyGyxKUuYMta2GS6Zy0xwB7OaVje8R1MJWVs_BF8Tv1jKqKscz1nJs6z4W1fMfjNWnQSzM4scb5Zs/s72-c/Tudo_Sobre_Todos.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-7584472415500250301</id><published>2015-07-15T13:24:00.001-03:00</published><updated>2015-07-15T13:24:06.472-03:00</updated><title type='text'>Chefe de segurança da informação do Facebook pede que Adobe marque uma data para morte.</title><content type='html'>&lt;br /&gt;
&lt;span style=&quot;background-color: white; font-family: tungsten-light; font-size: 28px; line-height: 40px;&quot;&gt;Após descoberta de grave vulnerabilidade no software, pressão sobre Adobe aumentou nos últimos dias.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: &#39;Open Sans&#39;; font-size: 18.2000007629395px; line-height: 26.0000019073486px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Cc6o6Seoik0Z5tAtt4MUHNdgD-cCr7cHTvXnIyZ4_mww8pVqVhgtC5l1fKs5egTGA4cEjDM-w-U4YWtlf6x8xm67lBVyo67cfEu9EmZdXMHYj7SNYfsKs6Xvm1cHksYm1b-XR9usX4g/s1600/Flash.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;214&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Cc6o6Seoik0Z5tAtt4MUHNdgD-cCr7cHTvXnIyZ4_mww8pVqVhgtC5l1fKs5egTGA4cEjDM-w-U4YWtlf6x8xm67lBVyo67cfEu9EmZdXMHYj7SNYfsKs6Xvm1cHksYm1b-XR9usX4g/s320/Flash.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Fonte:&amp;nbsp;info.abril.com.br&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: &#39;Open Sans&#39;; font-size: 18.2000007629395px; line-height: 26.0000019073486px;&quot;&gt;Essa sequência de falhas jogou a comunidade de segurança da informação contra o Flash. Mas a preocupação com o programa existe desde 2010, quando Steve Jobs&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://info.abril.com.br/noticias/tecnologia-pessoal/jobs-diz-que-flash-e-desnecessario-29042010-13.shl&quot; style=&quot;background-color: white; box-sizing: border-box; color: black; font-family: &#39;Open Sans&#39;; font-size: 18.2000007629395px; line-height: 26.0000019073486px;&quot;&gt;escreveu uma carta aberta&lt;/a&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: &#39;Open Sans&#39;; font-size: 18.2000007629395px; line-height: 26.0000019073486px;&quot;&gt;&amp;nbsp;detalhando por que os aparelhos da Apple jamais iriam rodar&amp;nbsp;o programa da Adobe.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: &#39;Open Sans&#39;; font-size: 18.2000007629395px; line-height: 26.0000019073486px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: &#39;Open Sans&#39;; font-size: 18.2000007629395px; line-height: 26.0000019073486px;&quot;&gt;Leia a matéria na integra aqui:&amp;nbsp;&lt;a href=&quot;http://info.abril.com.br/noticias/seguranca/2015/07/chefe-de-seguranca-da-informacao-do-facebook-pede-que-adobe-marque-uma-data-para-morte-do-flash.shtml&quot; target=&quot;_blank&quot;&gt;Chefe de seguranca da informacao do facebook pede que adobe marque uma data para morte.&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/7584472415500250301/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/07/chefe-de-seguranca-da-informacao-do.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/7584472415500250301'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/7584472415500250301'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/07/chefe-de-seguranca-da-informacao-do.html' title='Chefe de segurança da informação do Facebook pede que Adobe marque uma data para morte.'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Cc6o6Seoik0Z5tAtt4MUHNdgD-cCr7cHTvXnIyZ4_mww8pVqVhgtC5l1fKs5egTGA4cEjDM-w-U4YWtlf6x8xm67lBVyo67cfEu9EmZdXMHYj7SNYfsKs6Xvm1cHksYm1b-XR9usX4g/s72-c/Flash.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-8532937487419820087</id><published>2015-07-08T14:34:00.001-03:00</published><updated>2015-07-08T14:34:58.848-03:00</updated><title type='text'>Bancos brasileiros testam reconhecimento facial - Segurança - Biometria - Reconhecimento Facial - Cobertura especial do Convergência Digital</title><content type='html'>&lt;span style=&quot;background-color: white; color: #333333; font-family: Verdana, Geneva, sans-serif; font-size: 12px; line-height: 16.7999992370605px;&quot;&gt;Para o diretor de negócios para a área de Governo da NEC no Brasil, Massato Takakuwa, a Tecnologia ganha um papel relevante na estratégia de segurança pública e privada. &quot;A informação em tempo real passa a ser decisiva&quot;, diz.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #333333; font-family: Verdana, Geneva, sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; font-size: 12px; line-height: 16.7999992370605px;&quot;&gt;Fonte:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Tahoma, Geneva, sans-serif; font-size: 10px;&quot;&gt;Convergência Digital&lt;/span&gt;&lt;span style=&quot;background-color: white; font-family: Tahoma, Geneva, sans-serif; font-size: 10px;&quot;&gt;&amp;nbsp;-&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;mailto:analobo@convergenciadigital.com.br&quot; style=&quot;background-color: white; color: #666666; font-family: Tahoma, Geneva, sans-serif; font-size: 10px; text-decoration: none;&quot;&gt;&lt;span style=&quot;color: black; font-family: Verdana, Helvetica, Arial, Sans-Serif; font-size: xx-small;&quot;&gt;Ana Paula Lobo e Roberta Prescott&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white; font-family: Tahoma, Geneva, sans-serif; font-size: 10px;&quot;&gt;&amp;nbsp;- 27/03/2015&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Leia a matéria na integra aqui:&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://convergenciadigital.uol.com.br/cgi/cgilua.exe/sys/start.htm?infoid=39268&amp;amp;sid=83#.VZ1eXv_SyRs.blogger&quot;&gt;Bancos brasileiros testam reconhecimento facial - Segurança - Biometria - Reconhecimento Facial - Cobertura especial do Convergência Digital&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/8532937487419820087/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/07/bancos-brasileiros-testam.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/8532937487419820087'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/8532937487419820087'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/07/bancos-brasileiros-testam.html' title='Bancos brasileiros testam reconhecimento facial - Segurança - Biometria - Reconhecimento Facial - Cobertura especial do Convergência Digital'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-8154646898133805486</id><published>2015-07-08T14:29:00.001-03:00</published><updated>2015-07-08T14:30:04.604-03:00</updated><title type='text'>Governo refaz política de Segurança da Informação e admite &#39;fragilidades&#39; - Convergência Digital - Segurança</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik6Ngy9xFjEWY3VY0ZFJLWjldXZkrEiGUt-4x2TmWeHHsbatTNC9y_SEDzRrMpoq_iGTRwpV7PLWpJvPNJQeKKUKoxiVAKSGLado5RBiGPKU1i6mcSiYhCZmEPX_llb2XnvSI1iS5_Cf0/s1600/seguranca_dados_br.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik6Ngy9xFjEWY3VY0ZFJLWjldXZkrEiGUt-4x2TmWeHHsbatTNC9y_SEDzRrMpoq_iGTRwpV7PLWpJvPNJQeKKUKoxiVAKSGLado5RBiGPKU1i6mcSiYhCZmEPX_llb2XnvSI1iS5_Cf0/s1600/seguranca_dados_br.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Imagem: www.convergenciadigital.uol.com.br&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Arial, Verdana, Tahoma, sans-serif; font-size: 14px; line-height: 19.6000003814697px;&quot;&gt;Ligado à Presidência da República, o Gabinete de Segurança Institucional elaborou uma estratégia plurianual de segurança da informação que visa dar ao Brasil “uma robusta capacidade de posicionamento e resposta frente a potenciais quebras de segurança e ameaças cibernéticas”. O plano inicial, com metas graduais até 2018, passa pela criação de um órgão central de segurança e, especialmente, pela “alocação de recursos financeiros, tecnológicos e humanos”.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Fonte:&amp;nbsp;&lt;span style=&quot;background-color: white; color: #666666; font-family: Tahoma, Verdana, sans-serif; font-size: 10px; line-height: 10.5px;&quot;&gt;Luís Osvaldo Grossmann ... 02/07/2015 ... Convergência Digital&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Confira o artigo na integra aqui:&lt;br /&gt;
&lt;a href=&quot;http://convergenciadigital.uol.com.br/cgi/cgilua.exe/sys/start.htm?infoid=40019&quot;&gt;Governo refaz política de Segurança da Informação e admite &#39;fragilidades&#39; - Convergência Digital - Segurança&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/8154646898133805486/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/07/governo-refaz-politica-de-seguranca-da.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/8154646898133805486'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/8154646898133805486'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/07/governo-refaz-politica-de-seguranca-da.html' title='Governo refaz política de Segurança da Informação e admite &#39;fragilidades&#39; - Convergência Digital - Segurança'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik6Ngy9xFjEWY3VY0ZFJLWjldXZkrEiGUt-4x2TmWeHHsbatTNC9y_SEDzRrMpoq_iGTRwpV7PLWpJvPNJQeKKUKoxiVAKSGLado5RBiGPKU1i6mcSiYhCZmEPX_llb2XnvSI1iS5_Cf0/s72-c/seguranca_dados_br.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-349922115371084942</id><published>2015-07-01T11:43:00.002-03:00</published><updated>2015-07-01T11:43:55.798-03:00</updated><title type='text'>Rio 2016 prevê quatro vezes mais ciberataques do que em Londres</title><content type='html'>&lt;div class=&quot;assinatura&quot; style=&quot;background-color: white; color: #666666; font-family: Tahoma, Verdana, sans-serif; font-size: 10px; line-height: 10.5px; margin: 10px 0px 0px;&quot;&gt;
Luís Osvaldo Grossmann ... 30/06/2015 ... Convergência Digital&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8BzR_k1BbtvfZ6D8w3zWHTOO9SDXHyMJel6l2OxN_Y8qM9cXeQjmEkuvLe3U7Q5zB01Az5QRBauuoaesGu6EvaZelVO2kBD3yfXUYNfHXb8nA7MYMnvpfh5QojkBvTdggnRo3Zz97N5o/s1600/rio2016.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8BzR_k1BbtvfZ6D8w3zWHTOO9SDXHyMJel6l2OxN_Y8qM9cXeQjmEkuvLe3U7Q5zB01Az5QRBauuoaesGu6EvaZelVO2kBD3yfXUYNfHXb8nA7MYMnvpfh5QojkBvTdggnRo3Zz97N5o/s1600/rio2016.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;assinatura&quot; style=&quot;background-color: white; color: #666666; font-family: Tahoma, Verdana, sans-serif; font-size: 10px; line-height: 10.5px; margin: 10px 0px 0px;&quot;&gt;
Fonte:&amp;nbsp;http://convergenciadigital.uol.com.br/&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Verdana, Tahoma, sans-serif; font-size: 14px; line-height: 19.6000003814697px; margin-bottom: 15px; margin-top: 15px; padding: 0px;&quot;&gt;
Falta pouco mais de um ano para as Olimpíadas no Rio de Janeiro, mas o Comitê Organizador Local já vem realizando treinos periódicos e exercícios de ataque e defesa contra ameaças cibernéticas, de forma a evitar problemas durante a competição, que começa em 5 de agosto de 2016. Faz sentido. A expectativa é de que a próxima edição dos Jogos Olímpicos sofram muito mais ameaças do que na última edição, em 2012.&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;background-color: white; color: #333333; font-family: Arial, Verdana, Tahoma, sans-serif; font-size: 14px; line-height: 19.6000003814697px; margin-bottom: 15px; margin-top: 15px; padding: 0px;&quot;&gt;
Leia a matéria na integra aqui:&amp;nbsp;&lt;a href=&quot;http://convergenciadigital.uol.com.br/&quot; target=&quot;_blank&quot;&gt;Rio 2016 prevê quatro vezes mais ciberataques do que em Londres&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/349922115371084942/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/07/rio-2016-preve-quatro-vezes-mais.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/349922115371084942'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/349922115371084942'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/07/rio-2016-preve-quatro-vezes-mais.html' title='Rio 2016 prevê quatro vezes mais ciberataques do que em Londres'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8BzR_k1BbtvfZ6D8w3zWHTOO9SDXHyMJel6l2OxN_Y8qM9cXeQjmEkuvLe3U7Q5zB01Az5QRBauuoaesGu6EvaZelVO2kBD3yfXUYNfHXb8nA7MYMnvpfh5QojkBvTdggnRo3Zz97N5o/s72-c/rio2016.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-2207362900984150716</id><published>2015-06-24T11:29:00.001-03:00</published><updated>2015-06-24T13:19:10.129-03:00</updated><title type='text'>VOCÊ ABANDONOU O SEU FILHO NA INTERNET?</title><content type='html'>&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; class=&quot;YOUTUBE-iframe-video&quot; data-thumbnail-src=&quot;https://i.ytimg.com/vi/YUmP5wCsxcs/0.jpg&quot; frameborder=&quot;0&quot; height=&quot;266&quot; src=&quot;https://www.youtube.com/embed/YUmP5wCsxcs?feature=player_embedded&quot; width=&quot;320&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-family: Arial; font-size: 16px; height: auto; line-height: 20px; margin-bottom: 10px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;em style=&quot;border: 0px none; font-family: inherit; font-weight: inherit; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Com quem ele conversa, sem que você saiba?&lt;/em&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-family: Arial; font-size: 16px; height: auto; line-height: 20px; margin-bottom: 10px; padding: 0px; vertical-align: baseline;&quot;&gt;
Você sabe o que seu filho faz diante do computador? Sabe como o seu aluno tem perfis nas redes sociais? Com quem eles se comunicam na internet?&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: 0px none; font-family: Arial; font-size: 16px; height: auto; line-height: 20px; margin-bottom: 10px; padding: 0px; vertical-align: baseline;&quot;&gt;
Esses são questionamentos levantados por Patrícia Peck Pinheiro, especialista em Direito Digital, que desenvolveu um trabalho sobre “Família Segura”.&lt;br /&gt;
&lt;br style=&quot;font-size: 11px; margin-bottom: 10px;&quot; /&gt;
Na terça-feira (9), ela conversou com Paulo Henrique Amorim, na sede do&amp;nbsp;&lt;span style=&quot;border: 0px none; font-family: inherit; font-style: inherit; font-weight: 700; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Conversa Afiada&lt;/span&gt;.&lt;br /&gt;
&lt;br style=&quot;font-size: 11px; margin-bottom: 10px;&quot; /&gt;
“Navegando [pela internet] sozinho, a criança pode falar com um amigo, um vizinho, um parente ou um pedófilo. E aí pode virar um menor abandonado virtual”, alertou Patrícia.&lt;br /&gt;
&lt;br style=&quot;font-size: 11px; margin-bottom: 10px;&quot; /&gt;
Na conversa, a especialista falou sobre os riscos que a criança corre ao acessar a rede mundial de computadores que vão desde a venda de drogas pela internet até crimes contra a honra.&lt;br /&gt;
&lt;br style=&quot;font-size: 11px; margin-bottom: 10px;&quot; /&gt;
Na primeira parte da entrevista, ela dá dicas e recomendações para que a família use corretamente as novas tecnologias e as tornem aliadas e não inimigas.&lt;br /&gt;
&lt;br /&gt;
Fonte:&amp;nbsp;&lt;a href=&quot;http://www.conversaafiada.com.br/&quot; target=&quot;_blank&quot;&gt;ConversaAfiada&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/2207362900984150716/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/06/voce-abandonou-o-seu-filho-na-internet.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/2207362900984150716'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/2207362900984150716'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/06/voce-abandonou-o-seu-filho-na-internet.html' title='VOCÊ ABANDONOU O SEU FILHO NA INTERNET?'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://img.youtube.com/vi/YUmP5wCsxcs/default.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-6180797373376612699</id><published>2015-06-19T16:01:00.000-03:00</published><updated>2015-06-19T16:01:04.025-03:00</updated><title type='text'>A criptografia no WhatsApp não significa que todas as suas mensagens estão protegidas</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimI4tUlHcvgJL_naRtGIvTOnkCczSqOykq-u5pGuTvUpRKfzJrXVg1HuTygAz5uKhPW7PedYESst5DcSlVqha9rUlzQn47dOzfUq_CfjzgmHuJfoiaDm2ckGwiI6-xxC2vozx4QxfBkdc/s1600/WhatsApp-e-outros-apps.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;179&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimI4tUlHcvgJL_naRtGIvTOnkCczSqOykq-u5pGuTvUpRKfzJrXVg1HuTygAz5uKhPW7PedYESst5DcSlVqha9rUlzQn47dOzfUq_CfjzgmHuJfoiaDm2ckGwiI6-xxC2vozx4QxfBkdc/s320/WhatsApp-e-outros-apps.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;strong style=&quot;border: 0px; color: #4b738f; font-family: proxima-nova-condensed, serif; font-size: 14px; font-stretch: inherit; line-height: 20px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Por:&amp;nbsp;&lt;a href=&quot;http://gizmodo.uol.com.br/author/felipeventura/&quot; rel=&quot;author&quot; style=&quot;border: 0px; color: #4b738f; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot; title=&quot;Posts de Felipe Ventura&quot;&gt;Felipe Ventura&lt;/a&gt;&lt;/strong&gt;&lt;br style=&quot;color: #4b738f; font-family: proxima-nova-condensed, serif; font-size: 14px; line-height: 20px;&quot; /&gt;&lt;span style=&quot;color: #4b738f; font-family: proxima-nova-condensed, serif; font-size: 14px; line-height: 20px;&quot;&gt;10 de junho de 2015 às 11:42&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #4b738f; font-family: proxima-nova-condensed, serif;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;Fonte:&amp;nbsp;http://gizmodo.uol.com.br/&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #4b738f; font-family: proxima-nova-condensed, serif;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;color: #444444; font-family: Georgia, serif; font-size: 15.1999998092651px; line-height: 22.7999992370605px; text-align: justify;&quot;&gt;Em novembro, o WhatsApp anunciou que&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://gizmodo.uol.com.br/whatsapp-agora-tem-criptografia-de-ponta-a-ponta-para-suas-mensagens/&quot; style=&quot;border: 0px; color: #4b738f; font-family: Georgia, serif; font-size: 15.1999998092651px; font-stretch: inherit; line-height: 22.7999992370605px; margin: 0px; padding: 0px; text-align: justify; text-decoration: none; vertical-align: baseline;&quot;&gt;protegeria suas mensagens usando criptografia&lt;/a&gt;&lt;span style=&quot;color: #444444; font-family: Georgia, serif; font-size: 15.1999998092651px; line-height: 22.7999992370605px; text-align: justify;&quot;&gt;: isso seria ativado por padrão no Android e chegaria “em breve” ao iOS. Esta poderia ser a maior implementação de criptografia ponta-a-ponta já feita, expandindo-se para 600 milhões de usuários.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #444444; font-family: Georgia, serif; font-size: 15.1999998092651px; line-height: 22.7999992370605px; text-align: justify;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;color: #444444; font-family: Georgia, serif; font-size: 15.1999998092651px; line-height: 22.7999992370605px; text-align: justify;&quot;&gt;Continue lendo aqui:&amp;nbsp;&lt;a href=&quot;http://gizmodo.uol.com.br/criptografia-whatsapp/&quot; target=&quot;_blank&quot;&gt;A criptografia no WhatsApp&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/6180797373376612699/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/06/a-criptografia-no-whatsapp-nao.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/6180797373376612699'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/6180797373376612699'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/06/a-criptografia-no-whatsapp-nao.html' title='A criptografia no WhatsApp não significa que todas as suas mensagens estão protegidas'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimI4tUlHcvgJL_naRtGIvTOnkCczSqOykq-u5pGuTvUpRKfzJrXVg1HuTygAz5uKhPW7PedYESst5DcSlVqha9rUlzQn47dOzfUq_CfjzgmHuJfoiaDm2ckGwiI6-xxC2vozx4QxfBkdc/s72-c/WhatsApp-e-outros-apps.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-3492742502308629812</id><published>2015-06-12T17:55:00.002-03:00</published><updated>2015-06-12T17:55:37.109-03:00</updated><title type='text'>Segurança em celulares para crianças</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWD-6NyLr5Zp_d076e7evt7wsFrrMEh80kfW1iD0OBZCSJ6sejNyhIotig8Yc_5jOCHK-AZT7inJO50IXYgczTkos-ZpVb-RK34GVQa11DaJ6KhtE9ukgWi3wTWud7tW1Ht5755WdTf2A/s1600/Celular.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;265&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWD-6NyLr5Zp_d076e7evt7wsFrrMEh80kfW1iD0OBZCSJ6sejNyhIotig8Yc_5jOCHK-AZT7inJO50IXYgczTkos-ZpVb-RK34GVQa11DaJ6KhtE9ukgWi3wTWud7tW1Ht5755WdTf2A/s320/Celular.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 18px;&quot;&gt;[Crédito da Imagem: ClipArt Microsoft Word]&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #333333; font-family: &#39;Segoe ui&#39;, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 1.4em; margin-bottom: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Os celulares vão dos mais básicos, como aqueles para crianças menores que podem fazer chamadas apenas para números restritos, até smartphones que são essencialmente pequenos computadores e oferecem:&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;font-family: &#39;Segoe ui&#39;, Helvetica, Arial, sans-serif; font-size: 12px;&quot;&gt;
&lt;li&gt;&lt;div style=&quot;color: #333333; line-height: 1.4em; margin-bottom: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Acesso pela Internet a redes sociais como Facebook, assim como a jogos, vídeos e sites de bate-papo com vídeo, programas de TV, música e aplicativos (apps).&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;color: #333333; line-height: 1.4em; margin-bottom: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Uso de câmera e vídeo que são divertidos, mas também oferecem oportunidades para bullies e outros, e permitem tirar e compartilhar fotos ou vídeos provocantes (conhecidos como&amp;nbsp;&lt;em&gt;sexting&amp;nbsp;&lt;/em&gt;).&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style=&quot;color: #333333; line-height: 1.4em; margin-bottom: 10px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Rastreamento por GPS que permite determinar a localização do telefone - e da criança. Você pode usar este recurso para monitorar onde seus filhos estão, mas se o recurso não for usado com cuidado, outros também poderão localizá-los. Além disso, os smartphones podem marcar uma foto (&amp;nbsp;&lt;em&gt;marcas de localização&amp;nbsp;&lt;/em&gt;), revelando precisamente onde e quando foi tirada.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #555555; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 18px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Acesse a matéria na integra aqui:&amp;nbsp;&lt;a href=&quot;https://www.microsoft.com/pt-br/security/online-privacy/mobile-phone-safety-kids.aspx&quot; target=&quot;_blank&quot;&gt;Segurança em celulares para crianças&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Fonte:&amp;nbsp;www.microsoft.com&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/3492742502308629812/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/06/seguranca-em-celulares-para-criancas.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3492742502308629812'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3492742502308629812'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/06/seguranca-em-celulares-para-criancas.html' title='Segurança em celulares para crianças'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWD-6NyLr5Zp_d076e7evt7wsFrrMEh80kfW1iD0OBZCSJ6sejNyhIotig8Yc_5jOCHK-AZT7inJO50IXYgczTkos-ZpVb-RK34GVQa11DaJ6KhtE9ukgWi3wTWud7tW1Ht5755WdTf2A/s72-c/Celular.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-3410363422230670229</id><published>2015-06-08T16:30:00.001-03:00</published><updated>2015-06-08T16:30:22.662-03:00</updated><title type='text'>Envio de cartão de crédito não solicitado é prática abusiva sujeita a indenização</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjleD2FHyEq7IvI-6QmJsM0VdpSzT7lHHUReDNM-speRrruwYbqMDr_JWC9ymmqwqmGd1CgQdkVI2e0JS1pvf1CWovo-lfW4veclFB5odp9tAoMsdOvjBPITL3sV0TMnVchFRKX_v9_D0g/s1600/cart%25C3%25A3o-de-cr%25C3%25A9dito.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;202&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjleD2FHyEq7IvI-6QmJsM0VdpSzT7lHHUReDNM-speRrruwYbqMDr_JWC9ymmqwqmGd1CgQdkVI2e0JS1pvf1CWovo-lfW4veclFB5odp9tAoMsdOvjBPITL3sV0TMnVchFRKX_v9_D0g/s320/cart%25C3%25A3o-de-cr%25C3%25A9dito.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Imagem:&amp;nbsp;&lt;a href=&quot;http://maisdinheiromaisvida.com.br/category/cartao-de-credito/&quot; target=&quot;_blank&quot;&gt;MaisdinheiroMaisvida&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; color: #404040; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 21px;&quot;&gt;A Corte Especial do Superior Tribunal de Justiça (STJ) aprovou na última quarta-feira (3) a Súmula 532, para estabelecer que “&lt;u&gt;constitui prática comercial abusiva o envio de cartão de crédito sem prévia e expressa solicitação do consumidor, configurando-se ato ilícito indenizável e sujeito à aplicação de multa administrativa&lt;/u&gt;”.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #404040; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 21px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: white; color: #404040; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 21px;&quot;&gt;Leia a matéria na integra aqui:&amp;nbsp;&lt;a href=&quot;http://stj.jusbrasil.com.br/noticias/195272832/envio-de-cartao-de-credito-nao-solicitado-e-pratica-abusiva-sujeita-a-indenizacao?utm_campaign=newsletter-daily_20150608_1271&amp;amp;utm_medium=email&amp;amp;utm_source=newsletter&quot; target=&quot;_blank&quot;&gt;STJ JusBrasil&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/3410363422230670229/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/06/envio-de-cartao-de-credito-nao.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3410363422230670229'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3410363422230670229'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/06/envio-de-cartao-de-credito-nao.html' title='Envio de cartão de crédito não solicitado é prática abusiva sujeita a indenização'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjleD2FHyEq7IvI-6QmJsM0VdpSzT7lHHUReDNM-speRrruwYbqMDr_JWC9ymmqwqmGd1CgQdkVI2e0JS1pvf1CWovo-lfW4veclFB5odp9tAoMsdOvjBPITL3sV0TMnVchFRKX_v9_D0g/s72-c/cart%25C3%25A3o-de-cr%25C3%25A9dito.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-7684853432482452048</id><published>2015-05-28T22:29:00.000-03:00</published><updated>2015-05-28T22:29:17.540-03:00</updated><title type='text'>Conheça a nova versão do Relatório de Inteligência de Segurança</title><content type='html'>&lt;span style=&quot;background-color: rgba(255, 255, 255, 0);&quot;&gt;A Microsoft publicou recentemente o volume 18 do Relatório de Inteligência de Segurança, que analisou o cenário da segurança de TI entre Julho e Dezembro de 2014. O relatório se concentra em vulnerabilidades de software, malware e software indesejado, ameaças, a partir dos mais recentes dados coletados em milhões de sistemas em todo o mundo e em alguns dos mais movimentados serviços online.&lt;/span&gt;&lt;a href=&quot;http://click.email.microsoftemail.com/?qs=03181f630c295bc8117dbd14d3bedd6195ccc77e36a9b9e820a65723b257c6f18282567395282665&quot; style=&quot;-webkit-text-size-adjust: auto; font-family: &#39;Segoe UI&#39;, Verdana, Geneva, sans-serif; font-size: 14px;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: rgba(255, 255, 255, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: rgba(255, 255, 255, 0);&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style=&quot;background-color: rgba(255, 255, 255, 0);&quot;&gt;&lt;a href=&quot;http://www.microsoft.com/security/sir/default.aspx&quot; target=&quot;_blank&quot;&gt;saiba mais sobre este relatório&lt;/a&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/7684853432482452048/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/conheca-nova-versao-do-relatorio-de.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/7684853432482452048'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/7684853432482452048'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/conheca-nova-versao-do-relatorio-de.html' title='Conheça a nova versão do Relatório de Inteligência de Segurança'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-221887117271842861</id><published>2015-05-27T13:35:00.001-03:00</published><updated>2015-05-27T13:35:29.039-03:00</updated><title type='text'>Oito dicas de segurança para usuários corporativos de Android</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdrB3YQE746WDsoFBr6R8DyuGGluoLNLYW5OF1yLg0JD8j556EYTrVF1mW-dQuJmZperZqyBLgYFh_jn2iwR5wzDV4uGRXeFhvLeqb5mBSCFEWqNPU0FGZaLQ-UVmaEnO0TZfLN7Otp3s/s1600/android_0.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdrB3YQE746WDsoFBr6R8DyuGGluoLNLYW5OF1yLg0JD8j556EYTrVF1mW-dQuJmZperZqyBLgYFh_jn2iwR5wzDV4uGRXeFhvLeqb5mBSCFEWqNPU0FGZaLQ-UVmaEnO0TZfLN7Otp3s/s320/android_0.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Fonte: ComputerWorld - por:&amp;nbsp;&lt;a href=&quot;http://computerworld.com.br/autor/james-martin&quot; style=&quot;background-color: white; border: 0px; color: black; font-family: Lato, sans-serif; font-size: 16px; font-weight: bold; line-height: 19px; list-style: none; margin: 0px; outline: none; padding: 0px; text-decoration: none;&quot;&gt;James A. Martin&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Lato, sans-serif; font-size: 17px; line-height: 22px; text-align: left;&quot;&gt;A CIO.com ouviu especialistas e profissionais de segurança da informação para mapear que posturas podem elevar mecanismos de proteção de dispositivos que rodam Android. A seguir, listamos oito dicas que administradores e usuários corporativos do sistema operacional devem considerar.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Lato, sans-serif; font-size: 17px; line-height: 22px; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Lato, sans-serif; font-size: 17px; line-height: 22px; text-align: left;&quot;&gt;Veja a matéria na integra aqui:&amp;nbsp;&lt;a href=&quot;http://computerworld.com.br/oito-dicas-de-seguranca-para-usuarios-corporativos-de-android&quot; target=&quot;_blank&quot;&gt;Computerworld&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/221887117271842861/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/oito-dicas-de-seguranca-para-usuarios.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/221887117271842861'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/221887117271842861'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/oito-dicas-de-seguranca-para-usuarios.html' title='Oito dicas de segurança para usuários corporativos de Android'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdrB3YQE746WDsoFBr6R8DyuGGluoLNLYW5OF1yLg0JD8j556EYTrVF1mW-dQuJmZperZqyBLgYFh_jn2iwR5wzDV4uGRXeFhvLeqb5mBSCFEWqNPU0FGZaLQ-UVmaEnO0TZfLN7Otp3s/s72-c/android_0.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-2866750138684679381</id><published>2015-05-26T22:57:00.001-03:00</published><updated>2015-05-26T22:57:35.702-03:00</updated><title type='text'>A Casca Digital</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTzarbQMfKFgK-MFzC9kxi1TnPMizYxbs6J13LzsuBYjl9PUdgXnLoBZO_bmWZvat__ypquxWeCwZl0zTtiBYR5JEHIrUj0HZn8-mEF4mSSeP9MyZVkJAn75Pvy7aTt-AGM_gJO0d8Flk/s1600/Ovo.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;298&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTzarbQMfKFgK-MFzC9kxi1TnPMizYxbs6J13LzsuBYjl9PUdgXnLoBZO_bmWZvat__ypquxWeCwZl0zTtiBYR5JEHIrUj0HZn8-mEF4mSSeP9MyZVkJAn75Pvy7aTt-AGM_gJO0d8Flk/s400/Ovo.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 30px;&quot;&gt;
Seria no mínimo curioso se o comportamento dos internautas &amp;nbsp;&quot;seres humanos&quot; fosse diferente na Net.&lt;/div&gt;
&lt;div style=&quot;color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 30px;&quot;&gt;
Na verdade o mundo digital reflete nossas necessidades e comportamentos&amp;nbsp;no mundo físico.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 30px;&quot;&gt;
A liberdade de expressão que a internet proporciona é um motor gerador de compartilhamento de ideias e informações onde o fenômeno é benéfico na medida que esta acompanhado de inovação, objetividade, desenvolvimento, ajuda humanitária e crescimento do intelecto.&lt;/div&gt;
&lt;div style=&quot;color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 30px;&quot;&gt;
As distorções desta engrenagem, tomam corpo e deixam de serem produtivas, quando agimos mais por necessidade de estar em&amp;nbsp;&lt;strong&gt;EVIDÊNCIA&lt;/strong&gt;&amp;nbsp;- imposta pelo meio - do que propriamente possa refletir seus verdadeiros ideais.&lt;/div&gt;
&lt;div style=&quot;color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 30px;&quot;&gt;
No mundo digital estamos envoltos e &quot;protegidos&quot; por uma casca de aparências tão frágil quanto um ovo.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 30px;&quot;&gt;
A cada segundo ou menos, é lançada uma nova ideia, opinião, regra, postura, 7 ou mais passos para ter sucesso, o segredo do empreendedor, dicas para conseguir emprego, casamento, ser feliz....&lt;/div&gt;
&lt;div style=&quot;color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 30px;&quot;&gt;
E o vencedor da vez, o mais curtido, o mais visualizado e comentado passa a ter uma multidão de fiéis seguidores daquilo que - sem medo de errar - pode até virar um novo padrão a ser seguido e exigido de&amp;nbsp;&lt;strong&gt;VOCÊ&lt;/strong&gt;&amp;nbsp;como comportamento digitalmente adequado.&lt;/div&gt;
&lt;div style=&quot;color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 30px;&quot;&gt;
Pode ter certeza, depois que virou padrão , poucos vão questionar se existe algo dentro da casca do ovo, a casca basta, o pensamento da média vale como atestado de veracidade.&lt;/div&gt;
&lt;div style=&quot;color: #4d4f51; font-family: Helvetica, Arial, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 30px;&quot;&gt;
Qual a sua casca digital? Disposto a fazer um&amp;nbsp;&lt;strong&gt;OMELETE&lt;/strong&gt;?!&lt;/div&gt;
&lt;br /&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/2866750138684679381/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/a-casca-digital.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/2866750138684679381'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/2866750138684679381'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/a-casca-digital.html' title='A Casca Digital'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTzarbQMfKFgK-MFzC9kxi1TnPMizYxbs6J13LzsuBYjl9PUdgXnLoBZO_bmWZvat__ypquxWeCwZl0zTtiBYR5JEHIrUj0HZn8-mEF4mSSeP9MyZVkJAn75Pvy7aTt-AGM_gJO0d8Flk/s72-c/Ovo.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-5821851883232521874</id><published>2015-05-22T17:29:00.004-03:00</published><updated>2015-05-22T17:29:58.580-03:00</updated><title type='text'>Os cabos da internet também estão chegando ao limite</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSMtjBqMMBajRzuYiW7xRHcogs0KDP54FOh2AuU8w0muPxN8m9J8pPFbmmtZvUPYUtgITjgqRuhgmI77SNyyJm2vQzZr88KDtSFOt3mHFbrk4cxN9Fzuw18VHMiciKgBSTUniUnHd2IeM/s1600/Cabos-submarinos1-1260x710.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;180&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSMtjBqMMBajRzuYiW7xRHcogs0KDP54FOh2AuU8w0muPxN8m9J8pPFbmmtZvUPYUtgITjgqRuhgmI77SNyyJm2vQzZr88KDtSFOt3mHFbrk4cxN9Fzuw18VHMiciKgBSTUniUnHd2IeM/s320/Cabos-submarinos1-1260x710.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
fonte: GizModo&amp;nbsp;&lt;strong style=&quot;border: 0px; color: #4b738f; font-family: proxima-nova-condensed, serif; font-size: 14px; font-stretch: inherit; line-height: 20px; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Por:&amp;nbsp;&lt;a href=&quot;http://gizmodo.uol.com.br/author/maddie-stone/&quot; rel=&quot;author&quot; style=&quot;border: 0px; color: #4b738f; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;&quot; title=&quot;Posts de Maddie Stone&quot;&gt;Maddie Stone&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://gizmodo.uol.com.br/cabos-internet-limite/&quot; target=&quot;_blank&quot;&gt;Acesse a matéria na integra&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/5821851883232521874/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/os-cabos-da-internet-tambem-estao.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/5821851883232521874'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/5821851883232521874'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/os-cabos-da-internet-tambem-estao.html' title='Os cabos da internet também estão chegando ao limite'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSMtjBqMMBajRzuYiW7xRHcogs0KDP54FOh2AuU8w0muPxN8m9J8pPFbmmtZvUPYUtgITjgqRuhgmI77SNyyJm2vQzZr88KDtSFOt3mHFbrk4cxN9Fzuw18VHMiciKgBSTUniUnHd2IeM/s72-c/Cabos-submarinos1-1260x710.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-7539943189004685231</id><published>2015-05-20T12:09:00.000-03:00</published><updated>2015-05-20T12:09:11.670-03:00</updated><title type='text'>Petrobras admitiu ser vulnerável à espionagem</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHlX5FNjaAPOnQjmRx3-gUOYTMmaGpn2uJ3ielZqfMZQnupyam-sEvPeYA_CxNSKmwCpIEzwmp0Y8elYjoivUOzsu4vNhw6NpQey5OojyyyDcy2_d-y-mnGcHq81cYynA2UMby6NhlUTo/s1600/petrobras.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;179&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHlX5FNjaAPOnQjmRx3-gUOYTMmaGpn2uJ3ielZqfMZQnupyam-sEvPeYA_CxNSKmwCpIEzwmp0Y8elYjoivUOzsu4vNhw6NpQey5OojyyyDcy2_d-y-mnGcHq81cYynA2UMby6NhlUTo/s320/petrobras.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Fonte: Exame Abril,&amp;nbsp;&lt;span style=&quot;background-color: white; color: #666666; font-family: sans-serif; font-size: 12px; line-height: 15.9999589920044px; text-align: right;&quot;&gt;Tânia Rêgo/Agência Brasil&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Acesse a reportagem na integra:&amp;nbsp;&lt;a href=&quot;http://exame.abril.com.br/brasil/noticias/petrobras-admitiu-ser-vulneravel-a-espionagem&quot; target=&quot;_blank&quot;&gt;Petrobras admitiu ser vulneravel a espionagem&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/7539943189004685231/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/petrobras-admitiu-ser-vulneravel.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/7539943189004685231'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/7539943189004685231'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/petrobras-admitiu-ser-vulneravel.html' title='Petrobras admitiu ser vulnerável à espionagem'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHlX5FNjaAPOnQjmRx3-gUOYTMmaGpn2uJ3ielZqfMZQnupyam-sEvPeYA_CxNSKmwCpIEzwmp0Y8elYjoivUOzsu4vNhw6NpQey5OojyyyDcy2_d-y-mnGcHq81cYynA2UMby6NhlUTo/s72-c/petrobras.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-2033989549966147865</id><published>2015-05-07T11:42:00.003-03:00</published><updated>2015-05-07T11:42:48.618-03:00</updated><title type='text'>Webinars GRATUITOS sobre temas de Direito Digital</title><content type='html'>&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKU89TVojbKLzi5rJCCXZSP7_WzNnalrcCf0797pg8u1XIXzEpb3_mNHr_S7jzPv8AwgEBdZlcv7nCTjVGqwgzRSdJXJQ5JwkNxXaaLpF3bDLMFBJxSjOrvV54asT1LruLs1aoG2oAzMI/s1600/Webinar.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;226&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKU89TVojbKLzi5rJCCXZSP7_WzNnalrcCf0797pg8u1XIXzEpb3_mNHr_S7jzPv8AwgEBdZlcv7nCTjVGqwgzRSdJXJQ5JwkNxXaaLpF3bDLMFBJxSjOrvV54asT1LruLs1aoG2oAzMI/s320/Webinar.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Acesse aqui:&amp;nbsp;&lt;a href=&quot;http://trk.virtualtarget.com.br/index.dma/DmaPreview?1177.389.6678.21bf185bd758be2427dfb9ac29145e6f.1&quot; target=&quot;_blank&quot;&gt;Webinars GRATUITOS sobre temas de Direito Digital&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/2033989549966147865/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/webinars-gratuitos-sobre-temas-de.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/2033989549966147865'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/2033989549966147865'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/05/webinars-gratuitos-sobre-temas-de.html' title='Webinars GRATUITOS sobre temas de Direito Digital'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKU89TVojbKLzi5rJCCXZSP7_WzNnalrcCf0797pg8u1XIXzEpb3_mNHr_S7jzPv8AwgEBdZlcv7nCTjVGqwgzRSdJXJQ5JwkNxXaaLpF3bDLMFBJxSjOrvV54asT1LruLs1aoG2oAzMI/s72-c/Webinar.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-116640541607272768</id><published>2015-04-29T21:31:00.000-03:00</published><updated>2015-04-29T21:31:01.055-03:00</updated><title type='text'>App falso imita Dubsmash e infecta até 500 mil usuários</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZD8gAstZAgoF4Mk3QK5UqdnGd3VDl6dWiMbcMxS3JuwXe92W2Q-5_WHr_BiqIKChqIqw8rG58L88uIn4GhX8tmLsnPsRwFS7trnlj6Vc_R8C6j35OZHrekjXkf0gIhy-h03YGiHqH8c/s1600/D%C3%BAvidas.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZD8gAstZAgoF4Mk3QK5UqdnGd3VDl6dWiMbcMxS3JuwXe92W2Q-5_WHr_BiqIKChqIqw8rG58L88uIn4GhX8tmLsnPsRwFS7trnlj6Vc_R8C6j35OZHrekjXkf0gIhy-h03YGiHqH8c/s1600/D%C3%BAvidas.jpg&quot; height=&quot;232&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Acesse aqui a noticia completa:&amp;nbsp;&lt;a href=&quot;http://www.msn.com/pt-br/noticias/ciencia-e-tecnologia/app-falso-imita-dubsmash-e-infecta-at%C3%A9-500-mil-usu%C3%A1rios/ar-BBiTCe3?ocid=mailsignoutmd&quot; target=&quot;_blank&quot;&gt;Falso Dubsmash&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/116640541607272768/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/04/app-falso-imita-dubsmash-e-infecta-ate.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/116640541607272768'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/116640541607272768'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/04/app-falso-imita-dubsmash-e-infecta-ate.html' title='App falso imita Dubsmash e infecta até 500 mil usuários'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEifZD8gAstZAgoF4Mk3QK5UqdnGd3VDl6dWiMbcMxS3JuwXe92W2Q-5_WHr_BiqIKChqIqw8rG58L88uIn4GhX8tmLsnPsRwFS7trnlj6Vc_R8C6j35OZHrekjXkf0gIhy-h03YGiHqH8c/s72-c/D%C3%BAvidas.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-4479533596570752711</id><published>2015-04-29T16:35:00.001-03:00</published><updated>2015-04-29T16:35:08.317-03:00</updated><title type='text'>Segurança é a preocupação da vez na Internet das coisas</title><content type='html'>&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://www.ipnews.com.br/telefoniaip/index.php?option=com_content&quot;&gt;Segurança é a preocupação da vez na Internet das coisas&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_NfjKUY377RLE_e6VjZ-mN7cWA-eC7uE9CWar7VR4c-r1o4VcUZFJsu62DD8KpUxxwj1wW3lXtiNNB3OAm6UB-blLPfRJSoZTppoVDXaDSfaj2tcYiCCs1GVU1QBl8WiwJKq-Uxhd1Sk/s1600/internet+of+things.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_NfjKUY377RLE_e6VjZ-mN7cWA-eC7uE9CWar7VR4c-r1o4VcUZFJsu62DD8KpUxxwj1wW3lXtiNNB3OAm6UB-blLPfRJSoZTppoVDXaDSfaj2tcYiCCs1GVU1QBl8WiwJKq-Uxhd1Sk/s1600/internet+of+things.png&quot; height=&quot;240&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;Fonte:&amp;nbsp;&lt;a href=&quot;http://www.ipnews.com.br/&quot; target=&quot;_blank&quot;&gt;IpNews&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/4479533596570752711/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/04/seguranca-e-preocupacao-da-vez-na.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/4479533596570752711'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/4479533596570752711'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/04/seguranca-e-preocupacao-da-vez-na.html' title='Segurança é a preocupação da vez na Internet das coisas'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_NfjKUY377RLE_e6VjZ-mN7cWA-eC7uE9CWar7VR4c-r1o4VcUZFJsu62DD8KpUxxwj1wW3lXtiNNB3OAm6UB-blLPfRJSoZTppoVDXaDSfaj2tcYiCCs1GVU1QBl8WiwJKq-Uxhd1Sk/s72-c/internet+of+things.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-3272680607170946308</id><published>2015-04-22T09:28:00.002-03:00</published><updated>2015-04-22T09:46:28.098-03:00</updated><title type='text'>Tecnologia Contactless - Funcionamento e Segurança</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2DrNsw2oIlqGaNsJlViyjWP7FQILstpuIRZu2xYUNpvU9L4phR9v6mjANAx8lkjeqaYVNp6G1i8AFbbO9lWaFuJASa9cJRtVDt_fydH1Qe1-CnaDGSmKKrSRvdEEmmCfd7RpyK9iYIwU/s1600/contactless-payment.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2DrNsw2oIlqGaNsJlViyjWP7FQILstpuIRZu2xYUNpvU9L4phR9v6mjANAx8lkjeqaYVNp6G1i8AFbbO9lWaFuJASa9cJRtVDt_fydH1Qe1-CnaDGSmKKrSRvdEEmmCfd7RpyK9iYIwU/s1600/contactless-payment.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&amp;nbsp;Google Image &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/div&gt;
&lt;h3 style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;b&gt;ContactLess&lt;/b&gt;&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;b style=&quot;color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px;&quot;&gt;Contactless Payment: &lt;/b&gt;&lt;span style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px;&quot;&gt;São cartões de crédito e débito, ou outros dispositivos que utilizam a identificação por radio frequência (RFID) para realizar pagamentos &lt;/span&gt;&lt;b style=&quot;color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px;&quot;&gt;&quot;seguros&quot;&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px;&quot;&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
Nestes, o Chip do cartão possibilita aos consumidores efetuarem o pagamento das contas, apenas com a aproximação do cartão dos leitores sem a necessidade de digitar o código PIN (senha do cartão).&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
A tecnologia já esta disponível no Brasil desde o ano passado, portanto verifique se o seu cartão possui o simbolo abaixo, ao lado do Chip:&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHPDaqH-nz79gU7YSh4UupVIqvbafhuEBXVLr3rLq3XEkR3WZE1ggZ9_IcYYcYT-0Ho0qvwOZiglsp4ur-5K1EM9jHj31CITlsZk9pJVs1NgmQL78zII53BhRs089UFpMbo42yc7ixnaM/s1600/download.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHPDaqH-nz79gU7YSh4UupVIqvbafhuEBXVLr3rLq3XEkR3WZE1ggZ9_IcYYcYT-0Ho0qvwOZiglsp4ur-5K1EM9jHj31CITlsZk9pJVs1NgmQL78zII53BhRs089UFpMbo42yc7ixnaM/s1600/download.jpg&quot; height=&quot;118&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&amp;nbsp; &amp;nbsp; Google Image&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
&lt;span style=&quot;color: #657d88; font-family: Arial, Helvetica, Tahoma, Verdana, sans-serif; letter-spacing: -0.301600009202957px; line-height: 17.2339992523193px;&quot;&gt;Segundo o diretor de Cartões e Financiamento ao Consumo da CAIXA, Mário Ferreira Neto, as novas máquinas demoram cerca de 10 segundos para fazer a leitura quando é feita a aproximação do cartão. No sistema atual são necessários cerca de 30 segundos entre inserir e ler o cartão com o chip.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
&lt;span style=&quot;color: #657d88; font-family: Arial, Helvetica, Tahoma, Verdana, sans-serif; letter-spacing: -0.301600009202957px; line-height: 17.2339992523193px;&quot;&gt;Para utilizar o novo tipo de cartão, o diretor diz que o cliente deve ficar atento ao símbolo )))). Tanto o cartão, como a máquina, devem possuir estas quatro linhas: )))). No cartão, a marca está localizada acima do chip. Para realizar o pagamento, basta aproximá-lo &amp;nbsp;da máquina a uma distância de um centímetro e meio.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
&lt;span style=&quot;color: #657d88; font-family: Arial, Helvetica, Tahoma, Verdana, sans-serif; letter-spacing: -0.301600009202957px; line-height: 17.2339992523193px;&quot;&gt;&lt;b&gt;Limite&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
&lt;span style=&quot;color: #657d88; font-family: Arial, Helvetica, Tahoma, Verdana, sans-serif; letter-spacing: -0.301600009202957px; line-height: 17.2339992523193px;&quot;&gt;A tecnologia dos novos cartões é chamada &quot;contactless&quot;, e, conforme o diretor &quot; é muito usada em todo o mundo&quot;. Com o cartão por aproximação, o cliente poderá realizar compras de até R$ 50,00 por pagamento, com o limite diário de gastos de até R$ 200,00. Compras que superem o limite diário de R$ 200,00 continuarão sendo realizadas no modelo atual, com inserção do cartão na máquina. A nova tecnologia, na avaliação de Mário Neto, &quot;não deverá implicar em aumento no número de transações efetuadas com os cartões e nem no faturamento. &quot;O ganho será no conforto e na agilidade para o cliente&quot;, ressaltou Neto&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #252525; font-family: sans-serif; font-size: 14px; line-height: 22.3999996185303px; margin-bottom: 0.5em; margin-top: 0.5em;&quot;&gt;
Fonte:&lt;a href=&quot;http://www20.caixa.gov.br/Paginas/Noticias/Noticia/Default.aspx?newsID=1381&quot; target=&quot;_blank&quot;&gt;CAIXA lança cartão com tecnologia por aproximação em São Paulo e Distrito Federal&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;b&gt;Segurança&lt;/b&gt;&lt;br /&gt;
Apesar do limite estabelecido nesta tecnologia ser baixo, na minha visão foi ignorado o conceito de autenticação por mais de um fator.&lt;br /&gt;
&lt;br /&gt;
Normalmente os fatores de autenticação são classificados em três categorias:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;
&lt;li&gt;O que você tem &amp;nbsp;- &amp;nbsp;Neste caso o cartão.&lt;/li&gt;
&lt;li&gt;O que você é &amp;nbsp; &amp;nbsp; &amp;nbsp;- Sendo o cartão sua propriedade, subentende-se que somente você esta utilizando.&lt;/li&gt;
&lt;li&gt;O que você sabe - Sua senha - número do PIN.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
Desta forma, esta medida facilita a utilização de compras com cartões por pessoas não autorizadas &lt;b&gt;&quot;criminosos&quot;&lt;/b&gt;.&lt;br /&gt;
&lt;br /&gt;
Independentemente se a instituição bancária deverá reembolsar o cliente em caso de comprovada uma ação criminosa, eu acredito que o ganho de 20 segundos na operação não justifica facilitar a vida dos infratores de plantão.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Importante:&lt;/b&gt;&lt;br /&gt;
Enquanto as instituições financeiras são reconhecidas como parte do setor que mais investem em segurança da informação é no mínimo incoerente esta &quot;evolução tecnológica&quot;.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Denilson Barbosa&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/3272680607170946308/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/04/tecnologia-contactless-funcionamento-e.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3272680607170946308'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3272680607170946308'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/04/tecnologia-contactless-funcionamento-e.html' title='Tecnologia Contactless - Funcionamento e Segurança'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2DrNsw2oIlqGaNsJlViyjWP7FQILstpuIRZu2xYUNpvU9L4phR9v6mjANAx8lkjeqaYVNp6G1i8AFbbO9lWaFuJASa9cJRtVDt_fydH1Qe1-CnaDGSmKKrSRvdEEmmCfd7RpyK9iYIwU/s72-c/contactless-payment.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-771787451168927659</id><published>2015-04-15T11:25:00.002-03:00</published><updated>2015-04-15T11:25:35.819-03:00</updated><title type='text'>Treinamentos Gratuitos Sobre Segurança da Informação - Não Perca!</title><content type='html'>&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg5IhyeYMxR1V64JqSnV9frZHWpEJLc0CH0CEYmWIa1zACkMS6NXGunbHjypEjS-MwPsWPDf3-T3UR3468ENtfrggaXhiziAZN3A6dU7rJKSE0f0XoPIPl2sLKIkBOpcDLqED8UeXC878/s1600/PPP.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg5IhyeYMxR1V64JqSnV9frZHWpEJLc0CH0CEYmWIa1zACkMS6NXGunbHjypEjS-MwPsWPDf3-T3UR3468ENtfrggaXhiziAZN3A6dU7rJKSE0f0XoPIPl2sLKIkBOpcDLqED8UeXC878/s1600/PPP.jpg&quot; height=&quot;115&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Acesse agora mesmo:&amp;nbsp;&lt;a href=&quot;https://www.facebook.com/PPPTreinamentos/app_137541772984354&quot; target=&quot;_blank&quot;&gt;PPPTreinamentos&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/771787451168927659/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/04/treinamentos-gratuitos-sobre-seguranca.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/771787451168927659'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/771787451168927659'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/04/treinamentos-gratuitos-sobre-seguranca.html' title='Treinamentos Gratuitos Sobre Segurança da Informação - Não Perca!'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhg5IhyeYMxR1V64JqSnV9frZHWpEJLc0CH0CEYmWIa1zACkMS6NXGunbHjypEjS-MwPsWPDf3-T3UR3468ENtfrggaXhiziAZN3A6dU7rJKSE0f0XoPIPl2sLKIkBOpcDLqED8UeXC878/s72-c/PPP.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-3091325966506188387</id><published>2015-04-08T11:28:00.002-03:00</published><updated>2015-04-08T11:28:25.880-03:00</updated><title type='text'>Rússia prepara nova Doutrina de Segurança da Informação</title><content type='html'>&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://sptnkne.ws/bUc&quot; target=&quot;_blank&quot;&gt;Rússia prepara nova Doutrina de Segurança da Informação&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: #0000ee;&quot;&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWxGZM1ic-R8jroDZgtq9RccPpkrrF21spWSsPy0XmFkk0U5452GOZHC7gHLpBP2DvZp2x6E3DdoUhY-onmI_7-AKPYMQ7xpJOQDwdJPt2uj-ENolBxQ-7HhunkkchlGjYtNED1q9exos/s1600/Fundo_Apres.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWxGZM1ic-R8jroDZgtq9RccPpkrrF21spWSsPy0XmFkk0U5452GOZHC7gHLpBP2DvZp2x6E3DdoUhY-onmI_7-AKPYMQ7xpJOQDwdJPt2uj-ENolBxQ-7HhunkkchlGjYtNED1q9exos/s1600/Fundo_Apres.jpg&quot; height=&quot;185&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: #0000ee;&quot;&gt;&lt;u&gt;&lt;br /&gt;&lt;/u&gt;&lt;/span&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/3091325966506188387/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/04/russia-prepara-nova-doutrina-de.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3091325966506188387'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3091325966506188387'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/04/russia-prepara-nova-doutrina-de.html' title='Rússia prepara nova Doutrina de Segurança da Informação'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWxGZM1ic-R8jroDZgtq9RccPpkrrF21spWSsPy0XmFkk0U5452GOZHC7gHLpBP2DvZp2x6E3DdoUhY-onmI_7-AKPYMQ7xpJOQDwdJPt2uj-ENolBxQ-7HhunkkchlGjYtNED1q9exos/s72-c/Fundo_Apres.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-3470759626698711163</id><published>2015-03-18T18:52:00.001-03:00</published><updated>2015-03-18T18:52:10.080-03:00</updated><title type='text'>Gestores de segurança sob crescente pressão | Computerworld</title><content type='html'>&lt;a href=&quot;http://www.computerworld.com.pt/2015/03/11/gestores-de-seguranca-sob-crescente-pressao/#.VQnzQfeCumc.blogger&quot;&gt;Gestores de segurança sob crescente pressão | Computerworld&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPtrgP2qHOC41JFsbUSgM98v5Y3xQFnVLdWUToQHdk7J5UN9Q7RTDrdar_uwO-uOYGRvyKD_nhM5AWkM7CzukP3xrH8Xk_tGms_mGKjP7z3UjMRO5EruBhRLciPRfxc1FLnfqxLhXdcc4/s1600/Virus_imagem.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPtrgP2qHOC41JFsbUSgM98v5Y3xQFnVLdWUToQHdk7J5UN9Q7RTDrdar_uwO-uOYGRvyKD_nhM5AWkM7CzukP3xrH8Xk_tGms_mGKjP7z3UjMRO5EruBhRLciPRfxc1FLnfqxLhXdcc4/s1600/Virus_imagem.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/3470759626698711163/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/03/gestores-de-seguranca-sob-crescente.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3470759626698711163'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/3470759626698711163'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/03/gestores-de-seguranca-sob-crescente.html' title='Gestores de segurança sob crescente pressão | Computerworld'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPtrgP2qHOC41JFsbUSgM98v5Y3xQFnVLdWUToQHdk7J5UN9Q7RTDrdar_uwO-uOYGRvyKD_nhM5AWkM7CzukP3xrH8Xk_tGms_mGKjP7z3UjMRO5EruBhRLciPRfxc1FLnfqxLhXdcc4/s72-c/Virus_imagem.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-2154861288917908709.post-5954222661443942097</id><published>2015-03-04T11:41:00.001-03:00</published><updated>2015-03-04T11:41:01.848-03:00</updated><title type='text'>ISO 27001 é a mais eficaz em segurança da informação - Convergência Digital - Segurança</title><content type='html'>&lt;a href=&quot;http://convergenciadigital.uol.com.br/cgi/cgilua.exe/sys/start.htm?infoid=39061&quot;&gt;ISO 27001 é a mais eficaz em segurança da informação - Convergência Digital - Segurança&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1k_50Yk23IkOiZvQiVEyIoQW1pZg-XHMH3CNvPSuv7-NosekZ9uguATf8wBFs5a_IaVnsiQEfq8Jim37GbGWYtlyKCvA1Z9ETbK0SkcIEBWyE-o3evMX1pARJJD7ck4J_ROn320oqxb4/s1600/Computer.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1k_50Yk23IkOiZvQiVEyIoQW1pZg-XHMH3CNvPSuv7-NosekZ9uguATf8wBFs5a_IaVnsiQEfq8Jim37GbGWYtlyKCvA1Z9ETbK0SkcIEBWyE-o3evMX1pARJJD7ck4J_ROn320oqxb4/s1600/Computer.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;Denilson Barbosa ®
www.segurancadenilson.blogspot.com&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://segurancadenilson.blogspot.com/feeds/5954222661443942097/comments/default' title='Postar comentários'/><link rel='replies' type='text/html' href='http://segurancadenilson.blogspot.com/2015/03/iso-27001-e-mais-eficaz-em-seguranca-da.html#comment-form' title='0 Comentários'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/5954222661443942097'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/2154861288917908709/posts/default/5954222661443942097'/><link rel='alternate' type='text/html' href='http://segurancadenilson.blogspot.com/2015/03/iso-27001-e-mais-eficaz-em-seguranca-da.html' title='ISO 27001 é a mais eficaz em segurança da informação - Convergência Digital - Segurança'/><author><name>Anonymous</name><uri>http://www.blogger.com/profile/12534498739148147845</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1k_50Yk23IkOiZvQiVEyIoQW1pZg-XHMH3CNvPSuv7-NosekZ9uguATf8wBFs5a_IaVnsiQEfq8Jim37GbGWYtlyKCvA1Z9ETbK0SkcIEBWyE-o3evMX1pARJJD7ck4J_ROn320oqxb4/s72-c/Computer.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>