Clipping of news on Brazilian Culture, Law and Citizenship
 


Web

Growth Turbine cloud unwanted messages

01/13/2014

This article was translated by an automatic translation system, and was therefore not reviewed by people.

 

transparent image

 

 

Despite the threat , email remains a common means of interpersonal relationships on the Internet

 

DAY

Rio - The growing use of online storage ( cloud ) system , and increasingly computer networks with distributed computing software turbinam firepower of sending messages by hacker that induces the user to enter main campaigns or do download software stealing data.

 

The conclusion consists of a survey by Websense Security Lab Although the data indicate that the percentage of phishing attempts ( messaging) in terms of e-mail traffic fell to 0.5 % of the total (against 1.12 % in 2012 ) , experts consulted by Cheap Brazil still see e-mail as the most common vehicle for this type of invasion of computers to data theft .

 

Growth Turbine cloud unwanted messages

 

Photo: Art : The Day

" The email is still a major force , but with the changing communication habits around the world , we are seeing growth in the number of phishing in other media such as social networks ," says the marketing manager of AVG Brazil Mariano Sumrell .

" In social networks , the propagation speed is higher . We often have people who do not know these tools. It is common to receive something malicious and pass the information to friends , "added the security specialist Symantec , Otto Stoeterau . The desktop users are still the most attacked , but also grow threats to mobile devices such as tablets and smartphones , as it increases the use of these devices .

 

According to the survey , the volume of campaigns fell . However , they are much more targeted , with social engineering tactics such as scour social networks to capture and study their targets before building the traps , many of them by email .

 

The survey also indicates that the five main topics in phishing e-mails worldwide are invited to join LinkedIn ; Mail delivery failed: returning message to sender ; Dear Client , Communication major , and not Deliver Mail Returned to Sender . Sumrell also adds other examples such as promotions and trivia about celebrities .

 

" You need to understand a little what are the baits used . They can whet curiosity , bringing information about celebrities , event and even accidents . But also go much by fear as a notification of the Federal Police . Optimism also appears in the form of prizes and offers , "says the expert. " We have seen links that lead to legitimate sites , but are legitimate sites that have been infected ," adds Stoeterau .

 

Expert gives tips to defend yourself online virus

Expert gives some basic tips to help netizens themselves against these and other threats . Besides having an anti -virus and keep it up to date , it is important to be wary of clicking on a link , search before putting data into forms from the internet and maintain operating system always up to date .

" Financial institutions do not usually ask for information on the Internet. We must also pay attention to the security lock sites and even to receive e- mail from known be careful because the sender can not know who was infected ", says the manager of Systems Engineering McAfee Brazil , Bruno Zani , for whom the anti-spam tools are also used to block phishing .

 

' Cloud hides frightening universe '

In an exclusive interview to DIA , published on December 15 , the director of the Department for Culture, Media and Creative Activities at King's College, London , Professor Anna Reading showed that the metaphor of the cloud , used to represent the data stored in the virtual world hides a scary universe.

 

Heedless of the risks , children working in the dump electronics in Guangdong , China

Photo: Disclosure

Anna comes to the risks to the preservation of culture , since the digital memory has increasingly replaced the physical records , such as photographs and books . According to her , there is no guarantee that the information available on the internet forever and future generations are at risk of not having the current world records . Also , research the teacher reports the harsh reality that exists behind the pixels with digital memory built by people and the exploitation of the environment .

His speech is divided into three issues . The first deals with the damage caused by production technology . This happens primarily because the digital memory depends on the mining, which in turn implies a number of environmental impacts. According to the researcher , 320 tons of gold per year are used for connections on smartphones and tablets .

 

It reveals that there are 17 so-called rare earth minerals that are crucial for the production of modern technology . " These minerals are found with radioactive minerals such as thorium . Separation processes are complex and require large amounts of water , which results in toxic waste , "he explains .

The survey exposes the working conditions in the mines that are often similar to those of slavery. For Anna , " the production is done in the context of massive human rights abuses , especially in the Congo ." The junk is another matter .

 

The biggest technology dump in the world is in China, where workers separate the components by their value and potential for resale. However , contact with toxic materials ends up causing damage to health. " Tons of electronic waste are produced each year . One part is carried by ships to countries in the Southern Hemisphere , where it is recycled by workers , including children and women in China , for example. They live in terrible conditions , "said Anna .

 

 

Source : The Day - Online

 

Our news are taken in full from our partner sites . For this reason , we can not change their content even in cases of typos .

transparent image

This article was translated by an automatic translation system, and was therefore not reviewed by people.

Important:
The JurisWay site does not interfere in the work provided by doctrine, why only reflect the opinions, ideas and concepts of their authors.


  Subjects list
 
  Copyright (c) 2006-2009. JurisWay - All rights reserved.