{"id":23004,"date":"2020-08-24T00:00:00","date_gmt":"2020-08-24T00:00:00","guid":{"rendered":"https:\/\/abes.org.br\/?p=10502"},"modified":"2020-08-24T00:00:00","modified_gmt":"2020-08-24T00:00:00","slug":"artigo-como-evitar-ataques-de-hackers-e-phishing","status":"publish","type":"post","link":"https:\/\/abes.org.br\/en\/artigo-como-evitar-ataques-de-hackers-e-phishing\/","title":{"rendered":"ARTICLE - How to Avoid Hacking and Phishing Attacks"},"content":{"rendered":"<p>* By Roberto Gallo<\/p>\n<div style=\"text-align: justify;\">\n\tHacker attacks have become increasingly common nowadays, not only due to the digitization of companies, but also due to the increase in users on the network as a result of the pandemic. Attacks like Spyware, Trojans, Rootkits, Worms and the notorious Phishing are carried out daily by malicious hackers and generally have the same objective: the theft of confidential and private information from both ordinary and specific users, in addition to websites and applications. Check out some of the most popular types of attacks below:<\/p>\n<p>\t\u2022 <strong>Spyware:<\/strong> Collects information from the victim&#039;s browsing history;<\/p>\n<p>\t\u2022 <strong>Trojans:<\/strong> Allusion to the Trojan horse built by the Greeks, attracts the victim by offering a bait, but hides a malicious action;<\/p>\n<p>\t\u2022 <strong>Rootkit:<\/strong> Ensures administrative access to the attacker, enabling any action to be performed remotely;<\/p>\n<p>\t\u2022 <strong>Worms:<\/strong> They replicate throughout the network, executing several different attacks and infecting as many machines as possible;<\/p>\n<p>\t\u2022 <strong>Phishing:<\/strong> It seeks to deceive a victim with the intention of obtaining their personal information, such as passwords, credit card details and other documents.<\/p>\n<p>\tAccording to the Anti-Phishing Working Group, Brazil had a 232% increase in security incidents related to phishing\u00b9 in 2019, with its peak in November, caused mainly by two factors: the end-of-year shopping period, also associated with Black Friday, and year-end income increases, such as the thirteenth, for example.<\/p>\n<p>\tPhishing emails often catch the victim&#039;s attention through specific and worrying subjects, along with a convincing email address, such as &quot;<a href=\"http:\/\/empresa_suport@gmail.com\">empresa_suport@gmail.com<\/a>&quot;, for example. The technique provides credibility to the subject, in addition to having a format similar or even identical to that of the personified company, inducing the user to trust the authenticity of the document.<\/div>\n<p>\n<img decoding=\"async\" alt=\"\" src=\"\/wp-content\/uploads\/anterior\/Imagens\/Ita%C3%BA-pishing.jpg\" style=\"width: 350px; height: 263px;\" \/><\/p>\n<div style=\"text-align: justify;\">\n\tThis type of attack happens due to the ease of execution, with no prerequisites or specific target, which allows scammers with little preparation to mount attacks. Phishing, on the other hand, generally affects more people with low education and low experience with technology, in particular, the elderly. However, these attacks have become increasingly sophisticated, and, consequently, more dangerous and difficult to identify. However, there are some points that, when taken into account, will help you to protect yourself against this type of attack.<\/p>\n<p>\tGood customs can free you from a lot of trouble when it comes to accessing the internet. Look for: (i) changing your privacy settings to be more restrictive, (ii) not accessing applications that require authentication on a public network, (iii) keeping the browser up to date, and (iv) remembering to use two-factor authentication on social networks and in the application to access your credit card. E-mails that arouse curiosity or ask for personal information, such as credit card details, should be blocked and deleted. No financial institution asks for customer information by email. You should also be wary of login pages hosted on unknown domains, in addition to miraculous promotions that offer a price well below the market.<\/p>\n<p>\t<a href=\"\/wp-content\/uploads\/anterior\/Arquivos\/apwg_trends_report_q4_2019.pdf\">\u00b9Source: http:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2019.pdf<\/a><\/p>\n<p>\t* Roberto Gallo is an Advisor to ABES - ABES - Brazilian Association of Software Companies, founding CEO of Kryptus, President of ABIMDE - Brazilian Association of Defense and Security Materials Industries and Director of the Federation of Industries of the State of S\u00e3o Paulo - FIESP.<\/p><\/div>","protected":false},"excerpt":{"rendered":"<p>*Por Roberto Gallo Ataques de hackers t&ecirc;m se tornado cada vez mais comuns nos tempos atuais, n&atilde;o s&oacute; devido &agrave; digitaliza&ccedil;&atilde;o das empresas, mas tamb&eacute;m em virtude do aumento de usu&aacute;rios na rede em decorr&ecirc;ncia da pandemia. Ataques como Spyware, Trojans, Rootkits, Worms e o t&atilde;o famigerado Phishing s&atilde;o executados diariamente por hackers mal-intencionados e, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[40],"tags":[],"class_list":["post-23004","post","type-post","status-publish","format-standard","hentry","category-press-releases"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>ARTIGO - Como evitar ataques de hackers e Phishing - ABES<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/abes.org.br\/en\/artigo-como-evitar-ataques-de-hackers-e-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ARTIGO - Como evitar ataques de hackers e Phishing - ABES\" \/>\n<meta property=\"og:description\" content=\"*Por Roberto Gallo Ataques de hackers t&ecirc;m se tornado cada vez mais comuns nos tempos atuais, n&atilde;o s&oacute; devido &agrave; digitaliza&ccedil;&atilde;o das empresas, mas tamb&eacute;m em virtude do aumento de usu&aacute;rios na rede em decorr&ecirc;ncia da pandemia. Ataques como Spyware, Trojans, Rootkits, Worms e o t&atilde;o famigerado Phishing s&atilde;o executados diariamente por hackers mal-intencionados e, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/abes.org.br\/en\/artigo-como-evitar-ataques-de-hackers-e-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"ABES\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ABES.software\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-24T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"3509\" \/>\n\t<meta property=\"og:image:height\" content=\"2482\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"prima-dev\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:site\" content=\"@ABES_SOFTWARE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"prima-dev\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/artigo-como-evitar-ataques-de-hackers-e-phishing\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/artigo-como-evitar-ataques-de-hackers-e-phishing\\\/\"},\"author\":{\"name\":\"prima-dev\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\"},\"headline\":\"ARTIGO &#8211; Como evitar ataques de hackers e Phishing\",\"datePublished\":\"2020-08-24T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/artigo-como-evitar-ataques-de-hackers-e-phishing\\\/\"},\"wordCount\":762,\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"articleSection\":[\"Press releases\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/artigo-como-evitar-ataques-de-hackers-e-phishing\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/artigo-como-evitar-ataques-de-hackers-e-phishing\\\/\",\"name\":\"ARTIGO - Como evitar ataques de hackers e Phishing - ABES\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\"},\"datePublished\":\"2020-08-24T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/artigo-como-evitar-ataques-de-hackers-e-phishing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/abes.org.br\\\/artigo-como-evitar-ataques-de-hackers-e-phishing\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/artigo-como-evitar-ataques-de-hackers-e-phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\\\/\\\/abes.org.br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ARTIGO &#8211; Como evitar ataques de hackers e Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#website\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"name\":\"ABES\",\"description\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"publisher\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/abes.org.br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#organization\",\"name\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\",\"url\":\"https:\\\/\\\/abes.org.br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"contentUrl\":\"https:\\\/\\\/abes.org.br\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png\",\"width\":324,\"height\":70,\"caption\":\"Associa\u00e7\u00e3o Brasileira das Empresas de Software\"},\"image\":{\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ABES.software\",\"https:\\\/\\\/x.com\\\/ABES_SOFTWARE\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/abes-software\\\/\",\"https:\\\/\\\/www.instagram.com\\\/abes_software\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/abes.org.br\\\/#\\\/schema\\\/person\\\/1bad6bff859e7d56ec5664b01968e27e\",\"name\":\"prima-dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g\",\"caption\":\"prima-dev\"},\"url\":\"https:\\\/\\\/abes.org.br\\\/en\\\/author\\\/prima-dev\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ARTIGO - Como evitar ataques de hackers e Phishing - ABES","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/abes.org.br\/en\/artigo-como-evitar-ataques-de-hackers-e-phishing\/","og_locale":"en_US","og_type":"article","og_title":"ARTIGO - Como evitar ataques de hackers e Phishing - ABES","og_description":"*Por Roberto Gallo Ataques de hackers t&ecirc;m se tornado cada vez mais comuns nos tempos atuais, n&atilde;o s&oacute; devido &agrave; digitaliza&ccedil;&atilde;o das empresas, mas tamb&eacute;m em virtude do aumento de usu&aacute;rios na rede em decorr&ecirc;ncia da pandemia. Ataques como Spyware, Trojans, Rootkits, Worms e o t&atilde;o famigerado Phishing s&atilde;o executados diariamente por hackers mal-intencionados e, [&hellip;]","og_url":"https:\/\/abes.org.br\/en\/artigo-como-evitar-ataques-de-hackers-e-phishing\/","og_site_name":"ABES","article_publisher":"https:\/\/www.facebook.com\/ABES.software","article_published_time":"2020-08-24T00:00:00+00:00","og_image":[{"width":3509,"height":2482,"url":"https:\/\/abes.org.br\/wp-content\/uploads\/2021\/01\/logo_abes_marca_tagline_horizontal_colorido_rgb.png","type":"image\/png"}],"author":"prima-dev","twitter_card":"summary_large_image","twitter_creator":"@ABES_SOFTWARE","twitter_site":"@ABES_SOFTWARE","twitter_misc":{"Written by":"prima-dev","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/abes.org.br\/artigo-como-evitar-ataques-de-hackers-e-phishing\/#article","isPartOf":{"@id":"https:\/\/abes.org.br\/artigo-como-evitar-ataques-de-hackers-e-phishing\/"},"author":{"name":"prima-dev","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e"},"headline":"ARTIGO &#8211; Como evitar ataques de hackers e Phishing","datePublished":"2020-08-24T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/abes.org.br\/artigo-como-evitar-ataques-de-hackers-e-phishing\/"},"wordCount":762,"publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"articleSection":["Press releases"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/abes.org.br\/artigo-como-evitar-ataques-de-hackers-e-phishing\/","url":"https:\/\/abes.org.br\/artigo-como-evitar-ataques-de-hackers-e-phishing\/","name":"ARTIGO - Como evitar ataques de hackers e Phishing - ABES","isPartOf":{"@id":"https:\/\/abes.org.br\/#website"},"datePublished":"2020-08-24T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/abes.org.br\/artigo-como-evitar-ataques-de-hackers-e-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/abes.org.br\/artigo-como-evitar-ataques-de-hackers-e-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/abes.org.br\/artigo-como-evitar-ataques-de-hackers-e-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/abes.org.br\/"},{"@type":"ListItem","position":2,"name":"ARTIGO &#8211; Como evitar ataques de hackers e Phishing"}]},{"@type":"WebSite","@id":"https:\/\/abes.org.br\/#website","url":"https:\/\/abes.org.br\/","name":"ABES","description":"Brazilian Association of Software Companies","publisher":{"@id":"https:\/\/abes.org.br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/abes.org.br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/abes.org.br\/#organization","name":"Brazilian Association of Software Companies","url":"https:\/\/abes.org.br\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/","url":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","contentUrl":"https:\/\/abes.org.br\/wp-content\/uploads\/2020\/09\/logo_abes_marca_d_tagline_horizontal_verde-amarelo_cmyk.png","width":324,"height":70,"caption":"Associa\u00e7\u00e3o Brasileira das Empresas de Software"},"image":{"@id":"https:\/\/abes.org.br\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ABES.software","https:\/\/x.com\/ABES_SOFTWARE","https:\/\/www.linkedin.com\/company\/abes-software\/","https:\/\/www.instagram.com\/abes_software\/"]},{"@type":"Person","@id":"https:\/\/abes.org.br\/#\/schema\/person\/1bad6bff859e7d56ec5664b01968e27e","name":"prima-dev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/039c6325210cecd393c57645bc755f7d13deed578fddf4dbfa87bc05dcbcfa4b?s=96&d=mm&r=g","caption":"prima-dev"},"url":"https:\/\/abes.org.br\/en\/author\/prima-dev\/"}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-03 18:39:26","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/23004","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/comments?post=23004"}],"version-history":[{"count":0,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/posts\/23004\/revisions"}],"wp:attachment":[{"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/media?parent=23004"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/categories?post=23004"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/abes.org.br\/en\/wp-json\/wp\/v2\/tags?post=23004"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}