{"id":7605,"date":"2020-10-26T10:15:07","date_gmt":"2020-10-26T13:15:07","guid":{"rendered":"https:\/\/www.lumiun.com\/blog\/?p=7605"},"modified":"2022-05-02T15:00:21","modified_gmt":"2022-05-02T18:00:21","slug":"a-semana-da-seguranca-da-informacao-edicao-no-35","status":"publish","type":"post","link":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/","title":{"rendered":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba 35"},"content":{"rendered":"<p>Na edi\u00e7\u00e3o N\u00ba 35 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, Apple autoriza instala\u00e7\u00e3o de malware em seu sistema, apps infantis retirados da Play Store, novo golpe no WhatsApp, vazamento de dados de eleitores americanos e muito mais.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:separator {\"className\":\"is-style-wide\"} --><hr class=\"wp-block-separator is-style-wide\" \/><!-- \/wp:separator -->\r\n\r\n<!-- wp:heading -->\r\n<h2 id=\"noticias\">Not\u00edcias<\/h2>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"de-novo-apple-autoriza-malware-para-instalacao-no-macos\"><a href=\"https:\/\/canaltech.com.br\/seguranca\/de-novo-apple-autoriza-malware-para-instalacao-no-macos-173507\/\" target=\"_blank\" rel=\"noreferrer noopener\">De novo! Apple autoriza malware para instala\u00e7\u00e3o no macOS<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Seis amostras do Trojan foram aprovadas para funcionarem no sistema operacional ap\u00f3s verifica\u00e7\u00f5es feitas pela empresa.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Felipe Demartini em Canaltech<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"google-tira-da-play-store-tres-apps-infantis-que-poderiam-permitir-ao-desenvolvedor-reconhecer-e-rastrear-um-usuario-android\"><a href=\"https:\/\/olhardigital.com.br\/noticia\/google-tira-da-play-store-tres-apps-infantis-com-20-milhoes-de-downloads\/109196\" target=\"_blank\" rel=\"noreferrer noopener\">Google tira da Play Store tr\u00eas apps infantis q<\/a><a href=\"https:\/\/olhardigital.com.br\/fique_seguro\/noticia\/aumenta-o-numero-de-dominios-tentando-roubar-dados-de-usuarios-da-apple\/108676\" target=\"_blank\" rel=\"noreferrer noopener\">ue poderiam permitir ao desenvolvedor reconhecer e rastrear um usu\u00e1rio Android<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>O Google removeu da Play Store tr\u00eas apps Android voltados ao p\u00fablico infantil, que juntos tinham mais de 20 milh\u00f5es de downloads.<\/p>\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Rafael Rigues em Olhar Digital<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"ambientes-industriais-possuem-maior-risco-de-sofrer-ataques-ciberneticos-aponta-estudo\"><a href=\"https:\/\/thehack.com.br\/ambientes-industriais-possuem-maior-risco-de-sofrer-ataques-ciberneticos-aponta-estudo\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ambientes industriais possuem maior risco de sofrer ataques cibern\u00e9ticos, aponta estudo<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Nos \u00faltimos 12 meses, as empresas que responderam a esse estudo tiveram uma m\u00e9dia de quatro problemas relacionados a seguran\u00e7a da informa\u00e7\u00e3o.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Ramon de Souza em The Hack<\/span><\/em><\/p>\r\n<h3 id=\"golpe-do-whatsapp-muda-de-roubo-para-clone-alerta-empresa-russa-de-seguranca-de-dados\"><a href=\"https:\/\/diariodonordeste.verdesmares.com.br\/opiniao\/colunistas\/daniel-praciano\/golpe-do-whatsapp-muda-de-roubo-para-clone-alerta-empresa-russa-de-seguranca-de-dados-1.3001423\" target=\"_blank\" rel=\"noreferrer noopener\">Golpe do WhatsApp muda de roubo para clone, alerta empresa russa de seguran\u00e7a de dados<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Desde maio de 2019, a Kaspersky, empresa russa de seguran\u00e7a de dados, alertou sobre este risco, que j\u00e1 usou an\u00fancios online e convites para festas VIP, mas agora a t\u00e1tica \u00e9 mais simples: a cria\u00e7\u00e3o de perfis falsos.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Daniel Praciano em Di\u00e1rio do Nordeste<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"220-000-bots-tentam-atacar-paxful\"><a href=\"https:\/\/beincrypto.com.br\/220-000-bots-atacar-paxful\/\" target=\"_blank\" rel=\"noreferrer noopener\">220.000 bots tentam atacar Paxful<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Uma das maiores plataformas P2P de negocia\u00e7\u00e3o de criptomoedas, a Paxful, sofreu durante dois meses uma onda de ataques de web bots.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Saori Honorato em Be In Crypto<\/span><\/em><\/p>\r\n<h3 id=\"hackers-exploram-falha-em-links-compartilhados-no-facebook\"><a href=\"https:\/\/olhardigital.com.br\/fique_seguro\/noticia\/vulnerabilidade-xss-e-explorada-atraves-de-links-postados-no-facebook\/109243\" target=\"_blank\" rel=\"noreferrer noopener\">Hackers exploram falha em links compartilhados no Facebook<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Empresa de ciberseguran\u00e7a revela golpe realizado atrav\u00e9s de URLs maliciosas para for\u00e7ar usu\u00e1rios a comprar softwares de seguran\u00e7a.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Fernando Bianchi em Tribuna Online<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} --><!-- \/wp:paragraph -->\r\n\r\n<!-- wp:heading {\"level\":3} -->\r\n<h3 id=\"vazamento-expoe-dados-de-186-milhoes-de-eleitores-norte-americanos\"><a href=\"https:\/\/canaltech.com.br\/hacker\/vazamento-expoe-dados-de-186-milhoes-de-eleitores-norte-americanos-173457\/\" target=\"_blank\" rel=\"noreferrer noopener\">Vazamento exp\u00f5e dados de 186 milh\u00f5es de eleitores norte-americanos<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Um gigantesco banco de dados com informa\u00e7\u00f5es de 186 milh\u00f5es de eleitores dos Estados Unidos foi localizado, \u00e0 venda, em um f\u00f3rum dedicado a hacking.<\/p>\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Felipe Demartini em Canaltech<\/span><\/em><\/p>\r\n<h3 id=\"nao-ta-facil-gitlab-faz-teste-de-phishing-com-seus-funcionarios-e-varios-caem\"><a href=\"https:\/\/thehack.com.br\/nao-ta-facil-gitlab-faz-teste-de-phishing-com-seus-funcionarios-e-varios-caem\/\" target=\"_blank\" rel=\"noreferrer noopener\">N\u00e3o t\u00e1 f\u00e1cil: GitLab faz teste de phishing com seus funcion\u00e1rios e v\u00e1rios caem<\/a><\/h3>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Nem mesmo empresas que deveriam ser exemplo em boas pr\u00e1ticas de seguran\u00e7a cibern\u00e9tica est\u00e3o livres de ter, em seu quadro de colaboradores, indiv\u00edduos que ainda n\u00e3o saibam identificar uma amea\u00e7a cibern\u00e9tica.<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Ramon de Souza em The Hack<\/span><\/em><\/p>\r\n<h3 id=\"4-formas-de-bloquear-sites-dos-funcionarios-em-home-office\"><a href=\"https:\/\/www.lumiun.com\/blog\/4-formas-de-bloquear-sites-dos-funcionarios-em-home-office\/\" target=\"_blank\" rel=\"noreferrer noopener\">4 formas de bloquear sites dos funcion\u00e1rios em home office<\/a><\/h3>\r\n<p><!-- \/wp:heading -->\r\n\r\n<!-- wp:paragraph --><\/p>\r\n<p>As vantagens v\u00e3o muito al\u00e9m de manter o colaborador produtivo e sob observa\u00e7\u00e3o. Os perigos da internet s\u00e3o incont\u00e1veis e grande maioria v\u00eam de acessos de usu\u00e1rios leigos e despreparados.<\/p>\r\n<p><!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph --><\/p>\r\n<p><em><span class=\"has-inline-color has-cyan-bluish-gray-color\">Por Kelvin Zimmer em Blog do Lumiun<\/span><\/em><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:separator {\"className\":\"is-style-wide\"} --><!-- \/wp:heading -->\r\n\r\n<!-- wp:heading {\"level\":3} --><!-- \/wp:list -->\r\n\r\n<!-- wp:separator {\"className\":\"is-style-wide\"} --><hr class=\"wp-block-separator is-style-wide\" \/><!-- \/wp:separator -->\r\n\r\n<!-- wp:heading -->\r\n<h2 id=\"videos\">Videos<\/h2>\r\n<h3 id=\"livesec-a-importancia-da-seguranca-da-informacao-e-cyber-no-planejamento-empresarial\"><a href=\"https:\/\/www.youtube.com\/watch?v=pJxtjHxN7Cs\">LIVESEC &#8211; A import\u00e2ncia da seguran\u00e7a da informa\u00e7\u00e3o e cyber no planejamento empresarial<\/a><\/h3>\r\n<p><div class=\"cs-embed cs-embed-responsive\"><iframe title=\"LIVESEC - A import\u00e2ncia da seguran\u00e7a da informa\u00e7\u00e3o e cyber no planejamento empresarial\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/pJxtjHxN7Cs?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div><\/p>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:image {\"id\":6814,\"sizeSlug\":\"large\"} --><!-- \/wp:image -->\r\n\r\n<!-- wp:shortcode -->\r\n<h3 id=\"live-adequacao-a-lgpd-uma-jornada-em-seguranca-da-informacao\"><a href=\"https:\/\/www.youtube.com\/watch?v=e_Moq-5hH1E\">Live &#8216;Adequa\u00e7\u00e3o \u00e0 LGPD: uma jornada em seguran\u00e7a da informa\u00e7\u00e3o&#8217;<\/a><\/h3>\r\n<p><div class=\"cs-embed cs-embed-responsive\"><iframe title=\"Live &#039;Adequa\u00e7\u00e3o \u00e0 LGPD: uma jornada em seguran\u00e7a da informa\u00e7\u00e3o&#039;\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/e_Moq-5hH1E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><\/div><\/p>\r\n<!-- \/wp:heading -->\r\n\r\n<!-- wp:image {\"id\":6814,\"sizeSlug\":\"large\"} --><!-- \/wp:image -->\r\n\r\n<!-- wp:shortcode --><!-- \/wp:heading -->\r\n\r\n<!-- wp:image {\"id\":6814,\"sizeSlug\":\"large\"} --><!-- \/wp:image -->\r\n\r\n<!-- wp:shortcode --><hr \/>\r\n<p>Voc\u00ea ainda n\u00e3o est\u00e1 inscrito na nossa newsletter para receber esse conte\u00fado semanalmente no e-mail? Ent\u00e3o se inscreva atrav\u00e9s do link abaixo:<\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p><a href=\"https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet\">https:\/\/conteudo.lumiun.com\/semana-da-seguranca-na-internet<\/a><\/p>\r\n<!-- \/wp:paragraph -->\r\n\r\n<!-- wp:paragraph -->\r\n<p>Compartilhe o link com seus colegas e amigos.<\/p>","protected":false},"excerpt":{"rendered":"Na edi\u00e7\u00e3o N\u00ba 35 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, Apple autoriza instala\u00e7\u00e3o de malware em seu sistema,&hellip;\n","protected":false},"author":11,"featured_media":7612,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"image","meta":{"content-type":"","footnotes":""},"categories":[143],"tags":[275,6,146,137,236,164],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba 35 | Lumiun Blog<\/title>\n<meta name=\"description\" content=\"Na edi\u00e7\u00e3o N\u00ba 35 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, Apple autoriza malware para instala\u00e7\u00e3o no macOS, golpe de WhatsApp e muito mais.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba 35 | Lumiun Blog\" \/>\n<meta property=\"og:description\" content=\"Na edi\u00e7\u00e3o N\u00ba 35 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, Apple autoriza malware para instala\u00e7\u00e3o no macOS, golpe de WhatsApp e muito mais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/\" \/>\n<meta property=\"og:site_name\" content=\"Lumiun Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LumiunTecnologia\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-26T13:15:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-02T18:00:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao35-blog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"708\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kelvin Zimmer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kelvin Zimmer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/\"},\"author\":{\"name\":\"Kelvin Zimmer\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\"},\"headline\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba 35\",\"datePublished\":\"2020-10-26T13:15:07+00:00\",\"dateModified\":\"2022-05-02T18:00:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/\"},\"wordCount\":563,\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao35-blog.jpg\",\"keywords\":[\"apple\",\"facebook\",\"hackers\",\"seguran\u00e7a da informa\u00e7\u00e3o\",\"seguran\u00e7a de dados\",\"whatsapp\"],\"articleSection\":[\"Semana da Seguran\u00e7a na Internet\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/\",\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba 35 | Lumiun Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao35-blog.jpg\",\"datePublished\":\"2020-10-26T13:15:07+00:00\",\"dateModified\":\"2022-05-02T18:00:21+00:00\",\"description\":\"Na edi\u00e7\u00e3o N\u00ba 35 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, Apple autoriza malware para instala\u00e7\u00e3o no macOS, golpe de WhatsApp e muito mais.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#primaryimage\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao35-blog.jpg\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao35-blog.jpg\",\"width\":1200,\"height\":708,\"caption\":\"seguran\u00e7a da informa\u00e7\u00e3o\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/www.lumiun.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba 35\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#website\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"name\":\"Lumiun Blog\",\"description\":\"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI\",\"publisher\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#organization\",\"name\":\"Lumiun Tecnologia\",\"url\":\"https:\/\/www.lumiun.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"contentUrl\":\"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png\",\"width\":1500,\"height\":930,\"caption\":\"Lumiun Tecnologia\"},\"image\":{\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LumiunTecnologia\/\",\"https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/\",\"https:\/\/www.youtube.com\/LumiunNetwork\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77\",\"name\":\"Kelvin Zimmer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g\",\"caption\":\"Kelvin Zimmer\"},\"description\":\"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.\",\"sameAs\":[\"http:\/\/lumiun.com\"],\"url\":\"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba 35 | Lumiun Blog","description":"Na edi\u00e7\u00e3o N\u00ba 35 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, Apple autoriza malware para instala\u00e7\u00e3o no macOS, golpe de WhatsApp e muito mais.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/","og_locale":"pt_BR","og_type":"article","og_title":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba 35 | Lumiun Blog","og_description":"Na edi\u00e7\u00e3o N\u00ba 35 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, Apple autoriza malware para instala\u00e7\u00e3o no macOS, golpe de WhatsApp e muito mais.","og_url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/","og_site_name":"Lumiun Blog","article_publisher":"https:\/\/www.facebook.com\/LumiunTecnologia\/","article_published_time":"2020-10-26T13:15:07+00:00","article_modified_time":"2022-05-02T18:00:21+00:00","og_image":[{"width":1200,"height":708,"url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao35-blog.jpg","type":"image\/jpeg"}],"author":"Kelvin Zimmer","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Kelvin Zimmer","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#article","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/"},"author":{"name":"Kelvin Zimmer","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77"},"headline":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba 35","datePublished":"2020-10-26T13:15:07+00:00","dateModified":"2022-05-02T18:00:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/"},"wordCount":563,"publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao35-blog.jpg","keywords":["apple","facebook","hackers","seguran\u00e7a da informa\u00e7\u00e3o","seguran\u00e7a de dados","whatsapp"],"articleSection":["Semana da Seguran\u00e7a na Internet"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/","url":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/","name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o - Edi\u00e7\u00e3o N\u00ba 35 | Lumiun Blog","isPartOf":{"@id":"https:\/\/www.lumiun.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#primaryimage"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao35-blog.jpg","datePublished":"2020-10-26T13:15:07+00:00","dateModified":"2022-05-02T18:00:21+00:00","description":"Na edi\u00e7\u00e3o N\u00ba 35 da Semana da Seguran\u00e7a da Informa\u00e7\u00e3o, Apple autoriza malware para instala\u00e7\u00e3o no macOS, golpe de WhatsApp e muito mais.","breadcrumb":{"@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#primaryimage","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao35-blog.jpg","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/Semana-da-Seguranca-da-Informacao35-blog.jpg","width":1200,"height":708,"caption":"seguran\u00e7a da informa\u00e7\u00e3o"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lumiun.com\/blog\/a-semana-da-seguranca-da-informacao-edicao-no-35\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/www.lumiun.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Semana da Seguran\u00e7a da Informa\u00e7\u00e3o &#8211; Edi\u00e7\u00e3o N\u00ba 35"}]},{"@type":"WebSite","@id":"https:\/\/www.lumiun.com\/blog\/#website","url":"https:\/\/www.lumiun.com\/blog\/","name":"Lumiun Blog","description":"Conte\u00fado sobre gest\u00e3o e seguran\u00e7a da internet para gestores e profissionais de TI","publisher":{"@id":"https:\/\/www.lumiun.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lumiun.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.lumiun.com\/blog\/#organization","name":"Lumiun Tecnologia","url":"https:\/\/www.lumiun.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","contentUrl":"https:\/\/www.lumiun.com\/blog\/wp-content\/uploads\/logo-lumiun.png","width":1500,"height":930,"caption":"Lumiun Tecnologia"},"image":{"@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LumiunTecnologia\/","https:\/\/www.linkedin.com\/company\/lumiun---cloud-managed-network\/","https:\/\/www.youtube.com\/LumiunNetwork"]},{"@type":"Person","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/30ba726a925be4e704df87ac2f3aeb77","name":"Kelvin Zimmer","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.lumiun.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86b5cf3e5814ca737f2d6ba0be399339?s=96&d=mm&r=g","caption":"Kelvin Zimmer"},"description":"Colunista de ciberseguran\u00e7a, especialista em produtividade e Analista de Marketing na Lumiun.","sameAs":["http:\/\/lumiun.com"],"url":"https:\/\/www.lumiun.com\/blog\/author\/kelvin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/7605"}],"collection":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/comments?post=7605"}],"version-history":[{"count":8,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/7605\/revisions"}],"predecessor-version":[{"id":8020,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/posts\/7605\/revisions\/8020"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media\/7612"}],"wp:attachment":[{"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/media?parent=7605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/categories?post=7605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lumiun.com\/blog\/wp-json\/wp\/v2\/tags?post=7605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}