Cibercriminalidade em segundo lugar nos crimes com mais inquéritos em Lisboa

Os números fazem parte do relatório da comarca de Lisboa para o ano de 2015 que foi divulgado online e mostra a prevalência do cibercrime e das atividades relacionadas com crimes informáticos entre a atividade criminal investigada na região.”

cibercriminalidade

In http://tek.sapo.pt/noticias/computadores/artigo/cibercrime_em_segundo_lugar_na_investigacao_do_ministerio_publico_em_lisboa-46235xzo.html

Lei n.º 109/2009, de 15 de Setembro – Lei do Cibercrime

Lei n.º 109/2009
de 15 de Setembro
Aprova a Lei do Cibercrime, transpondo para a ordem jurídica interna a Decisão Quadro n.º 2005/222/JAI, do Conselho, de 24 de Fevereiro, relativa a ataques contra sistemas de informação, e adapta o direito interno à Convenção sobre Cibercrime do Conselho da Europa.

 

http://www.pgdlisboa.pt/leis/lei_mostra_articulado.php?nid=1137&tabela=leis

7 Tips for Protecting Your Site From WordPress Plugin Vulnerabilities

  • Regularly install WordPress core updates and plugin updates to ensure you are running code having all the latest security patches.
  • Use a modern and updated WordPress theme. Older themes often have embedded plugins that haven’t been patched and can present vulnerabilities.
  • When researching the use of any plugin, check the date it was last updated and its WordPress version compatibility. Avoid older plugins, as those haven’t been tested with the current WordPress version.
  • When deciding between plugins having similar functionality, choose those having greater numbers of active installs and better ratings. Generally speaking, such popular plugins are regularly updated and have a lower risk factor.
  • Even inactive plugins on your WordPress site pose a security risk. Delete those that are unnecessary plugins and don’t actively use. The fewer the plugins you use, the fewer options a hacker will have.
  • No plugin is 100% safe, but the WordPress Plugin repository (https://wordpress.org/plugins/) vets each one located there before offering them to users. Only download plugins from the repository site and from third-party theme and plugin developers known to be reputable.
  • Use WPScan’s Vulnerability Database (https://wpvulndb.com/) to monitor plugins known to have vulnerabilities, as well as to learn when they are patched.

based on https://www.incapsula.com/blog/wordpress-plugin-vulnerabilities.html

KillDisk and BlackEnergy Are Not Just Energy Sector Threats

“Our new intelligence on BlackEnergy expands previous findings on the first wide-scale coordinated attack against industrial networks. Based on our research that we will further outline below, attackers behind the outages in two power facilities in Ukraine in December likely attempted similar attacks against a mining company and a large railway operator in Ukraine.

This proves that BlackEnergy has evolved from being just an energy sector problem; now it is a threat that organizations in all sectors—public and private—should be aware of and be prepared to defend themselves from. While the motivation for the said attacks has been the subject of heavy speculation, these appear to be aimed at crippling Ukrainian public and criticial infrastructure in what could only be a politically motivated strike.”

http://blog.trendmicro.com/trendlabs-security-intelligence/killdisk-and-blackenergy-are-not-just-energy-sector-threats/