{"id":21983,"date":"2020-04-25T10:10:21","date_gmt":"2020-04-25T15:10:21","guid":{"rendered":"https:\/\/blogs.funiber.org\/pt\/?p=21983"},"modified":"2020-04-25T10:10:21","modified_gmt":"2020-04-25T15:10:21","slug":"funiber-seguranca-cibernetica","status":"publish","type":"post","link":"https:\/\/www.funiber.blog\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica","title":{"rendered":"Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica"},"content":{"rendered":"<h2><strong>O Instituto Nacional de Seguran\u00e7a Cibern\u00e9tica (INCIBE) relatou uma vulnerabilidade no sistema de videoconfer\u00eancia Zoom.<\/strong><\/h2>\n<p>Os aplicativos de videochamada est\u00e3o na ordem do dia, depois de ganhar poder nas \u00faltimas semanas devido ao confinamento da sociedade em v\u00e1rios pa\u00edses.<!--more--><\/p>\n<p>Segundo o <a href=\"https:\/\/www.incibe.es\/protege-tu-empresa\/avisos-seguridad\/vulnerabilidad-descubierta-el-sistema-videoconferencia-zoom\" target=\"_blank\" rel=\"noopener noreferrer\">INCIBE<\/a>, o &#8220;Zoom publicou um aviso de seguran\u00e7a alertando para uma vulnerabilidade para usu\u00e1rios do Windows que poderia permitir que um cibercriminoso roube informa\u00e7\u00f5es confidenciais e execute arquivos no dispositivo da v\u00edtima&#8221;.<\/p>\n<p>Esta plataforma de bate-papo por v\u00eddeo criada por <a href=\"https:\/\/elpais.com\/gente\/2020-03-31\/eric-yuan-el-inventor-de-zoom-que-permite-relacionarse-en-tiempos-de-crisis.html\" target=\"_blank\" rel=\"noopener noreferrer\">Eric Yuan<\/a> viu como seu uso aumentou ap\u00f3s a dissemina\u00e7\u00e3o do coronav\u00edrus.<\/p>\n<p>O jornal americano <a href=\"https:\/\/www.nytimes.com\/2020\/04\/02\/technology\/zoom-linkedin-data.html\" target=\"_blank\" rel=\"noopener noreferrer\">The New York Times<\/a> publicou recentemente uma pesquisa que mostrou que &#8220;o aplicativo tinha uma fun\u00e7\u00e3o de minera\u00e7\u00e3o de dados, assim que iniciava uma sess\u00e3o, que vinculava automaticamente nomes de usu\u00e1rio e endere\u00e7os de e-mail aos perfis do LinkedIn&#8221;, apontou o jornal espanhol El Pa\u00eds.<\/p>\n<p>Na semana passada, a empresa emitiu um comunicado defendendo-se contra as acusa\u00e7\u00f5es e garantindo seu trabalho cont\u00ednuo para melhorar as falhas do sistema.<\/p>\n<p>Todos os profissionais que desejam ampliar sua experi\u00eancia e conhecimento no campo de novas tecnologias encontrar\u00e3o uma ampla variedade de programas universit\u00e1rios patrocinados pela <a href=\"https:\/\/www.funiber.org.br\" target=\"_blank\" rel=\"noopener noreferrer\">FUNIBER<\/a>. Um dos cursos oferecidos \u00e9 o <a href=\"https:\/\/www.funiber.org.br\/mestrado-em-transformacao-digital\" target=\"_blank\" rel=\"noopener noreferrer\">Mestrado em Transforma\u00e7\u00e3o Digital.<\/a><\/p>\n<p>Fonte: <a href=\"https:\/\/retina.elpais.com\/retina\/2020\/04\/06\/innovacion\/1586169223_190951.html\" target=\"_blank\" rel=\"noopener noreferrer\">Los problemas de privacidad y seguridad sacuden el \u00e9xito de Zoom<\/a>.<\/p>\n<p>Foto: Todos os direitos reservados.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>O Instituto Nacional de Seguran\u00e7a Cibern\u00e9tica (INCIBE) relatou uma vulnerabilidade no sistema de videoconfer\u00eancia Zoom. Os aplicativos de videochamada est\u00e3o na ordem do dia, depois de ganhar poder nas \u00faltimas semanas devido ao confinamento da sociedade em v\u00e1rios pa\u00edses.<\/p>\n","protected":false},"author":10,"featured_media":21985,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[6],"tags":[1242,855,285,408,119,248,671,641,255,787,26,4552,4390,6117],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica<\/title>\n<meta name=\"description\" content=\"O Instituto Nacional de Seguran\u00e7a Cibern\u00e9tica (INCIBE) relatou uma vulnerabilidade no sistema de videoconfer\u00eancia Zoom.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica\" \/>\n<meta property=\"og:description\" content=\"O Instituto Nacional de Seguran\u00e7a Cibern\u00e9tica (INCIBE) relatou uma vulnerabilidade no sistema de videoconfer\u00eancia Zoom.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica\" \/>\n<meta property=\"og:site_name\" content=\"FuniBlogs - FUNIBER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/funiber\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-25T15:10:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.funiber.org\/pt\/wp-content\/uploads\/2020\/04\/funiber-seguranca-cibernetica.png\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"566\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michelle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@FUNIBER\" \/>\n<meta name=\"twitter:site\" content=\"@FUNIBER\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica#article\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica\"},\"author\":{\"name\":\"Michelle\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d\"},\"headline\":\"Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica\",\"datePublished\":\"2020-04-25T15:10:21+00:00\",\"dateModified\":\"2020-04-25T15:10:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica\"},\"wordCount\":251,\"publisher\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\"},\"keywords\":[\"Bolsas\",\"Doutorado\",\"Educa\u00e7\u00e3o\",\"Educa\u00e7\u00e3o a Dist\u00e2ncia\",\"Estudos\",\"Funiber\",\"mestrado\",\"Opini\u00e3o FUNIBER\",\"Opini\u00f5es Funiber\",\"Seguran\u00e7a cibern\u00e9tica\",\"tecnologia\",\"videoconfer\u00eancia\",\"vulnerabilidade\",\"Zoom\"],\"articleSection\":[\"Tecnologias TIC\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica\",\"name\":\"Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#website\"},\"datePublished\":\"2020-04-25T15:10:21+00:00\",\"dateModified\":\"2020-04-25T15:10:21+00:00\",\"description\":\"O Instituto Nacional de Seguran\u00e7a Cibern\u00e9tica (INCIBE) relatou uma vulnerabilidade no sistema de videoconfer\u00eancia Zoom.\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/blogs.funiber.org\/pt\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#website\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/\",\"name\":\"FuniBlogs - FUNIBER\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.funiber.org\/pt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\",\"name\":\"FuniBlogs - FUNIBER\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg\",\"contentUrl\":\"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg\",\"width\":1,\"height\":1,\"caption\":\"FuniBlogs - FUNIBER\"},\"image\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/funiber\",\"https:\/\/twitter.com\/FUNIBER\",\"https:\/\/www.instagram.com\/funiber_becas\",\"https:\/\/www.youtube.com\/user\/funiber\",\"https:\/\/www.linkedin.com\/company\/funiber\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d\",\"name\":\"Michelle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g\",\"caption\":\"Michelle\"},\"url\":\"https:\/\/www.funiber.blog\/pt\/author\/michelle-moreira\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica","description":"O Instituto Nacional de Seguran\u00e7a Cibern\u00e9tica (INCIBE) relatou uma vulnerabilidade no sistema de videoconfer\u00eancia Zoom.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica","og_locale":"pt_BR","og_type":"article","og_title":"Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica","og_description":"O Instituto Nacional de Seguran\u00e7a Cibern\u00e9tica (INCIBE) relatou uma vulnerabilidade no sistema de videoconfer\u00eancia Zoom.","og_url":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica","og_site_name":"FuniBlogs - FUNIBER","article_publisher":"https:\/\/www.facebook.com\/funiber","article_published_time":"2020-04-25T15:10:21+00:00","og_image":[{"width":850,"height":566,"url":"https:\/\/blogs.funiber.org\/pt\/wp-content\/uploads\/2020\/04\/funiber-seguranca-cibernetica.png","type":"image\/png"}],"author":"Michelle","twitter_card":"summary_large_image","twitter_creator":"@FUNIBER","twitter_site":"@FUNIBER","twitter_misc":{"Escrito por":"Michelle","Est. tempo de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica#article","isPartOf":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica"},"author":{"name":"Michelle","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d"},"headline":"Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica","datePublished":"2020-04-25T15:10:21+00:00","dateModified":"2020-04-25T15:10:21+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica"},"wordCount":251,"publisher":{"@id":"https:\/\/blogs.funiber.org\/pt\/#organization"},"keywords":["Bolsas","Doutorado","Educa\u00e7\u00e3o","Educa\u00e7\u00e3o a Dist\u00e2ncia","Estudos","Funiber","mestrado","Opini\u00e3o FUNIBER","Opini\u00f5es Funiber","Seguran\u00e7a cibern\u00e9tica","tecnologia","videoconfer\u00eancia","vulnerabilidade","Zoom"],"articleSection":["Tecnologias TIC"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica","url":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica","name":"Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica","isPartOf":{"@id":"https:\/\/blogs.funiber.org\/pt\/#website"},"datePublished":"2020-04-25T15:10:21+00:00","dateModified":"2020-04-25T15:10:21+00:00","description":"O Instituto Nacional de Seguran\u00e7a Cibern\u00e9tica (INCIBE) relatou uma vulnerabilidade no sistema de videoconfer\u00eancia Zoom.","breadcrumb":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/04\/25\/funiber-seguranca-cibernetica#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/blogs.funiber.org\/pt"},{"@type":"ListItem","position":2,"name":"Aplicativo que perde a batalha na seguran\u00e7a cibern\u00e9tica"}]},{"@type":"WebSite","@id":"https:\/\/blogs.funiber.org\/pt\/#website","url":"https:\/\/blogs.funiber.org\/pt\/","name":"FuniBlogs - FUNIBER","description":"","publisher":{"@id":"https:\/\/blogs.funiber.org\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.funiber.org\/pt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blogs.funiber.org\/pt\/#organization","name":"FuniBlogs - FUNIBER","url":"https:\/\/blogs.funiber.org\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg","contentUrl":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg","width":1,"height":1,"caption":"FuniBlogs - FUNIBER"},"image":{"@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/funiber","https:\/\/twitter.com\/FUNIBER","https:\/\/www.instagram.com\/funiber_becas","https:\/\/www.youtube.com\/user\/funiber","https:\/\/www.linkedin.com\/company\/funiber"]},{"@type":"Person","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/a1eaaa5e57eac866a8c5946946bcf80d","name":"Michelle","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5e87041f7609dc50493cf216754fece1?s=96&d=mm&r=g","caption":"Michelle"},"url":"https:\/\/www.funiber.blog\/pt\/author\/michelle-moreira"}]}},"jetpack_featured_media_url":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2020\/04\/funiber-seguranca-cibernetica.png","jetpack_shortlink":"https:\/\/wp.me\/p7ee1t-5Iz","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/21983"}],"collection":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/comments?post=21983"}],"version-history":[{"count":1,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/21983\/revisions"}],"predecessor-version":[{"id":21986,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/21983\/revisions\/21986"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/media\/21985"}],"wp:attachment":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/media?parent=21983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/categories?post=21983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/tags?post=21983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}