723 resultados para phishing attacks


Relevância:

60.00% 60.00%

Publicador:

Resumo:

Financial information is extremely sensitive. Hence, electronic banking must provide a robust system to authenticate its customers and let them access their data remotely. On the other hand, such system must be usable, affordable, and portable.We propose a challengeresponse based one-time password (OTP) scheme that uses symmetriccryptography in combination with a hardware security module. The proposed protocol safeguards passwords from keyloggers and phishing attacks.Besides, this solution provides convenient mobility for users who want to bank online anytime and anywhere, not just from their owntrusted computers.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

O presente trabalho de investigação aplicada tem como titulo “Processo de Awareness dos Utilizadores nas Redes Militares”, com o intuito de “identificar a forma mais eficiente e eficaz de efetuar um design de um processo de awareness de forma a sensibilizar os utilizadores do sistema de e-mail do Exército para os ataques de phishing” que é o objetivo desta investigação. Por este motivo, de início foram selecionados objetivos específicos que remetem para este principal. Foi definido que precisamos de conhecer as principais teorias comportamentais que influenciam o sucesso dos ataques de phishing, de forma a perceber e combater estes mesmos. Foi, também, necessário perceber quais os principais métodos ou técnicas de ensino de atitudes, para possibilitar a sensibilização dos utilizadores, como também era necessário definir o meio de awareness para executar esta mesma. Por último, era necessário o processo de awareness, portanto, precisamos de critérios de avaliação e, para isso, é importante definir estes mesmos para validar a investigação. Para responder a estes quatro objetivos específicos e ao objetivo geral da investigação foi criada a questão central do trabalho que é “Como efetuar o design de um processo de awareness para o Exército que reduza o impacto dos ataques de phishing executados através do seu sistema de e-mail?” Devido ao carácter teórico-prático desta investigação, foi decidido que o método de investigação seria o Hipotético-Dedutivo, e o método de procedimento seria o Estudo de Caso. Foi uma investigação exploratória, utilizando as técnicas de pesquisa bibliográfica e análise documental para executar uma revisão de literatura completa com o intuito de apoiar a investigação, como, também, fundamentar todo o trabalho de campo realizado. Para a realização deste estudo, foi necessário estudar a temática Segurança da Informação, já que esta suporta a investigação. Para existir segurança da informação é necessário que as propriedades da segurança da informação se mantenham preservadas, isto é, a confidencialidade, a integridade e a disponibilidade. O trabalho de campo consistiu em duas partes, a construção dos questionários e da apresentação de sensibilização e a sua aplicação e avaliação (outputs da investigação). Estes produtos foram usados na sessão de sensibilização através da aplicação do questionário de aferição seguido da apresentação de sensibilização, e terminando com o questionário de validação (processo de awareness). Conseguiu-se, após a sensibilização, através do processo de awareness, que os elementos identificassem com maior rigor os ataques de phishing. Para isso utilizou-se, na sensibilização, o método de ensino ativo, que incorpora boas práticas para a construção de produtos de sensibilização, utilizando os estilos de aprendizagem auditivo, mecânico e visual, que permite alterar comportamentos.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hereditary angioedema (HAE) with C1 inhibitor deficiency manifests as recurrent episodes of edema involving the skin, upper respiratory tract and gastrointestinal tract. It can be lethal due to asphyxia. The aim here was to evaluate the response to therapy for these attacks using icatibant, an inhibitor of the bradykinin receptor, which was recently introduced into Brazil. Prospective experimental single-cohort study on the efficacy and safety of icatibant for HAE patients. Patients with a confirmed HAE diagnosis were enrolled according to symptoms and regardless of the time since onset of the attack. Icatibant was administered in accordance with the protocol that has been approved in Brazil. Symptom severity was assessed continuously and adverse events were monitored. 24 attacks in 20 HAE patients were treated (female/male 19:1; 19-55 years; median 29 years of age). The symptoms were: subcutaneous edema (22/24); abdominal pain (15/24) and upper airway obstruction (10/24). The time taken until onset of relief was: 5-10 minutes (5/24; 20.8%); 10-20 (5/24; 20.8%); 20-30 (8/24; 33.4%); 30-60 (5/24; 20.8%); and 2 hours (1/24; 4.3%). The time taken for complete resolution of symptoms ranged from 4.3 to 33.4 hours. Adverse effects were only reported at injection sites. Mild to moderate erythema and/or feelings of burning were reported by 15/24 patients, itching by 3 and no adverse effects in 6. HAE type I patients who received icatibant responded promptly; most achieved improved symptom severity within 30 minutes. Local adverse events occurred in 75% of the patients.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bee males (drones) of stingless bees tend to congregate near entrances of conspecific nests, where they wait for virgin queens that initiate their nuptial flight. We observed that the Neotropical solitary wasp Trachypus boharti (Hymenoptera, Cabronidae) specifically preys on males of the stingless bee Scaptotrigona postica (Hymenoptera, Apidae); these wasps captured up to 50 males per day near the entrance of a single hive. Over 90% of the wasp attacks were unsuccessful; such erroneous attacks often involved conspecific wasps and worker bees. After the capture of non-male prey, wasps almost immediately released these individuals unharmed and continued hunting. A simple behavioral experiment showed that at short distances wasps were not specifically attracted to S. postica males nor were they repelled by workers of the same species. Likely, short-range prey detection near the bees' nest is achieved mainly by vision whereas close-range prey recognition is based principally on chemical and/or mechanical cues. We argue that the dependence on the wasp's visual perception during attack and the crowded and dynamic hunting conditions caused wasps to make many preying attempts that failed. Two wasp-density-related factors, wasp-prey distance and wasp-wasp encounters, may account for the fact that the highest male capture and unsuccessful wasp bee encounter rates occurred at intermediate wasp numbers.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Moyamoya disease (MMD) is an uncommon cerebrovascular disorder characterized by progressive stenosis of the terminal portion of the internal carotid artery and its main branches. Direct and indirect bypass techniques have been devised with the aim of promoting neoangiogenesis. The current study aimed to investigate the role of multiple cranial burr hole (MCBH) operations in the prevention of cerebral ischemic attacks in children with MMD. Seven children suffering from progressive MMD were submitted to the MCBH and arachnoid opening technique. Ten to 20 burr holes were drilled in the fronto-temporo-parieto-occipital area of each hemisphere in each patient, depending on the site and extent of the disease. All patients were evaluated pre- and postoperatively by means of Barthel index (BI), CT, MR, angio-MR, and angiography. Patients had no recurrence of ischemic attacks postoperatively. Neoangiogenesis was observed in both hemispheres. One patient developed a persistent subdural collection after surgery, thus requiring placement of a subdural-peritoneal shunt. Postoperative BI was statistically significantly improved (P = 0.02). This report suggests that MCBH for revascularization in MMD is a simple procedure with a relatively low risk of complications and effective for preventing cerebral ischemic attacks in children. In addition, MCBH may be placed as an adjunct to other treatments for MMD.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The drugs which provide specific relief from migraine attacks, the ergopeptides (ergotamine and dihydroergotamine) and the various 'triptans' (notably sumatriptan), are often prescribed for persons already taking various migraine preventative agents, and sometimes drugs for other indications. As a result, migraine-specific drugs may become involved in drug-drug interactions. The migraine-specific drugs all act as agonists at certain subclasses of serotonin (5-hydroxytryptamine; 5-MT) receptor, particularly those of the 5-HT1D subtype, and produce vasoconstriction through these receptor-mediated mechanisms. The oral bioavailabilities of these drugs, particularly those of the ergopeptides, are often incomplete, due to extensive presystemic metabolism. As a result, if migraine-specific agents are coadministered with drugs with vasoconstrictive properties, or with drugs which inhibit the metabolism of the migraine-specific agents, there is a risk of interactions occurring which produce manifestations of excessive vasoconstriction. This can also occur through pharmacodynamic mechanisms, as when ergopeptides or triptans are coadministered with methysergide or propranolol (although a pharmacokinetic element may apply in relation to the latter interaction), or if one migraine-specific agent is used shortly after another. When egopeptide metabolism is inhibited by the presence of macrolide antibacterials, particularly troleandomycin and erythromycin, the resultant interaction can produce ergotism, sometimes leading to gangrene. Similar pharmacokinetic mechanisms, with their vasoconstrictive consequences, probably apply to combination of the ergopeptides with HIV protease inhibitors (indinavir and ritonavir), heparin, cyclosporin or tacrolimus. Inhibition of triptan metabolism by monoamine oxidase A inhibitors, e.g. moclobemide, may raise circulating triptan concentrations, although this does not yet seem to have led to reported clinical problems. Caffeine may cause increased plasma ergotamine concentrations through an as yet inadequately defined pharmacokinetic interaction. However, a direct antimigraine effect of caffeine may contribute to the claimed increased efficacy of ergotamine-caffeine combinations in relieving migraine attacks. Serotonin syndromes have been reported as probable pharmacodynamic consequences of the use of ergots or triptans in persons taking serotonin reuptake inhibitors. There have been two reports of involuntary movement disorders when sumatriptan has been used by patients already taking loxapine. Nearly all the clinically important interactions between the ergopeptide antimigraine agents and currently marketed drugs are likely to have already come to notice. In contrast, new interactions involving the triptans are likely to be recognised as additional members of this family of drugs, with their different patterns of metabolism and pharmacokinetics, are marketed.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

One of the major problems that prevents the spread of elections with the possibility of remote voting over electronic networks, also called Internet Voting, is the use of unreliable client platforms, such as the voter's computer and the Internet infrastructure connecting it to the election server. A computer connected to the Internet is exposed to viruses, worms, Trojans, spyware, malware and other threats that can compromise the election's integrity. For instance, it is possible to write a virus that changes the voter's vote to a predetermined vote on election's day. Another possible attack is the creation of a fake election web site where the voter uses a malicious vote program on the web site that manipulates the voter's vote (phishing/pharming attack). Such attacks may not disturb the election protocol, therefore can remain undetected in the eyes of the election auditors. We propose the use of Code Voting to overcome insecurity of the client platform. Code Voting consists in creating a secure communication channel to communicate the voter's vote between the voter and a trusted component attached to the voter's computer. Consequently, no one controlling the voter's computer can change the his/her's vote. The trusted component can then process the vote according to a cryptographic voting protocol to enable cryptographic verification at the server's side.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In recent years, attacks by piranhas have become a common problem in dammed portions of rivers and streams in the State of Sao Paulo, Southeastern Brazil. In two outbreaks recorded in two neighboring counties in the Northwest region of the state, 74 bathers were bitten. Only one bite per person was recorded during a short period of the year. The bites were related to parental care and/or defense of spawning territory, which confirms previous studies and demystify the attacks by these legendary fish, as they are perceived by most people. Placement of fine mesh nets and removal of aquatic vegetation stopped the attacks.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

PURPOSE: To highlight meningoencephalitis as a transient ischaemic attack (TIA) mimic and suggest clinical clues for differential diagnosis. METHODS: This was an observational study of consecutively admitted patients over a 9.75-year period presenting as TIAs at a stroke unit. RESULTS: A total of 790 patients with TIAs and seven with TIA-like symptoms but a final diagnosis of viral meningoencephalitis were recognised. The most frequent presentations of meningoencephalitis patients were acute sensory hemisyndrome (6) and cognitive deficits (5). Signs of meningeal irritation were minor or absent on presentation. Predominantly lymphocytic pleocytosis, hyperproteinorachia and a normal cerebrospinal fluid (CSF)/serum glucose index (in 5 out of 6 documented patients) were present. Meningeal thickening on a brain magnetic resonance imaging (MRI) scan was the only abnormal imaging finding. Six patients received initial vascular treatment; one thrombolysed. Finally, six patients were treated with antivirals and/or antibiotics. Although neither bacterial nor viral agents were identified on extensive testing, viral meningoencephalitis was the best explanation for all clinical and laboratory findings. CONCLUSIONS: Aseptic meningoencephalitis should be part of the differential diagnosis in patients presenting as TIA. The threshold for a lumbar puncture in such patients should be set individually and take into account the presence of mild meningeal symptoms, age and other risk factors for vascular disease, the results of brain imaging and the basic diagnostic work-up for a stroke source.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Abstract-Due to the growing use of biometric technologies inour modern society, spoofing attacks are becoming a seriousconcern. Many solutions have been proposed to detect the use offake "fingerprints" on an acquisition device. In this paper, wepropose to take advantage of intrinsic features of friction ridgeskin: pores. The aim of this study is to investigate the potential ofusing pores to detect spoofing attacks.Results show that the use of pores is a promising approach. Fourmajor observations were made: First, results confirmed that thereproduction of pores on fake "fingerprints" is possible. Second,the distribution of the total number of pores between fake andgenuine fingerprints cannot be discriminated. Third, thedifference in pore quantities between a query image and areference image (genuine or fake) can be used as a discriminatingfactor in a linear discriminant analysis. In our sample, theobserved error rates were as follows: 45.5% of false positive (thefake passed the test) and 3.8% of false negative (a genuine printhas been rejected). Finally, the performance is improved byusing the difference of pore quantity obtained between adistorted query fingerprint and a non-distorted referencefingerprint. By using this approach, the error rates improved to21.2% of false acceptation rate and 8.3% of false rejection rate.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Economists have recently turned their attention to the effects of terrorism. One much debated effect of terrorist attacks is its impact on the results of democratic elections. We use the electoral consequences of the terrorist attacks of the 11-M in Madrid to analyze this issue. We consider this particular experiment since the attack took place only three days before the 2004 Congressional Election, which allows the use of credible identification criteria. In particular, we use the advance voting by Spanish residents abroad, who cast their vote before the terrorist attack, to identify the effect of the bombing. We exploit this macabre natural experiment to run a difference-in-differences estimation using data on three consecutive Congressional elections. Our empirical results indicate that a terrorist attack can have a large impact on the outcome of democratic elections.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Attorney General’s Consumer Protection Division receives hundreds of calls and consumer complaints every year. Follow these tips to avoid unexpected expense and disappointments. This record is about: Warning: Internet "Phishing" Scams

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Hereditary angioedema is a disease which develops as a result of a deficiency or dysfonction of C1-inhibitor, a key regulator of the complement, coagulation and contact cascades, resulting among others in excessive release of bradykinin. This disease mortality rate is high in absence of immediate and effective treatment, in particular in presence of acute attacks of the upper respiratory tract (laryngeal edema). Until now only administration of a purified C1-inhibitor extract was effective against these symptoms. This paper aims to synthesise essentials knowledge concerning news drugs, in particular icatibant, a selective bradykinin B2- receptor antagonist whose use should be widened to the treatment of angioedema with ACE-inhibitors intolerance.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Attorney General’s Consumer Protection Division receives hundreds of calls and consumer complaints every year. Follow these tips to avoid unexpected expense and disappointments. This record is about: “Phishing” Scams Use New Tricks