{"id":20873,"date":"2022-04-15T12:00:29","date_gmt":"2022-04-15T15:00:29","guid":{"rendered":"\/blog\/?p=20873"},"modified":"2024-04-22T10:33:37","modified_gmt":"2024-04-22T13:33:37","slug":"conheca-os-principais-tipos-de-malware-existentes","status":"publish","type":"post","link":"https:\/\/www.bringit.com.br\/blog\/conheca-os-principais-tipos-de-malware-existentes\/","title":{"rendered":"Conhe\u00e7a os principais tipos de malware existentes"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20873\" class=\"elementor elementor-20873\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section data-particle_enable=\"false\" data-particle-mobile-disabled=\"false\" class=\"elementor-section elementor-top-section elementor-element elementor-element-6a3939b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a3939b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-28087a2\" data-id=\"28087a2\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c4c39d0 elementor-widget elementor-widget-text-editor\" data-id=\"c4c39d0\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">O termo malware ou &#8220;software malicioso&#8221; como tamb\u00e9m \u00e9 conhecido, al\u00e9m de ter um significado muito amplo, descreve qualquer tipo de programa ou c\u00f3digo que venha a ser danoso para a sua m\u00e1quina.<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Pensando nisso, n\u00f3s da <\/span><a href=\"http:\/\/bringit.com.br\" style=\"text-decoration:none;\" target=\"_blank\" rel=\"noopener\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#1155cc;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:underline;-webkit-text-decoration-skip:none;text-decoration-skip-ink:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">bringIT<\/span><\/a><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\"> trouxemos tudo o que voc\u00ea precisa saber sobre esses softwares maliciosos, bem como, a forma como eles funcionam, quais os tipos existentes, al\u00e9m de como voc\u00ea pode identific\u00e1-los e muito mais!<\/span><\/p><h2 style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:18pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Como funciona um malware?<\/span><\/h2><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Geralmente, um malware infecta uma m\u00e1quina enganando os usu\u00e1rios, fazendo-os clicar ou at\u00e9 mesmo instalar um programa de fonte n\u00e3o confi\u00e1vel.&nbsp;<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Dessa forma, ao clicar ou instalar algum software desse tipo, o c\u00f3digo malicioso executa a\u00e7\u00f5es que o usu\u00e1rio n\u00e3o tenha previsto. Dentre as poss\u00edveis a\u00e7\u00f5es, podemos incluir:<\/span><\/p><ul style=\"margin-top:0;margin-bottom:0;padding-inline-start:48px;\"><li dir=\"ltr\" style=\"list-style-type:disc;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Instala\u00e7\u00e3o de aplicativos que capturam cliques de tecla ou recursos do sistema e s\u00e3o geralmente executados sem que o usu\u00e1rio perceba, enquanto desacelera o sistema de forma consider\u00e1vel;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:disc;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Poss\u00edvel bloqueio ao acesso de arquivos, programas ou at\u00e9 mesmo ao pr\u00f3prio sistema;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:disc;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Instala\u00e7\u00e3o de softwares capazes de fazer capturas de tela, ativa\u00e7\u00e3o da Webcam ou roubo de senhas;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:disc;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:14pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Quebrar componentes essenciais do sistema e, com isso, tornar o dispositivo ineficaz.<\/span><\/p><\/li><\/ul><h2 style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:18pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Tipos mais comuns de malware<\/span><\/h2><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Pensando nos diversos tipos de malware que existem atualmente, montamos uma lista com os principais malwares.<\/span><\/p><h3 style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:13.5pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Ransomware<\/span><\/h3><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Conhecido por empregar criptografia para manter as informa\u00e7\u00f5es da v\u00edtima em resgate, o ransomware faz com que os dados cr\u00edticos de um usu\u00e1rio ou de uma organiza\u00e7\u00e3o sejam criptografados para que n\u00e3o possam acessar arquivos, bancos de dados ou aplicativos.&nbsp;<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Dessa forma, o ransomware \u00e9 projetado para se espalhar por uma rede e por bancos de dados de destino e servidores de arquivos e, portanto, pode paralisar rapidamente uma organiza\u00e7\u00e3o inteira.<\/span><\/p><h3 style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:13.5pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Spyware<\/span><\/h3><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Instalado em um dispositivo de computa\u00e7\u00e3o sem o conhecimento do usu\u00e1rio final, o Spyware invade o dispositivo, rouba dados confidenciais e dados de uso da internet e os retransmite para anunciantes, empresas de dados ou usu\u00e1rios externos.<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Al\u00e9m disso, qualquer software pode ser classificado como spyware se for baixado sem a autoriza\u00e7\u00e3o do usu\u00e1rio.&nbsp;<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Conhecido tamb\u00e9m como uma das amea\u00e7as mais comuns aos usu\u00e1rios da internet, o malware depois de instalado, monitora a atividade do sistema, rastreia as credenciais de login do usu\u00e1rio e capta informa\u00e7\u00f5es consideradas sigilosas.<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">O objetivo principal do spyware \u00e9 geralmente obter n\u00fameros de cart\u00e3o de cr\u00e9dito, informa\u00e7\u00f5es banc\u00e1rias e senhas.<\/span><\/p><h3 style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:13.5pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Worms<\/span><\/h3><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Conhecido comumente por ser um tipo de malware que espalha c\u00f3pias de si mesmo de um computador para outro, um worm pode se replicar sem nenhuma intera\u00e7\u00e3o humana, bem como n\u00e3o precisa se anexar a um programa de software para causar danos.<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Esse tipo de malware pode chegar como um simples anexo de e-mail de spam ou at\u00e9 mesmo com mensagens instant\u00e2neas (IMs). Depois de abertos, esses arquivos podem fornecer um link para um site malicioso ou at\u00e9 mesmo baixar automaticamente o worm para o computador.<\/span><\/p><h3 style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:13.5pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Adware<\/span><\/h3><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Conhecido como um software que exibe an\u00fancios pop-up indesejados (e \u00e0s vezes irritantes, n\u00e3o concorda?) que podem aparecer no seu computador ou dispositivo m\u00f3vel.<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Na maioria dos casos, o adware gera receita para seu desenvolvedor exibindo automaticamente an\u00fancios online na interface do usu\u00e1rio do software ou at\u00e9 mesmo em uma tela que <\/span><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">aparece na cara<\/span><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\"> do usu\u00e1rio durante o processo de instala\u00e7\u00e3o.<\/span><\/p><h3 style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:13.5pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Cavalos de Tr\u00f3ia<\/span><\/h3><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">\u00c9 um tipo de malware baixado em um computador disfar\u00e7ado de um programa leg\u00edtimo. O m\u00e9todo de entrega normalmente v\u00ea um invasor usar engenharia social para ocultar c\u00f3digo malicioso em software leg\u00edtimo para tentar obter acesso de sistema dos usu\u00e1rios com seu software.<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Projetado para danificar, interromper e roubar, o cavalo de troia inflige alguma a\u00e7\u00e3o considerada prejudicial aos seus dados ou at\u00e9 mesmo a rede.&nbsp;<\/span><\/p><h2 style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:18pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Como descobrir se sua m\u00e1quina est\u00e1 com algum malware?<\/span><\/h2><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">O malware pode se revelar atrav\u00e9s de muitos eventos at\u00edpicos. Dentre os sinais, podemos destacar alguns que mais chamam a aten\u00e7\u00e3o, como, por exemplo:&nbsp;<\/span><\/p><ol style=\"margin-top:0;margin-bottom:0;padding-inline-start:48px;\"><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Seu computador fica bem mais lento, congela ou trava com muita facilidade;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Mensagens de erro passam a aparecer;&nbsp;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Na maioria das vezes, as tarefas que est\u00e1 realizando podem ser interrompidas por janelas de pop-ups;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">A p\u00e1gina inicial do seu navegador muda sem voc\u00ea ter mexido nas configura\u00e7\u00f5es;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Seus contatos passam a receber mensagens ou e-mails com links misteriosos;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">\u00cdcones ou programas que voc\u00ea n\u00e3o reconhece apareceram na sua \u00e1rea de trabalho;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">O computador passa a reiniciar sozinho, mesmo quando n\u00e3o est\u00e1 realizando atualiza\u00e7\u00f5es de rotina;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:decimal;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:14pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Seu software antiv\u00edrus informa diversas vezes que est\u00e1 desativado.<\/span><\/p><\/li><\/ol><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">E, por falar em antiv\u00edrus, eles podem ser sua principal ferramenta contra os malwares como veremos a seguir!<\/span><\/p><h2 style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:18pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:700;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Como se proteger de malware<\/span><\/h2><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">De forma bem simples, voc\u00ea pode se proteger dos malwares de duas formas: sendo a primeira atrav\u00e9s de sua pr\u00f3pria vigil\u00e2ncia, ou seja, esteja atento a tudo que j\u00e1 acessa ou instala em sua m\u00e1quina, ou por meio de programas que combatem os malwares, os chamados antiv\u00edrus.<\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Um pacote de software antiv\u00edrus eficiente \u00e9 o principal componente das defesas tecnol\u00f3gicas que todos os sistemas de computadores pessoais e comerciais devem ter. Al\u00e9m disso, quando instalada uma prote\u00e7\u00e3o antiv\u00edrus bem projetada deve apresentar algumas caracter\u00edsticas essenciais, como, por exemplo, ser de capaz de:<\/span><\/p><ul style=\"margin-top:0;margin-bottom:0;padding-inline-start:48px;\"><li dir=\"ltr\" style=\"list-style-type:disc;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Verificar todos os programas que foram rec\u00e9m-baixados para garantir que estejam livres de malware para que seu computador fique seguro;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:disc;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:0pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Verificar de forma peri\u00f3dica o computador para conseguir detectar, bem como combater todos os malwares inseridos por acidente no sistema;<\/span><\/p><\/li><li dir=\"ltr\" style=\"list-style-type:disc;font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;\" aria-level=\"1\"><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:0pt;margin-bottom:14pt;\" role=\"presentation\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Atualizar regularmente para conseguir reconhecer as amea\u00e7as mais recentes presentes.<\/span><\/p><\/li><\/ul><p><span><\/span><\/p><p dir=\"ltr\" style=\"line-height:1.7999999999999998;text-align: justify;margin-top:14pt;margin-bottom:14pt;\"><span style=\"font-size:12pt;font-family:Merriweather,serif;color:#000000;background-color:transparent;font-weight:400;font-style:normal;font-variant:normal;text-decoration:none;vertical-align:baseline;white-space:pre;white-space:pre-wrap;\">Apesar de todas essas caracter\u00edsticas, nenhuma prote\u00e7\u00e3o \u00e9 considerada absoluta. Por isso, \u00e9 sempre bom ficar de olho em quais sites est\u00e1 acessando e o qu\u00e3o prejudicial ele pode ser para sua m\u00e1quina!<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>O termo malware ou &#8220;software malicioso&#8221; como tamb\u00e9m \u00e9 conhecido, al\u00e9m de ter um significado muito amplo, descreve qualquer tipo de programa ou c\u00f3digo que venha a ser danoso para a sua m\u00e1quina. Pensando nisso, n\u00f3s da bringIT trouxemos tudo o que voc\u00ea precisa saber sobre esses softwares maliciosos, bem como, a forma como eles [&hellip;]<\/p>\n","protected":false},"author":21,"featured_media":20877,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[1605,1509,2276,2275,1694,1669,1510],"class_list":["post-20873","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dicas-e-tutoriais-para-notebook","tag-conheca","tag-dicas","tag-existentes","tag-malware","tag-principais","tag-tipos","tag-tutoriais"],"_links":{"self":[{"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/posts\/20873","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/comments?post=20873"}],"version-history":[{"count":3,"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/posts\/20873\/revisions"}],"predecessor-version":[{"id":20876,"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/posts\/20873\/revisions\/20876"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/media\/20877"}],"wp:attachment":[{"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/media?parent=20873"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/categories?post=20873"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bringit.com.br\/blog\/wp-json\/wp\/v2\/tags?post=20873"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}