terça-feira, 5 de janeiro de 2016

in: http://www.entrepreneur.com/article/253646

Digital Pickpockets Are Now Targeting Your Smartphone

Digital Pickpockets Are Now Targeting Your Smartphone
Image credit: shutterstock

Gary Davis

CONTRIBUTOR
Chief Consumer Security Evangelist at Intel
  
JANUARY 4, 2016
The scourge of viruses, Trojans and other malware has long been a familiar foe for desktop PC users. As iPhone users in China recently discovered, these digital nasties are no longer confined to traditional computers and are already a very real threat to the security of mobile devices, such as smartphones, tablets and wearables.
Few smartphone owners seem to realize this risk, despite the fact that our smartphones have become a veritable treasure trove of digital booty -- photos, passwords, emails and texts, location data and more. To enterprising malware engineers, scammers and bad actors, sneaking into a smartphone may be the ultimate jackpot. Consumers aren't without options, however, and taking a few quick and easy precautions vastly decreases the risk of becoming a victim.
1. A need for consumer awareness
Because of their unique status as a digital catch-all, and the fact that smartphones are often used in locations that lack traditional safeguards such as firewalls, smartphones actually require more protective measures from malicious interlopers than PCs.
And yet last year's State of the Net by Consumer Reports found that just 7 percent of mobile phone owners use any form of encryption and little more than a third even bother using a PIN. That's a terrible track record. No wonder then that McAfee Labs recorded a jump of malware sampleson mobile devices by nearly 50 percent in just the first quarter of this year
2. Apps too eager to ask permission
While the volume of malware is certainly alarming, what’s of particular concern is the manner in which it gets onto devices. In particular malware writers have begun targeting apps directly rather than going after devices. The result is that users blindly trust app stores and install apps that have been compromised, unwittingly infecting themselves in the process.
This is made effective in large part due to overly aggressive apps that require far too many permissions to access user and device data than is logical or necessary. Take for example flashlight apps that needlessly demand the ability to perform a host of unwanted functions, like the ability to delete apps, track your location and even fiddle with your phone's software. Games are the most popular downloads on app stores, and as a category are notoriously pushy with permissions that needlessly put users at risk.
3. Desperate times call for commonsense measures.
There is, unfortunately, no completely foolproof way of foiling all the malware all of the time. But by using a few simple and sensible precautions the vast majority of risks can be averted.
4. Regularly update your phone's software.
The easiest, and most effective step you can take to protect your personal data is to install the periodic updates to your smartphone's software. Besides adding features, they typically include crucial security fixes you won't be able to get otherwise.
5. Turn on provided security features such as device encryption and locate and lock.
Your phone comes with a comprehensive array of free security tools. Enable them, and be familiar with their use such as how to locate a lost device and lock or even wipe it clean of data remotely.
6. Be mindful of permissions.
When you install an app, you grant it access to various types of information on your device, such as your contacts, your photos or your location. Before installing an app, look at the permissions it asks for and decline if it's needlessly aggressive -- why does that restaurant review app need access to your photos, for instance?
7. Stick with official app stores.
While malware-laden apps have on occasion slipped past the guards, consumers are far more protected from installing malicious apps and services when patronizing app stores from the big players -- Amazon, Apple, Google, Microsoft -- than ones from third-party stores or sites that aren't accountable to anyone.
8. Resist clicking on unknown links in texts and emails.
Just like you would with oddball links in email messages, don't click on a hyperlink in a text or email unless it's from someone you know -- and you're expecting it. Better yet, protect yourself further by going into your settings on your mobile phone and turning off auto-download for MMS (multimedia) messages to prevent your phone from installing anything without asking first.
Our mobile devices give us unprecedented connectivity, productivity and convenience. However, with cybercriminals ramping up their mobile skills, now more than ever, we need to be mindful of the risks and take the appropriate steps to protect ourselves as we enjoy the convenience they enable. 


NOVIDADES
VEM LER





















segunda-feira, 4 de janeiro de 2016

quarta-feira, 16 de dezembro de 2015



in: http://www.msn.com/pt-pt/saude/saude/estes-s%C3%A3o-os-alimentos-que-os-nutricionistas-recusam-comer/ar-AAgdWyN?li=AA4WWv

Estes são os alimentos que os nutricionistas recusam comer


© 2015 Noticias ao Minuto Estes são os alimentos que os nutricionistas recusam comer

Os nutricionistas sabem o que se deve ou não comer. Embora cometam as suas ‘facadinhas’ na dieta – como qualquer outra pessoa – estes profissionais conseguem ter uma melhor noção dos alimentos que não devem, de todo, constar na alimentação diária.
O site Food Network falou com alguns nutricionistas norte-americanos e listou os alimentos que jamais são ingeridos diariamente e que fazem parte do ‘menu’ apenas em dias especiais – mesmo que muito esporadicamente.
As bebidas açucaradas, como o s refrigerantes, são um exemplo do que não deve constar na alimentação diária. Os cachorros quentes, os pretzels, os molhos light e os cafés cremosos e servidos com natas ou chantili são outros exemplos de alimentos que devem apenas ser consumidos em dias ‘especiais’, como aniversários, uma vez que são nutricionalmente pobres e ricos em gordura e açúcar adicionados.
A manteiga de amendoim industrializada, os molhos para batatas fritas, os alimentos pré-confecionados – como as lasanha congelada, as pizzas refrigeradas ou os pães prontos para ir ao forno – e o bacon são outros dos alimentos que os nutricionistas se recusam a comer diariamente.


terça-feira, 15 de dezembro de 2015



O Agrupamento ESLA, com a escola do Jardim de Infância e escolas do 1º ciclo, participou com os bonecos de neve que estão em exposição na baixa da cidade de Quarteira.
É digno de se ver...















quinta-feira, 10 de dezembro de 2015


in: http://www.entrepreneur.com/article/253426

The Biggest Work Trend You're Unintentionally Ignoring
The Biggest Work Trend You're Unintentionally Ignoring
Image credit: Shutterstock

Tor Constantino

CONTRIBUTOR
Former Journalist, Current PR Guy (wielding an MBA)
     
DECEMBER 3, 2015
It may not come as a surprise to many readers of Entrepreneur.com that last year the London Business School projected that by 2020 up to 50 percent of workers will be working remotely a majority of the time.
What might be a bit more astonishing, however, is a recent survey by FlexJobs and WorldatWork which found that only 3 percent of the organizations surveyed were actually trying to quantify the return on investment for job flexibility or remote work.
"That's shocking to me, because it says loudly and clearly that employers and management believe flexible work only benefits the employee; they don't even think it will benefit the broader organization," Sara Sutton Fell, CEO and founder of FlexJobs, said of the survey's findings. "If management valued it, they would be tracking and monitoring it."
The CEO went on to point out that remote work was already happening widely -- if not formally. 
"Employees are working from home," she said. "They're working during their commute. They're working on their smartphones, mobile devices and tablets. [Remote work] might be 5, 20 or 100 percent of their job, but the vast majority of companies don't have a formal process or method in place to track the value of remote work."  
According to the study, top management tends to be more of a barrier than middle management, and often acts as an obstacle to telework programs. The reasons for this resistance? The top reasons given by more than half of the organizations surveyed included:
·         Some jobs are not conducive to flex time or remote work (54 percent). 
·         Part-time schedules are a confounding variable (53 percent). 
·         Lack of expressed interest from employees is an obstacle (39 percent).
·         Phased retirement is a barrier (38 percent).
Despite these expressions of reluctance, companies would be wise to acknowledge the beneficial opportunities remote work poses for any organization willing to formalize it for employees. 
"There are obvious short- and long-term economic benefits for employers of remote workers," Sutton Fell pointed out. "Things such as smaller office space, lower utility costs or back-office overhead are all examples of savings that can easily be realized from a flexible work model." 
Beyond expense reductions, another key advantage is the ability to maximize access to quality talent regardless of market rates or geography. "Whether you're in a rural area or in a highly competitive talent market, such as San Francisco, you can access high-quality, affordable talent even if you don't have a large, deep pool of candidates locally," the FlexJobs founder said.
Obviously, not every job is or should be eligible for 100 percent remote work. Regardless, savvy companies will recognize that building a path to accommodate remote workers might actually be a road to their future success.


Encontro com
João Labrincha
(formador do Projeto Europeu)
www.citizenrights-euroalter.com
Direitos dos cidadãos
Participar num projeto europeu,
Com a participação da turma do 11ºB e da profª Ana Bela











Berta Isla - Javier Marías

CAMÕES

 V CENTENÁRIO DE CAMÕES! CAMÕES, ENGENHO E ARTE! Participa...