{"id":204,"date":"2011-08-11T17:44:02","date_gmt":"2011-08-11T20:44:02","guid":{"rendered":"http:\/\/www.linux2business.com.br\/site\/?p=203"},"modified":"2011-08-11T17:44:02","modified_gmt":"2011-08-11T20:44:02","slug":"estudo-de-seguranca-em-aplicativos-moveis","status":"publish","type":"post","link":"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/","title":{"rendered":"Estudo de seguran\u00e7a em aplicativos m\u00f3veis"},"content":{"rendered":"<p>A empresa <a href=\"http:\/\/viaforensics.com\" target=\"_self\">viaForensics<\/a> disponibilizou um estudo de seguran\u00e7a em aplicativo m\u00f3veis Android e iOS referente as 100 mais aplica\u00e7\u00f5es. O estudo utilizou o <a href=\"http:\/\/viaforensics.com\/appwatchdog\/\" target=\"_self\">appWatchdog<\/a>, que \u00e9 um servi\u00e7o livre da pr\u00f3pria viaForensics, que<span id=\"result_box\" lang=\"pt\"><span class=\"hps\"> fornece<\/span> <span class=\"hps\">informa\u00e7\u00f5es p\u00fablicas sobre<\/span> <span class=\"hps\">a inseguran\u00e7a<\/span> <span class=\"hps\">de<\/span> <span class=\"hps\">aplica\u00e7\u00f5es m\u00f3veis<\/span> <span class=\"hps\">populares<\/span><span>.<\/span><\/span><\/p>\n<p><span lang=\"pt\"><span>O resultado n\u00e3o poderia ser pior, apenas 17% das aplica\u00e7\u00f5es passaram nos testes realizados, 44% ficaram em uma situa\u00e7\u00e3o de alerta e 39% n\u00e3o passaram nos testes.<\/span><\/span><\/p>\n<p><span lang=\"pt\"><span>Refer\u00eancias:<\/span><\/span><\/p>\n<p><a href=\"http:\/\/viaforensics.com\/education\/white-papers\/appwatchdog-findings-mobile-app-security-iphone-android\/\" target=\"_self\"><span lang=\"pt\"><span>Mobile App Security Study<\/span><\/span><\/a><\/p>\n<p><a href=\"http:\/\/viaforensics.com\/mobile-news\/mobile-app-security-findings-released-july-201.html\" target=\"_self\"><span lang=\"pt\"><span>Mobile App Security Findings Released \u2013 July 2011<\/span><\/span><\/a><\/p>\n<p><span lang=\"pt\"><span><a href=\"http:\/\/meiobit.com\/89248\/auditoria-de-appwatchdog-da-viaforensics-revela-um-cenario-porcino-de-seguranca-no-mobile\/\" target=\"_self\">Auditoria de AppWatchDog da ViaForensics revela um cen\u00e1rio porcino de seguran\u00e7a no mobile<\/a><br \/>\n<\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A empresa viaForensics disponibilizou um estudo de seguran\u00e7a em aplicativo m\u00f3veis Android e iOS referente as 100 mais aplica\u00e7\u00f5es. O estudo utilizou o appWatchdog, que \u00e9 um servi\u00e7o livre da pr\u00f3pria viaForensics, que fornece informa\u00e7\u00f5es p\u00fablicas sobre a inseguran\u00e7a de aplica\u00e7\u00f5es m\u00f3veis populares. O resultado n\u00e3o poderia ser pior, apenas 17% das aplica\u00e7\u00f5es passaram nos [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Estudo de seguran\u00e7a em aplicativos m\u00f3veis - Linux2Business<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Estudo de seguran\u00e7a em aplicativos m\u00f3veis - Linux2Business\" \/>\n<meta property=\"og:description\" content=\"A empresa viaForensics disponibilizou um estudo de seguran\u00e7a em aplicativo m\u00f3veis Android e iOS referente as 100 mais aplica\u00e7\u00f5es. O estudo utilizou o appWatchdog, que \u00e9 um servi\u00e7o livre da pr\u00f3pria viaForensics, que fornece informa\u00e7\u00f5es p\u00fablicas sobre a inseguran\u00e7a de aplica\u00e7\u00f5es m\u00f3veis populares. O resultado n\u00e3o poderia ser pior, apenas 17% das aplica\u00e7\u00f5es passaram nos [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/\" \/>\n<meta property=\"og:site_name\" content=\"Linux2Business\" \/>\n<meta property=\"article:published_time\" content=\"2011-08-11T20:44:02+00:00\" \/>\n<meta name=\"author\" content=\"Administrator\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Administrator\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/\"},\"author\":{\"name\":\"Administrator\",\"@id\":\"https:\/\/www.linux2business.com.br\/site\/#\/schema\/person\/8226c461c68925c416cac11caf0633d8\"},\"headline\":\"Estudo de seguran\u00e7a em aplicativos m\u00f3veis\",\"datePublished\":\"2011-08-11T20:44:02+00:00\",\"dateModified\":\"2011-08-11T20:44:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/\"},\"wordCount\":114,\"publisher\":{\"@id\":\"https:\/\/www.linux2business.com.br\/site\/#organization\"},\"articleSection\":[\"Not\u00edcias\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/\",\"url\":\"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/\",\"name\":\"Estudo de seguran\u00e7a em aplicativos m\u00f3veis - Linux2Business\",\"isPartOf\":{\"@id\":\"https:\/\/www.linux2business.com.br\/site\/#website\"},\"datePublished\":\"2011-08-11T20:44:02+00:00\",\"dateModified\":\"2011-08-11T20:44:02+00:00\",\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.linux2business.com.br\/site\/#website\",\"url\":\"https:\/\/www.linux2business.com.br\/site\/\",\"name\":\"Linux2Business\",\"description\":\"Solu\u00e7\u00f5es Livres na Nuvem para Facilitar a Gest\u00e3o das Pequenas e M\u00e9dias Empresas\",\"publisher\":{\"@id\":\"https:\/\/www.linux2business.com.br\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.linux2business.com.br\/site\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.linux2business.com.br\/site\/#organization\",\"name\":\"Linux2Business\",\"url\":\"https:\/\/www.linux2business.com.br\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.linux2business.com.br\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.linux2business.com.br\/site\/wp-content\/uploads\/2019\/10\/cropped-Logo1_Linux2Biz_pequeno_transparente.png\",\"contentUrl\":\"https:\/\/www.linux2business.com.br\/site\/wp-content\/uploads\/2019\/10\/cropped-Logo1_Linux2Biz_pequeno_transparente.png\",\"width\":207,\"height\":45,\"caption\":\"Linux2Business\"},\"image\":{\"@id\":\"https:\/\/www.linux2business.com.br\/site\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.linux2business.com.br\/site\/#\/schema\/person\/8226c461c68925c416cac11caf0633d8\",\"name\":\"Administrator\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/www.linux2business.com.br\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/716273c6d7a270b66053c809b0b43de0?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/716273c6d7a270b66053c809b0b43de0?s=96&r=g\",\"caption\":\"Administrator\"},\"url\":\"https:\/\/www.linux2business.com.br\/site\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Estudo de seguran\u00e7a em aplicativos m\u00f3veis - Linux2Business","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/","og_locale":"pt_BR","og_type":"article","og_title":"Estudo de seguran\u00e7a em aplicativos m\u00f3veis - Linux2Business","og_description":"A empresa viaForensics disponibilizou um estudo de seguran\u00e7a em aplicativo m\u00f3veis Android e iOS referente as 100 mais aplica\u00e7\u00f5es. O estudo utilizou o appWatchdog, que \u00e9 um servi\u00e7o livre da pr\u00f3pria viaForensics, que fornece informa\u00e7\u00f5es p\u00fablicas sobre a inseguran\u00e7a de aplica\u00e7\u00f5es m\u00f3veis populares. O resultado n\u00e3o poderia ser pior, apenas 17% das aplica\u00e7\u00f5es passaram nos [&hellip;]","og_url":"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/","og_site_name":"Linux2Business","article_published_time":"2011-08-11T20:44:02+00:00","author":"Administrator","twitter_misc":{"Escrito por":"Administrator","Est. tempo de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/#article","isPartOf":{"@id":"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/"},"author":{"name":"Administrator","@id":"https:\/\/www.linux2business.com.br\/site\/#\/schema\/person\/8226c461c68925c416cac11caf0633d8"},"headline":"Estudo de seguran\u00e7a em aplicativos m\u00f3veis","datePublished":"2011-08-11T20:44:02+00:00","dateModified":"2011-08-11T20:44:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/"},"wordCount":114,"publisher":{"@id":"https:\/\/www.linux2business.com.br\/site\/#organization"},"articleSection":["Not\u00edcias"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/","url":"https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/","name":"Estudo de seguran\u00e7a em aplicativos m\u00f3veis - Linux2Business","isPartOf":{"@id":"https:\/\/www.linux2business.com.br\/site\/#website"},"datePublished":"2011-08-11T20:44:02+00:00","dateModified":"2011-08-11T20:44:02+00:00","inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.linux2business.com.br\/site\/estudo-de-seguranca-em-aplicativos-moveis\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.linux2business.com.br\/site\/#website","url":"https:\/\/www.linux2business.com.br\/site\/","name":"Linux2Business","description":"Solu\u00e7\u00f5es Livres na Nuvem para Facilitar a Gest\u00e3o das Pequenas e M\u00e9dias Empresas","publisher":{"@id":"https:\/\/www.linux2business.com.br\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.linux2business.com.br\/site\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/www.linux2business.com.br\/site\/#organization","name":"Linux2Business","url":"https:\/\/www.linux2business.com.br\/site\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.linux2business.com.br\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.linux2business.com.br\/site\/wp-content\/uploads\/2019\/10\/cropped-Logo1_Linux2Biz_pequeno_transparente.png","contentUrl":"https:\/\/www.linux2business.com.br\/site\/wp-content\/uploads\/2019\/10\/cropped-Logo1_Linux2Biz_pequeno_transparente.png","width":207,"height":45,"caption":"Linux2Business"},"image":{"@id":"https:\/\/www.linux2business.com.br\/site\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.linux2business.com.br\/site\/#\/schema\/person\/8226c461c68925c416cac11caf0633d8","name":"Administrator","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.linux2business.com.br\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/716273c6d7a270b66053c809b0b43de0?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/716273c6d7a270b66053c809b0b43de0?s=96&r=g","caption":"Administrator"},"url":"https:\/\/www.linux2business.com.br\/site\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.linux2business.com.br\/site\/wp-json\/wp\/v2\/posts\/204"}],"collection":[{"href":"https:\/\/www.linux2business.com.br\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.linux2business.com.br\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.linux2business.com.br\/site\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.linux2business.com.br\/site\/wp-json\/wp\/v2\/comments?post=204"}],"version-history":[{"count":0,"href":"https:\/\/www.linux2business.com.br\/site\/wp-json\/wp\/v2\/posts\/204\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.linux2business.com.br\/site\/wp-json\/wp\/v2\/media?parent=204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.linux2business.com.br\/site\/wp-json\/wp\/v2\/categories?post=204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.linux2business.com.br\/site\/wp-json\/wp\/v2\/tags?post=204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}