1. Ballagas, R., Rohs, M., Sheridan, J.G., Borchers, J.: BYOD: bring your own device. In: Proceedings of the Workshop on Ubiquitous Display Environments (2004)
2. Krombholz, K., Hobel, H., Huber, M., Weippl, E.: Advanced social engineering attacks. J. Inf. Secur. Appl. 22, 113–122 (2015)
3. Drucker, P.F.: Landmarks of Tomorrow: A Report on the New “Post-Modern” World, 1st edn. Harper, New York (1959)
4. RSA: Anatomia de um ataque. RSA, 17 Julho 2013. http://blogs.rsa.com/anatomy-of-an-attack/
5. Schwartz, M.J.: Microsoft Hacked: Joins Apple, Facebook, Twitter, InformationWeek, 25 February 2013. https://www.darkreading.com/attacks-and-breaches/microsoft-hacked-joins-apple-facebook-twitter/d/d-id/1108800? Accessed 26 Feb 2021