Notícias - Atividade do MP

logo mp pequeno com fundo
Cybercrime. Network of specialized prosecutorsThere are more and more crimes committed in a virtual environment.Thus, the use of technologies for the practice of crimes is a part of daily life and each day it becomes more sophisticatedHence,…
cibercrime letrac 2
Extortion by emailA criminal campaign of extortion by e-mail, aimed at persuading victims to pay amounts of money, in bitcoins, under threat of publicly disclosing the said victims’ personal data, images or…
criancas jovens internet
Action Plan "Children and Crimes on the Internet"A launching workshop of the Action Plan "Children and Crimes on the Internet" will take place on 5 February 5 at the Prosecutor General’s, in Lisbon. This plan aims at improving the capacity of the…
imagem cibercrime phishing noticia 1
Cybercrime Warning: "Phishing" - NetflixA criminal phishing campaign is under way for users of Netflix. There is a risk that potential victims provide the perpetrators with their access credentials to that service.
imagem cibercrime phishing noticia 1
Cybercrime Warning: "Phishing" - Millenium BCPA criminal phishing campaign is under way for costumers of the bank Millenium BCP. There is a risk that potential victims provide the perpetrators with their access credentials to their bank account.
visita delegacao republica armenia 29-10-2018
Visit of the delegation of the Republic of Armenia to the Prosecutor General’s OfficeRepresentatives of the Prosecution Office of Armenia visited today the Prosecutor General’s Office and have been received at the Cybercrime Office.The purpose of this visit was to gather…
eleicao portugal vice pres ciber ce 4
Portugal elected to the Vice-Presidency of the Cybercrime Committee of the Council of EuropePortugal regularly participates in the work of the T-CY Committee of the Council of Europe (Committee of the Cybercrime Convention). This has been the case since 2006. The Cybercrime Convention, in…
foto3 workshop cibercrime 25-05-2018
Workshop on "Criminal Procedural Law: Challenges in the Digital Era" and meeting of the Cybercrime Contact PointsWhere can emails be seized? Is it possible to develop covert operations within online investigations? What data retention rules should service providers aply?These and other issues are daily a part…