In the 27th edition of Information Security Week, we cover ethical hackers, cybersecurity in organizations, how to avoid hidden risks in online ads, the Netflix name being used by hackers, tips and recommendations for creating strong and secure passwords, scams originating from legitimate domains, and much more.
News
"Ethical Hackers Protect University Computer Systems"
The Information Technology Superintendency (STI), in partnership with the Institute of Mathematics and Statistics (IME), created the Hackers for Good program, a pioneering initiative at USP that aims to identify vulnerabilities and recommend corrections in the University's computer system.
By Adriana Cruz in Jornal da USP
Is it possible to spy on a cell phone without any app?
Generally, a cell phone can only be spied on in two ways: through network monitoring or by altering the device's operation.
By Altieres Rohr on G1
Is cybersecurity a taboo subject in your organization? Bring the topic to the table
Organizations need to bring this issue to senior leadership as a business requirement.
By João Rocha in Computerworld
The path to cybersecurity leads through the cloud
With organizations becoming increasingly distributed, maintaining devices in all locations or using different products for remote workers creates numerous security gaps, in addition to being costly and overburdening IT resources.
By Felipe Canale and in Convergência Digital
Learn how to avoid the hidden risks in online ads
Who hasn't been puzzled by the 'coincidence' of ads appearing after searching for a product online? According to systems analyst and information security specialist Bruno Guerra, this is one of the most common strategies that apps and social networks use to generate monetization daily.
By Juliana Melo and Raquel Almeida on Infonet
New scam, old trick: Netflix's name is being used by hackers
An email message warning about a 'payment delay' on the streaming platform is being used to trick users into providing their payment information.
By Renato Mota in Olhar Digital
Recommendations and tips for creating strong and secure passwords
With simple actions, it's possible to increase the security of your accounts and ensure they aren't easily discovered by hackers who could misuse this information.
By Cledison Eduardo Fritzen on Lumiun's Blog
Scams to steal credentials from legitimate domains
In short, the scam relies on using hosting services to evade automatic detection and employing legitimate brands to increase the apparent legitimacy of the campaign, which aims to obtain corporate credentials and Office 365 credentials.
By Arjun Sambamoorthy on Armorblox
Scams using cloned Instagram accounts
Why would someone steal and clone an Instagram account? Learn how to avoid becoming a victim of this type of scam.
By Jake Moore at Welivesecurity
Researchers warn about inactive domains that lead to malicious pages
In the digital world, when you register a domain, you are paying for a "virtual plot of land" where you can build your website however you want. However, if you stop paying, it becomes inactive and inaccessible.
By Ramon De Souza on Canaltech
Tool Tips
Test your internet security.
Do you know if your employees, students, or family are protected against phishing , malware , pornography racist or terrorist content ?

The test will involve access requests to various websites that fall into categories considered insecure, using your internet connection, such as:
- Phishing and online fraud
- Malware and spyware
- Access anonymizers
- Drugs and alcoholic beverages
- Games and betting
- Pornography and nudity
- Violence, terrorism and racism
Materials

Courses
Open Courses – ITS – Institute of Technology and Society of Rio
- Free
- Online
Are you not yet subscribed to our newsletter to receive this content weekly by email? Then subscribe using the link below:
https://conteudo.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.










