Information Security Week – Edition Nº17

In issue No. 17 of the Week of Information Security, victims of false Lives in Brazil, IFOOD security breach, Zoom adds new cutting -edge encryption, registration of websites visited on the internet router and much more.


News

False Lives ”are the scam in fashion and already make victims in Brazil

False Lives or “Fake Lives” seek to take advantage of the innocence of some netizens to steal their money.

Ramon de Souza in The Hack

Phishing and malware attacks use regional contexts to attract victims

Attacks are carried out, above all, from emails that take advantage of the financial fears of the victims and questions about Covid-19.

In Computerworld

IFOOD SAFETY BREAKS exposes data and orders from users

In a flaw that seems to have lasted just a few minutes, Delivery app customers were surprised when they accessed their accounts and came across information, addresses, and history of third party orders, as well as personal data such as CPF, emails, and complete names of strangers.

By Felipe Demartini in Canaltech

Is IT safety ready for Pix?

Central Bank has launched the Pix system that will digitize money and thus reduce the costs of financial transactions between people, companies and even the government.

By José Ricardo Maia Moraes in Tiinside

Zoom adds end to end encryption to all users

The Zoom Videoconference App will add end -to -to -end encryption in calls of people who use the free version of the service weeks after announcing that the option would be available to premium users.

By Tom McKay in Gizmodo

Can the internet router register the websites visited?

Duvies also explains the functioning of navigation history on mobile phones and scammers in WhatsApp scammers.

By Altieres Rohr in G1

Customers of Rappi, Ifood and Uber Eats are the target of a scam on Instagram

Bandits are taking the opportunity to apply coups on Instagram complainants, keeping an eye on their personal data and account application accounts.

By Felipe Demartini in Canaltech

IT: Trends in Postpandey Information Technology

Even without the absolute certainty of what is coming, it is possible to glimpse some trends in the information technology universe that need to be on the executive agenda.

By Carlos Kazuo in Network Accounting Journal

This Excel malware requires you to fill in a dreaded captcha form

Beware, spreadsheet enthusiasts - Had Excel Malware ongoing.

By Joel Khalili in Techradar

Improper use of cell phones at work can lead to dismissal for just cause

For professionals who constantly use mobile phone in the workplace, it is important to know that this exaggerated use can endanger their job, after all, according to Brazilian law, dismissal for just cause due to the use of mobile phone at work is valid.

By Kelvin Zimmer on Lumiun Blog


Videos

Information Security | Creating Safe Passwords

YouTube player

Practical view of an information security professional

Teleworking, Remote Access and Information Security

 


Useful services

My password

Find out if your email and password leaked.

Don't disturb me

Not disturbing me allows it easily and freely to avoid offering products and services through telephone contact from telecommunications service providers (mobile telephone, landline, signature and internet) and financial institutions (payroll loan and payroll loan operations).


 

Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:

https://conteudo.lumiun.com/semana-da-eguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Free Trial
Related Posts