Information Security Week

Information Security Week – Edition Nº21

In issue 21 of the Week of Information Security, Cheap Windows 10 key, identify the origin of an email, twitter invasion, fake cisco switches, half a million email and more.


News

Is buying cheap Windows 10 key reliable? Canaltech tested

No one likes to see the warning that the platform is not licensed or has its resources reduced, so acquiring a license that ends it is highly attractive.

By Felipe Demartini in Canaltech

Is it possible to identify the origin of an email?

If you want to know the exact geographical location where an email has been sent, this is a little difficult.

By Altieres Rohr in G1

Government identifies hacker action to zero balance in Caixa application

The government identified that an “orchestrated action” was being designed to try to destabilize the CAIXA TEM application, which makes the payments of emergency aid.

By Carla Araújo in UOL

Twitter invasion: experts comment on the incident

The recent cyber incident involving Twitter administrative tools shocked the internet and made a lot of people worried.

By Ramon de Souza in The Hack

VPN apps exposed data from millions of users, including Brazilians

The personal data of millions of users from four VPN mobile applications were exhibited on the Internet by the software developer, which stored the information on an open and unprotected server.

By Felipe Demartini in Canaltech

False cisco switches can be a threat to information security

Externally, the devices did not differ much from the originals, although, after a more detailed examination, the difference could be perceived, as indicated in the F Secure report.

In Avalanche News

Employee awareness is a key piece to reduce risks of cybers

Companies that have information security guidelines, take great advantage over their competitors.

By Denis Riviello in Computerworld

A single phishing email can cost an SME half a million reais

According to the survey, more than one third (37%) from companies received an email from someone who pretended to be a manager, director or supplier requesting payments.

By Alex de Oliveira on Lumiun Blog


Tool Tips: Activity and Process Management

We joined the best solutions for business and process management for this topic.

🎯 – Trello

🎯 – Quire

🎯 – ProofHub

🎯 – Asana

🎯 – Basecamp

🎯 – monday.com

🎯 – Runrun.it

🎯 – Pipefy

 

You can see the information of each solution by accessing the article: Activity and Process Management: Tips and 8 tools for companies!


Material


Videos

Careful! Your FGTS may be at risk

Careful! Your FGTS may be at risk

INFORMATION SECURITY QUESTIONS | Class 50

YouTube player

Events

Webinar in Focus - LGPD and the impacts on information management

  • July 23, 2020, 19h - 8:30 pm
  • Online Event

Free Information Security Course - Anhanguera Guarulhos

  • July 23, 2020, 7:30 pm - 9:30 pm
  • Online Event

Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:

https://conteudo.lumiun.com/semana-da-eguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Free Trial
Related Posts