Information Security Week – Edition Nº27

In issue 27 of Information Safety Week, Hackers of Good, cybersecurity in the organization, such as avoiding hidden risk in internet ads, Netflix name is used by hackers, tips and recommendations to create strong and secure passwords, blows from legitimate domains and more.


News

Good Hackers Protect University Computational Systems

The Superintendence of Information Technology (STI), in partnership with the Institute of Mathematics and Statistics (IME), has created the Hackers do Bem program, an unprecedented USP initiative that aims to identify vulnerabilities and recommend corrections in the university's computer system.

By Adriana Cruz in USP Journal

Is it possible for a cell phone to be spied on without any app?

In general, a mobile phone can only be spied in two ways: with network monitoring or with changes in the operation of the device.

By Altieres Rohr in G1

Is cybersecurity a taboo in your organization? Bring the theme to the table

Organizations need to bring the theme to high leadership as a business requirement.

By João Rocha in Computerworld

The path of cybersecurity goes through the cloud

With increasingly distributed organizations, keeping devices everywhere or using different products for remote workers creates numerous safety breaches, and cost a lot and overload IT features.

By Felipe Canale and M Digital Convergence

Learn how to avoid the risks hidden in internet ads

Who has never been stuffed with the 'coincidence' of ads that appear after researching a product on the internet? According to systems analyst and information security expert Bruno Guerra, this is one of the most common strategies that applications and social networks use to generate monetization daily.

By Juliana Melo and Raquel Almeida in Infonet

New blow, old trick: Netflix name is used by hackers

Email message that warns of 'late payment' of the streaming platform has been used to lead users to provide their payment data.

By Renato Mota in Digital Look

Recommendations and tips for creating strong and secure passwords

With simple actions it is possible to increase the safety of your accounts and ensure that they are not easily discovered by hackers that can misuse this information.

By Cledison Eduardo Fritzen on Lumiun Blog

Blows to steal credentials from legitimate domains

Briefly the blow is based on the use of lodging services to evade automatic detections and the use of legitimate brands to increase the appearance of campaign legitimacy, which aims to obtain corporate credentials and Office 365.

By Arjun Sambamoorthy in Armorblox

Scams through cloned Instagram accounts

Why could anyone steal and clone an Instagram account? Learn how to avoid being a victim of this type of scam.

By Jake Moore in Welivesecurity

Researchers warn of inactive domains that lead to malicious pages

In the digital world, by registering a domain, you are paying for a “virtual terrain” where you can build your site the way you want. If you stop playing, however, it becomes inactive and inaccessible.

By Ramon de Souza in Canaltech


Tool Tips

Test the security of your internet

Do you know if your staff, students or family are protected against phishing , malware , pornography racism or terrorist content ?

information security

In the test will be made requests for access to various sites that are within the categories considered insecure, from your internet connection, such as:

  • Phishing and online fraud
  • Malware and Spyware
  • Access Anonymitors
  • Drugs and alcoholic beverages
  • Games and bets
  • Pornography and Nudity
  • Violence, terrorism and racism

Material

home office guide

Courses

Open Courses - ITS - Institute of Technology and Society of Rio

  • Free
  • Online

Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:

https://conteudo.lumiun.com/semana-da-eguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Free Trial
Related Posts