Information Security Week – Issue 17

In the 17th edition of Information Security Week, victims of fake live streams in Brazil, a security breach at iFood, Zoom adds new cutting-edge encryption, logging of websites visited on the internet router, and much more.


News

“Fake Lives” are the latest scam and are already claiming victims in Brazil.

Fake live streams or “fake lives” seek to take advantage of the innocence of some internet users to steal their money.

Ramon de Souza in The Hack

Phishing and malware attacks use regional contexts to lure victims

Attacks are carried out primarily through emails that exploit victims' financial fears and questions about Covid-19.

In Computerworld

iFood security breach exposes user data and orders

In a glitch that appears to have lasted only a few minutes, delivery app customers were surprised when they accessed their accounts and found information, addresses, and order history belonging to third parties, as well as personal data such as CPFs, emails, and full names of strangers.

By Felipe Demartini in CanalTech

Is IT security ready for PIX?

The Central Bank launched the PIX system, which will digitize money and thereby reduce the costs of financial transactions between individuals, companies, and even the government.

By José Ricardo Maia Moraes in Tiinside

Zoom adds end-to-end encryption for all users

Video conferencing app Zoom will add end-to-end encryption to calls for people using the free version of the service, weeks after announcing that the option would be available to premium users.

By Tom McKay at Gizmodo

Can the internet router log the websites visited?

The FAQ also explains how browsing history works on cell phones and the risks of contacting scammers on WhatsApp.

By Altieres Rohr in G1

Rappi, iFood, and Uber Eats customers targeted by new Instagram scam

Criminals are taking advantage of this opportunity to scam complainants on Instagram, targeting their personal data and messaging app accounts.

By Felipe Demartini in CanalTech

IT: Trends in Post-Pandemic Information Technology

Even without absolute certainty about what's to come, it's possible to glimpse some trends in the Information Technology universe that need to be on the executive agenda.

By Carlos Kazuo in Rede Jornal Contábil

This Excel malware forces you to fill out a dreaded CAPTCHA form

Beware, spreadsheet enthusiasts – there's Excel malware afoot.

By Joel Khalili at Techradar

Improper use of cell phones at work can result in dismissal for just cause.

For professionals who constantly use cell phones in the workplace, it is important to know that this excessive use can put their job at risk. After all, according to Brazilian law, dismissal for just cause due to cell phone use at work is valid.

By Kelvin Zimmer on Lumiun Blog


Videos

Information Security | Creating Secure Passwords

YouTube player

Practical insight from an information security professional

TELEWORKING, REMOTE ACCESS AND INFORMATION SECURITY

 


Useful Services

My Password

Find out if your email and password have been leaked.

Do Not Disturb Me

Do Not Disturb allows you, easily and free of charge, to avoid the offer of products and services through telephone contact coming exclusively from Telecommunications Service Providers (mobile phone, landline, pay TV and Internet) and Financial Institutions (Consigned Loan and Consigned Credit Card operations).


 

Not yet subscribed to our newsletter to receive this content weekly in your email? Then sign up using the link below:

https://conteudo.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Free Trial
Related Posts