In Edition No. 128 of Internet Security Week , Vishing blow growth, cyberataques without malware, fake bill and more.
News
Vishing | Growth of the blows puts interpol on alert
Voice Phishing (Voice or Vishing) scams are becoming a growing threat worldwide and has even worried Interpol. Even though the agency has increased repression on this type of criminal strategy, the risk of being a victim of Vishing has reached unpublished levels.
By Kaique Lima in Canaltech
Cyberataques without malware?
Recently, some news about the activity of the Luna Moth group, which specializes in corporate data theft and blackmail. The big difference about Luna Moth is that they get information without using malware.
By Anastasia Starikova in Kaspersky Daily
False Invoice: Criminals are passing by operator to propagate the trojan Grandoreiro
Although this new campaign has even greater complexity by distributing malicious software and not just sending a fake invoice for victims to pay it, it is possible to notice a number of signs that clearly show that it is a blow.
By Daniel Cunha Barbosa in We Live Security
Spanish research agency still recovers after ransomware attack last month
Spain's National Research Council (CSIC) last month was hit by a ransomware attack that is now attributed to Russian hackers.
By ionut ilasu in bleeding computer
TSE sets action against hackers after a report warn of attacks on the afternoon elections
Alerted by a technical group that is dedicated to information security, the Superior Electoral Court (TSE) works with the possibility of suffering hackers attacks on the eve of the October elections. Faced with the global scenario of “threats of threats”, the Electoral Court has been implementing measures to protect the electoral system in Brasilia and also in the regional courts.
By Vinícius Valfré in UOL
Criminals use malicious PDFs to spread malware; Learn how to protect yourself
Light and safe, the PDF is a very popular file format, which is used to load from a resume sent by someone looking for a job, to the electricity bill to those who chose to receive it by email. However, confidence in the format has been used by cybercriminals to spreading malware.
By Kaique Lima in Canaltech
A Cryptoroubo of half a billion dollars
We usually write about blows that promise gold mountains, when in reality the opposite happens and the victims end up empty pockets. Similarly, cybercriminals can put their hands on the money of entire companies exploring the greed and negligence of their employees.
By Leonid Grustniy in Kaspersky Daily
Criminals attack delivery apps to steal US credit card data
Criminals stole credit card data from more than 300 restaurants in attacks targeted at three food delivery applications.
By Juan Manuel Harán in We Live Security
Lamb Wolf: As malware deceives users and antiviruses
One of the main methods used by malware distributors to infect devices is to deceive people to download and run malicious files and, to get this mistake, malware authors are using a variety of tricks.
By Bill Toulas in Bleeping Computer
ebook
What is DNS Firewall and 7 reasons to use it in your company
- Complete Material on Firewall DNS
- Available for download
- Free
Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:
https://br.lumiun.com/semana-da-eguranca-na-internet
Share the link with your colleagues and friends.