In issue #140 of Internet Security Week , we cover topics such as browser hijacking extensions, how to optimize company IT governance, malware stealing login data saved in browsers, and much more.
News
Extensions for Edge and Chrome hijack browsers and have 1 million installations
Just like everything else we download to our computers and cell phones, we also need to be careful with something small, but which can cause us a lot of headaches: browser extensions.
By Claudio Yuge on Canaltech
DHL and Microsoft are the most commonly used brands in phishing scams
The trademarks most frequently used by cybercriminals in their attempts to steal personal information or payment credentials (which also serve as a "bridge" for stealing corporate data) during July, August, and September of this year were, in that order, DHL, Microsoft, LinkedIn, Google, and Netflix.
In CISO Advisor
How can you optimize your company's IT governance?
IT is one of the most important areas for a company. Optimizing the management of this sector depends entirely on the use of technology and appropriate security policies. With the help of technology, managers can eliminate inadequate processes and actions that do not provide the necessary efficiency for the company's objectives.
By Alex de Oliveira on Lumiun Blog
Beware of scams during the World Cup
We've compiled some examples of scams that use the World Cup as bait to steal users' personal information or money, such as phishing emails, fake websites, sticker albums, or the supposed sale of tickets.
By Juan Manuel Harán We Live Security
Payment terminal malware steals $3.3 million in credit card numbers
Cybercriminals used two types of point-of-sale malware to steal the details of more than 167,000 credit cards from payment terminals. If sold on underground forums, the stolen data could net the thieves more than US$3.3 million.
By Jessica Lyons Hardcastle in The Register
The email scam: learn what phishing is
In simplified terms, the term phishing is related to another word in the English language, "fishing." This helps us understand more clearly what this practice consists of: through phishing, cybercriminals are able to "fish" for confidential data and information from users and companies through traps and false information.
By Alex de Oliveira on Lumiun Blog
Discover the 5 main threats to businesses on social media
With the popularization of the internet, the digital world has become increasingly intertwined with our personal lives. A cybersecurity expert warned that this proximity is what makes social networks "ideal havens" for online criminal activity, as it combines two main factors: a large number of users and a high level of trust among users.
By Giovana Pignati on Canaltech
Ransomware is second only to money laundering in terms of risk
Cybercrimes, such as money laundering, ransomware, and phishing, represent the greatest threat to society, according to the first Interpol Global Crime Trend report. The inaugural study was compiled from data received from the organization's 195 member countries, as well as information and analysis from external sources.
In CISO Advisor
Formbook: Malware steals login data saved in browsers
We analyzed Formbook, a malware that has been active since 2016 and steals login data saved in web browsers.
By Fernando Tavella in We Live Security
Courses
The 6 best free cybersecurity courses
- FutureLearn: Introduction to Cybersecurity
- Coursera: The Fundamentals of Cybersecurity
- FutureLearn: Introduction to Cybersecurity for Teachers
- Coursera: Cybersecurity and its ten domains
- Heimdal Cyber Security for Beginners
- Basic concepts of information security - Cybrary
Are you not yet subscribed to our newsletter to receive this content weekly by email? Then subscribe using the link below:
https://br.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.







