In issue #163 of Internet Security Week , we cover risk methodologies, whether Trojans are still a threat, cybersecurity budgets, a new, faster ransomware, a seized credential warehouse, a YouTube email scam, and much more.
News
Methodologies for managing cybersecurity risks and their potential interoperability.
Selecting methodologies for managing cybersecurity risks can be a complicated task among all the available options. ENISA provides a document that can facilitate and guide this process.
By Miguel Ángel Mendoza
What really happens to your device when it's in for repair?
Will someone have access to your private photos while your device is being repaired?
By Alanna Titterington
Your weather app is spying on you, here's what to do.
Weather apps have a shaky track record of respecting your privacy. Choosing an app with a friendly and transparent privacy policy is important to protect your personal data and location history.
By Jason Fitzpatrick
Is Trojan still a threat to companies? See the risks and solutions
Also known as a Trojan horse, the Trojan is one of the most widely used threats in the cyber world.
By Kelvin Zimmer
Cybersecurity budgets in Brazilian companies will grow by 14%.
Kaspersky's projection focuses on the next three years. Complexity in IT infrastructure and specialization in the area are the main drivers of spending.
The new Rorschach ransomware is the fastest encryption device seen so far.
Following a cyberattack on a US-based company, malware researchers discovered what appears to be a new strain of ransomware with "technically unique features," which they have dubbed Rorschach.
By Bill Toulas
Small and medium-sized enterprises should also be concerned about cybersecurity.
A study conducted by Kaspersky shows that some types of attacks have grown by more than 40% since last year.
Notorious warehouse of stolen credentials at Genesis Market seized by the FBI.
Operation Cookie Monster exposes data provider as stolen service.
By Simon Sharwood
Beware – that email from YouTube asking for your account details is definitely a scam.
Emails from @youtube.com are part of a phishing scam, experts warn.
By Craig Hale
Brazilian computers have nearly 500,000 active vulnerabilities.
For the most part, these are old bugs, meaning updates have already been released but were never downloaded due to consumer negligence.
By Claudio Yuge
5 key ways a hacker approach can benefit managers
An effective manager should think like a hacker.
By Bryan Robinson, Ph.D.
Not yet subscribed to our newsletter to receive this content weekly in your email? Then sign up using the link below:
https://br.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.








