In the 140th edition of Internet Security Week , extensions hijack browsers, how to optimize enterprise IT governance, malware steals login data saved in browsers, and much more.
News
Edge and Chrome extensions hijack browsers and have 1 million installations
Just like everything we download to our computers and cell phones, we also need to be careful with something small, but that can really mess us up: browser extensions.
By Claudio Yuge on Canaltech
DHL and Microsoft are the most used brands in phishing
The trademarks most frequently used by cybercriminals in their attempts to steal personal information or payment credentials (which also serve as a “bridge” for corporate data theft) during July, August and September of this year were, in order, DHL, Microsoft, LinkedIn, Google and Netflix.
In CISO Advisor
How to optimize the company's IT governance?
IT is one of the most important areas for a company. Optimizing IT management depends entirely on the use of technology and appropriate security policies. With the help of technology, managers can eliminate inappropriate processes and actions that lack the efficiency necessary for the company's objectives.
By Aléx de Oliveira in Lumiun Blog
Beware of scams during the World Cup
We've compiled some examples of scams that use the World Cup as bait to steal users' personal information or money, including phishing emails, fake websites, sticker albums, or supposed ticket sales.
By Juan Manuel Harán We Live Security
Payment Terminal Malware Steals $3.3 Million in Credit Card Numbers
Cybercriminals used two types of point-of-sale malware to steal the details of more than 167,000 credit cards from payment terminals. If sold on underground forums, the shipment could net the thieves more than $3.3 million.
By Jessica Lyons Hardcastle in The Register
The Email Scam: Learn What Phishing Is
Simply put, the term phishing is related to another English word, "fishing." This allows us to understand more clearly what this practice entails: through phishing, cybercriminals can "fish" for sensitive data and information from users and companies by using traps and false information.
By Aléx de Oliveira in Lumiun Blog
Discover the 5 main threats to companies on social media
With the popularization of the internet, the digital world has become increasingly closer to our personal lives. A cybersecurity expert warned that this closeness is what makes social media "ideal havens" for online criminal activity, as it combines two key factors: a large number of users and a high level of trust among users.
By Giovana Pignati on Canaltech
Ransomware is second only to money laundering in risk.
Cybercrimes such as money laundering, ransomware, and phishing pose the greatest threat to society, according to Interpol's first Global Crime Trend report. The inaugural study was compiled from data received from the organization's 195 member countries, as well as information and analysis from external sources.
In CISO Advisor
Formbook: malware steals login data saved in browsers
We analyzed Formbook, a malware that has been active since 2016 and steals login data saved in web browsers.
By Fernando Tavella at We Live Security
Courses
The 6 Best Free Cybersecurity Courses
- FutureLearn: Introduction to Cybersecurity
- Coursera: The Fundamentals of Cybersecurity
- FutureLearn: Introduction to Cybersecurity for Teachers
- Coursera: Cybersecurity and its ten domains
- Heimdal Cyber Security for Beginners
- Cybrary Information Security Basics
Not yet subscribed to our newsletter to receive this content weekly in your email? Then sign up using the link below:
https://br.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.