internet safety week

Internet Safety Week – Issue 140

In the 140th edition of Internet Security Week , extensions hijack browsers, how to optimize enterprise IT governance, malware steals login data saved in browsers, and much more.


News

Edge and Chrome extensions hijack browsers and have 1 million installations

Just like everything we download to our computers and cell phones, we also need to be careful with something small, but that can really mess us up: browser extensions.

By Claudio Yuge on Canaltech

DHL and Microsoft are the most used brands in phishing

The trademarks most frequently used by cybercriminals in their attempts to steal personal information or payment credentials (which also serve as a “bridge” for corporate data theft) during July, August and September of this year were, in order, DHL, Microsoft, LinkedIn, Google and Netflix.

In CISO Advisor

How to optimize the company's IT governance?

IT is one of the most important areas for a company. Optimizing IT management depends entirely on the use of technology and appropriate security policies. With the help of technology, managers can eliminate inappropriate processes and actions that lack the efficiency necessary for the company's objectives.

By Aléx de Oliveira in Lumiun Blog

Beware of scams during the World Cup

We've compiled some examples of scams that use the World Cup as bait to steal users' personal information or money, including phishing emails, fake websites, sticker albums, or supposed ticket sales.

By Juan Manuel Harán We Live Security

Payment Terminal Malware Steals $3.3 Million in Credit Card Numbers

Cybercriminals used two types of point-of-sale malware to steal the details of more than 167,000 credit cards from payment terminals. If sold on underground forums, the shipment could net the thieves more than $3.3 million.

By Jessica Lyons Hardcastle in The Register

The Email Scam: Learn What Phishing Is

Simply put, the term phishing is related to another English word, "fishing." This allows us to understand more clearly what this practice entails: through phishing, cybercriminals can "fish" for sensitive data and information from users and companies by using traps and false information.

By Aléx de Oliveira in Lumiun Blog

Discover the 5 main threats to companies on social media

With the popularization of the internet, the digital world has become increasingly closer to our personal lives. A cybersecurity expert warned that this closeness is what makes social media "ideal havens" for online criminal activity, as it combines two key factors: a large number of users and a high level of trust among users.

By Giovana Pignati on Canaltech

Ransomware is second only to money laundering in risk.

Cybercrimes such as money laundering, ransomware, and phishing pose the greatest threat to society, according to Interpol's first Global Crime Trend report. The inaugural study was compiled from data received from the organization's 195 member countries, as well as information and analysis from external sources.

In CISO Advisor

Formbook: malware steals login data saved in browsers

We analyzed Formbook, a malware that has been active since 2016 and steals login data saved in web browsers.

By Fernando Tavella at We Live Security


Courses

The 6 Best Free Cybersecurity Courses

  1. FutureLearn: Introduction to Cybersecurity
  2. Coursera: The Fundamentals of Cybersecurity
  3. FutureLearn: Introduction to Cybersecurity for Teachers
  4. Coursera: Cybersecurity and its ten domains
  5. Heimdal Cyber ​​​​Security for Beginners
  6. Cybrary Information Security Basics

Not yet subscribed to our newsletter to receive this content weekly in your email? Then sign up using the link below:

https://br.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Free Trial
Related Posts