In the 163rd edition of Internet Security Week , risk methodologies, Trojans are still a threat, cybersecurity budgets, new, faster ransomware, seized credential warehouse, YouTube email scam, and much more.
News
Methodologies for cybersecurity risk management and their potential interoperability
Selecting cybersecurity risk management methodologies can be a daunting task, considering all the available options. ENISA provides a document that can facilitate and guide this process.
By Miguel Angel Mendoza
What actually happens to your device when it's in for repair
Will someone have access to your private photos when your device is being repaired?
By Alanna Titterington
Your Weather App Is Spying On You, Here's What To Do
Weather apps have a spotty track record of respecting your privacy. Choosing an app with a friendly and transparent privacy policy is important to protect your personal data and location history.
By Jason Fitzpatrick
Is Trojan still a threat to companies? See the risks and solutions
Also known as a Trojan Horse, the Trojan is one of the most widely used threats in the cyber world.
By Kelvin Zimmer
Cybersecurity budget in Brazilian companies will grow 14%
Kaspersky's projection looks at the next three years. Complexity in IT infrastructure and specialization in the field are the main drivers of spending.
New Rorschach ransomware is the fastest encryptor seen so far
Following a cyberattack on a US-based company, malware researchers have discovered what appears to be a new strain of ransomware with "technically unique capabilities," which they have dubbed Rorschach.
By Bill Toulas
Small and medium-sized businesses should also be concerned about cybersecurity
A study conducted by Kaspersky shows that some types of attacks have grown by more than 40% since last year.
Notorious Genesis Market Stolen Credentials Warehouse Seized by FBI
Operation Cookie Monster takes down data provider as service is stolen.
By Simon Sharwood
Beware – that email from YouTube asking for your account details is definitely a scam
Emails from @youtube.com are part of a phishing scam, experts warn
By Craig Hale
Brazilian machines have almost 500,000 active vulnerabilities
For the most part, these are old bugs, that is, updates for which have already been made available, but have never been downloaded due to consumers' own carelessness.
By Claudio Yuge
Top 5 Ways a Hacker Approach Can Benefit Managers
An effective manager must think like a hacker.
By Bryan Robinson, Ph.D.
Not yet subscribed to our newsletter to receive this content weekly in your email? Then sign up using the link below:
https://br.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.