In edition No. 163 of Internet Security Week , risk methodologies, Trojan is still threat, cybersecurity budget, faster ransomware, seized accreditation warehouse, Youtube e-mail farce, and more.
News
Methodologies for cybersecurity risk management and its potential interoperability
Selecting methodologies for cybersecurity risk management can be a complicated activity among all available options. Enisa offers a document that can facilitate and guide this process.
By Miguel Ángel Mendoza
What really happens to your device when it is in the repair
Will anyone have access to your private photos when your device is being repaired?
By Alanna Titterington
Your climate app is spying on you, see what to do
Meteorological applications have an unstable history of respecting their privacy. Choosing an application with a friendly and transparent privacy policy is important to protect your personal and location history.
By Jason Fitzpatrick
Is Trojan still a threat to companies? See the risks and solutions
Also known as Trojan horse, Trojan is one of the most used threats in the cyber world.
By Kelvin Zimmer
Cybersecurity budget in Brazilian companies will grow 14%
Kaspersky Mira projection next three years. Complexity in IT infrastructure and specialization in the area are main spending drivers.
New Ransomware Rorschach is the fastest encrypher seen so far
After a cyber attack on a US -based company, Malware researchers discovered what seems to be a new variety of ransomware with "technically exclusive resources," which they called Rorschach.
By Bill Toulas
Small and medium -sized companies should also worry about cybersecurity
Study conducted by Kaspersky shows that some types of attacks have grown over 40% from last year.
Notorious warehouse of stolen credentials genesis market seized by the FBI
Operation cookie monster collapses data supplier as stolen service.
By Simon Sharwood
Care-That Youtube email requesting the details of your account is definitely a scam
@Youtube.com emails are part of phishing coup, warning experts
By Craig Hale
Brazilian machines have almost 500,000 active vulnerabilities
For the most part they are old failures, that is, whose updates have already been made available, but have never been downloaded by inattention of consumers themselves.
By Claudio Yuge
5 main ways in which a hacker approach can benefit managers
An efficient manager should think like a hacker.
By Bryan Robinson, Ph.D.
Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:
https://br.lumiun.com/semana-da-eguranca-na-internet
Share the link with your colleagues and friends.