internet safety week

Internet Security Week - Edition No. 163

In edition No. 163 of Internet Security Week , risk methodologies, Trojan is still threat, cybersecurity budget, faster ransomware, seized accreditation warehouse, Youtube e-mail farce, and more.


News

Methodologies for cybersecurity risk management and its potential interoperability

Selecting methodologies for cybersecurity risk management can be a complicated activity among all available options. Enisa offers a document that can facilitate and guide this process.

By Miguel Ángel Mendoza

What really happens to your device when it is in the repair

Will anyone have access to your private photos when your device is being repaired?

By Alanna Titterington

Your climate app is spying on you, see what to do

Meteorological applications have an unstable history of respecting their privacy. Choosing an application with a friendly and transparent privacy policy is important to protect your personal and location history.

By Jason Fitzpatrick

Is Trojan still a threat to companies? See the risks and solutions

Also known as Trojan horse, Trojan is one of the most used threats in the cyber world.

By Kelvin Zimmer

Cybersecurity budget in Brazilian companies will grow 14%

Kaspersky Mira projection next three years. Complexity in IT infrastructure and specialization in the area are main spending drivers.

New Ransomware Rorschach is the fastest encrypher seen so far

After a cyber attack on a US -based company, Malware researchers discovered what seems to be a new variety of ransomware with "technically exclusive resources," which they called Rorschach.

By Bill Toulas

Small and medium -sized companies should also worry about cybersecurity

Study conducted by Kaspersky shows that some types of attacks have grown over 40% from last year.

Notorious warehouse of stolen credentials genesis market seized by the FBI

Operation cookie monster collapses data supplier as stolen service.

By Simon Sharwood

Care-That Youtube email requesting the details of your account is definitely a scam

@Youtube.com emails are part of phishing coup, warning experts

By Craig Hale

Brazilian machines have almost 500,000 active vulnerabilities

For the most part they are old failures, that is, whose updates have already been made available, but have never been downloaded by inattention of consumers themselves.

By Claudio Yuge

5 main ways in which a hacker approach can benefit managers

An efficient manager should think like a hacker.

By Bryan Robinson, Ph.D.


Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:

https://br.lumiun.com/semana-da-eguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Free Trial
Related Posts