In Edition No. 140 of Internet Security Week , extensions kidnap browsers, such as optimizing the company's IT governance, malware steals data from login save in browsers and more.
News
Extensions for Edge and Chrome kidnap browsers and have 1 million facilities
Just like everything we download to our computers and mobile phones, we also need to be aware of something small, but it can give us a lot of head: the extensions for browsers.
By Claudio Yuge in Canaltech
DHL and Microsoft are the most used marks in phishing
The commercial brands used more frequently by cybercriminals in their attempts to theft of personal information or payment credentials (which also serve as a “bridge” for corporate data theft), during July, August and September this year, were, by order, DHL, Microsoft, LinkedIn, Google and Netflix.
In Ciso Advisor
How to optimize the company's IT governance?
IT is one of the most important areas for a company. Optimizing management of this sector depends fully on the use of technology and proper security policies. With the help of technology, managers can eliminate inadequate processes and actions that do not have the necessary efficiency for the company's objectives.
By aléx de oliveira in lumiun blog
Beware of blows in World Cup season
We have separated some examples of blows that use the World Cup as bait to steal personal information or money from users, such as phishing emails, fake sites, stickers or supposed ticket sales.
By Juan Manuel Harán We Live Security
Payment terminal malware steals US $ 3.3 million in credit card numbers
Cybercriminals used two types of point of sale malware to steal the details of more than 167,000 payment terminal credit cards. If sold in clandestine forums, loading can yield more than US $ 3.3 million to thieves.
By Jessica Lyons Hardcastle in The Register
The scam of emails: Know what phishing is
Simply put, the term phishing is related to another word of the English language, the Fishing. With this we can understand more clearly about this practice: through phishing, cybercriminals can “fish” data and confidential user and business information through traps and false information.
By aléx de oliveira in lumiun blog
Get to know the 5 main threats to companies on social networks
With the popularization of the internet, the digital environment has become increasingly close to our personal lives. A cybersecurity expert warned that this approach is what makes social networks “ideal paradise” for online criminal activities, as it combines two main factors: a large number of users and a high level of confidence among users.
By Giovana Pignati in Canaltech
Ransomware only loses at risk for money laundering
Cybercrime, such as money laundering, ransomware and phishing, represent the biggest threat to society, according to the first report of Interpol Global Crime Trend. The inaugural study was compiled from data received from 195 member countries of the police organization, as well as information and analysis of external sources.
In Ciso Advisor
Formbook: Malware steals login data saved in browsers
We have analyzed the formbook, malware that has been active since 2016 and stealing login data saved in web browsers.
By Fernando Tavella in We Live Security
Courses
The 6 best free cyber security courses
- Futurelearn: Introduction to cyber security
- Coursera: The Fundamentals of Cybersecurity
- Futurelearn: Introduction to cybersecurity for teachers
- Coursera: cybersecurity and its ten domains
- Heimdal Cyber Security for beginners
- Basic Concepts of Information Security Cybrary
Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:
https://br.lumiun.com/semana-da-eguranca-na-internet
Share the link with your colleagues and friends.