internet safety week

Internet Security Week - Edition No. 140

In Edition No. 140 of Internet Security Week , extensions kidnap browsers, such as optimizing the company's IT governance, malware steals data from login save in browsers and more.


News

Extensions for Edge and Chrome kidnap browsers and have 1 million facilities

Just like everything we download to our computers and mobile phones, we also need to be aware of something small, but it can give us a lot of head: the extensions for browsers.

By Claudio Yuge in Canaltech

DHL and Microsoft are the most used marks in phishing

The commercial brands used more frequently by cybercriminals in their attempts to theft of personal information or payment credentials (which also serve as a “bridge” for corporate data theft), during July, August and September this year, were, by order, DHL, Microsoft, LinkedIn, Google and Netflix.

In Ciso Advisor

How to optimize the company's IT governance?

IT is one of the most important areas for a company. Optimizing management of this sector depends fully on the use of technology and proper security policies. With the help of technology, managers can eliminate inadequate processes and actions that do not have the necessary efficiency for the company's objectives.

By aléx de oliveira in lumiun blog

Beware of blows in World Cup season

We have separated some examples of blows that use the World Cup as bait to steal personal information or money from users, such as phishing emails, fake sites, stickers or supposed ticket sales.

By Juan Manuel Harán We Live Security

Payment terminal malware steals US $ 3.3 million in credit card numbers

Cybercriminals used two types of point of sale malware to steal the details of more than 167,000 payment terminal credit cards. If sold in clandestine forums, loading can yield more than US $ 3.3 million to thieves.

By Jessica Lyons Hardcastle in The Register

The scam of emails: Know what phishing is

Simply put, the term phishing is related to another word of the English language, the Fishing. With this we can understand more clearly about this practice: through phishing, cybercriminals can “fish” data and confidential user and business information through traps and false information.

By aléx de oliveira in lumiun blog

Get to know the 5 main threats to companies on social networks

With the popularization of the internet, the digital environment has become increasingly close to our personal lives. A cybersecurity expert warned that this approach is what makes social networks “ideal paradise” for online criminal activities, as it combines two main factors: a large number of users and a high level of confidence among users.

By Giovana Pignati in Canaltech

Ransomware only loses at risk for money laundering

Cybercrime, such as money laundering, ransomware and phishing, represent the biggest threat to society, according to the first report of Interpol Global Crime Trend. The inaugural study was compiled from data received from 195 member countries of the police organization, as well as information and analysis of external sources.

In Ciso Advisor

Formbook: Malware steals login data saved in browsers

We have analyzed the formbook, malware that has been active since 2016 and stealing login data saved in web browsers.

By Fernando Tavella in We Live Security


Courses

The 6 best free cyber security courses

  1. Futurelearn: Introduction to cyber security
  2. Coursera: The Fundamentals of Cybersecurity
  3. Futurelearn: Introduction to cybersecurity for teachers
  4. Coursera: cybersecurity and its ten domains
  5. Heimdal Cyber ​​Security for beginners
  6. Basic Concepts of Information Security Cybrary

Are you not yet registered on our newsletter to receive this content weekly in the email? Then subscribe through the link below:

https://br.lumiun.com/semana-da-eguranca-na-internet

Share the link with your colleagues and friends.

Lumiun DNS Free Trial
Related Posts