information security

Information Security Week – Edition No. 35

In edition No. 35 of Information Security Week, Apple authorizes the installation of malware on its system, children's apps removed from the Play Store, a new scam on WhatsApp, leaks of American voters' data and much more.


News

Again! Apple authorizes malware for installation on macOS

Six samples of the Trojan were approved to work on the operating system after checks carried out by the company.

By Felipe Demartini on Canaltech

Google removes three children's apps from the Play Store that could allow the developer to recognize and track an Android user

Google removed three Android apps aimed at children from the Play Store, which together had more than 20 million downloads.

By Rafael Rigues in Olhar Digital

Industrial environments are at greater risk of suffering cyber attacks, study finds

In the last 12 months, companies that responded to this study had an average of four problems related to information security.

By Ramon de Souza in The Hack

WhatsApp scam changes from theft to clone, warns Russian data security company

Since May 2019, Kaspersky, a Russian data security company, has warned about this risk, which has previously used online advertisements and invitations to VIP parties, but now the tactic is simpler: creating fake profiles.

By Daniel Praciano in Diário do Nordeste

220,000 bots try to attack Paxful

One of the largest P2P cryptocurrency trading platforms, Paxful, suffered a wave of web bot attacks for two months.

By Saori Honorato in Be In Crypto

Cybersecurity company reveals scam carried out using malicious URLs to force users to buy security software.

By Fernando Bianchi in Tribuna Online

Leak exposes data from 186 million North American voters

A gigantic database with information from 186 million voters in the United States was found for sale on a forum dedicated to hacking.

By Felipe Demartini on Canaltech

It's not easy: GitLab carries out phishing tests on its employees and several fail

Not even companies that should be an example of good cybersecurity practices are free from having individuals on their staff who do not yet know how to identify a cyber threat.

By Ramon de Souza in The Hack

4 ways to block employee websites when working from home

The advantages go far beyond keeping employees productive and under observation. The dangers of the internet are countless and the vast majority come from access by lay and unprepared users.

By Kelvin Zimmer on Lumiun Blog


Videos

LIVESEC – The importance of information and cyber security in business planning

Live 'Adherence to the LGPD: a journey in information security'


Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:

https://conteudo.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

Related Posts