Information Security Week – Edition Nº17

In edition No. 17 of Information Security Week, victims of fake lives in Brazil, security breach in iFood, Zoom adds new cutting-edge encryption, registration of websites visited on the internet router and much more.


News

Fake Lives” are the scam in fashion and are already causing victims in Brazil

Fake lives or “fake lives” seek to take advantage of the innocence of some internet users to steal their money.

Ramon de Souza in The Hack

Phishing and malware attacks use regional contexts to attract victims

Attacks are mainly carried out using emails that take advantage of victims' financial fears and questions about Covid-19.

In Computerworld

Security breach on iFood exposes user data and requests

In a failure that appears to have lasted just a few minutes, customers of the delivery app were surprised when they accessed their accounts and came across information, addresses and order history from third parties, as well as personal data such as CPF, emails and full names of customers. unknown.

By Felipe Demartini on CanalTech

Is IT security ready for PIX?

Central Bank launched the PIX system that will digitize money and thus reduce the costs of financial transactions between people, companies and even the government.

By José Ricardo Maia Moraes in Tiinside

Zoom adds end-to-end encryption for all users

Video conferencing app Zoom will add end-to-end encryption to calls from people using the free version of the service, weeks after announcing that the option would be available to premium users.

By Tom McKay in Gizmodo

Can the internet router record the websites visited?

Question-answering also explains how browsing history works on cell phones and the risks of contacting scammers on WhatsApp.

By Altieres Rohr in G1

Rappi, iFood and Uber Eats customers are the target of a new scam on Instagram

Criminals are taking the opportunity to scam complainants on Instagram, keeping an eye on their personal data and messaging app accounts.

By Felipe Demartini on CanalTech

IT: Trends in post-pandemic information technology

Even without absolute certainty about what is to come, it is possible to glimpse some trends in the world of Information Technology that need to be on the executive agenda.

By Carlos Kazuo in Rede Jornal Contábil

This Excel malware forces you to fill out a dreaded CAPTCHA form

Beware, spreadsheet enthusiasts – there's Excel malware afoot.

By Joel Khalili on Techradar

Improper use of cell phones at work can lead to dismissal for just cause

For professionals who constantly use their cell phones in the workplace, it is important to know that this excessive use can put their job at risk, after all, according to Brazilian legislation, dismissal for just cause due to using a cell phone at work is valid.

By Kelvin Zimmer on Lumiun Blog


videos

Information security | Creating secure passwords

YouTube player

Practical insight from an information security professional

TELEWORKING, REMOTE ACCESS AND INFORMATION SECURITY

 


Useful Services

My password

Find out if your email and password have been leaked.

Don't Disturb Me

Don't Disturb Me allows, easily and free of charge, to avoid the offering of products and services through telephone contact coming exclusively from Telecommunications Service Providers (mobile phone, landline phone, pay TV and Internet) and by Financial Institutions ( Payroll Loan and Payroll Credit Card operations).


 

Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:

https://conteudo.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

Related Posts