In edition No. 27 of Information Security Week, good hackers, cybersecurity in the organization, how to avoid risks hidden in advertisements on the internet, Netflix's name is used by hackers, tips and recommendations for creating strong and secure passwords, scams coming from domains legitimate and much more.
News
Good Hackers protect University computer systems
The Information Technology Superintendence (STI), in partnership with the Institute of Mathematics and Statistics (IME), created the Hackers do Bem program, a unique initiative from USP that aims to identify vulnerabilities and recommend corrections in the University's computer system. .
By Adriana Cruz in Jornal da USP
Is it possible for a cell phone to be spied on without any application?
In general, a cell phone can only be spied on in two ways: with network monitoring or with changes in the device's operation.
By Altieres Rohr in G1
Is cybersecurity a taboo in your organization? Bring the topic to the table
Organizations need to take the topic to senior leadership as a business requirement.
By João Rocha in Computerworld
The path to cybersecurity goes through the cloud
With organizations increasingly distributed, keeping devices in all locations or using different products for remote workers creates numerous security holes, as well as being costly and taxing IT resources.
By Felipe Canale and Convergência Digital
Find out how to avoid the risks hidden in internet ads
Who has never been troubled by the 'coincidence' of advertisements that appear after searching for a product on the internet? According to systems analyst and information security specialist, Bruno Guerra, this is one of the most common strategies that applications and social networks use to generate monetization on a daily basis.
By Juliana Melo and Raquel Almeida in Infonet
New scam, old trick: Netflix's name is used by hackers
An email message warning about 'delayed payment' from the streaming platform has been used to prompt users to provide their payment details.
By Renato Mota in Olhar Digital
Recommendations and tips for creating strong and secure passwords
With simple actions it is possible to increase the security of your accounts and ensure that they are not easily discovered by hackers who could misuse this information.
By Cledison Eduardo Fritzen on Lumiun Blog
Scams to steal credentials coming from legitimate domains
In short, the scam is based on the use of hosting services to evade automatic detections and the use of legitimate brands to increase the appearance of legitimacy of the campaign, which aims to obtain corporate and Office 365 credentials.
By Arjun Sambamoorthy in Armorblox
Scams through cloned Instagram accounts
Why might someone steal and clone an Instagram account? Find out how to avoid falling victim to this type of scam.
By Jake Moore at Welivesecurity
Researchers warn of inactive domains that lead to malicious pages
In the digital world, when registering a domain, you are paying for a “virtual land” where you can build your website the way you want. If you stop paying, however, it becomes inactive and inaccessible.
By Ramon De Souza on FreeGameGuide
Tooltips
Test your Internet Security
Do you know if your employees, students or family are protected from phishing , malware , pornography racist or terrorist content ?
In the test, access requests will be made to several websites that are within the categories considered insecure, using your internet connection, such as:
- Phishing and online fraud
- Malware and spyware
- Access anonymizers
- Drugs and alcoholic beverages
- Games and bets
- Pornography and nudity
- Violence, terrorism and racism
Materials
Courses
Open Courses – ITS – Rio Institute of Technology and Society
- Free
- Online
Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:
https://conteudo.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.