Information Security Week – Edition Nº27

In edition No. 27 of Information Security Week, good hackers, cybersecurity in the organization, how to avoid risks hidden in advertisements on the internet, Netflix's name is used by hackers, tips and recommendations for creating strong and secure passwords, scams coming from domains legitimate and much more.


News

Good Hackers protect University computer systems

The Information Technology Superintendence (STI), in partnership with the Institute of Mathematics and Statistics (IME), created the Hackers do Bem program, a unique initiative from USP that aims to identify vulnerabilities and recommend corrections in the University's computer system. .

By Adriana Cruz in Jornal da USP

Is it possible for a cell phone to be spied on without any application?

In general, a cell phone can only be spied on in two ways: with network monitoring or with changes in the device's operation.

By Altieres Rohr in G1

Is cybersecurity a taboo in your organization? Bring the topic to the table

Organizations need to take the topic to senior leadership as a business requirement.

By João Rocha in Computerworld

The path to cybersecurity goes through the cloud

With organizations increasingly distributed, keeping devices in all locations or using different products for remote workers creates numerous security holes, as well as being costly and taxing IT resources.

By Felipe Canale and Convergência Digital

Find out how to avoid the risks hidden in internet ads

Who has never been troubled by the 'coincidence' of advertisements that appear after searching for a product on the internet? According to systems analyst and information security specialist, Bruno Guerra, this is one of the most common strategies that applications and social networks use to generate monetization on a daily basis.

By Juliana Melo and Raquel Almeida in Infonet

New scam, old trick: Netflix's name is used by hackers

An email message warning about 'delayed payment' from the streaming platform has been used to prompt users to provide their payment details.

By Renato Mota in Olhar Digital

Recommendations and tips for creating strong and secure passwords

With simple actions it is possible to increase the security of your accounts and ensure that they are not easily discovered by hackers who could misuse this information.

By Cledison Eduardo Fritzen on Lumiun Blog

Scams to steal credentials coming from legitimate domains

In short, the scam is based on the use of hosting services to evade automatic detections and the use of legitimate brands to increase the appearance of legitimacy of the campaign, which aims to obtain corporate and Office 365 credentials.

By Arjun Sambamoorthy in Armorblox

Scams through cloned Instagram accounts

Why might someone steal and clone an Instagram account? Find out how to avoid falling victim to this type of scam.

By Jake Moore at Welivesecurity

Researchers warn of inactive domains that lead to malicious pages

In the digital world, when registering a domain, you are paying for a “virtual land” where you can build your website the way you want. If you stop paying, however, it becomes inactive and inaccessible.

By Ramon De Souza on FreeGameGuide


Tooltips

Test your Internet Security

Do you know if your employees, students or family are protected from phishing , malware , pornography racist or terrorist content ?

information security

In the test, access requests will be made to several websites that are within the categories considered insecure, using your internet connection, such as:

  • Phishing and online fraud
  • Malware and spyware
  • Access anonymizers
  • Drugs and alcoholic beverages
  • Games and bets
  • Pornography and nudity
  • Violence, terrorism and racism

Materials

home office guide

Courses

Open Courses – ITS – Rio Institute of Technology and Society

  • Free
  • Online

Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:

https://conteudo.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

Related Posts