In edition #140 of Internet Security Week , extensions hijack browsers, how to optimize company IT governance, malware steals login data saved in browsers and much more.
News
Extensions for Edge and Chrome hijack browsers and have 1 million installations
Just like everything we download to our computers and cell phones, we also need to be careful with something small, but that can give us a lot of headaches: browser extensions.
By Claudio Yuge on FreeGameGuide
DHL and Microsoft are the most used brands in phishing
The trademarks used most frequently by cybercriminals in their attempts to steal personal information or payment credentials (which also serve as a “bridge” for theft of corporate data), during July, August and September of this year, were, in order, DHL, Microsoft, LinkedIn, Google and Netflix.
In CISO Advisor
How to optimize the company's IT governance?
IT is one of the most important areas for a company. Optimizing the management of this sector depends entirely on the use of technology and adequate security policies. With the help of technology, managers are able to eliminate inappropriate processes and actions that do not present the efficiency necessary for the company's objectives.
By Aléx de Oliveira in Lumiun Blog
Beware of scams during the World Cup
We have separated some examples of scams that use the World Cup as bait to steal personal information or money from users, such as phishing emails, fake websites, sticker albums or supposed ticket sales.
By Juan Manuel Harán We Live Security
Payment Terminal Malware Steals $3.3 Million in Credit Card Numbers
Cybercriminals used two types of point-of-sale malware to steal the details of more than 167,000 credit cards from payment terminals. If sold on underground forums, the shipment could net thieves more than US$3.3 million.
By Jessica Lyons Hardcastle in The Register
The email scam: find out what Phishing is
In a simplified way, the term phishing is related to another word in the English language, “fishing”. With this, we can understand more clearly what this practice consists of: through Phishing, cybercriminals are able to “fish” sensitive data and information from users and companies through traps and false information.
By Aléx de Oliveira in Lumiun Blog
Discover the top 5 threats to companies on social media
With the popularization of the internet, digital media has become increasingly closer to our personal lives. A cybersecurity expert has warned that this approach is what makes social networks “ideal havens” for online criminal activity, as it combines two main factors: a large number of users and a high level of trust among users.
By Giovana Pignati on Canaltech
Ransomware is second only to money laundering risk
Cybercrimes such as money laundering, ransomware and phishing pose the greatest threat to society, according to the first Interpol Global Crime Trend report. The inaugural study was compiled from data received from the police organization's 195 member countries, as well as information and analysis from external sources.
In CISO Advisor
Formbook: malware steals login data saved in browsers
We analyzed Formbook, a malware that has been active since 2016 and steals login data saved in web browsers.
By Fernando Tavella in We Live Security
Courses
The 6 best free cybersecurity courses
- FutureLearn: Introduction to Cybersecurity
- Coursera: The Fundamentals of Cybersecurity
- FutureLearn: Introduction to Cybersecurity for Teachers
- Coursera: Cybersecurity and its ten domains
- Heimdal Cyber Security for Beginners
- Cybrary information security basics
Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:
https://br.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.