internet safety week

Internet Security Week – Edition No. 140

In edition #140 of Internet Security Week , extensions hijack browsers, how to optimize company IT governance, malware steals login data saved in browsers and much more.


News

Extensions for Edge and Chrome hijack browsers and have 1 million installations

Just like everything we download to our computers and cell phones, we also need to be careful with something small, but that can give us a lot of headaches: browser extensions.

By Claudio Yuge on FreeGameGuide

DHL and Microsoft are the most used brands in phishing

The trademarks used most frequently by cybercriminals in their attempts to steal personal information or payment credentials (which also serve as a “bridge” for theft of corporate data), during July, August and September of this year, were, in order, DHL, Microsoft, LinkedIn, Google and Netflix.

In CISO Advisor

How to optimize the company's IT governance?

IT is one of the most important areas for a company. Optimizing the management of this sector depends entirely on the use of technology and adequate security policies. With the help of technology, managers are able to eliminate inappropriate processes and actions that do not present the efficiency necessary for the company's objectives.

By Aléx de Oliveira in Lumiun Blog

Beware of scams during the World Cup

We have separated some examples of scams that use the World Cup as bait to steal personal information or money from users, such as phishing emails, fake websites, sticker albums or supposed ticket sales.

By Juan Manuel Harán We Live Security

Payment Terminal Malware Steals $3.3 Million in Credit Card Numbers

Cybercriminals used two types of point-of-sale malware to steal the details of more than 167,000 credit cards from payment terminals. If sold on underground forums, the shipment could net thieves more than US$3.3 million.

By Jessica Lyons Hardcastle in The Register

The email scam: find out what Phishing is

In a simplified way, the term phishing is related to another word in the English language, “fishing”. With this, we can understand more clearly what this practice consists of: through Phishing, cybercriminals are able to “fish” sensitive data and information from users and companies through traps and false information.

By Aléx de Oliveira in Lumiun Blog

Discover the top 5 threats to companies on social media

With the popularization of the internet, digital media has become increasingly closer to our personal lives. A cybersecurity expert has warned that this approach is what makes social networks “ideal havens” for online criminal activity, as it combines two main factors: a large number of users and a high level of trust among users.

By Giovana Pignati on Canaltech

Ransomware is second only to money laundering risk

Cybercrimes such as money laundering, ransomware and phishing pose the greatest threat to society, according to the first Interpol Global Crime Trend report. The inaugural study was compiled from data received from the police organization's 195 member countries, as well as information and analysis from external sources.

In CISO Advisor

Formbook: malware steals login data saved in browsers

We analyzed Formbook, a malware that has been active since 2016 and steals login data saved in web browsers.

By Fernando Tavella in We Live Security


Courses

The 6 best free cybersecurity courses

  1. FutureLearn: Introduction to Cybersecurity
  2. Coursera: The Fundamentals of Cybersecurity
  3. FutureLearn: Introduction to Cybersecurity for Teachers
  4. Coursera: Cybersecurity and its ten domains
  5. Heimdal Cyber ​​Security for Beginners
  6. Cybrary information security basics

Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:

https://br.lumiun.com/semana-da-seguranca-na-internet

Share the link with your colleagues and friends.

Related Posts