In edition no. 163 of Internet Security Week , risk methodologies, trojans are still a threat, cybersecurity budget, new faster ransomware, credentials warehouse seized, YouTube email scam, and much more.
News
Methodologies for managing cybersecurity risks and their potential interoperability
Selecting methodologies for managing cybersecurity risks can be a complicated activity among all the options available. ENISA provides a document that can facilitate and guide this process.
By Miguel Ángel Mendoza
What actually happens to your device when it's in repair
Will someone have access to your private photos when your device is being repaired?
By Alanna Titterington
Your weather app is spying on you, here's what to do
Weather apps have a spotty track record of respecting your privacy. Choosing an app with a user-friendly and transparent privacy policy is important to protect your personal data and location history.
By Jason Fitzpatrick
Is Trojan still a threat to companies? See the risks and solutions
Also known as the Trojan Horse, the Trojan is one of the most used threats in the cyber world.
By Kelvin Zimmer
Cybersecurity budget in Brazilian companies will grow 14%
Kaspersky's projection targets the next three years. Complexity in IT infrastructure and specialization in the area are the main drivers of spending.
New Rorschach ransomware is the fastest encryptor seen so far
Following a cyberattack on a US-based company, malware researchers discovered what appears to be a new strain of ransomware with “technically unique features,” which they called Rorschach.
By Bill Toulas
Small and medium-sized companies should also be concerned about cybersecurity
A study carried out by Kaspersky shows that some types of attacks have increased by more than 40% since last year.
Notorious Warehouse of Stolen Genesis Market Credentials Seized by FBI
Operation Cookie Monster collapses stolen data-as-a-service vendor.
By Simon Sharwood
Be careful – that email from YouTube asking for your account details is definitely a scam
Emails from @youtube.com are part of a phishing scam, experts warn
By Craig Hale
Brazilian machines have almost 500 thousand active vulnerabilities
For the most part, they are old flaws, that is, updates for which have already been made available, but were never downloaded due to the inattention of consumers themselves.
By Claudio Yuge
Top 5 Ways a Hacker Approach Can Benefit Managers
An effective manager must think like a hacker.
By Bryan Robinson, Ph.D.
Are you not yet subscribed to our newsletter to receive this content weekly by email? Then sign up using the link below:
https://br.lumiun.com/semana-da-seguranca-na-internet
Share the link with your colleagues and friends.