Security researchers have created a list that brings together a total of 42 vulnerabilities present in 17 different technologies that groups…
Read More*Renato Dante What is Code Review? Code review is a code review practice that is widely used…
Read More* By Antônio Silva Social engineering is a non-technical strategy used by cyber invaders, which depends a lot on…
Read More* By Gerson Lemos Controls and Methods of Information Security Definition One of the main security problems today is the…
Read More* By Vitória Silva Currently, any organizational environment, regardless of its size or type of business, fear cyber fraud,…
Read MoreBy Raphael Denser * Phishing attacks are not new, especially when it comes to spam emails sent on the web.
Read More@safeway Imagine the following scene ... You are out of office hours and suddenly get a call supposedly from…
Read MoreAccording to Forrester's Mobile Vision 2020 study, 54% organizations will have deployed the Unified Endpoint Management…
Read MoreSource: Robert Hamilton - Imperva Incapsula The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) released…
Read MoreMicrosoft patches two critical remote code execution (RCE) flaws that have been exploited in attacks
Microsoft released the June 2017 Patch Tuesday to address more than 90 security flaws, including two critical RCE that have…
Read More