Feb 24 Love0 Phishing, the Data Capture Technique By Sara Carvalho Articles São Paulo/SP – January 30, 2023. The term phishing comes from the English that means “capturing” confidential data, it is…Read More
Jul 02 Love0 Cybersecurity and the Digital Transformation By Sara Carvalho Articles Cybersecurity and Digital Transformation *By Carlos Borella We know that Digital Transformation is not just about creating…Read More
Jun 08 Love1 What is Code Review? Know the Importance of Making This Review By Sara Carvalho Articles *Renato Dante What is Code Review? Code review is a code review practice that is widely used…Read More
Apr 20 Love0 Social engineering By Sara Carvalho Articles * By Antônio Silva Social engineering is a non-technical strategy used by cyber invaders, which depends a lot on…Read More
Apr 12 Love0 Information Security Controls and Methods By Sara Carvalho Articles * By Gerson Lemos Controls and Methods of Information Security Definition One of the main security problems today is the…Read More
Apr 08 Love0 Information Security Allied to Combat Fraud By Sara Carvalho Articles * By Vitória Silva Currently, any organizational environment, regardless of its size or type of business, fear cyber fraud,…Read More
Jun 21 Love0 Hidden Cobra and DeltaCharlie: An Explainer By Andrea Rosti Articles No Comments Source: Robert Hamilton - Imperva Incapsula The Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI) released…Read More
Jun 14 Love0 Microsoft patches two critical remote code execution (RCE) flaws that have been exploited in attacks By Andrea Rosti Articles No Comments Microsoft released the June 2017 Patch Tuesday to address more than 90 security flaws, including two critical RCE that have…Read More
Dec 20 Love0 [CYBERATTACKS] Top Tips to Protect Your Personal Computer and Devices By Andrea Rosti Articles No Comments The more and more cyberattacks make headlines around the world, consumers can easily be overwhelmed with warnings and technical instructions…Read More
Sep 23 Love0 Business Innovation Study: Thinking Outside the Box May Not Help Protect It By Andrea Rosti Articles No Comments By IBM - Douglas Bonderud Cybercriminals are innovating. New attack vectors - everything from fansmitter information stealing to the rise…Read More