Manchetes
-
TLS e SSL
SSL | MITOS E REALIDADE
-
International News
American Express lança anúncio vintage para promover Apple Pay
-
Destaques
Symantec has a found a spying tool active on computers around the world
-
Destaques
The Cost of Creating Collisions Using SHA-1
-
International News
Download at your own risk: Bitcoin mine
Últimas notícias
Gartner prevê que gastos mundiais de usuários finais com Nuvem Pública irão ultrapassar US$ 675 bilhões em 2024
Gartner prevê crescimento anual que deve superar 20%, impulsionado por aplicativos habilitados para Inteligência Artificial Generativa
6 de junho de 2024Bombardeio MFA: Nova Técnica de Phishing Mirando Usuários de Dispositivos Apple
Os especialistas da Norton, uma marca de cibersegurança para o consumidor da Gen™ (NASDAQ: GEN), alertam sobre uma nova modalidade conhecida como “bombardeio MFA” ou “push bombing,
6 de junho de 2024Everymind e Salesforce abrem inscrições para evento de RGM para mercado de varejo e consumo
A Salesforce e a Everymind promovem o evento exclusivo “RGM em Foco: Conectando a Estratégia com o Campo” no dia 2 de julho em São Paulo.
6 de junho de 2024CoopsParty 2024 é oportunidade para desmitificar a inovação e aproximar jovens do cooperativismo
O CoopsParty, pela primeira vez em Goiás, 18 e 19 de novembro, já pode ser considerado o maior evento de inovação do cooperativismo brasileiro
6 de junho de 20243C Gaming anuncia Renato Paiva como novo Vice-Presidente de Operações
Empresário chega para nova fase de expansão da empresa com
5 de junho de 2024International News
CISCO TrustSec: The Cybersecurity Enforcer
What stands out in many breaches is not that adversaries were able to penetrate the network through a known vulnerability.
Leia maisCriminal hackers will use GDPR to profit from companies worldwide, warns Cyber Security expert
Criminal hackers will use GDPR to profit from companies worldwide, warns Cyber Security expert.
Leia maisWikiLeaks: CIA impersonated Kaspersky Labs as a cover for its malware operations
WikiLeaks, under its new Vault 8 series of released documents, has rolled out what it says is the source code to a previously noted CIA tool, called Hive, that is used to help hide espionage actions when the Agency implants malware.
Leia maisHowMuch Does an SSL Certificate Really Cost
The SSL/TLS Market is growing as companies realize the importance of encryption in cybersecurity best practices.
Leia maissciNote to incorporate artificial intelligence into its electronic lab notebook
Cientistas do mundo todo começarão a usar Inteligência Artificial para escreverem seus artigos científicos.
Leia maisKey Reinstallation Attacks Breaking WPA2 by forcing nonce reuse
We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs).
Leia maisQuantum Computing: Real or Exaggerated Threat to the Web PKI?
All of this is secured by digital certificates and encryption, which provide privacy and authentication of information transiting the open Internet (aka Web PKI).
Leia maisTempest is a co-author of the – Best Practices in Fraud Prevention – guide for the digital advertising industry
Tempest é co-autor do guia “Melhores Práticas de Prevenção de Fraude” para o setor de publicidade digital
Leia maisCYBER WAR
The cybernetic sector contemplates the use of technological means destined to the transit of information, even those dedicated to strategic sectors, and to protect them is fundamental for the maintenance of the stability and security of the society, since we live in the information age, in which The dependence on technology increases every day and the risks inherent in the lack of security grow exponentially.
Leia maisPetya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry
By Swati Khandelwal Watch out, readers! It is ransomware, another WannaCry, another wide-spread attack. The WannaCry ransomware is not
Leia maisLIBERTAD DE EXPRESIÓN, PROTECCION DE DATOS, ALGORITMOS Y BIOMETRÍA, UNA NUEVA RETÓRICA?
Por Romina Florencia Cabrera * En el mundo virtual del cuál somos parte, muchas veces sin
Leia maisWhat’s the Difference Between Advanced and Qualified Signatures in eIDAS?
Regulations such as eIDAS have developed their own eSignature classifications based on trust and assurance. These terms signify the level of assurance provided by different types of signatures as specified by the goals of the regulation.
Leia maisSymantec Connects 40 Cyber Attacks to CIA Hacking Tools Exposed by Wikileaks
Artigos em outros idiomas são publicados em International News | Articles in other languages are published in the International News
Leia maisCAB Forum: The Latest on Certification Authority Authorization
Things are certainly heating up at the CA/Browser with exciting proposals surrounding inclusion of the Wi-Fi Alliance (WFA) as a subjectAltName otherName, new validation methods, and debates over how the CAB Forum will continue operating.
Leia maisMy journey from fleeing Iran to making the internet safer
Her path to being the chief strategy officer of internet security firm RSA started when she travelled on her own to the US at 11-years-old.
Leia maisTim Berners-Lee: I invented the web. Here are three things we need to change to save it
Artigos em outros idiomas são publicados em International News | Articles in other languages are published in the International News .
Leia maisProvide Secure Identites, Reduce Costs, Increase Revenue – By Laila Robak
Electronic frauds represent a billion dollar loss in the Americas regions, especially frauds targeting financial systems, banks, payments, mobile and web applications.
Leia maisHow to Secure Bitcoin Exchanges
Artigos em outros idiomas são publicados em International News | Articles in other languages are published in the International News
Leia mais