Últimas notícias

Gartner prevê que gastos mundiais de usuários finais com Nuvem Pública irão ultrapassar US$ 675 bilhões em 2024 

Gartner prevê crescimento anual que deve superar 20%, impulsionado por aplicativos habilitados para Inteligência Artificial Generativa

6 de junho de 2024

Bombardeio MFA: Nova Técnica de Phishing Mirando Usuários de Dispositivos Apple

Os especialistas da Norton, uma marca de cibersegurança para o consumidor da Gen™ (NASDAQ: GEN), alertam sobre uma nova modalidade conhecida como “bombardeio MFA” ou “push bombing,

6 de junho de 2024

Everymind e Salesforce abrem inscrições para evento de RGM para mercado de varejo e consumo

A Salesforce e a Everymind promovem o evento exclusivo “RGM em Foco: Conectando a Estratégia com o Campo” no dia 2 de julho em São Paulo.

6 de junho de 2024

CoopsParty 2024 é oportunidade para desmitificar a inovação e aproximar jovens do cooperativismo

O CoopsParty, pela primeira vez em Goiás, 18 e 19 de novembro, já pode ser considerado o maior evento de inovação do cooperativismo brasileiro

6 de junho de 2024

International News

CISCO TrustSec: The Cybersecurity Enforcer

What stands out in many breaches is not that adversaries were able to penetrate the network through a known vulnerability.

Leia mais

Criminal hackers will use GDPR to profit from companies worldwide, warns Cyber Security expert

Criminal hackers will use GDPR to profit from companies worldwide, warns Cyber Security expert.

Leia mais

WikiLeaks: CIA impersonated Kaspersky Labs as a cover for its malware operations

WikiLeaks, under its new Vault 8 series of released documents, has rolled out what it says is the source code to a previously noted CIA tool, called Hive, that is used to help hide espionage actions when the Agency implants malware.

Leia mais

HowMuch Does an SSL Certificate Really Cost

The SSL/TLS Market is growing as companies realize the importance of encryption in cybersecurity best practices.

Leia mais

sciNote to incorporate artificial intelligence into its electronic lab notebook 

Cientistas do mundo todo começarão a usar Inteligência Artificial para escreverem seus artigos científicos.

Leia mais

Key Reinstallation Attacks Breaking WPA2 by forcing nonce reuse

We discovered serious weaknesses in WPA2, a protocol that secures all modern protected Wi-Fi networks. An attacker within range of a victim can exploit these weaknesses using key reinstallation attacks (KRACKs).

Leia mais

Quantum Computing: Real or Exaggerated Threat to the Web PKI?

All of this is secured by digital certificates and encryption, which provide privacy and authentication of information transiting the open Internet (aka Web PKI).

Leia mais

Tempest is a co-author of the – Best Practices in Fraud Prevention – guide for the digital advertising industry

Tempest é co-autor do guia “Melhores Práticas de Prevenção de Fraude” para o setor de publicidade digital

Leia mais

CYBER WAR

The cybernetic sector contemplates the use of technological means destined to the transit of information, even those dedicated to strategic sectors, and to protect them is fundamental for the maintenance of the stability and security of the society, since we live in the information age, in which The dependence on technology increases every day and the risks inherent in the lack of security grow exponentially.

Leia mais

Petya Ransomware Spreading Rapidly Worldwide, Just Like WannaCry

By Swati Khandelwal     Watch out, readers! It is ransomware, another WannaCry, another wide-spread attack. The WannaCry ransomware is not

Leia mais

What’s the Difference Between Advanced and Qualified Signatures in eIDAS?

Regulations such as eIDAS have developed their own eSignature classifications based on trust and assurance. These terms signify the level of assurance provided by different types of signatures as specified by the goals of the regulation.

Leia mais

Symantec Connects 40 Cyber Attacks to CIA Hacking Tools Exposed by Wikileaks

Artigos em outros idiomas são publicados em International News | Articles in other languages are published in the International News

Leia mais

CAB Forum: The Latest on Certification Authority Authorization

Things are certainly heating up at the CA/Browser with exciting proposals surrounding inclusion of the Wi-Fi Alliance (WFA) as a subjectAltName otherName, new validation methods, and debates over how the CAB Forum will continue operating.

Leia mais

My journey from fleeing Iran to making the internet safer

Her path to being the chief strategy officer of internet security firm RSA started when she travelled on her own to the US at 11-years-old.

Leia mais

Tim Berners-Lee: I invented the web. Here are three things we need to change to save it

Artigos em outros idiomas são publicados em International News | Articles in other languages are published in the International News .

Leia mais

Provide Secure Identites, Reduce Costs, Increase Revenue – By Laila Robak

Electronic frauds represent a billion dollar loss in the Americas regions, especially frauds targeting financial systems, banks, payments, mobile and web applications.

Leia mais

How to Secure Bitcoin Exchanges

Artigos em outros idiomas são publicados em International News | Articles in other languages are published in the International News

Leia mais