Últimas notícias

Gartner prevê que gastos mundiais de usuários finais com Nuvem Pública irão ultrapassar US$ 675 bilhões em 2024 

Gartner prevê crescimento anual que deve superar 20%, impulsionado por aplicativos habilitados para Inteligência Artificial Generativa

6 de junho de 2024

Bombardeio MFA: Nova Técnica de Phishing Mirando Usuários de Dispositivos Apple

Os especialistas da Norton, uma marca de cibersegurança para o consumidor da Gen™ (NASDAQ: GEN), alertam sobre uma nova modalidade conhecida como “bombardeio MFA” ou “push bombing,

6 de junho de 2024

Everymind e Salesforce abrem inscrições para evento de RGM para mercado de varejo e consumo

A Salesforce e a Everymind promovem o evento exclusivo “RGM em Foco: Conectando a Estratégia com o Campo” no dia 2 de julho em São Paulo.

6 de junho de 2024

CoopsParty 2024 é oportunidade para desmitificar a inovação e aproximar jovens do cooperativismo

O CoopsParty, pela primeira vez em Goiás, 18 e 19 de novembro, já pode ser considerado o maior evento de inovação do cooperativismo brasileiro

6 de junho de 2024

International News

Putin Warns Russian Critical Infrastructure to Brace for Potential Cyber Attacks

The Russian government on Thursday warned of cyberattacks targeting domestic operators of critical infrastructure

Leia mais

Another Israeli Firm, QuaDream, Caught Weaponizing iPhone Bug for Spyware

QuaDream’s spyware, named REIGN, functions in a manner similar to NSO Group’s Pegasus, granting its users full control of the device

Leia mais

NSA’s cybersecurity directorate looks to scale up this year

Crypto ID publishes international articles about information security, digital transformation, cyber security, encryption and related topics.

Leia mais

How to build a security strategy for critical infrastructures

End-to-end protection of a critical infrastructure must be based on three pillars: people, processes, and technology

Leia mais

The metaverse is money and crypto is king – why you’ll be on a blockchain when you’re virtual-world hopping

Web 3.0 will be the foundation for the metaverse. It will consist of applications that support an economy of crypto assets and data

Leia mais

Should you use Let’s Encrypt for internal hostnames?

It means your employees aren’t constantly fighting browser warnings when trying to submit stuff internally, all your http traffic is encrypted

Leia mais

Performance and Innovation Are the Rewards of Digital Transformation

Beyond the critical question of how to deliver a successful digital transformation, there are three other questions we hear a lot

Leia mais

How does Log4Shell works and what steps do you need to take?

Crypto ID publishes international articles about information security, digital transformation, cyber security, encryption and related topics.

Leia mais

Cloudflare blocks an almost 2 Tbps multi-vector DDoS attack

Earlier this week, Cloudflare automatically detected and mitigated a DDoS attack that peaked just below 2 Tbps —

Leia mais

Mastercard Introduces Accessible Card for Blind and Partially Sighted People

Unique notches on the Touch Card’s short side allow the person to distinguish it between a

Leia mais

Criptografia da startup Tide propõe acabar com a pandemia de violação cibernética

A Tide Foundation, uma startup de cinco pessoas sediada em Sydney que compete no TechCrunch Disrupt Startup Battlefield esta semana.

Leia mais

Scaling digital transformation digital identity in Brazil

“There is no efficient government without digital government. There is no digital government without interoperability. And there is no interoperability without privacy.”– Luis Felipe Monteiro

Leia mais

Mobile Payment Security Trends and Opportunities

With these new solutions and the development of new payment technologies, new security challenges and opportunities have emerged as well

Leia mais

Researchers Warn of 4 Emerging Ransomware Groups That Can Cause Havoc

The development comes as ransomware attacks are getting bigger and more frequent, growing in size and severity

Leia mais

How does digital authentication work? And how can you implement it securely in your organisation?

More recently, attention has shifted to which technical components can contribute to a better overall solution to increase digital resilience

Leia mais

Implementing Encryption Feature in pdf-lib

After half a day of searching, I realize that not many libraries support modifying existing PDF files, let alone encryption features

Leia mais

Hackers Exploiting New Auth Bypass Bug Affecting Millions of Arcadyan Routers

Successful exploitation of the could enable an attacker to circumvent authentication barriers and potentially

Leia mais

Don’t pay that Ransom!

Ransomware is just another type of threat. Dealing with threats is not something new to IT

Leia mais