Manchetes
-
TLS e SSL
SSL | MITOS E REALIDADE
-
Destaques
American Express lança anúncio vintage para promover Apple Pay
-
Destaques
Symantec has a found a spying tool active on computers around the world
-
Notícias
The Cost of Creating Collisions Using SHA-1
-
International News
Download at your own risk: Bitcoin mine
Últimas notícias
Gartner prevê que gastos mundiais de usuários finais com Nuvem Pública irão ultrapassar US$ 675 bilhões em 2024
Gartner prevê crescimento anual que deve superar 20%, impulsionado por aplicativos habilitados para Inteligência Artificial Generativa
6 de junho de 2024Bombardeio MFA: Nova Técnica de Phishing Mirando Usuários de Dispositivos Apple
Os especialistas da Norton, uma marca de cibersegurança para o consumidor da Gen™ (NASDAQ: GEN), alertam sobre uma nova modalidade conhecida como “bombardeio MFA” ou “push bombing,
6 de junho de 2024Everymind e Salesforce abrem inscrições para evento de RGM para mercado de varejo e consumo
A Salesforce e a Everymind promovem o evento exclusivo “RGM em Foco: Conectando a Estratégia com o Campo” no dia 2 de julho em São Paulo.
6 de junho de 2024CoopsParty 2024 é oportunidade para desmitificar a inovação e aproximar jovens do cooperativismo
O CoopsParty, pela primeira vez em Goiás, 18 e 19 de novembro, já pode ser considerado o maior evento de inovação do cooperativismo brasileiro
6 de junho de 20243C Gaming anuncia Renato Paiva como novo Vice-Presidente de Operações
Empresário chega para nova fase de expansão da empresa com
5 de junho de 2024International News
Putin Warns Russian Critical Infrastructure to Brace for Potential Cyber Attacks
The Russian government on Thursday warned of cyberattacks targeting domestic operators of critical infrastructure
Leia maisAnother Israeli Firm, QuaDream, Caught Weaponizing iPhone Bug for Spyware
QuaDream’s spyware, named REIGN, functions in a manner similar to NSO Group’s Pegasus, granting its users full control of the device
Leia maisNSA’s cybersecurity directorate looks to scale up this year
Crypto ID publishes international articles about information security, digital transformation, cyber security, encryption and related topics.
Leia maisHow to build a security strategy for critical infrastructures
End-to-end protection of a critical infrastructure must be based on three pillars: people, processes, and technology
Leia maisThe metaverse is money and crypto is king – why you’ll be on a blockchain when you’re virtual-world hopping
Web 3.0 will be the foundation for the metaverse. It will consist of applications that support an economy of crypto assets and data
Leia maisShould you use Let’s Encrypt for internal hostnames?
It means your employees aren’t constantly fighting browser warnings when trying to submit stuff internally, all your http traffic is encrypted
Leia maisPerformance and Innovation Are the Rewards of Digital Transformation
Beyond the critical question of how to deliver a successful digital transformation, there are three other questions we hear a lot
Leia maisHow does Log4Shell works and what steps do you need to take?
Crypto ID publishes international articles about information security, digital transformation, cyber security, encryption and related topics.
Leia maisCloudflare blocks an almost 2 Tbps multi-vector DDoS attack
Earlier this week, Cloudflare automatically detected and mitigated a DDoS attack that peaked just below 2 Tbps —
Leia maisMastercard Introduces Accessible Card for Blind and Partially Sighted People
Unique notches on the Touch Card’s short side allow the person to distinguish it between a
Leia maisCriptografia da startup Tide propõe acabar com a pandemia de violação cibernética
A Tide Foundation, uma startup de cinco pessoas sediada em Sydney que compete no TechCrunch Disrupt Startup Battlefield esta semana.
Leia maisScaling digital transformation digital identity in Brazil
“There is no efficient government without digital government. There is no digital government without interoperability. And there is no interoperability without privacy.”– Luis Felipe Monteiro
Leia maisMobile Payment Security Trends and Opportunities
With these new solutions and the development of new payment technologies, new security challenges and opportunities have emerged as well
Leia maisResearchers Warn of 4 Emerging Ransomware Groups That Can Cause Havoc
The development comes as ransomware attacks are getting bigger and more frequent, growing in size and severity
Leia maisHow does digital authentication work? And how can you implement it securely in your organisation?
More recently, attention has shifted to which technical components can contribute to a better overall solution to increase digital resilience
Leia maisImplementing Encryption Feature in pdf-lib
After half a day of searching, I realize that not many libraries support modifying existing PDF files, let alone encryption features
Leia maisHackers Exploiting New Auth Bypass Bug Affecting Millions of Arcadyan Routers
Successful exploitation of the could enable an attacker to circumvent authentication barriers and potentially
Leia maisDon’t pay that Ransom!
Ransomware is just another type of threat. Dealing with threats is not something new to IT
Leia mais