Últimas notícias

Gartner prevê que gastos mundiais de usuários finais com Nuvem Pública irão ultrapassar US$ 675 bilhões em 2024 

Gartner prevê crescimento anual que deve superar 20%, impulsionado por aplicativos habilitados para Inteligência Artificial Generativa

6 de junho de 2024

Bombardeio MFA: Nova Técnica de Phishing Mirando Usuários de Dispositivos Apple

Os especialistas da Norton, uma marca de cibersegurança para o consumidor da Gen™ (NASDAQ: GEN), alertam sobre uma nova modalidade conhecida como “bombardeio MFA” ou “push bombing,

6 de junho de 2024

Everymind e Salesforce abrem inscrições para evento de RGM para mercado de varejo e consumo

A Salesforce e a Everymind promovem o evento exclusivo “RGM em Foco: Conectando a Estratégia com o Campo” no dia 2 de julho em São Paulo.

6 de junho de 2024

CoopsParty 2024 é oportunidade para desmitificar a inovação e aproximar jovens do cooperativismo

O CoopsParty, pela primeira vez em Goiás, 18 e 19 de novembro, já pode ser considerado o maior evento de inovação do cooperativismo brasileiro

6 de junho de 2024

International News

The Real Cost Of Ransomware And How We Stop Paying It

Ransomware attacks are never far from the headlines and the impact of a successful hit can be devastating.

Leia mais

How To Encrypt Your Internet Traffic 2020 Guide

There are numerous reasons why a user would want to encrypt their internet traffic, keep up

Leia mais

Death & Digital Identities

In the not so distant future, Jane Doe has several virtual selves, a digital medical twin,

Leia mais

How Healthcare Organizations Forecast Demand, ICU Capacity, And A Second Wave Of Coronavirus

Even before the COVID-19 pandemic hit, healthcare systems were starting to leverage the power of predictive analytics to better anticipate and administer care.

Leia mais

HTTP Status Codes Command This Malware How to Control Hacked Systems

A new version of COMpfun remote access trojan (RAT) has been discovered in the wild that uses HTTP status codes to control compromised systems targeted in a recent campaign against diplomatic entities in Europe

Leia mais

Blockchain and Decentralized Identity: How Transparency Can Improve Identity Verification for Banks

When re-framing decentralized identity problem from one that banks must solve individually, to one that banks can solve collectively.

Leia mais

Zoom 5.0 is Released with Robust Security Enhancements Include Support for AES 256-Bit GCM Encryption

By adding support for AES 256-bit GCM encryption, Zoom will provide increased protection for meeting data and resistance against tampering.

Leia mais

Why Businesses Need an SDP during the Coronavirus Crisis

With over two million Coronavirus cases and counting, the pandemic doesn’t seem to be slowing down anytime soon, and SDP becomes a necessity.

Leia mais

14 Tech Pros Predict The ‘Next Big Thing’ In Cybersecurity And Encryption

Cybersecurity is a constant arms race. Because of its continuous evolution, what firms have solved for today might be obsolete by tomorrow.

Leia mais

A ‘Perfect Storm’ Is Brewing For The Bitcoin Price

The Bitcoin price is known to be extremely volatile over the short term, but the past couple of months have been a particularly wild ride.

Leia mais

The Dilemma: Should you phish test during the COVID-19 pandemic?

Because we’ve entered a ‘new normal’ you should let your user know that cybercriminals are having a heyday with COVID-19, read more here.

Leia mais

Top 5 cybersecurity recommendations amid the COVID-19 pandemic

Industries have seen a sharp rise in cyberattacks even as the COVID-19 pandemic continues, including cyberattacks focused on health care using spear-phishing and ransomware …

Leia mais

Perilous peripherals: the hidden dangers inside windows & linux computers

In new research, Eclypsium found unsigned firmware in WiFi adapters, USB hubs, trackpads, and cameras used in computers from Lenovo, Dell, HP and other major manufacturers.

Leia mais

141 Cybersecurity Predictions For 2020

Entrepreneur Shlomo Kramer said that cybersecurity is “like Alice in Wonderland”,you run as fast as you can only to stay in place.

Leia mais

The Complete Guide to Domain Names: What Are They and How Do They Work

To know how internet works on a functional level, you don’t need that much and a good place to start is understanding domain names.

Leia mais

Exploiting the Windows CryptoAPI Certificate Vulnerability

The NSA announced they had found a vulnerability in the certificate validation functionality on Windows 10 and Windows Server 2016/2019.

Leia mais

A (relatively easy to understand) primer on elliptic curve cryptography Cloudflar

That elliptic curve cryptography is a set of algorithms for encrypting and decrypting data and exchanging cryptographic keys.

Leia mais