Notícias, Pontas, Laboratório de segurança

Weak block cipher

Weak Block Cipher in Microsoft Office 365 Leads to Message Content Disclosure

ComSeguro (anteriormente F-Secure Business) pesquisadores afirmam que o conteúdo das mensagens criptografadas enviadas pelo Microsoft Office 365 can be partially

Spyware vs. Stalkerware: What’s the difference?

Os fraudadores desenvolvem vários métodos para penetrar na propriedade de terceiros, então existem diferentes tipos de ataques e ameaças. Em…

Police Swindle Decryption Keys from DeadBolt Ransomware Gang

A Polícia Nacional Holandesa, junto com especialistas em segurança da informação da RespondersNU, tricked the operators of the DeadBolt encryptor into giving

What is Torrenting? Is it illegal or Safe? How Does it Work

Um torrent é uma ferramenta para troca gratuita de dados na Internet. No entanto, it is considered a symbol of piracy

Russian DDOSIA Project Pays Volunteers to Participate in DDOS Attacks on Western Companies

Especialistas da Radware descobriram o projeto DDoS de crowdsourcing DDOSIA, in which a Russian-speaking hack group pays volunteers for participation in attacks

New Times, New Threats: Adware.Amonetize investigation

New Times, New Threats: Adware.Amonetize investigation

Ultimamente, nossa equipe enfrentou reclamações sobre o vírus Adware.amonetize. Isto…

USB Drive

USB Drive Security Risks: What You Need To Know

A USB drive may seem like the most convenient medium

Top 4 tips to speed up a slow PC

Top 4 tips to speed up a slow PC

Bem, you probably can recall that sweet feeling of owning

Why are "free" browser extensions not actually a good deal?

Why are “free” browser extensions not actually a good deal?

A plug-in required to improve the functionality of any web

Adware Everywhere: Who Knows What Is Happening?

Adware Everywhere: Who Knows What Is Happening?

Perhaps you’ve heard the familiar whirlwind that no harm can

How Teens Tricking Their Parents With The Help of Their Electronic Devices

How Teens Tricking Their Parents With The Help of Their Electronic Devices

We all know that the internet has become a major

How to prepare your kids for school? - Secure ours Kids!

How to prepare your kids for school? – Secure ours Kids!

It is not a secret that our children do not

Cybersecurity Myths

15 Cybersecurity Myths and Denials

There are a lot of cybersecurity myths, just like about

6 Terrifying Samples How Marketers Use Adware

6 Terrifying Samples How Marketers Use Adware

While Spyware and Adware are arguably the fastest growing malicious

Why You Should Not Clean Your PC Yourself

Why You Should Not Clean Your PC Yourself

Você está enfrentando um PC lento? One that you

Advertising-free Internet, how much better it would be - No ads

Advertising-free Internet, how much better it would be! – No ads!

Nos primeiros dias da Internet, web pages used

Signs that your Computer is Infected

Signs that your Computer is Infected

The usual question many computer users ask is “what are