Buscar
2 de jun. de 20172 min de leitura
Fireball: vírus infecta mais 250 milhões e transforma PC em zumbi
Malware transforma afeta navegadores mas pode roubar dados sensíveis de usuários Um novo tipo de vírus descoberto pela CheckPoint pode...
31 de mai. de 20172 min de leitura
US Defense Contractor left Sensitive Files on Amazon Server Without Password
Sensitive files linked to the United States intelligence agency were reportedly left on a public Amazon server by one of the nation's top...
28 de mai. de 20172 min de leitura
VLC WARNING - How HACKERS can take control of your computer, phone with THIS feature
THOSE who use the VLC media player might be at risk from cybercriminals – thanks to a new allowing cybercriminals access to your device...
28 de mai. de 20174 min de leitura
Hackers Hide Cyberattacks in Social Media Posts
It took only one attempt for Russian hackers to make their way into the computer of a Pentagon official. But the attack didn’t come...
28 de mai. de 20175 min de leitura
Hackers de-activating WannaCry ransomware kill switch - Prepare for a new attack now!
On Friday, May 12, the largest ransomware attack ever recorded began breaking headlines. What started with one unwitting computer user in...
28 de mai. de 20171 min de leitura
2016: The Year of the Mega Breach
“Excuse me, are you aware of what’s happening right now? We’re facing 20 billion security events every day. DDoS campaigns, ransomware,...
24 de mai. de 20173 min de leitura
Samsung Says It's Serious About Foundry, Creates Business Unit
Samsung Electronics Co., the world’s second-biggest chipmaker, is increasing its effort in semiconductor outsourcing, separating the...
19 de mai. de 20173 min de leitura
Android Security Bulletin Tackles Additional Critical Mediaserver Issues
Google released their security bulletin for May, which once again tackles Critical vulnerabilities in Android’s Mediaserver component, a...
8 de fev. de 20176 min de leitura
De IDM a IAM - Projetos de Sucesso
Neste artigo espero conseguir contar um pouco da história de como IDM (identity Management) tornou-se IAM (Identity And Access...
28 de jul. de 20163 min de leitura
Hacker ? O que é ? Quem são ?
Sempre que vejo e leio estas matérias sobre os chamados hackers, fico incomodado com essa palavra, "hackers".. Eles são tão temidos assim...