Últimas notícias

e-skin: Uma capa eletrônica vestível pode monitorar sua saúde

A tecnologia foi desenvolvida por Takao Someya, professor da Escola de Graduação em Engenharia da Universidade de Tóquio.

23 de abril de 2021

Entrevista com Oscar Zuccarelli da Certisign sobre segurança cibernética

Oscar Zuccarelli, Gerente de Segurança da Informação, Proteção de Dados e Prevenção a Fraudes da Certisign.

22 de abril de 2021

Acelerando a Virtualização: 3 dicas para o sucesso

A expectativa é que a virtualização se torne um mercado global de US$ 95 bilhões até 2023 em uma época que reina o “acesso a qualquer hora, em qualquer lugar e de qualquer dispositivo”.

22 de abril de 2021

Simples Nacional adota Pix e facilita o dia a dia de mais de 16 milhões de contribuintes

Serpro implementa melhorias no sistema para facilitar a quitação do Documento de Arrecadação do Simples Nacional pelo novo meio de pagamento eletrônico

22 de abril de 2021

7 ações-chave para executivos de risco orientados a dados

Consultor da Russell Reynolds Associates alerta para as armadilhas na gestão de dados e análises dos CRO

22 de abril de 2021

International News

Poppy Gustafsson: the Darktrace tycoon in new cybersecurity era

Poppy Gustafsson runs a cutting-edge and gender-diverse cybersecurity firm on the brink of a £3bn stock market debut,

Leia mais

New NAME:WRECK Vulnerabilities Impact Nearly 100 Million IoT Devices

Security researchers have uncovered nine vulnerabilities affecting four TCP/IP stacks impacting more than 100 million consumer and enterprise devices

Leia mais

‘Blockchain computing’ plan in the works in China’s Yunnan province

Government officials from the Chinese Yunnan province released a plan to support the region’s blockchain industry’s development

Leia mais

Socure to Provide Identity Verification for Microsoft Azure Active Directory Verifiable Credentials

The result is an ecosystem for issuing standards-based digitally verifiable credentials, stored within an encrypted digital hub and accessed via an individual’s digital wallet.

Leia mais

What Is a Cybersecurity Legal Practice?

Recent surveys by the Association of Corporate Counsel (ACC) consistently reveal that one of the top concerns for general counsel at private companies is cybersecurity

Leia mais

DNS over HTTPS, DNS over TLS explained: Encrypting DNS traffic

Protocols like DNS over HTTPS (DoH) or DNS over TLS (DoT) provide end-to-end encryption, therefore guaranteeing data confidentiality.

Leia mais

Tesla Ransomware Hacker Pleads Guilty; Swiss Hacktivist Charged for Fraud

The U.S. Department of Justice yesterday announced updates on two separate cases involving cyberattacks—a Swiss hacktivist and a Russian hacker who planned to plant malware in the Tesla company

Leia mais

Can anyone become an NFT collector? I tried it to find out

This year non-fungible tokens burst into the mainstream after several digital images and animations sold for absurd amounts – so I entered the world of NFT s myself

Leia mais

Fingerprint technique could help prevent banknote fraud

Researchers at the University of Warwick have developed a technique that identifies every banknote’s ‘unique and unclonable’ fingerprint, which could help prevent the increasing exchange of counterfeit banknotes

Leia mais

New Mirai Variant and ZHtrap Botnet Malware Emerge in the Wild

Cybersecurity researchers on Monday disclosed a new wave of ongoing attacks exploiting multiple vulnerabilities to deploy Mirai variants on compromised systems

Leia mais

Security startup Verkada hack exposes 150,000 security cameras in Tesla factories, jails, and more

Verkada, a Silicon Valley security startup that provides cloud-based security camera services, has suffered a major security breach

Leia mais

Startup: Only Quantum Cryptography Can Save The $100 Trillion Global Digital Economy

Nations and startups around the world are investing hundreds of billion of dollars in quantum computing, says quantum security startup CEO James Nguyen

Leia mais

Dark Web Analysis: Healthcare Risks Tied to Database Leaks, Credentials

CybelAngel shows just how hackers are successfully cracking into healthcare networks: credential stuffing, vulnerable, connected devices, and databases left wide open to attackers

Leia mais

Everything You Need to Know About Evolving Threat of Ransomware

The cybersecurity world is constantly evolving to new forms of threats and vulnerabilities. But ransomware proves to be a different animal

Leia mais

First Malware Designed for Apple M1 Chip Discovered in the Wild

One of the first malware samples tailored to run natively on Apple’s M1 chips has been discovered

Leia mais

Largest compilation of emails and passwords leaked for free on public forum

More than 3.2 billion unique pairs of cleartext emails and passwords have just been leaked on a popular hacking forum, aggregating past leaks from Netflix, LinkedIn, Exploit.in, Bitcoin and more.

Leia mais

Hackers leverage sophisticated and novel techniques to break into networks

There have definitely been many cyberattacks, risks, and threats in 2020. Would you say that the scale of attacks was unprecedented?

Leia mais

What is quantum computing and how will it affect your organization?

So what will happen when the first quantum computers enter the market? What are the opportunities and threats?

Leia mais