Latest news

scam
Awareness

Life after a scam: what actions can be taken after falling victim to online fraud?

Unfortunately, falling victim to an online scam is an increasingly common reality nowadays. Scammers take advantage of people’s vulnerabilities to obtain personal and financial information.  If you or someone close to you has been a victim of cybercrime, our deepest sympathies. We are fully aware of just how frustrating this can be. On top of […]

Read article
encrypt files
Cybersecurity

Hands-on! How to easily encrypt files and devices

Now that you’ve learned what cryptography is and understand its importance in keeping sensitive information and data safe, it’s quite normal for questions to pop up: after all, what can I do to incorporate this expertise effectively and actively into my daily routine? Sure, cryptography is already “silently” present in many aspects of our daily […]

Read article
information security risk management
Awareness

The importance of information security risk management

Investing in an information security risk management policy is a fundamental strategy to guarantee corporate security. The information stored by a company’s systems is valuable. It may include confidential data about customers, employees, finances, intellectual property, business strategies, and much more.  If this information falls into the wrong hands, the problems can be enormous: financial […]

Read article
Cryptography
Cybersecurity

Cryptography: the history, what it is, and how to use it

What is the first thing you think of when you hear or read the word “cryptography”? Those somewhat unfamiliar with the concept certainly imagine something extremely complex and technological, employing almost incomprehensible mathematical calculations to make life online safer. What few people know is that this craft is much older than cybersecurity – in fact, […]

Read article
C level
Awareness

C-levels: why they should support an awareness program

In the age of technology, security awareness programs are fundamental within any company and in any industry. After all, they propose training to reduce the likelihood of security incidents caused by human error by teaching best practices when it comes to using the Internet, electronic devices, and handling information.  It’s thus a little surprising that […]

Read article
disposing of information
Awareness

How to safely dispose of personal information in your daily routine

A constant topic on the cybersecurity awareness agenda is the care required when disposing of information in the professional environment. After all, companies are common targets for so-called “dumpster diving,” the criminal act of rummaging through other people’s trash in search of sensitive data and corporate secrets. But did you know that it is important […]

Read article
HTTPS
Cybersecurity

HTTPS: Why this alone doesn’t represent enough security

It may seem hard to believe, but there was a time when it was easy to identify whether you were on a secure website or not: all you had to do was check your browser’s address bar for the iconic green padlock, a visual representation that the page was protected by Hyper Text Transfer Protocol […]

Read article
Ransomware
Cybersecurity

Ransomware: How you can help protect your company

Imagine one day you lose access to the critical information required to do your job. Without it, it is impossible to continue, right? This is exactly the position a ransomware attack puts you in when infecting your computer.  Ransomware is a type of malware that hijacks all the data stored on the device once it’s […]

Read article
Caller ID Spoofing
Cybersecurity

Caller ID Spoofing: What is it and how can you protect yourself?

Imagine the following situation. You receive a call from a contact number on the screen that appears exactly the same as your bank’s telephone number. Everything should be just fine, right? So you answer. An employee calmly explains that there is a security problem with your account and that your password is required to prevent a […]

Read article
newsletter

Receba as
novidades em
seu email

    Mission accomplished!

    You'll receive new cybersecurity updates in your inbox weekly.

    Follow us on our social media:

    Instagram: @hackerrangers2
    LinkedIn: linkedin.com/company/hacker-rangers22