Latest news

deepfake phishing
Phishing

Deepfake Phishing explained and how you can protect yourself

Gone are the days when a video or a voice message could help you guess whether a request was real or fraudulent. Nowadays, cybercriminals can create ultra-realistic phishing scams using deepfake techniques. But first… do you know what each of these terms means? What is phishing, what is deepfake, and, most importantly, what is deepfake […]

Read article
antivirus
Cybersecurity

Antivirus: how it works and how important it is

Are antivirus programs still necessary for digital security? How do these programs really work and what’s the best way to use them? Are you curious to know the answers? Then check out this article. What are antiviruses? Antivirus software is designed to detect, block, and eliminate malicious programs – like malware – that can compromise […]

Read article
Artificial intelligence AI cybercrime
Cybersecurity

How artificial intelligence (AI) may boost cybercrime

Artificial intelligence (AI) is not only a program trying to behave like a human being. The “intelligence” created from “machine learning” and deep learning is capable of doing good things that would be too complex for a human being, but they also fail disastrously – and even amusingly – in certain other areas. That’s why […]

Read article
age of deepfakes
Cybersecurity

In the age of deepfakes, not every picture is worth a thousand words

Although the term fake news is sometimes used to describe any news that is biased or has factual errors, we must remember that the production and propagation of lies on the Internet can be very lucrative. Unlike inaccuracies in the news, which often occur due to journalistic carelessness, the information spread by fake news is […]

Read article
Juice Jacking
Scams

Juice Jacking: the dangers behind public USB ports

Modern convenience means it’s very common to find USB ports or charging totems in public transport, airports, hotels, and even festivals or amusement parks. But are they safe? In this article, we’ll take a look at Juice Jacking, how it works, its risks, and how to protect yourself. Have you ever heard of Juice Jacking? Juice […]

Read article
How can corporate files be shared securely
Awareness

How can corporate files be shared securely?

How many files do you share in a day’s work? It’s hard to pinpoint an exact number, but most professionals these days would probably say “a lot.” Budgets, proposals, content, contracts, customer and employee data, team reports… the list is endless. File sharing is an important aspect of efficient collaboration between teams. But, due to […]

Read article
critical infrastructure
Cybersecurity

Cybersecurity: why it matters in critical infrastructure

In decades past, before the turn of the millennium, folks believed that “critical” services for society should not be connected to the Internet. However, this thought process has not withstood the technological advances of recent years and the Internet itself is now a critical infrastructure on which many companies and services depend daily. Considering today’s […]

Read article
cybersecurity healthcare ()
Cybersecurity

Cybersecurity in healthcare: a challenge for data sharing

Information technology can transform many processes and is being used more regularly to improve agility and effectiveness. So it’s no surprise that technology is also playing an increasingly important role in the healthcare sector, such as when registering patient data in medical records and electronic reports. More recently, there has been a demand for “data […]

Read article
Imagens blog
Cybersecurity

Why does cybersecurity need to be a priority for CFOs?

Cybersecurity is a key concern for 75% of CFOs (Outthink, 2023). The reason is obvious: digital attacks cause huge losses for companies of all sizes and industries. The global costs of cybercrime to organizations around the world are expected to reach an annual average of US$10.5 trillion by 2025 (Cybersecurity Ventures, 2022). Real-life examples of […]

Read article
newsletter

Receba as
novidades em
seu email

    Mission accomplished!

    You'll receive new cybersecurity updates in your inbox weekly.

    Follow us on our social media:

    Instagram: @hackerrangers2
    LinkedIn: linkedin.com/company/hacker-rangers22