Latest news

encrypt files
Cybersecurity

Hands-on! How to easily encrypt files and devices

Now that you’ve learned what cryptography is and understand its importance in keeping sensitive information and data safe, it’s quite normal for questions to pop up: after all, what can I do to incorporate this expertise effectively and actively into my daily routine? Sure, cryptography is already “silently” present in many aspects of our daily […]

Read article
Cryptography
Cybersecurity

Cryptography: the history, what it is, and how to use it

What is the first thing you think of when you hear or read the word “cryptography”? Those somewhat unfamiliar with the concept certainly imagine something extremely complex and technological, employing almost incomprehensible mathematical calculations to make life online safer. What few people know is that this craft is much older than cybersecurity – in fact, […]

Read article
HTTPS
Cybersecurity

HTTPS: Why this alone doesn’t represent enough security

It may seem hard to believe, but there was a time when it was easy to identify whether you were on a secure website or not: all you had to do was check your browser’s address bar for the iconic green padlock, a visual representation that the page was protected by Hyper Text Transfer Protocol […]

Read article
Ransomware
Cybersecurity

Ransomware: How you can help protect your company

Imagine one day you lose access to the critical information required to do your job. Without it, it is impossible to continue, right? This is exactly the position a ransomware attack puts you in when infecting your computer.  Ransomware is a type of malware that hijacks all the data stored on the device once it’s […]

Read article
Caller ID Spoofing
Cybersecurity

Caller ID Spoofing: What is it and how can you protect yourself?

Imagine the following situation. You receive a call from a contact number on the screen that appears exactly the same as your bank’s telephone number. Everything should be just fine, right? So you answer. An employee calmly explains that there is a security problem with your account and that your password is required to prevent a […]

Read article
Shadow IT risks and prevention
Cybersecurity

Shadow IT: risks and prevention

Have you ever heard of the term “shadow IT” or “invisible IT”? It refers to the indiscriminate use of devices, applications, and platforms that have not been authorized to be used for professional purposes by the IT department. This is an old problem, but one that is becoming increasingly common and difficult to contain – […]

Read article
blockchain scams and frauds
Cybersecurity

Safe? Maybe not so much! Learn about blockchain scams and frauds

As the pillar that supports everything from the classic Bitcoin to all the latest crypto economy “inventions” (common tokens, non-fungible tokens, and even other cryptocurrencies), blockchain technology has always been seen as a true web revolution. It works like a ledger, facilitating the immutable registration of transactions and asset control in a given business network, […]

Read article
metaverse
Cybersecurity

Metaverse: Experts’ concerns over privacy threats

There’s no denying that the metaverse is one of the most promising technological trends of recent years. Although the concept seems quite complex, the idea of literally being inserted into a fully virtual environment to consume content, collaborate and interact with other people is finally shifting closer toward reality. However, it’s not all roses, and […]

Read article
man in the middle attack
Cybersecurity

Understanding the classic and dangerous man-in-the-middle attack

It’s no news that cybercriminals invent new tricks and tactics daily to attain their sinister objectives: to harm unprotected Internet users by stealing personal data, sensitive documents, and often even money. But this doesn’t mean that old scams no longer work. Certain techniques have existed for over a decade and are still highly efficient and […]

Read article
newsletter

Receba as
novidades em
seu email

    Mission accomplished!

    You'll receive new cybersecurity updates in your inbox weekly.

    Follow us on our social media:

    Instagram: @hackerrangers2
    LinkedIn: linkedin.com/company/hacker-rangers22