{"id":2101,"date":"2025-12-09T17:23:42","date_gmt":"2025-12-09T20:23:42","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2101"},"modified":"2025-12-09T17:23:42","modified_gmt":"2025-12-09T20:23:42","slug":"caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/","title":{"rendered":"Spoofing de chamada: o que \u00e9 e como voc\u00ea pode se proteger?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Imagine a seguinte situa\u00e7\u00e3o. Voc\u00ea recebe uma liga\u00e7\u00e3o em que apare\u00e7a exatamente o n\u00famero de contato do seu banco na tela. Parece leg\u00edtima, n\u00e9? Ent\u00e3o, voc\u00ea atende.\u00a0<\/span><span style=\"font-weight: 400;\">Um funcion\u00e1rio com o tom calmo come\u00e7a a explicar que existe um problema de seguran\u00e7a na conta e que ele precisa que voc\u00ea forne\u00e7a a senha de acesso para que ele possa impedir um incidente grave.\u00a0<\/span><span style=\"font-weight: 400;\">Ent\u00e3o, acreditando estar falando com um funcion\u00e1rio real, voc\u00ea fornece a informa\u00e7\u00e3o solicitada. Pronto, ele acabou de te enganar com um spoofing de chamada.<\/span><\/p>\n<h2><b>O que \u00e9 e como funciona?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">O spoofing de chamada nada mais \u00e9 do que uma t\u00e9cnica usada por cibercriminosos para falsificar o n\u00famero de telefone de uma liga\u00e7\u00e3o. Basicamente, eles conseguem esconder o n\u00famero de telefone real usado para efetuar a chamada, sobrepondo-o com um n\u00famero de telefone leg\u00edtimo, id\u00eantico ao da institui\u00e7\u00e3o personificada.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Existem diferentes t\u00e9cnicas que podem ser usadas pelos cibercriminosos para aplicar o golpe de spoofing de chamadas. A principal delas inclui o uso de softwares leg\u00edtimos que ajudam a disfar\u00e7ar a origem de certas chamadas. \u00c9 o caso dos servi\u00e7os de VoIP (voz sobre IP), por exemplo, que conseguem efetuar chamadas telef\u00f4nicas pela Internet em vez de usar redes telef\u00f4nicas tradicionais. Utilizando o VoIP, \u00e9 poss\u00edvel decidir e configurar o n\u00famero de sa\u00edda exibido durante as liga\u00e7\u00f5es. \u00c9 por isso que, na sua tela, tudo o que voc\u00ea enxerga \u00e9 um n\u00famero real.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Assim, usando um n\u00famero leg\u00edtimo, os criminosos se passam por institui\u00e7\u00f5es financeiras, \u00f3rg\u00e3os governamentais, empresas leg\u00edtimas e at\u00e9 mesmo amigou ou familiares da v\u00edtima. Como muitas pessoas n\u00e3o atendem chamadas de n\u00fameros desconhecidos, os criminosos usam essa estrat\u00e9gia para contornar esse h\u00e1bito e ter mais sucesso na aplica\u00e7\u00e3o do golpe.<\/span><b><\/b><b><br \/>\n<\/b><b><\/b><\/p>\n<h2><b>Como se proteger?<\/b><\/h2>\n<h3><b>Desconfie de contatos suspeitos e inesperados:<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">A<\/span><span style=\"font-weight: 400;\">principal t\u00e9cnica usada por cibercriminosos que aplicam golpes de spoofing \u00e9 a engenharia social. Quando receber uma liga\u00e7\u00e3o na qual o interlocutor tenta, de todos os modos, te convencer a tomar alguma a\u00e7\u00e3o suspeita, como fornecer ou confirmar alguma informa\u00e7\u00e3o confidencial, desconfie.<\/span><\/p>\n<h3><b>Nunca forne\u00e7a informa\u00e7\u00f5es pessoais ou financeiras:<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Nunca forne\u00e7a informa\u00e7\u00f5es pessoais ou financeiras por telefone, especialmente se o contato foi iniciado por outra pessoa e n\u00e3o por voc\u00ea. N\u00famero de RG, CPF, endere\u00e7o, senhas\u2026 nenhuma dessas informa\u00e7\u00f5es deve ser passada em uma liga\u00e7\u00e3o.<\/span><\/p>\n<h3><b>Desligue a chamada e ligue para o n\u00famero de telefone oficial:<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Quando receber uma liga\u00e7\u00e3o em que a pessoa do outro lado da linha alega ser um representante oficial de um banco, loja ou qualquer outra institui\u00e7\u00e3o, pedindo que voc\u00ea forne\u00e7a certa informa\u00e7\u00e3o, prefira desligar a chamada e ligar voc\u00ea mesmo para o n\u00famero de telefone oficial da entidade quest\u00e3o. No entanto, espere alguns minutos antes de fazer essa liga\u00e7\u00e3o. Alguns criminosos conseguem \u201csegurar\u201d a chamada por alguns minutos mesmo ap\u00f3s o enceramento da liga\u00e7\u00e3o. Dessa forma, se voc\u00ea tentar ligar imediatamente depois, pode ser que quem te atenda seja o mesmo criminoso.<\/span><\/p>\n<h2><b>Fui v\u00edtima! E agora?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Se voc\u00ea suspeitar que foi v\u00edtima de spoofing de chamadas, existem algumas a\u00e7\u00f5es que devem ser tomadas. Confira:<\/span><\/p>\n<h3><b>Informe a empresa ou organiza\u00e7\u00e3o sendo falsificada:<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Entre em contato com a entidade personificada para relatar o incidente. Dessa forma, a institui\u00e7\u00e3o poder\u00e1 tomar medidas para alertar outros clientes e ajudar a impedir futuros ataques de spoofing de chamadas.<\/span><\/p>\n<h3><b>Relate o ocorrido \u00e0s autoridades:<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Se voc\u00ea sofreu uma perda financeira como resultado do spoofing de chamadas, informe o incidente \u00e0s autoridades policiais, como delegacias especializadas em golpes eletr\u00f4nicos. Eles podem investigar o incidente e tentar rastrear os criminosos.<\/span><\/p>\n<h3><b>Atualize suas senhas:<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Se voc\u00ea forneceu senhas ou outras informa\u00e7\u00f5es confidenciais durante a chamada, altere-as imediatamente. Certifique-se de usar senhas fortes e \u00fanicas para cada conta.<\/span><\/p>\n<h2><b>Outras boas pr\u00e1ticas<\/b><b><br \/>\n<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Por mais que o spoofing de chamada use n\u00fameros conhecidos, \u00e9 preciso ter cuidado, tamb\u00e9m, com n\u00fameros desconhecidos. Afinal, assim como em golpes de phishing, muitos golpistas aplicam fraudes em massa com n\u00fameros aleat\u00f3rios, sem se importar em faz\u00ea-los parecer verdadeiros.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por fim, \u00e9 importante que voc\u00ea tenha cuidado para que o seu n\u00famero de telefone n\u00e3o seja usado em golpes de spoofing. Lembre-se que o seu n\u00famero de telefone tamb\u00e9m \u00e9 uma informa\u00e7\u00e3o pessoal e n\u00e3o deve ser compartilhado com qualquer pessoa ou publicado em qualquer lugar. Forne\u00e7a o n\u00famero de telefone em cadastros apenas quando necess\u00e1rio e <a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/5-security-settings-for-social-networks\/\">n\u00e3o o deixe vis\u00edvel nas suas redes sociais<\/a>.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Imagine the following situation. You receive a call from a contact number on the screen that appears exactly the same as your bank\u2019s telephone number. Everything should be just fine, right? So you answer.\u00a0An employee calmly explains that there is a security problem with your account and that your password is required to prevent a [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2103,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[23],"tags":[106,90,64,83,107],"class_list":["post-2101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-caller-id-spoofing","tag-cybercrime","tag-cybersecurity","tag-scams","tag-spoofing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Caller ID Spoofing: What is it and how can you protect yourself? | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn how caller ID spoofing works and discover essential tips to avoid scams where criminals fake trusted phone numbers to steal your data.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Caller ID Spoofing: What is it and how can you protect yourself? | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn how caller ID spoofing works and discover essential tips to avoid scams where criminals fake trusted phone numbers to steal your data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-09T20:23:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Caller-ID-Spoofing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1500\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Caller ID Spoofing: What is it and how can you protect yourself?\",\"datePublished\":\"2025-12-09T20:23:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/\"},\"wordCount\":725,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Caller-ID-Spoofing.png\",\"keywords\":[\"caller ID spoofing\",\"cybercrime\",\"cybersecurity\",\"scams\",\"spoofing\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/\",\"name\":\"Caller ID Spoofing: What is it and how can you protect yourself? | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Caller-ID-Spoofing.png\",\"datePublished\":\"2025-12-09T20:23:42+00:00\",\"description\":\"Learn how caller ID spoofing works and discover essential tips to avoid scams where criminals fake trusted phone numbers to steal your data.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Caller-ID-Spoofing.png\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Caller-ID-Spoofing.png\",\"width\":1500,\"height\":1000,\"caption\":\"Caller ID Spoofing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Caller ID Spoofing: What is it and how can you protect yourself?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Caller ID Spoofing: What is it and how can you protect yourself? | Hacker Rangers","description":"Learn how caller ID spoofing works and discover essential tips to avoid scams where criminals fake trusted phone numbers to steal your data.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Caller ID Spoofing: What is it and how can you protect yourself? | Hacker Rangers","og_description":"Learn how caller ID spoofing works and discover essential tips to avoid scams where criminals fake trusted phone numbers to steal your data.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-09T20:23:42+00:00","og_image":[{"width":1500,"height":1000,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Caller-ID-Spoofing.png","type":"image\/png"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Caller ID Spoofing: What is it and how can you protect yourself?","datePublished":"2025-12-09T20:23:42+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/"},"wordCount":725,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Caller-ID-Spoofing.png","keywords":["caller ID spoofing","cybercrime","cybersecurity","scams","spoofing"],"articleSection":["Cybersecurity"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/","url":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/","name":"Caller ID Spoofing: What is it and how can you protect yourself? | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Caller-ID-Spoofing.png","datePublished":"2025-12-09T20:23:42+00:00","description":"Learn how caller ID spoofing works and discover essential tips to avoid scams where criminals fake trusted phone numbers to steal your data.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Caller-ID-Spoofing.png","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Caller-ID-Spoofing.png","width":1500,"height":1000,"caption":"Caller ID Spoofing"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/cybersecurity\/caller-id-spoofing-what-is-it-and-how-can-you-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Caller ID Spoofing: What is it and how can you protect yourself?"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2101","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2101"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2101\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2103"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}