{"id":2148,"date":"2025-12-11T13:25:30","date_gmt":"2025-12-11T16:25:30","guid":{"rendered":"https:\/\/hackerrangers.siteup.dev\/?p=2148"},"modified":"2025-12-11T13:25:30","modified_gmt":"2025-12-11T16:25:30","slug":"social-engineering-what-it-is-and-how-to-identify-it","status":"publish","type":"post","link":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/","title":{"rendered":"Engenharia social: o que \u00e9 e como identificar"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Engenharia social \u00e9 uma t\u00e9cnica de manipula\u00e7\u00e3o psicol\u00f3gica usada por criminosos para persuadir as v\u00edtimas a revelar alguma informa\u00e7\u00e3o confidencial ou a executar uma a\u00e7\u00e3o inapropriada.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As t\u00e1ticas de engenharia social s\u00e3o extremamente eficientes porque os criminosos, inclu\u00eddos os cibern\u00e9ticos, sabem que enganar pessoas pode ser muito mais f\u00e1cil do que burlar as barreiras de seguran\u00e7a f\u00edsicas ou computacionais.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">E \u00e9 poss\u00edvel que voc\u00ea j\u00e1 tenha se perguntado: mas por que ca\u00edmos nas mentiras dos criminosos? Bem, as causas s\u00e3o muitas: \u00e0s vezes estamos distra\u00eddos, cansados ou simplesmente n\u00e3o identificamos o risco quando ele aparece.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Mas a verdade \u00e9 que n\u00f3s, seres humanos, temos como caracter\u00edsticas intr\u00ednsecas a empatia, ou seja, o desejo de ser amig\u00e1vel, e a obedi\u00eancia \u00e0 autoridade. E esses s\u00e3o, justamente, os dois fatores mais explorados pelos criminosos para aplicar <a href=\"https:\/\/hackerrangers.siteup.dev\/pt\/scams\/presentes-inesperados-com-qr-codes\/\">golpes de engenharia social<\/a>.\u00a0<\/span><\/p>\n<h2><b>Na pr\u00e1tica<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">No final das contas, o objetivo dos criminosos que usam a engenharia social para enganar as v\u00edtimas \u00e9, quase sempre, conseguir algo em benef\u00edcio pr\u00f3prio: coletar informa\u00e7\u00f5es para cometer fraudes ou atacar sistemas; ganhar dinheiro de forma r\u00e1pida; roubar identidades e assim por diante.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Que tal conhecermos algumas t\u00e9cnicas de engenharia social amplamente empregadas pelos criminosos na pr\u00e1tica?<\/span><\/p>\n<h2><b>Pretexting<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Por meio do pretexting, literalmente, pretexto, o criminoso cria uma hist\u00f3ria fict\u00edcia para manipular a v\u00edtima, for\u00e7ando-a a executar a\u00e7\u00f5es que n\u00e3o executaria sob circunst\u00e2ncias  \u201cnormais\u201d. Geralmente, ele personifica uma pessoa confi\u00e1vel para conseguir com que a v\u00edtima acredite na farsa mais facilmente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Por exemplo, \u00e9 poss\u00edvel que um golpista mande um e-mail para a v\u00edtima se passando pelo suporte da empresa, alegando que um problema de seguran\u00e7a foi identificado no computador e que \u00e9 preciso instalar um novo software de seguran\u00e7a.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Outro cen\u00e1rio \u00e9 aquele em que o criminoso liga para a v\u00edtima fingindo ser um representante de um banco, alegando que uma movimenta\u00e7\u00e3o suspeita foi identificada na conta dela. Ent\u00e3o, \u00e9 preciso que a v\u00edtima forne\u00e7a algumas informa\u00e7\u00f5es pessoais para confirmar se realmente \u00e9 ela quem est\u00e1 usando o cart\u00e3o.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">O pretexting explora, essencialmente, a confian\u00e7a.<\/span><\/p>\n<h2><b>Baiting\u00a0<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">O baiting, literalmente, isca, \u00e9 uma t\u00e9cnica na qual o cibercriminoso elabora uma armadilha para atrair a aten\u00e7\u00e3o da v\u00edtima.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Uma t\u00e9cnica comum \u00e9 deixar USBs infectados com v\u00edrus espalhados em um local com grande circula\u00e7\u00e3o de pessoas, como a cafeteria da empresa ou um escrit\u00f3rio de coworking, esperando que uma v\u00edtima curiosa o conecte ao computador do trabalho, infectando os sistemas com malware.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Essa t\u00e9cnica tamb\u00e9m \u00e9 usada digitalmente quando os cibercriminosos oferecem brindes-surpresa ou descontos exclusivos em mensagens fraudulentas. No final das contas, essas s\u00e3o apenas armadilhas para fisgar as v\u00edtimas.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">O baiting explora, essencialmente, a curiosidade.\u00a0<\/span><\/p>\n<h2><b>Phishing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">O phishing \u00e9 uma fraude na qual os cibercriminosos enviam comunica\u00e7\u00f5es eletr\u00f4nicas fraudulentas \u00e0s v\u00edtimas com o objetivo de que elas executem alguma a\u00e7\u00e3o prejudicial para si mesmas, seja fornecer uma informa\u00e7\u00e3o confidencial, clicar em um anexo malicioso ou transferir dinheiro para o golpista. O phishing geralmente vem acompanhado de t\u00e9cnicas de pretexting e baiting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quando o phishing acontece por e-mail, geralmente o cibercriminoso se passa por uma empresa leg\u00edtima, alegando que h\u00e1 um produto com um desconto incr\u00edvel ou que um problema foi identificado na conta, como um pagamento n\u00e3o realizado ou uma tentativa de invas\u00e3o.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Quando o phishing acontece por mensagens de WhatsApp, o cibercriminoso geralmente personifica um conhecido da v\u00edtima e pede que ela transfira uma certa quantidade de dinheiro para que ele possa resolver um problema urgente.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">O phishing explora, essencialmente, o medo, a gan\u00e2ncia e a empatia.<\/span><\/p>\n<h2><b>Como identificar e evitar golpes de engenharia social<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Infelizmente, qualquer pessoa pode ser alvo de um golpista. No entanto, existem algumas formas de identificar e evitar as manipula\u00e7\u00f5es da engenharia social caso algum criminoso tente aplic\u00e1-las contra voc\u00ea.<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Desconfie de ofertas que parecem boas demais para ser verdade<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Se algu\u00e9m oferecer algo que pare\u00e7a ser um neg\u00f3cio incr\u00edvel, \u00e9 prov\u00e1vel que seja um golpe. Desconfie de investimentos com retornos garantidos e sem riscos e de mensagens que afirmam que voc\u00ea ganhou um pr\u00eamio pelo qual nem estava esperando.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>N\u00e3o compartilhe informa\u00e7\u00f5es confidenciais<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Nunca compartilhe informa\u00e7\u00f5es confidenciais, como senhas, credenciais de acesso, n\u00fameros de cart\u00e3o de cr\u00e9dito, informa\u00e7\u00f5es de conta banc\u00e1ria ou dados pessoais, n\u00e3o importa qu\u00e3o leg\u00edtima ou urgente pare\u00e7a a comunica\u00e7\u00e3o.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Verifique as solicita\u00e7\u00f5es e n\u00e3o confie em remetentes desconhecidos<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Antes de clicar em um link, fazer uma transfer\u00eancia de dinheiro ou compartilhar informa\u00e7\u00f5es, verifique com cautela a fonte da solicita\u00e7\u00e3o. Em caso de que seja um remetente desconhecido, prefira ignorar o pedido. Quando se tratar de um remetente conhecido, entre em contato com a pessoa por outros meios para checar se a solicita\u00e7\u00e3o \u00e9 verdadeira.\u00a0<\/span><b><\/b><\/p>\n<ul>\n<li aria-level=\"1\"><b>Rejeite contatos n\u00e3o solicitados<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Seja por e-mail, telefone ou WhatsApp, se algu\u00e9m entrou em contato com voc\u00ea pedindo algum tipo de informa\u00e7\u00e3o, fornecendo alguma oferta imperd\u00edvel ou alegando que voc\u00ea precisa entrar em contato com algum tipo de suporte, prefira ignorar a mensagem. Em caso de d\u00favidas, entre em contato diretamente com a pessoa ou institui\u00e7\u00e3o em quest\u00e3o para ficar por dentro de mais detalhes do ocorrido.<\/span><\/p>\n<h2><b>Proteja a sua empresa contra golpes de engenharia social<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Os colaboradores das empresas s\u00e3o pessoas como qualquer outras, e, claro, tamb\u00e9m s\u00e3o potenciais v\u00edtimas de um golpe de engenharia social. Por isso, \u00e9 muito importante investir na conscientiza\u00e7\u00e3o em ciberseguran\u00e7a dos funcion\u00e1rios, para que eles aprendam a adotar h\u00e1bitos seguros no dia a dia, mantendo a organiza\u00e7\u00e3o protegida.<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Social engineering is a psychological manipulation technique used by criminals to persuade victims to reveal confidential information or to trick them into doing something. Social engineering is extremely effective because criminals, including cybercriminals, know that fooling people can often be much easier than circumventing physical or computer security barriers. You may wonder why people always [&hellip;]<\/p>\n","protected":false},"author":4009,"featured_media":2149,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"categories":[46],"tags":[113,92,119,121],"class_list":["post-2148","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-awareness","tag-information-security","tag-phishing","tag-security","tag-social-engineering"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Social engineering: what it is and how to identify it | Hacker Rangers<\/title>\n<meta name=\"description\" content=\"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Social engineering: what it is and how to identify it | Hacker Rangers\" \/>\n<meta property=\"og:description\" content=\"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Hacker Rangers\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-11T16:25:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hacker Rangers\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hacker Rangers\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\"},\"author\":{\"name\":\"Hacker Rangers\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\"},\"headline\":\"Social engineering: what it is and how to identify it\",\"datePublished\":\"2025-12-11T16:25:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\"},\"wordCount\":821,\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg\",\"keywords\":[\"information security\",\"phishing\",\"security\",\"social engineering\"],\"articleSection\":[\"Awareness\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\",\"name\":\"Social engineering: what it is and how to identify it | Hacker Rangers\",\"isPartOf\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg\",\"datePublished\":\"2025-12-11T16:25:30+00:00\",\"description\":\"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.\",\"breadcrumb\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Social engineering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/hackerrangers.siteup.dev\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social engineering: what it is and how to identify it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#website\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"name\":\"Hacker Rangers\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#organization\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"contentUrl\":\"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg\",\"width\":104,\"height\":50,\"caption\":\"Hacker Rangers\"},\"image\":{\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61\",\"name\":\"Hacker Rangers\",\"url\":\"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social engineering: what it is and how to identify it | Hacker Rangers","description":"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Social engineering: what it is and how to identify it | Hacker Rangers","og_description":"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.","og_url":"https:\/\/hackerrangers.siteup.dev\/pt\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/","og_site_name":"Hacker Rangers","article_published_time":"2025-12-11T16:25:30+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg","type":"image\/jpeg"}],"author":"Hacker Rangers","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Hacker Rangers","Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#article","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/"},"author":{"name":"Hacker Rangers","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61"},"headline":"Social engineering: what it is and how to identify it","datePublished":"2025-12-11T16:25:30+00:00","mainEntityOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/"},"wordCount":821,"publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg","keywords":["information security","phishing","security","social engineering"],"articleSection":["Awareness"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/","url":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/","name":"Social engineering: what it is and how to identify it | Hacker Rangers","isPartOf":{"@id":"https:\/\/hackerrangers.siteup.dev\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage"},"thumbnailUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg","datePublished":"2025-12-11T16:25:30+00:00","description":"Learn what social engineering is, the techniques criminals use, and how to spot and avoid scams that exploit trust, curiosity and fear.","breadcrumb":{"@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#primaryimage","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/12\/Social-engineering-scaled.jpg","width":2560,"height":1707,"caption":"Social engineering"},{"@type":"BreadcrumbList","@id":"https:\/\/hackerrangers.siteup.dev\/awareness\/social-engineering-what-it-is-and-how-to-identify-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/hackerrangers.siteup.dev\/"},{"@type":"ListItem","position":2,"name":"Social engineering: what it is and how to identify it"}]},{"@type":"WebSite","@id":"https:\/\/hackerrangers.siteup.dev\/#website","url":"https:\/\/hackerrangers.siteup.dev\/","name":"Hacker Rangers","description":"","publisher":{"@id":"https:\/\/hackerrangers.siteup.dev\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hackerrangers.siteup.dev\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/hackerrangers.siteup.dev\/#organization","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/","url":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","contentUrl":"https:\/\/hackerrangers.siteup.dev\/wp-content\/uploads\/2025\/07\/logo.svg","width":104,"height":50,"caption":"Hacker Rangers"},"image":{"@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hackerrangers.siteup.dev\/#\/schema\/person\/3e152a5bd1004506e37a9342cdd34c61","name":"Hacker Rangers","url":"https:\/\/hackerrangers.siteup.dev\/pt\/author\/hackerrangers\/"}]}},"_links":{"self":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2148","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/users\/4009"}],"replies":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/comments?post=2148"}],"version-history":[{"count":0,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/posts\/2148\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media\/2149"}],"wp:attachment":[{"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/media?parent=2148"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/categories?post=2148"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hackerrangers.siteup.dev\/pt\/wp-json\/wp\/v2\/tags?post=2148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}