-
-
-
4 Tips to Make Cyber Security Training Funnier
-
10 precious security tips for average users
-
Social Engineering: Why minding?
-
How do you not fall for e-mail scams that steal bank passwords?
-
Mobile frauds: do you know how to protect yourself?
-
How do you know if a website is safe to make purchases?
-
Social Engineering: why bother?
-
Criminals profit about $10 million in social engineering schemes involving cryptocurrencies
-
Which is easier to be hacked: human or computer?
-
The new "creative" phishing attack that you should watch out for
-
What causes users to click on malicious links?
-
Habits for a (cybernetically) safer year
-
The virtual world is watching us
-
Who would know this, right? More than half of malicious websites already use HTTPS
-
Spam and Phishing Data in 2019
-
Face aging application outbreak makes users ignore risks
-
Horror game is removed from Google Play for trying to steal Google and Facebook passwords
-
Facebook: How to control your account privacy
-
Learn what two-factor authentication is and why it is important
-
Largest hacker attacks in history
-
DANGER - A new phishing attack has been discovered!
-
7 mobile device security threats that you should take seriously in 2019
-
Bandits steal $243,000 with deepfake audio mimicking CEO voice
-
The danger of browser extensions
-
Corporate Data: Backups Can Never Be Too Much
-
Coronavirus: Run away from the disease that took us by surprise, but continue protecting your company's data
-
5 easy ways to protect yourself from cyber attacks
-
Why easy-to-remember passwords put your online security at risk
-
How to spot fake news
-
Getting Wise to Fake News
-
Maximize office security for receiving visitors
-
Clean Desktop Policy
-
5 Ways to Help Protect Your Company's Data
-
Microsoft Security: Password Problem Affecting 44 Million Users Revealed
-
9 types of malware and how to recognize them
-
Staying Safe on Social Media
-
Russian hackers investigate new vulnerabilities
-
Giving too much away? Most people share personal information online and young people are most at risk
-
Coronavirus: How hackers are preying on fears of Covid-19
-
What is an Insider Threat? Definition, examples, and mitigations
-
Loving the enemy: it is time to embrace digital piracy audiences
-
Why Cloud Computing Cyber Security Risks Are On The Rise: Report
-
Blog
-
How to create an effective business continuity plan
-
5 ways data classification can prevent an insurance data breach
-
Grindr is fined $11.7 million under European privacy law
-
Why This Financial Expert’s Tip Can Help Protect Your Parents Against Financial Scams
-
How an AI-powered Digital Assistant Increases Productivity in Business
-
Phishing for cryptocurrencies: How bitcoins are stolen
-
Five Emerging Internet Of Things Trends For 2021
-
How to Protect Your Digital Privacy
-
When Cyber Terrorism Becomes State Censorship
-
Five lessons I’ve learned from having my credit card hacked
-
Сybersecurity becomes an integral part of managed IT services
-
4 Dimensions of Digital Transformation with the Industrial Internet of Things
-
Organizing For Data Protection: The Data Protection Officer As An Agent Of Change
-
Internet banking: What happens when things go wrong?
-
VPN: Why you should use a virtual private network
-
WhatsApp WARNING: If you get this message from friends, delete it immediately
-
Home working increases cyber-security fears
-
Data Controller vs. Data Processor: What's The Difference?
-
Cyber Security Awareness Maturity: understanding the concept and finding out what it can say about your company
-
Credit card scams are on the rise; learn how they work
-
Security by design — is it just a pipe dream?
-
Why cyber attacks are on the rise in healthcare
-
GDPR and working from home: what’s the impact?
-
What is cyber warfare?
-
What’s Driving the Surge in Ransomware Attacks?
-
What Do Criminal Hackers And Scammers Discuss On Forums?
-
Cybersecurity threats to the COVID-19 vaccine
-
A Growing Digital Economy Means More Cybersecurity Challenges
-
Training vs. Security Awareness: what's the difference?
-
What does the IT professional do and what is the importance of the job?
-
What is information classification and how critical it has become with LGPD
-
Safe development: what is it and why is it important?
-
5 Major Reasons for “Why is Cyber Security Important?”
-
How Cybersecurity Habits Of Returning Remote Workers Can Put Companies At Risk
-
Cozy Bears and Hidden Cobras: The hackers targeting COVID-19 vaccine researchers
-
Protect against identity theft when sharing photos online
-
Business Continuity Plan: what it is and why you need one
-
The Poisoned Pawn: a cybersecurity metaphor
-
Security breaches in relationship apps and social media: here are some cases
-
Beyond the office: are you concerned with the security of your personal information?
-
With Crime-as-a-Service, anyone can be an attacker
-
The New Security Demands Of A Hybrid Work Environment
-
Hacker vs Cracker: Main Differences Explained
-
Green Computing, a contribution to save the environment
-
VPN: what is it, how does it work and what is its importance?
-
Data Protection Officers: who they are, what they do, and their importance
-
Hacking for good: what Ethical Hacking is and how it works
-
Cryptocurrencies: if you're going to use them, you'd better be careful
-
How to recognize - and avoid! - the web's main financial scams
-
Digital assistants or digital spies? Beware of this kind of technology!
-
How does a disaster recovery (DR) plan work?
-
What Is Cyberbullying
-
What is a C-Level Executive?
-
6 steps to using integrity and compliance to create a culture of ethics
-
How the pandemic increased investments in information security
-
Internet banking: a facility that can become a threat
-
Internet of Things: a powerful, but dangerous, technological trend
-
IoT in the industrial environment: benefits and security threats
-
LGPD: How does working from home impact the protection of personal data?
-
Why worry — now more than ever — about good cybersecurity habits?
-
Don't fall for these clever Black Friday scams this year
-
How to Shop Online Safely
-
The nature of privacy and security in shared workspaces
-
What to do about the new wave of DDoS extortion attacks
-
The LGPD for the end user: do you know your rights?
-
Is this the end of working from home? Learn good security practices to adopt at the office
-
Hacker or cracker: after all, what is the correct nomenclature and what are the differences?
-
How to identify — and avoid — scams via WhatsApp and SMS
-
Processor, controller... After all, who's who when it comes to LGPD?
-
Hybrid work is a trend, but… But what about security?
-
OWASP Top 10 2021 – What’s New
-
2022 and the threat landscape: The top 5 future cybersecurity challenges
-
6 Things You Should Never Do On Your Work Computer
-
Mobile Malware: Threats and Solutions
-
How to shop online securely
-
How criminals take advantage of vulnerabilities in web systems
-
Crime-as-a-service: now anyone can commit cybercrimes
-
So, what are the dangers of Cloud Computing?
-
Disaster Recovery: preparing your business to survive the worst!
-
Do you know what an integrity program is and what it is for?
-
How the Secure by Design methodology is making the web safer
-
Learn about cybersecurity market trends and forecasts for 2022
-
The rising number of ransomware attacks against the healthcare sector
-
Cyberwarfare and Espionage: when the physical battle goes digital
-
The obscure universe of hacking forums and cybercrime
-
Both sides of the coin: more digitization, greater risk of leaks
-
Researchers and Scientists: some of cybercriminals' favorite targets
-
Have you been vaccinated against COVID-19? Do not post photos of your card!
-
Digital hijacking: how ransomware is spreading across the web
-
World Day Against Cyber Censorship
-
Coworking: what the risks of this type of environment are and how you can protect yourself
-
Cyberbullying: what is it, how to fight it and what the victim's rights are
-
Ever heard of DDoS Extortion, the new trend in cyberattacks?
-
How to protect yourself from mobile malware
-
The OWASP Top 10 2021: what has changed in the new version of the ranking?
-
Photos on social media: be careful with what you post!
-
Green IT: what this concept is and how cybersecurity can benefit from it
-
The end of the year is approaching: Beware of the scam and fraud season!
-
What are C-levels and what are their roles?
-
Working from home? Be careful not to mix personal and professional services!
-
Cookies: what they are and how to ensure your online privacy
-
How to create a strong password
-
What is social engineering? How to protect yourself from online fraud
-
Ransomware in the Hospital: When a Cyber Attack Causes Physical Harm
-
Business Email Compromise (BEC) attacks: What they are and how to protect your company
-
What is NFC and what precautions should you take with this technology?
-
Understanding what the DevSecOps methodology is and why it matters
-
PIX: How to use this feature safely?
-
Learn about the International Data Privacy Day, celebrated on January 28th
-
Phishing: What it is, what the existing types are, and how to protect yourself
-
Cryptocurrencies: what should look out for when investing in digital currencies
-
Hybrid Work: Do you know what safety practices to adopt in this work format?
-
How to create strong passwords to protect your accounts
-
How to use mobile devices safely at work
-
QR Codes: What are they, how do they work, and what are their dangers?
-
Log4Shell: Understand the set of vulnerabilities that has shaken the world
-
Fake news: 5 dangers of spreading fake news
-
Tailgating: a dangerous, but unknown, social engineering technique
-
The importance of backups for corporate data security
-
Two-factor authentication: what it is and why it is important
-
USB ports: the risks that a simple connector can hide
-
Why is updating devices regularly an important security measure?
-
What is a firewall, how does it work and why is it important?
-
The dangers behind fake applications – and how to spot them
-
Passwordless: is this the future of authentication?
-
Why are public Wi-Fi networks dangerous?
-
App permissions: pay attention before granting!
-
SIM Swap: find out everything about this global scam
-
Malicious advertisements: when cybercrime invests in marketing
-
Learn to protect yourself from the Technical Support scam
-
All about spyware and the subtypes
-
The Brazilian General Data Protection Law and corporate devices: correct use at your company
-
Danger at the top: cyber threats aimed at C-levels
-
My phone’s been stolen! Tips on preventing and resolving headaches
-
The Fake Bank Payment Slip Scam: how to spot and avoid it
-
Browser-in-the-browser: learn more about this new type of phishing
-
There’s a rise in stalkerware in Brazil; learn how to spot and remove them
-
Is contactless payment safe? Weighing the risks and benefits
-
Pre-hijacking: the latest scam running amok, in countries like Brazil
-
Oversharing online: what are the personal and professional risks?
-
Catfishing: how to recognize and avoid fake profile scams
-
Fraud-as-a-service: the latest lucrative business in cybercrime
-
Card payment machine scam: avoid delivery-related frauds
-
What are macros and what risks do they represent to security?
-
Do you install add-ons in your browser? Be careful!
-
WhatsApp: how to safely use the messaging app
-
WHAT ARE THE FOUR MOST DANGEROUS FILE TYPES?
-
The history of information security: protecting knowledge for over a century
-
The Ghost Hand Attack, the Brazilian scam spreading abroad
-
Vishing: a growing threat against companies
-
World Cup Album scam: discover how it works and how to stay safe!
-
Fakecalls, the Trojan that imitates telephone calls
-
The Clean Desk Policy: why it is so important
-
Warning! Social benefit certificate of life scam on the rise in Brazil
-
Virtual credit cards: how they work and why they're safer
-
Deepfakes: what they are, how they are used and tips to stay safe
-
Brazil's Severance Indemnity Fund or FGTS scam and how to avoid it
-
Credential stuffing: the dangers of reusing passwords
-
Delayed phishing: discover the new tactic used by cybercriminals
-
Dumpster diving: in cybersecurity, one man’s trash is another man’s treasure!
-
Understand why you shouldn't use your corporate email for personal purposes
-
Understand the risks of using SMS for two-factor authentication
-
How to protect your webcam from outside access. Practical tips!
-
How long does it take a cybercriminal to crack your password? Find out here!
-
The importance of the Code of Conduct and Ethics and respect in the workplace
-
Farewell to the year gone by! Care measures concerning fraud during Christmas and New Year
-
Callback phishing: learn what it is and how this new trend works
-
How to safely use the cloud at work
-
Learn the top three mistakes Internet users make when backing up data
-
Social Media Scams: learn about four common scams and how to protect yourself!
-
Social networks and work: how to reconcile the two worlds and keep your company safe?
-
Insider threats: what they are, what types there are, and how to counter them
-
Cybersecurity in public places: why it’s important
-
Cybersecurity in 2023: What to expect in terms of new risks and challenges
-
MFA Fatigue: How criminals bypass multifactor authentication
-
Your digital footprint and why you should pay attention to the tracks you leave behind on the Internet
-
Office visits: physical perimeter care measures
-
5 security settings for social networks
-
Understanding the classic and dangerous man-in-the-middle attack
-
Metaverse: Experts' concerns over privacy threats
-
Safe? Maybe not so much! Learn about blockchain scams and frauds
-
Shadow IT: risks and prevention
-
Cybersecurity in 2023: what can we expect from new risks and challenges?
-
HTTPS: Why this alone doesn’t represent enough security
-
How to safely dispose of personal information in your daily routine
-
Brazil’s "new PIX instant payment scam" goes viral and worries Internet users; find out more
-
Ransomware: How you can help protect your company
-
Registrato: how to use the Central Bank of Brazil service to stay safe
-
Caller ID Spoofing: What is it and how can you protect yourself?
-
C-levels: why is their support critical to a successful awareness program?
-
Cryptography: the history, what it is, and how to use it in everyday life
-
The importance of information security risk management
-
Life after a scam: what actions can be taken after falling victim to online fraud?
-
How to ensure the security of privileged users
-
Elicitation: the polite and courteous technique of stealing sensitive information
-
Social engineering: what it is and how to identify it
-
OSINT: what it is and how cybercriminals are using it
-
The Pump-and-Dump scam and how it works
-
REPORT CYBERSECURITY IN THE AGE OF TECHNOLOGICAL DEPENDENCE
-
The importance of security culture to mitigate business risks
-
Is Brazil a nation of cybercrime? An overview of the scenario
-
The growing risk of open-source code and libraries
-
Smishing: what is SMS phishing and why is it still so popular?
-
How C-levels can contribute to gamified awareness programs
-
How organizing your digital life can protect you from cyber risks
-
What is human-centric security and what are the benefits of this approach
-
Thinking of using artificial intelligence? Take care with data confidentiality!
-
Online dangers that threaten children and teenagers: what are they and how can we avoid them?
-
Desenrola, Brasil: government program targeted by cybercriminals
-
Vacation Notification Scam: how to recognize and protect yourself from this type of fraud
-
Understand what has changed in ISO 27001:2022 and why
-
Why adopting good cybersecurity habits is increasingly important
-
The threat of cybercrime to company data privacy: how Hacker Rangers can help you keep your organization more protected
-
Crime-as-a-service: how outsourcing cybercrime can affect your business
-
Gamification for a secure business: discover 3 benefits of Hacker Rangers, the gamified platform for raising awareness about cybersecurity and the general data protection law
-
"I'm not a tempting target for cybercriminals": how this mindset may harm people and companies
-
Do you save passwords in your browser? Understand why this is a bad security practice
-
The responsibilities of a CISO and the importance of Raising Awareness to Tackle Social Engineering and Phishing Attacks
-
5 Reasons to Invest in a Gamified Cybersecurity Program for Your Company
-
Security beyond the office: ensuring cybersecurity while on vacation
-
How to Avoid the Tax Return Scam
-
Smishing scenarios: learn more about some of the common pretexts and how to protect yourself!
-
Hacker Rangers ranks as the 10th best software in G2’s Rookies of the Year Awards
-
Artificial intelligence: what it has to do with you and cybersecurity
-
Security in online meetings and conferences: risks and best practices
-
Digital security during live streams
-
Why information security is relevant to you
-
How to add a password to your SIM card and why it’s important
-
What can cybercriminals do with my personal data?
-
What can cybercriminals do with my email?
-
What is a Distributed Denial-of-Service (DDoS) attack?
-
Spotting fake profiles on social media
-
Doxxing: how to protect yourself from exposing sensitive information?
-
Fake legal notice scam
-
Cyber security in education: from 'eternal September' to digital natives
-
Cybersecurity in healthcare: a challenge for data sharing
-
Cybersecurity: why it matters in critical infrastructure
-
Juice Jacking: the dangers behind public USB ports
-
Safe Cell Phone Program: what it is, how it works and everything we know so far
-
Antivirus: how it works and how important it is
-
How artificial intelligence may boost cybercrime
-
Deepfake Phishing explained and how you can protect yourself
-
Password managers and why we should use them
-
In the age of deepfakes, not every picture is worth a thousand words
-
Why should a CFO support a cybersecurity awareness program?
-
The role of HR in cybersecurity awareness programs
-
Why does cybersecurity need to be a priority for HR?
-
Why does cybersecurity need to be a priority for CFOs?
-
Introducing PhishOS, Hacker Rangers' Latest Phishing Awareness Game
-
How can corporate files be shared securely?
-
7 best practices for secure file sharing
-
Compliance: agreement, monitoring and success
-
Assertive and nonviolent communication: why this practice is so important for the organization
-
Understanding what the NAIC Insurance Data Security Model Law is
-
PCI DSS Guide for Employees and Businesses: protect yourself now
-
You can't be too careful: learn how to identify and combat fraud during the Olympics
-
GDPR: Introduction and Foundations for a Secure Digital World
-
How can you protect your software with code obfuscation?
-
Working remotely with a personal computer: tips for security, productivity and maintenance
-
Unexpected gifts with QR codes: how to protect yourself from this social engineering scam
-
Copyright scams: What are they and how do they work?
-
blogtollscam.png
-
Toll scam: how can you protect yourself from false toll charges?
-
Scams involving crowdfunding campaigns and fake donations: how can you protect yourself?