<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>Forem: Ivo Pereira</title>
    <description>The latest articles on Forem by Ivo Pereira (@ivocreates).</description>
    <link>https://forem.com/ivocreates</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F2931928%2F5f4c8668-eae4-4f6e-987d-77ea4d8c0f5c.png</url>
      <title>Forem: Ivo Pereira</title>
      <link>https://forem.com/ivocreates</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://forem.com/feed/ivocreates"/>
    <language>en</language>
    <item>
      <title>Why Every Developer (and Student) Should Master Git &amp; GitHub</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Tue, 02 Sep 2025 04:38:30 +0000</pubDate>
      <link>https://forem.com/ivocreates/why-every-developer-and-student-should-master-git-github-23bh</link>
      <guid>https://forem.com/ivocreates/why-every-developer-and-student-should-master-git-github-23bh</guid>
      <description>&lt;p&gt;If you’re in tech—or even just curious about how modern projects come to life—you’ve probably heard people talk about Git and GitHub. They’re mentioned everywhere, but many still don’t know what they actually are, why they matter, or why almost every developer swears by them.&lt;/p&gt;

&lt;p&gt;Let me break it down in a way that’s simple, practical, and hopefully a little eye-opening.&lt;/p&gt;

&lt;p&gt;What Exactly is Git?&lt;/p&gt;

&lt;p&gt;Imagine you’re writing a novel. Every day, you make edits—some big, some small. Wouldn’t it be great if you could:&lt;/p&gt;

&lt;p&gt;Save every version of your draft without creating dozens of confusing copies.&lt;/p&gt;

&lt;p&gt;Jump back to how the book looked two weeks ago with one command.&lt;/p&gt;

&lt;p&gt;Work on different chapters simultaneously without mixing things up.&lt;/p&gt;

&lt;p&gt;That’s exactly what Git does for code.&lt;/p&gt;

&lt;p&gt;Git is a version control system. It records every change made to your files so you can revisit any point in time, branch off to try new ideas, and collaborate without chaos. It was created by Linus Torvalds (the same mind behind Linux) to solve one problem: managing complex projects with many contributors.&lt;/p&gt;

&lt;p&gt;And What is GitHub?&lt;/p&gt;

&lt;p&gt;If Git is the tool that tracks your changes, GitHub is the platform where your Git projects live and breathe. Think of it as a global library for code—part storage, part collaboration hub, part social network for developers.&lt;/p&gt;

&lt;p&gt;On GitHub, you can:&lt;/p&gt;

&lt;p&gt;Store and back up your projects online.&lt;/p&gt;

&lt;p&gt;Collaborate with teammates anywhere in the world.&lt;/p&gt;

&lt;p&gt;Showcase your work as a portfolio for potential employers.&lt;/p&gt;

&lt;p&gt;Explore and contribute to open-source projects that power the modern internet.&lt;/p&gt;

&lt;p&gt;GitHub is where Git meets community.&lt;/p&gt;

&lt;p&gt;Why Do We Need Them?&lt;/p&gt;

&lt;p&gt;In today’s world, no one builds software in isolation. Projects are massive, teams are distributed, and mistakes are inevitable. Git and GitHub solve these challenges by offering:&lt;/p&gt;

&lt;p&gt;Version history – Roll back to any point when something breaks.&lt;/p&gt;

&lt;p&gt;Smooth teamwork – Multiple people can work on the same project without overwriting each other’s work.&lt;/p&gt;

&lt;p&gt;Transparency – Every change is tracked with who made it and when.&lt;/p&gt;

&lt;p&gt;Security – Your work is backed up online and protected.&lt;/p&gt;

&lt;p&gt;Open source contributions – Anyone can improve, learn from, or share projects.&lt;/p&gt;

&lt;p&gt;The Benefits Beyond Coding&lt;/p&gt;

&lt;p&gt;Here’s the part most people overlook: Git and GitHub aren’t just for developers.&lt;/p&gt;

&lt;p&gt;Students can track assignments and collaborate on group projects.&lt;/p&gt;

&lt;p&gt;Writers can manage drafts of articles or books.&lt;/p&gt;

&lt;p&gt;Researchers can co-author papers with clean version histories.&lt;/p&gt;

&lt;p&gt;Designers can keep track of changes in design files or assets.&lt;/p&gt;

&lt;p&gt;Version control is a productivity superpower that goes far beyond code.&lt;/p&gt;

&lt;p&gt;Why You Should Start Using Them Today&lt;/p&gt;

&lt;p&gt;Still wondering if it’s worth the effort? Here’s why it is:&lt;/p&gt;

&lt;p&gt;Career growth – A strong GitHub profile is often more impressive than a résumé.&lt;/p&gt;

&lt;p&gt;Learning – You see real-world projects and how professionals structure code.&lt;/p&gt;

&lt;p&gt;Safety – No more losing work after a crash or mistake.&lt;/p&gt;

&lt;p&gt;Future-proofing – Almost every serious project uses Git under the hood.&lt;/p&gt;

&lt;p&gt;At first, the commands may feel intimidating (git init, git commit, git push), but with a little practice, they become second nature.&lt;/p&gt;

&lt;p&gt;Final Thoughts&lt;/p&gt;

&lt;p&gt;Git is like having a time machine for your projects. GitHub takes that power and connects it to the world, turning your personal code into something collaborative, visible, and impactful.&lt;/p&gt;

&lt;p&gt;If you’re building anything—a class project, a side hustle, or a professional application—Git and GitHub aren’t optional anymore. They’re essential.&lt;/p&gt;

&lt;p&gt;The best time to start was yesterday. The second-best time is today.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>github</category>
      <category>git</category>
    </item>
    <item>
      <title>Ransomware Explained: How It Works and How to Stay Protected</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Sat, 14 Jun 2025 20:26:40 +0000</pubDate>
      <link>https://forem.com/ivocreates/ransomware-explained-how-it-works-and-how-to-stay-protected-1ieb</link>
      <guid>https://forem.com/ivocreates/ransomware-explained-how-it-works-and-how-to-stay-protected-1ieb</guid>
      <description>&lt;p&gt;By Ivo Pereira | Web Developer &amp;amp; Cybersecurity Enthusiast&lt;/p&gt;

&lt;p&gt;Introduction&lt;br&gt;
Hey there! I’m Ivo Pereira—a computer science student and web developer with a serious interest in building secure, modern tech. With cyberattacks becoming more common, one term that keeps popping up is ransomware. It’s one of the most dangerous forms of cybercrime out there—and it doesn’t just target big businesses. Anyone can be a victim.&lt;/p&gt;

&lt;p&gt;In this post, I’ll break down ransomware in a way that’s simple, clear, and useful—whether you’re a student, a developer, or just someone who wants to stay safe online.&lt;/p&gt;

&lt;p&gt;What is Ransomware?&lt;br&gt;
Ransomware is a type of malware that encrypts your files or locks your entire system, making it unusable. The attacker then demands a ransom payment, usually in cryptocurrency, in exchange for a decryption key to unlock your data.&lt;/p&gt;

&lt;p&gt;Think of it like this: someone breaking into your house, changing all the locks, and asking you to pay to get back in. Worst part? Even if you pay, they might not hand over the keys.&lt;/p&gt;

&lt;p&gt;How Does Ransomware Work?&lt;br&gt;
Let’s walk through the usual process:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Infection
The attacker finds a way in through:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;📨 Phishing Emails: Fake emails with links or attachments.&lt;/p&gt;

&lt;p&gt;💻 Malvertising: Fake ads that install malware when clicked.&lt;/p&gt;

&lt;p&gt;🌐 Compromised Websites: Drive-by downloads without your knowledge.&lt;/p&gt;

&lt;p&gt;🔓 RDP Attacks: Brute-forcing weak remote desktop connections.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Execution
Once inside your system, the malware:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Gains admin privileges&lt;/p&gt;

&lt;p&gt;Encrypts files using strong algorithms&lt;/p&gt;

&lt;p&gt;Often spreads to other connected devices&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;&lt;p&gt;Ransom Demand&lt;br&gt;
A message appears on your screen demanding payment and giving you a deadline. Sometimes, they even offer to decrypt one file as a “sample of goodwill.”&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;The Aftermath&lt;br&gt;
Victims are left with three choices:&lt;/p&gt;&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Pay the ransom (not recommended)&lt;/p&gt;

&lt;p&gt;Recover from backups (if they exist)&lt;/p&gt;

&lt;p&gt;Lose access to their data permanently&lt;/p&gt;

&lt;p&gt;Types of Ransomware&lt;br&gt;
🔒 Crypto Ransomware – Encrypts your files&lt;br&gt;
→ Examples: WannaCry, Locky&lt;/p&gt;

&lt;p&gt;🔐 Locker Ransomware – Locks the entire device&lt;br&gt;
→ Used in fake law enforcement pop-ups&lt;/p&gt;

&lt;p&gt;🕵️ Double Extortion – Steals and encrypts data; threatens to leak it&lt;br&gt;
→ Examples: Maze, REvil&lt;/p&gt;

&lt;p&gt;🧰 Ransomware-as-a-Service (RaaS) – Ransomware tools sold on dark web&lt;br&gt;
→ Examples: DarkSide, Conti&lt;/p&gt;

&lt;p&gt;Real Incidents That Shook the Internet&lt;br&gt;
WannaCry (2017): Paralyzed hospitals and companies in 150+ countries.&lt;/p&gt;

&lt;p&gt;Colonial Pipeline (2021): Disrupted fuel supply in the U.S.&lt;/p&gt;

&lt;p&gt;Kaseya (2021): Supply-chain attack that affected thousands of businesses.&lt;/p&gt;

&lt;p&gt;How to Protect Yourself (and Your Organization)&lt;br&gt;
Let’s get to the good part: defense.&lt;/p&gt;

&lt;p&gt;🔁 1. Backups&lt;br&gt;
Use the 3-2-1 rule: 3 copies, 2 different formats, 1 stored offline.&lt;/p&gt;

&lt;p&gt;Cloud backups are great—but make sure they’re not always connected.&lt;/p&gt;

&lt;p&gt;✉️ 2. Email Safety&lt;br&gt;
Think twice before clicking links or opening unknown attachments.&lt;/p&gt;

&lt;p&gt;Run phishing simulations if you’re in a team environment.&lt;/p&gt;

&lt;p&gt;💻 3. Keep Systems Updated&lt;br&gt;
Always apply updates and patches.&lt;/p&gt;

&lt;p&gt;Don’t ignore “Update Available” prompts!&lt;/p&gt;

&lt;p&gt;🛡️ 4. Antivirus + EDR&lt;br&gt;
Use reliable security software with behavior-based detection.&lt;/p&gt;

&lt;p&gt;Consider Endpoint Detection &amp;amp; Response (EDR) tools for deeper protection.&lt;/p&gt;

&lt;p&gt;🔐 5. Access Control&lt;br&gt;
Use MFA (Multi-Factor Authentication) everywhere—especially for admin accounts.&lt;/p&gt;

&lt;p&gt;Follow the least privilege principle—only give users what they need.&lt;/p&gt;

&lt;p&gt;🌐 6. Secure Your Network&lt;br&gt;
Segment networks to contain any breach.&lt;/p&gt;

&lt;p&gt;Use firewalls, VPNs, and secure DNS filtering.&lt;/p&gt;

&lt;p&gt;📝 7. Have a Response Plan&lt;br&gt;
Know exactly what to do if an attack happens.&lt;/p&gt;

&lt;p&gt;Keep offline contacts for IT, cybersecurity support, and local cyber law enforcement.&lt;/p&gt;

&lt;p&gt;Should You Pay the Ransom?&lt;br&gt;
Honestly, no. Most cybersecurity experts and law agencies (like CERT-In, CISA, and Interpol) strongly recommend against it.&lt;/p&gt;

&lt;p&gt;Why?&lt;/p&gt;

&lt;p&gt;No guarantee you’ll get your files back&lt;/p&gt;

&lt;p&gt;Your money funds criminal operations&lt;/p&gt;

&lt;p&gt;Encourages attackers to strike again&lt;/p&gt;

&lt;p&gt;Instead, isolate the infected system, report the incident, and begin recovery using backups.&lt;/p&gt;

&lt;p&gt;Final Thoughts&lt;br&gt;
Ransomware is scary, but it’s not unbeatable. Most attacks succeed not because of super-advanced hacking—but due to small human errors or outdated systems. So if you stay alert, keep things updated, and have a solid backup strategy, you’ll already be way ahead of most targets.&lt;/p&gt;

&lt;p&gt;As someone who builds apps with a focus on security, I truly believe in this one thing:&lt;/p&gt;

&lt;p&gt;Prevention is always better (and cheaper) than cure.&lt;/p&gt;

&lt;p&gt;So take care of your digital space like you would your home—lock the doors, install an alarm, and don’t let just anyone in. Stay safe out there!&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>web</category>
      <category>webdev</category>
    </item>
    <item>
      <title>🎭 What is Social Engineering? Real-World Examples That’ll Blow Your Mind</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Sun, 08 Jun 2025 10:11:57 +0000</pubDate>
      <link>https://forem.com/ivocreates/what-is-social-engineering-real-world-examples-thatll-blow-your-mind-3md5</link>
      <guid>https://forem.com/ivocreates/what-is-social-engineering-real-world-examples-thatll-blow-your-mind-3md5</guid>
      <description>&lt;p&gt;by Ivo Pereira&lt;/p&gt;

&lt;p&gt;💻 Computer Science Student | Full-Stack Web Developer | Cybersecurity &amp;amp; OSINT Enthusiast | IoT Innovator&lt;/p&gt;

&lt;p&gt;Imagine this: You're an employee at a growing startup. A polite man calls, saying he's from your IT department. He asks you to reset your password to fix a network glitch. Sounds routine, right?&lt;/p&gt;

&lt;p&gt;Wrong. You just got social engineered.&lt;/p&gt;

&lt;p&gt;As someone who’s passionate about cybersecurity, OSINT, and building secure systems, I find social engineering one of the most underrated yet most effective forms of cyber attack. This blog dives deep into how it works, why it's terrifyingly effective, and how we can defend against it — with real-world examples that may surprise you.&lt;/p&gt;

&lt;p&gt;🧠 Social Engineering: The Hacker’s Human Toolkit&lt;br&gt;
Social engineering is the act of manipulating people into revealing confidential information — like passwords, security tokens, or even access to physical infrastructure.&lt;/p&gt;

&lt;p&gt;Unlike typical hacking which targets machines, social engineering targets people. It bypasses tech defenses by exploiting emotions, trust, urgency, fear, or curiosity.&lt;/p&gt;

&lt;p&gt;💡 In simple terms: psychological manipulation + technical outcome = social engineering.&lt;/p&gt;

&lt;p&gt;🎯 Why You Should Care&lt;br&gt;
“Amateurs hack systems. Professionals hack people.”&lt;br&gt;
– Bruce Schneier, Cybersecurity Expert&lt;/p&gt;

&lt;p&gt;Social engineering is effective because humans don’t get security patches. According to IBM’s Cyber Security Intelligence Index, over 95% of breaches are caused by human error — not software vulnerabilities.&lt;/p&gt;

&lt;p&gt;Even the most secure servers can be compromised with a phone call, fake badge, or an email with just the right emotional nudge.&lt;/p&gt;

&lt;p&gt;🔍 Common Types of Social Engineering (with Real-World Examples)&lt;br&gt;
Let’s break down some common (and some shockingly creative) forms of social engineering.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Phishing – The Classic Trap
Fake emails posing as trusted entities, designed to steal credentials or plant malware.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;💥 Real Example:&lt;br&gt;
📅 2016 DNC Hack — Russian threat actors used phishing emails to access the Democratic National Committee. This breach arguably influenced an entire U.S. election.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Spear Phishing – Personalized Attacks
More targeted than phishing, often using data from social media or leaks.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;🎯 Real Example:&lt;br&gt;
Sony Pictures Hack (2014) — Hackers used tailored emails to breach Sony, leak movies, and expose sensitive internal communications.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Pretexting – Fake Scenarios
Crafting a believable scenario to gain access to sensitive info or systems.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;🕵️ Real Example:&lt;br&gt;
Kevin Mitnick, one of the world’s most famous hackers, called companies pretending to be IT staff and got employees to hand over their credentials.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Baiting – Using Curiosity as a Weapon
Physical or digital “bait” is used to get a target to engage.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;💽 Real Example:&lt;br&gt;
Stuxnet: USBs infected with malware were dropped near Iranian nuclear facilities. Curious employees plugged them in, unknowingly initiating cyber sabotage.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Tailgating – Physical Access Through Trust
An attacker follows someone into a secure area by pretending to be an employee.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;🚪 Real Example:&lt;br&gt;
A journalist once entered a data center just by holding a cup of coffee and walking confidently behind staff. No badge. No ID. Just social confidence.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Vishing – Voice-Based Phishing
Phone calls impersonating banks, government agencies, or IT departments.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;📞 Real Example:&lt;br&gt;
Fraudsters often pretend to be from Amazon or your bank, convincing victims to give away OTPs or card numbers. Some even spoof the caller ID.&lt;/p&gt;

&lt;p&gt;🧪 Why It Works: The Psychology of Being Hacked&lt;br&gt;
Social engineering works because it hijacks core human instincts:&lt;/p&gt;

&lt;p&gt;Authority Bias – "It’s from the CEO, I must respond."&lt;/p&gt;

&lt;p&gt;Urgency – "Your account will be locked in 30 minutes!"&lt;/p&gt;

&lt;p&gt;Fear – "Suspicious activity on your bank account."&lt;/p&gt;

&lt;p&gt;Curiosity – "You’ve received a confidential document..."&lt;/p&gt;

&lt;p&gt;Reciprocity – "Here’s a free gift — just sign in to claim it."&lt;/p&gt;

&lt;p&gt;Attackers also exploit OSINT (Open-Source Intelligence). Your LinkedIn, GitHub, blog posts — even your conference attendance — can be mined for details that make a scam more believable.&lt;/p&gt;

&lt;p&gt;🛡️ How to Protect Yourself (and Your Team)&lt;br&gt;
🔐 For Individuals:&lt;br&gt;
Think before you click. Check email sources, URLs, and attachments.&lt;/p&gt;

&lt;p&gt;Don’t overshare online. Avoid posting sensitive info publicly.&lt;/p&gt;

&lt;p&gt;Verify before you act. Call your boss back. Double-check with IT.&lt;/p&gt;

&lt;p&gt;Enable MFA. Even if your password is compromised, it adds a layer.&lt;/p&gt;

&lt;p&gt;🏢 For Organizations:&lt;br&gt;
Train your people. Run phishing simulations and awareness sessions.&lt;/p&gt;

&lt;p&gt;Limit access. Use least-privilege principles.&lt;/p&gt;

&lt;p&gt;Monitor behavior. Behavioral analytics tools can detect anomalies.&lt;/p&gt;

&lt;p&gt;Establish incident protocols. Employees should know exactly what to do if they suspect an attack.&lt;/p&gt;

&lt;p&gt;🧨 What’s Next? AI + Deepfakes + Human Weakness&lt;br&gt;
The next era of social engineering is being powered by AI and deepfake tech.&lt;/p&gt;

&lt;p&gt;Example: Criminals used AI to clone a CEO’s voice and tricked a subordinate into wiring $240,000 to a fake vendor.&lt;/p&gt;

&lt;p&gt;That’s no longer sci-fi — it’s happening now.&lt;/p&gt;

&lt;p&gt;🧵 TL;DR: The Human Firewall Matters&lt;br&gt;
Social engineering bypasses tech and attacks you.&lt;/p&gt;

&lt;p&gt;It’s emotional hacking, not technical.&lt;/p&gt;

&lt;p&gt;It’s rising fast — now aided by AI, deepfakes, and OSINT.&lt;/p&gt;

&lt;p&gt;Prevention requires awareness, not just antivirus.&lt;/p&gt;

&lt;p&gt;📌 Final Thoughts&lt;br&gt;
Social engineering is no longer reserved for spy thrillers. It’s real. It’s subtle. It’s scalable. And it's scarily effective. But by understanding the tactics, training your instinct to pause, and thinking critically about every interaction — you can build a defense stronger than any firewall.&lt;/p&gt;

&lt;p&gt;💬 Got phished before? Tricked by a clever scam?&lt;br&gt;
Let’s make this a safe space to share, learn, and build resilience together.&lt;/p&gt;

&lt;p&gt;👋 About Me&lt;br&gt;
I'm Ivo Pereira — a computer science student, full-stack developer, and cybersecurity &amp;amp; OSINT enthusiast. I build secure systems, explore emerging tech, and write about it all.&lt;/p&gt;

&lt;p&gt;🔗 Let’s connect:&lt;/p&gt;

&lt;p&gt;🌐 Portfolio: &lt;a href="https://ivocreates.site/" rel="noopener noreferrer"&gt;ivocreates.site&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;🐙 GitHub: &lt;a href="https://github.com/ivocreates" rel="noopener noreferrer"&gt;github.com/ivocreates&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;📝 Blog: &lt;a href="http://telescope.ac/stories-of-ivo" rel="noopener noreferrer"&gt;telescope.ac/stories-of-ivo&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;💼 LinkedIn: &lt;a href="https://www.linkedin.com/in/pereira-ivo" rel="noopener noreferrer"&gt;linkedin.com/in/pereira-ivo&lt;/a&gt;&lt;/p&gt;

&lt;h1&gt;
  
  
  CyberSecurity #SocialEngineering #OSINT #AI #Deepfakes #EthicalHacking #TechAwareness #InfoSec #Phishing #DevTo #Medium #Telescope
&lt;/h1&gt;

</description>
    </item>
    <item>
      <title>🚀 Why Every Developer Should Have a Portfolio — And How to Host Yours for Free!</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Sun, 01 Jun 2025 02:05:05 +0000</pubDate>
      <link>https://forem.com/ivocreates/why-every-developer-should-have-a-portfolio-and-how-to-host-yours-for-free-4gnf</link>
      <guid>https://forem.com/ivocreates/why-every-developer-should-have-a-portfolio-and-how-to-host-yours-for-free-4gnf</guid>
      <description>&lt;p&gt;By Ivo Pereira&lt;br&gt;
GitHub: &lt;a href="https://github.com/ivocreates" rel="noopener noreferrer"&gt;@ivocreates&lt;/a&gt; | Portfolio: &lt;a href="https://ivocreates.site/" rel="noopener noreferrer"&gt;ivocreates.site&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;💡 Why Is a Developer Portfolio So Important?&lt;br&gt;
In a world where attention spans are shrinking and competition is growing, your developer portfolio isn’t just a showcase — it’s your digital handshake. Whether you're a student, intern, freelancer, or full-time dev, a well-crafted portfolio sets you apart.&lt;/p&gt;

&lt;p&gt;Here’s why every developer should have one:&lt;/p&gt;

&lt;p&gt;🔍 Visibility – Recruiters and clients search for portfolios before resumes.&lt;/p&gt;

&lt;p&gt;🧠 Reflection of Skills – It shows what you can do, not just what you say you do.&lt;/p&gt;

&lt;p&gt;🛠️ Real Projects – Hosting your own code, blog posts, or contributions builds trust.&lt;/p&gt;

&lt;p&gt;💬 Brand Voice – Your portfolio tells your story, your way.&lt;/p&gt;

&lt;p&gt;“A good portfolio is like a silent recruiter working for you 24/7.”&lt;/p&gt;

&lt;p&gt;🧭 Steps to Create and Host a Portfolio for Free&lt;br&gt;
Let me walk you through how I did it and how you can do it too. Whether you use HTML/CSS/JS, React, or some cool framework, the deployment steps are simple and cost zero bucks 💸.&lt;/p&gt;

&lt;p&gt;🔧 Step 1: Build Your Portfolio&lt;br&gt;
You can build it from scratch using:&lt;/p&gt;

&lt;p&gt;HTML/CSS/JS&lt;/p&gt;

&lt;p&gt;Frameworks like React, Next.js, Vue, etc.&lt;/p&gt;

&lt;p&gt;Or use generators like Jekyll, Hugo, Gatsby&lt;/p&gt;

&lt;p&gt;If you want a reference, check out my site 👉 ivocreates.site or my code on GitHub 👉 &lt;a href="https://github.com/ivocreates" rel="noopener noreferrer"&gt;github.com/ivocreates&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;📦 Step 2: Choose a Free Hosting Platform&lt;br&gt;
Here are some awesome free platforms to host your portfolio:&lt;/p&gt;

&lt;p&gt;✅ Surge.sh&lt;br&gt;
⚡ Super fast&lt;/p&gt;

&lt;p&gt;🧠 One command to deploy (surge ./ yourname.surge.sh)&lt;/p&gt;

&lt;p&gt;🔐 Free HTTPS&lt;/p&gt;

&lt;p&gt;🧩 Best for static sites (HTML/CSS/JS)&lt;/p&gt;

&lt;p&gt;✅ InfinyHost&lt;br&gt;
🖥️ Free cPanel hosting&lt;/p&gt;

&lt;p&gt;📨 Email support&lt;/p&gt;

&lt;p&gt;📂 Great if you want PHP or WordPress support&lt;/p&gt;

&lt;p&gt;✅ GitHub Pages&lt;br&gt;
🔗 Directly connects to GitHub repos&lt;/p&gt;

&lt;p&gt;🧪 Perfect for dev portfolios&lt;/p&gt;

&lt;p&gt;💾 Custom domain support (like mine: ivocreates.site)&lt;/p&gt;

&lt;p&gt;✅ Netlify&lt;br&gt;
🚀 CI/CD included&lt;/p&gt;

&lt;p&gt;🔄 Auto deploy from GitHub&lt;/p&gt;

&lt;p&gt;💡 Great for static site generators and modern frameworks&lt;/p&gt;

&lt;p&gt;✅ Vercel&lt;br&gt;
🦄 Perfect for React, Next.js apps&lt;/p&gt;

&lt;p&gt;🌐 Free SSL, CDN&lt;/p&gt;

&lt;p&gt;🔁 Git integration&lt;/p&gt;

&lt;p&gt;🚀 Step 3: Deploy It&lt;br&gt;
Here’s a sample deployment using Surge:&lt;/p&gt;

&lt;p&gt;npm install --global surge&lt;br&gt;
surge ./dist my-awesome-portfolio.surge.sh&lt;br&gt;
Or using GitHub Pages:&lt;/p&gt;

&lt;p&gt;Push code to a GitHub repo&lt;/p&gt;

&lt;p&gt;Go to Repo → Settings → Pages&lt;/p&gt;

&lt;p&gt;Select main branch and /root or /docs&lt;/p&gt;

&lt;p&gt;Boom, it's live! 🎉&lt;/p&gt;

&lt;p&gt;🌍 Step 4: Connect a Custom Domain (Optional but Powerful)&lt;br&gt;
Domains like .site, .dev, or .me cost just a few bucks/year.&lt;/p&gt;

&lt;p&gt;You can buy a domain (I use Google Domains) and map it on:&lt;/p&gt;

&lt;p&gt;GitHub Pages&lt;/p&gt;

&lt;p&gt;Netlify or Vercel (they give DNS records to update)&lt;/p&gt;

&lt;p&gt;Surge (using CNAME file)&lt;/p&gt;

&lt;p&gt;I use ivocreates.site to reflect my personal brand.&lt;/p&gt;

&lt;p&gt;🛡️ Bonus Tips&lt;br&gt;
✅ Keep your portfolio updated (projects, skills, resume)&lt;/p&gt;

&lt;p&gt;✍️ Add a blog (great for SEO + showing thought leadership)&lt;/p&gt;

&lt;p&gt;🪪 Add badges/certifications (like I did: GCP, Gemini SDLC, Flutter, etc.)&lt;/p&gt;

&lt;p&gt;📫 Include a contact form (I built mine using Firebase and Google Apps Script — no third-party junk)&lt;/p&gt;

&lt;p&gt;🧠 Final Thoughts&lt;br&gt;
If you're serious about tech, don’t wait for your “perfect” portfolio — just launch and iterate. Your online presence is as important as your skills.&lt;/p&gt;

&lt;p&gt;If you want help setting yours up, feel free to fork mine or connect with me. Let’s build something awesome!&lt;/p&gt;

&lt;p&gt;🚀 Live Portfolio: &lt;a href="https://ivocreates.site/" rel="noopener noreferrer"&gt;ivocreates.site&lt;/a&gt;&lt;br&gt;
💻 Code &amp;amp; Projects: &lt;a href="https://github.com/ivocreates" rel="noopener noreferrer"&gt;github.com/ivocreates&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Drop a comment if you found this helpful or if you want a step-by-step walkthrough for Firebase, CI/CD, or custom forms — I’d love to help!&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>coding</category>
      <category>portfolio</category>
      <category>programming</category>
    </item>
    <item>
      <title>🔐 Top 10 Cybersecurity Myths You Should Stop Believing</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Mon, 26 May 2025 03:28:59 +0000</pubDate>
      <link>https://forem.com/ivocreates/top-10-cybersecurity-myths-you-should-stop-believing-28n</link>
      <guid>https://forem.com/ivocreates/top-10-cybersecurity-myths-you-should-stop-believing-28n</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp7gh5f002jq24cmrenf9.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fp7gh5f002jq24cmrenf9.jpg" alt="Image description" width="800" height="533"&gt;&lt;/a&gt;&lt;br&gt;
By Me, Ivo Pereira&lt;br&gt;
💻 Computer Science Student | Web Developer | Cybersecurity Enthusiast | IoT Innovator&lt;br&gt;
🔗 My LinkedIn | 🐙 GitHub | 🌐 Portfolio | 📝 Medium&lt;/p&gt;

&lt;p&gt;🚨 Why You Need to Read This&lt;br&gt;
Whether you’re a techie or not — this article is for you.&lt;/p&gt;

&lt;p&gt;Cyberattacks are no longer rare or movie-like plots. They're a part of daily life now. And the worst part? Most people still believe myths that leave them wide open to attacks. I’ve seen smart people — developers, students, business owners — fall for basic traps just because they thought they were safe.&lt;/p&gt;

&lt;p&gt;As someone studying Computer Science and diving deep into cybersecurity and tech, I’ve learned that what you don’t know can actually hurt you — financially, emotionally, and even professionally.&lt;/p&gt;

&lt;p&gt;That’s why I wrote this. Not as a lecture, but as a friend breaking it down — simple, no jargon, just facts that can protect you, your family, your data, and your future.&lt;/p&gt;

&lt;p&gt;🔟 Myth #1: “No one would ever want to hack me.”&lt;br&gt;
The Truth: If you have a phone, email, or online account, you are a target.&lt;/p&gt;

&lt;p&gt;This is probably the most dangerous belief. Hackers don’t care about who you are — they care about what you have: usernames, passwords, bank logins, personal info. Attacks are automated now — bots scan millions of people, looking for the easiest entry.&lt;/p&gt;

&lt;p&gt;🔒 Real Talk: You’re not “too small” to be hacked — you’re just as valuable in bulk.&lt;/p&gt;

&lt;p&gt;✅ Do this now:&lt;/p&gt;

&lt;p&gt;Treat all your accounts as targets.&lt;/p&gt;

&lt;p&gt;Set up Two-Factor Authentication (2FA) everywhere.&lt;/p&gt;

&lt;p&gt;Never reuse passwords.&lt;/p&gt;

&lt;p&gt;9️⃣ Myth #2: “I’ve got antivirus — I’m covered.”&lt;br&gt;
The Truth: Antivirus is just a single tool — not a full defense system.&lt;/p&gt;

&lt;p&gt;Many modern attacks happen through phishing emails, fake websites, or stolen credentials — which antivirus won’t catch. Antivirus helps, but it’s like wearing a seatbelt on a motorcycle — helpful, but not enough.&lt;/p&gt;

&lt;p&gt;✅ Do this now:&lt;/p&gt;

&lt;p&gt;Combine antivirus with smart habits (scroll down for those).&lt;/p&gt;

&lt;p&gt;Don’t blindly trust attachments or links.&lt;/p&gt;

&lt;p&gt;Use browser add-ons like uBlock Origin or Privacy Badger for safer surfing.&lt;/p&gt;

&lt;p&gt;8️⃣ Myth #3: “I use a Mac — I don’t get viruses.”&lt;br&gt;
The Truth: That’s outdated thinking. Mac users are absolutely targeted today.&lt;/p&gt;

&lt;p&gt;In fact, some attackers prefer Mac users because they think they’re “safe” and let their guard down. Mac malware and fake apps are real and increasing every year.&lt;/p&gt;

&lt;p&gt;✅ Do this now:&lt;/p&gt;

&lt;p&gt;Keep your macOS updated.&lt;/p&gt;

&lt;p&gt;Avoid third-party app sites.&lt;/p&gt;

&lt;p&gt;Use a trusted antivirus for Mac (yes, they exist).&lt;/p&gt;

&lt;p&gt;7️⃣ Myth #4: “Free public Wi-Fi? Sweet, I’m in.”&lt;br&gt;
The Truth: If it’s free and open, it’s also a trap waiting to happen.&lt;/p&gt;

&lt;p&gt;Hackers can set up fake Wi-Fi hotspots (like “Airport_FreeWiFi” or “Cafe_WiFi”) that look legit. Once you connect, they can intercept your data — even watch what you're typing.&lt;/p&gt;

&lt;p&gt;✅ Do this now:&lt;/p&gt;

&lt;p&gt;Avoid public Wi-Fi for sensitive activity.&lt;/p&gt;

&lt;p&gt;If you must use it, turn on a VPN first.&lt;/p&gt;

&lt;p&gt;Never enter banking or login info on open networks.&lt;/p&gt;

&lt;p&gt;6️⃣ Myth #5: “If a site has a padlock (https), it’s legit.”&lt;br&gt;
The Truth: HTTPS means encryption — not trustworthiness.&lt;/p&gt;

&lt;p&gt;Many phishing sites use HTTPS to appear safe. That little padlock just means your data is encrypted while being stolen.&lt;/p&gt;

&lt;p&gt;✅ Do this now:&lt;/p&gt;

&lt;p&gt;Always type URLs manually for banks, social media, etc.&lt;/p&gt;

&lt;p&gt;Don’t click on suspicious links from texts or emails — even if they look official.&lt;/p&gt;

&lt;p&gt;Use a password manager that alerts you to fake sites.&lt;/p&gt;

&lt;p&gt;5️⃣ Myth #6: “I’ll update my software later — it’s working fine now.”&lt;br&gt;
The Truth: Every update you skip is a security hole you leave open.&lt;/p&gt;

&lt;p&gt;Hackers literally hunt for unpatched systems. That update isn’t just about features — it’s fixing vulnerabilities that could be used to hijack your system.&lt;/p&gt;

&lt;p&gt;✅ Do this now:&lt;/p&gt;

&lt;p&gt;Turn on automatic updates on your phone, PC, browser, and apps.&lt;/p&gt;

&lt;p&gt;Especially update anything related to your camera, email, and bank apps.&lt;/p&gt;

&lt;p&gt;Don’t delay updates for convenience — that’s how malware spreads.&lt;/p&gt;

&lt;p&gt;4️⃣ Myth #7: “My password is fine — I can remember it easily.”&lt;br&gt;
The Truth: If it’s easy to remember, it’s easy to guess or crack.&lt;/p&gt;

&lt;p&gt;Passwords like "qwerty", "password123", or even “Ivo1999” are cracked in seconds using software. Cybercriminals use brute-force tools that try millions of combos in minutes.&lt;/p&gt;

&lt;p&gt;✅ Do this now:&lt;/p&gt;

&lt;p&gt;Use a password manager to store and generate strong, unique passwords.&lt;/p&gt;

&lt;p&gt;Aim for 12+ characters, with symbols and randomness.&lt;/p&gt;

&lt;p&gt;Don’t reuse passwords across accounts — ever.&lt;/p&gt;

&lt;p&gt;3️⃣ Myth #8: “2FA is annoying. I don’t need it.”&lt;br&gt;
The Truth: 2FA is a game-changer.&lt;/p&gt;

&lt;p&gt;Yes, it takes 10 extra seconds. But it can stop 99% of account hacks. Even if someone gets your password, they still can’t get in.&lt;/p&gt;

&lt;p&gt;✅ Do this now:&lt;/p&gt;

&lt;p&gt;Use app-based 2FA (like Google Authenticator, Authy) instead of SMS.&lt;/p&gt;

&lt;p&gt;Turn it on for your email, cloud storage, banking, and social media.&lt;/p&gt;

&lt;p&gt;2️⃣ Myth #9: “I’d never fall for a phishing scam — I’m smart.”&lt;br&gt;
The Truth: Even cybersecurity experts fall for well-crafted phishing attacks.&lt;/p&gt;

&lt;p&gt;Hackers do research. They fake emails from Amazon, PayPal, banks, even colleagues. One click — and they have your data.&lt;/p&gt;

&lt;p&gt;✅ Do this now:&lt;/p&gt;

&lt;p&gt;Always double-check email addresses.&lt;/p&gt;

&lt;p&gt;Don’t click links from unknown senders.&lt;/p&gt;

&lt;p&gt;If in doubt, go directly to the official website instead.&lt;/p&gt;

&lt;p&gt;1️⃣ Myth #10: “Cybersecurity is for IT people — not me.”&lt;br&gt;
The Truth: Cybersecurity is for everyone who uses technology.&lt;/p&gt;

&lt;p&gt;Whether you're a student, freelancer, parent, gamer, or entrepreneur — if you're online, you're part of the cybersecurity equation.&lt;/p&gt;

&lt;p&gt;✅ Do this now:&lt;/p&gt;

&lt;p&gt;Make it a habit to review your digital hygiene once a month.&lt;/p&gt;

&lt;p&gt;Educate your family and team — you're only as strong as your weakest link.&lt;/p&gt;

&lt;p&gt;Bookmark this article, and revisit it often. Share it with your circle.&lt;/p&gt;

&lt;p&gt;✨ Final Words: The Internet Won’t Get Safer — But You Can&lt;br&gt;
I didn’t write this to scare you — I wrote it because I care.&lt;br&gt;
The biggest threat isn’t malware, ransomware, or phishing — it’s false confidence and outdated thinking.&lt;/p&gt;

&lt;p&gt;Cybersecurity isn’t about being paranoid — it’s about being prepared.&lt;/p&gt;

&lt;p&gt;These myths cost people their savings, their reputations, and their peace of mind. Don’t let that be you. I’m not asking you to become a cybersecurity expert — just to be aware, cautious, and empowered.&lt;/p&gt;

&lt;p&gt;👨‍💻 About Me&lt;br&gt;
I’m Ivo Pereira — a Computer Science student, developer, and cybersecurity enthusiast who believes that tech should empower, not endanger us. I create tools and write content that breaks down complex tech ideas into real-world value.&lt;/p&gt;

&lt;p&gt;📬 Want more content like this? Follow me here on &lt;a href="https://medium.com/@ivocreates" rel="noopener noreferrer"&gt;Medium&lt;/a&gt;.&lt;br&gt;
🔗 Let’s connect on &lt;a href="https://www.linkedin.com/in/pereira-ivo" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt;&lt;br&gt;
🐙 Check out my dev work on &lt;a href="https://github.com/ivocreates" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt;&lt;br&gt;
🌐 Or visit my &lt;a href="https://ivocreates.site/" rel="noopener noreferrer"&gt;portfolio&lt;/a&gt; for more projects and ideas.&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>cybersecurity</category>
      <category>web</category>
      <category>privacy</category>
    </item>
    <item>
      <title>Why Most People Struggle to Learn Coding (And How You Can Win Smarter and Faster)</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Mon, 12 May 2025 19:36:54 +0000</pubDate>
      <link>https://forem.com/ivocreates/why-most-people-struggle-to-learn-coding-and-how-you-can-win-smarter-and-faster-3a3</link>
      <guid>https://forem.com/ivocreates/why-most-people-struggle-to-learn-coding-and-how-you-can-win-smarter-and-faster-3a3</guid>
      <description>&lt;p&gt;When I first tried to learn coding, I was stuck in an endless loop:&lt;br&gt;
Learn → Forget → Get Frustrated → Repeat.&lt;/p&gt;

&lt;p&gt;It wasn’t because I wasn’t trying hard enough — it was because I wasn’t learning smart.&lt;/p&gt;

&lt;p&gt;It took me months to realize:&lt;br&gt;
👉 Learning faster isn’t about working harder.&lt;br&gt;
👉 It's about learning better and winning small.&lt;/p&gt;

&lt;p&gt;If you’re an aspiring web developer, tech enthusiast, or just passionate about building in tech —&lt;br&gt;
this might be the article you wish you had read sooner.&lt;/p&gt;

&lt;p&gt;Let me show you the real method I used to turn chaotic learning into clear wins.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Redefine Winning: Why Tiny Goals Crush Giant Dreams
Most people fail at coding because they aim for giant, vague goals like:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;“Become a full-stack developer”&lt;/p&gt;

&lt;p&gt;“Master JavaScript”&lt;/p&gt;

&lt;p&gt;Sounds cool, right?&lt;br&gt;
But here's the truth: Big dreams without small wins are overwhelming.&lt;/p&gt;

&lt;p&gt;Real winning is about tiny, sharp goals that you can actually finish:&lt;/p&gt;

&lt;p&gt;Build one landing page.&lt;/p&gt;

&lt;p&gt;Make one API call.&lt;/p&gt;

&lt;p&gt;Fix one layout bug.&lt;/p&gt;

&lt;p&gt;Each tiny win is like adding bricks to your coding castle.&lt;br&gt;
Ignore the small stuff, and your castle never stands.&lt;/p&gt;

&lt;p&gt;🎯 Action Tip:&lt;br&gt;
Before every coding session, write down:&lt;br&gt;
"What is my one tiny win today?"&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Don’t Just Learn — Build (Even If It’s Ugly)
Imagine trying to learn swimming by only watching YouTube videos.
Ridiculous, right?
Coding is the same.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Passive learning feels productive. Building is productive.&lt;/p&gt;

&lt;p&gt;When I started coding WHILE learning:&lt;/p&gt;

&lt;p&gt;Flexbox made sense because I wrestled with layouts.&lt;/p&gt;

&lt;p&gt;APIs clicked because I debugged broken fetch calls.&lt;/p&gt;

&lt;p&gt;JavaScript functions mattered because I broke real projects.&lt;/p&gt;

&lt;p&gt;Even ugly, broken projects teach you more than 10 tutorials.&lt;/p&gt;

&lt;p&gt;🔨 Action Tip:&lt;br&gt;
Turn every concept you learn into a 20-minute mini project.&lt;br&gt;
No excuses.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Micro-Goals: The Cheat Code to Outsmart Overwhelm
Here's the secret nobody tells you:
Your brain loves finishing things.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Instead of writing "Learn React" on your to-do list (and feeling terrible for weeks),&lt;br&gt;
break it into clear, small steps:&lt;/p&gt;

&lt;p&gt;✅ Understand JSX&lt;/p&gt;

&lt;p&gt;✅ Build a counter&lt;/p&gt;

&lt;p&gt;✅ Handle simple state with Hooks&lt;/p&gt;

&lt;p&gt;Each ✔️ creates momentum.&lt;br&gt;
Each tiny goal makes you addicted to winning.&lt;/p&gt;

&lt;p&gt;🧠 Action Tip:&lt;br&gt;
Every week, create a 3-goal sprint.&lt;br&gt;
Small. Sharp. Achievable.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Stop Chasing Frameworks: Master the Core First
Chasing the "hot framework of the month" will keep you stuck in beginner mode forever.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Real skill comes from mastering the invisible foundations:&lt;/p&gt;

&lt;p&gt;Semantic HTML&lt;/p&gt;

&lt;p&gt;CSS layouts (flex, grid)&lt;/p&gt;

&lt;p&gt;Core JavaScript (arrays, loops, functions)&lt;/p&gt;

&lt;p&gt;Git basics (save your future projects from chaos)&lt;/p&gt;

&lt;p&gt;Frameworks will change.&lt;br&gt;
Your solid foundation won't.&lt;/p&gt;

&lt;p&gt;🏗️ Action Tip:&lt;br&gt;
Every week, dedicate 30% of your time to practicing pure HTML, CSS, JS — no frameworks allowed.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;The 80/20 Hack: Learn Only What Moves You Forward
Not all coding skills are created equal.
Some will skyrocket your ability to build real stuff faster.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Here's where you should start:&lt;/p&gt;

&lt;p&gt;CRUD (Create, Read, Update, Delete)&lt;/p&gt;

&lt;p&gt;Responsive design (media queries, flexbox, grid)&lt;/p&gt;

&lt;p&gt;API consumption&lt;/p&gt;

&lt;p&gt;Basic user authentication&lt;/p&gt;

&lt;p&gt;Master these, and you can build almost ANY web app that people actually use.&lt;/p&gt;

&lt;p&gt;⏳ Action Tip:&lt;br&gt;
Focus on the 20% of skills that give you 80% real-world results.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Learn in Public: Your Secret Accelerator
You think you're not ready to post your work publicly?
That's exactly why you should.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;When I started posting:&lt;/p&gt;

&lt;p&gt;Half-baked projects&lt;/p&gt;

&lt;p&gt;Concepts I barely understood&lt;/p&gt;

&lt;p&gt;Mini code breakdowns&lt;/p&gt;

&lt;p&gt;It forced me to THINK clearer, LEARN faster, and it CONNECTED me with real developers.&lt;/p&gt;

&lt;p&gt;🚀 Benefits of learning in public:&lt;/p&gt;

&lt;p&gt;Instant feedback&lt;/p&gt;

&lt;p&gt;Unexpected opportunities&lt;/p&gt;

&lt;p&gt;Building your tech reputation early&lt;/p&gt;

&lt;p&gt;📢 Action Tip:&lt;br&gt;
Start posting one thing you learned or built every week — no matter how small.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Double Your Practice, Halve Your Watching
Watching tutorials feels comfortable.
But tutorials don't build muscle memory.
Only practice does.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The best change I made:&lt;/p&gt;

&lt;p&gt;Watch a topic&lt;/p&gt;

&lt;p&gt;Build it immediately&lt;/p&gt;

&lt;p&gt;Break it&lt;/p&gt;

&lt;p&gt;Fix it&lt;/p&gt;

&lt;p&gt;Rebuild it better&lt;/p&gt;

&lt;p&gt;That’s how learning locks into your brain.&lt;/p&gt;

&lt;p&gt;💥 Action Tip:&lt;br&gt;
For every 30 minutes of watching, spend 1 hour building.&lt;/p&gt;

&lt;p&gt;Final Thought: Stack Tiny Wins Until They Look Like Mastery&lt;br&gt;
You don’t need to be a genius to learn coding.&lt;br&gt;
You don’t need 12 hours a day.&lt;br&gt;
You don’t even need to be "good" at math.&lt;/p&gt;

&lt;p&gt;What you need is:&lt;br&gt;
✅ Small clear goals&lt;br&gt;
✅ Relentless tiny wins&lt;br&gt;
✅ Curiosity without ego&lt;/p&gt;

&lt;p&gt;The people who win aren’t always the fastest — they’re the ones who keep stacking wins until everyone else looks at them and says,&lt;br&gt;
"Wow, you’re so talented!"&lt;/p&gt;

&lt;p&gt;(Nope. Just consistent.)&lt;/p&gt;

&lt;p&gt;About the Author:&lt;br&gt;
I'm Ivo Pereira, a passionate web developer and tech builder.&lt;br&gt;
I'm on a mission to create secure, high-impact tech — and help others learn smarter, faster, and with more joy.&lt;br&gt;
Follow my work and projects here: GitHub.&lt;/p&gt;

&lt;p&gt;Let’s Connect:&lt;br&gt;
LinkedIn: &lt;a href="https://www.linkedin.com/in/pereira-ivo/" rel="noopener noreferrer"&gt;Connect Here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;GitHub: &lt;a href="https://github.com/ivocreates" rel="noopener noreferrer"&gt;ivocreates&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;👇 Your Move:&lt;br&gt;
What small win are you stacking today?&lt;br&gt;
Drop it in the comments — let's build momentum together!&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>beginners</category>
      <category>productivity</category>
    </item>
    <item>
      <title>🛡️ Cybersecurity 101: How to Stay Safe from Rising Cyber Threats</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Sun, 11 May 2025 04:00:59 +0000</pubDate>
      <link>https://forem.com/ivocreates/cybersecurity-101-how-to-stay-safe-from-rising-cyber-threats-241k</link>
      <guid>https://forem.com/ivocreates/cybersecurity-101-how-to-stay-safe-from-rising-cyber-threats-241k</guid>
      <description>&lt;p&gt;Author: &lt;a href="https://www.linkedin.com/in/pereira-ivo/" rel="noopener noreferrer"&gt;Ivo Pereira&lt;/a&gt;&lt;br&gt;
(Web Developer | Tech Enthusiast | Cybersecurity Aware Citizen)&lt;/p&gt;

&lt;p&gt;In today’s digital world, cybersecurity is no longer optional.&lt;br&gt;
From simple scams to advanced cyberattacks, threats are everywhere — targeting people of all ages, backgrounds, and professions.&lt;br&gt;
The good news? With a few simple habits and the right mindset, you can protect yourself and your loved ones.&lt;/p&gt;

&lt;p&gt;This guide explains — in simple words — how to stay safe, what to watch for, how to recover if attacked, and why being aware is more important than ever.&lt;/p&gt;

&lt;p&gt;🚨 Why Are Cyberattacks Rising Everywhere&lt;br&gt;
More devices = More opportunities for hackers (phones, smart TVs, even smart fridges).&lt;/p&gt;

&lt;p&gt;Global conflicts and wars often extend into cyber wars.&lt;/p&gt;

&lt;p&gt;Hackers are not just criminals — some are sponsored by governments.&lt;/p&gt;

&lt;p&gt;Everyday people are easier targets because they are often less protected.&lt;/p&gt;

&lt;p&gt;Criminals want easy money — and ordinary users are softer targets.&lt;/p&gt;

&lt;p&gt;Lack of awareness is the biggest weakness hackers exploit.&lt;/p&gt;

&lt;p&gt;No matter who you are — a student, a professional, a business owner, or a retiree — you are valuable online. Your identity, money, and personal data are what attackers seek.&lt;/p&gt;

&lt;p&gt;🧨 Common Types of Cyberattacks You Should Know&lt;br&gt;
Phishing: Fake emails or messages trying to steal your personal information.&lt;/p&gt;

&lt;p&gt;Ransomware: Your files are locked and ransom is demanded to unlock them.&lt;/p&gt;

&lt;p&gt;Identity Theft: Hackers steal and misuse your personal information.&lt;/p&gt;

&lt;p&gt;Malware/Viruses: Harmful software damages or spies on your device.&lt;/p&gt;

&lt;p&gt;Social Engineering: Tricks that make you reveal confidential info unknowingly.&lt;/p&gt;

&lt;p&gt;Credential Stuffing: Using your leaked passwords from one site to hack another.&lt;/p&gt;

&lt;p&gt;👀 Signs You Are Being Targeted&lt;br&gt;
Unusual messages from unknown numbers or emails.&lt;/p&gt;

&lt;p&gt;Pop-ups or links asking you to "update your account" urgently.&lt;/p&gt;

&lt;p&gt;Phone calls asking for OTPs, bank details, or passwords.&lt;/p&gt;

&lt;p&gt;Slow device performance without reason.&lt;/p&gt;

&lt;p&gt;Apps asking for unnecessary permissions (like a calculator asking for camera access).&lt;/p&gt;

&lt;p&gt;🧠 Golden Rules to Stay Safe&lt;br&gt;
🔒 1. Use Strong, Unique Passwords:&lt;/p&gt;

&lt;p&gt;Different passwords for different accounts.&lt;/p&gt;

&lt;p&gt;Mix UPPERCASE, lowercase, numbers, and symbols.&lt;/p&gt;

&lt;p&gt;Change them every 3-6 months.&lt;/p&gt;

&lt;p&gt;Use a password manager to keep them safe.&lt;/p&gt;

&lt;p&gt;📲 2. Enable Two-Factor Authentication (2FA):&lt;/p&gt;

&lt;p&gt;Always activate 2FA on important accounts like email, banking, and social media.&lt;/p&gt;

&lt;p&gt;🚫 3. Think Before You Click:&lt;/p&gt;

&lt;p&gt;Never click on unknown links, videos, files, or messages from suspicious people.&lt;/p&gt;

&lt;p&gt;Even if it looks urgent or attractive ("You won a prize!" ❌), verify first.&lt;/p&gt;

&lt;p&gt;Hover over links to check the real URL before clicking (especially on computers).&lt;/p&gt;

&lt;p&gt;📵 4. Apps Only from Trusted Sources:&lt;/p&gt;

&lt;p&gt;Download apps only from official stores like Google Play or the Apple App Store.&lt;/p&gt;

&lt;p&gt;Check reviews, developer info, and permissions before installing.&lt;/p&gt;

&lt;p&gt;🛡️ 5. Update Everything:&lt;/p&gt;

&lt;p&gt;Keep your phone, apps, and computer software updated.&lt;/p&gt;

&lt;p&gt;Updates fix security holes that hackers can exploit.&lt;/p&gt;

&lt;p&gt;🛑 6. Avoid Public Wi-Fi for Banking or Sensitive Work:&lt;/p&gt;

&lt;p&gt;Public Wi-Fi can be easily hacked.&lt;/p&gt;

&lt;p&gt;If needed, always use a trusted VPN (Virtual Private Network).&lt;/p&gt;

&lt;p&gt;🔍 7. Check Before Sharing Personal Info:&lt;/p&gt;

&lt;p&gt;No bank, company, or government body will ask for your OTPs or passwords over a call or email.&lt;/p&gt;

&lt;p&gt;If in doubt, hang up and call the official number yourself.&lt;/p&gt;

&lt;p&gt;📚 8. Educate Your Family:&lt;/p&gt;

&lt;p&gt;Kids, parents, and grandparents are all targets too.&lt;/p&gt;

&lt;p&gt;Teach them basic online safety habits.&lt;/p&gt;

&lt;p&gt;🛠️ What To Do If You Get Hacked&lt;br&gt;
Don't panic. Act quickly.&lt;/p&gt;

&lt;p&gt;Disconnect the affected device from the internet.&lt;/p&gt;

&lt;p&gt;Change passwords immediately, especially for banking and emails.&lt;/p&gt;

&lt;p&gt;Scan your device with trusted antivirus and malware removal tools.&lt;/p&gt;

&lt;p&gt;Inform your bank if financial information was exposed.&lt;/p&gt;

&lt;p&gt;Notify your contacts if your account was sending spam.&lt;/p&gt;

&lt;p&gt;Report it to local cybercrime authorities:&lt;/p&gt;

&lt;p&gt;India: &lt;a href="https://cybercrime.gov.in" rel="noopener noreferrer"&gt;https://cybercrime.gov.in&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;USA: FBI Internet Crime Complaint Center (IC3)&lt;/p&gt;

&lt;p&gt;🏛️ Who to Contact for Help&lt;br&gt;
Local Police Cyber Crime Unit&lt;/p&gt;

&lt;p&gt;National Cyber Security Agencies (CERT, CISA, etc.)&lt;/p&gt;

&lt;p&gt;Your Bank’s Customer Support&lt;/p&gt;

&lt;p&gt;Professional Cybersecurity Services (if needed)&lt;/p&gt;

&lt;p&gt;🌟 Extra Tips to Stay Ahead&lt;br&gt;
Lock your phone and computer with PINs or biometrics.&lt;/p&gt;

&lt;p&gt;Review your social media privacy settings regularly.&lt;/p&gt;

&lt;p&gt;Watch for urgent language in emails ("Immediate action required!" 🚨).&lt;/p&gt;

&lt;p&gt;Regularly check if your email/passwords were leaked at HaveIBeenPwned.&lt;/p&gt;

&lt;p&gt;Backup your important files regularly (cloud or external hard drive).&lt;/p&gt;

&lt;p&gt;Regularly review your bank account and credit card statements.&lt;/p&gt;

&lt;p&gt;Subscribe to a good antivirus if possible — it’s cheaper than getting hacked.&lt;/p&gt;

&lt;p&gt;Avoid oversharing personal details like your location, address, or travel plans online.&lt;/p&gt;

&lt;p&gt;✅ Quick Cybersecurity Checklist&lt;br&gt;
✔️ Unique, strong passwords&lt;br&gt;
✔️ 2FA enabled everywhere&lt;br&gt;
✔️ Think before clicking any unknown link, video, file, or message&lt;br&gt;
✔️ Regular backups&lt;br&gt;
✔️ Antivirus installed and updated&lt;br&gt;
✔️ Avoid public Wi-Fi or use a VPN&lt;br&gt;
✔️ Keep your devices and apps updated&lt;br&gt;
✔️ Watch for scam signs&lt;br&gt;
✔️ Educate your family&lt;/p&gt;

&lt;p&gt;✨ Final Words: Stay Smart, Stay Strong&lt;br&gt;
Cyberattacks are like invisible battles happening every second across the globe.&lt;br&gt;
You don’t need to be a cybersecurity expert — just be alert, think twice, and protect your digital world.&lt;br&gt;
The small steps you take today can save you — and your family — from big trouble tomorrow.&lt;/p&gt;

&lt;p&gt;👉 Share this guide with your friends and family. Together, we make the internet a safer place.&lt;/p&gt;

&lt;p&gt;📚 References&lt;br&gt;
Cybersecurity &amp;amp; Infrastructure Security Agency (CISA)&lt;/p&gt;

&lt;p&gt;FBI Internet Crime Complaint Center (IC3)&lt;/p&gt;

&lt;p&gt;CERT-IN India&lt;/p&gt;

&lt;p&gt;HaveIBeenPwned - Data Breach Checker&lt;/p&gt;

&lt;p&gt;✍️ About the Author&lt;br&gt;
I am (&lt;a href="https://ivocreates.site/" rel="noopener noreferrer"&gt;Ivo Pereira&lt;/a&gt;) a Web Developer and a Computer Science student passionate about building secure and innovative technologies.&lt;br&gt;
I believes in making cybersecurity awareness simple and accessible for everyone.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>awareness</category>
      <category>security</category>
    </item>
    <item>
      <title>5 Practical Cybersecurity Habits Every Developer and IT Professional Must Build in 2025</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Sat, 10 May 2025 06:52:20 +0000</pubDate>
      <link>https://forem.com/ivocreates/5-practical-cybersecurity-habits-every-developer-and-it-professional-must-build-in-2025-1gig</link>
      <guid>https://forem.com/ivocreates/5-practical-cybersecurity-habits-every-developer-and-it-professional-must-build-in-2025-1gig</guid>
      <description>&lt;p&gt;✍️ Written by Ivo Pereira&lt;br&gt;
Computer Science Student | Web Developer | Cybersecurity Enthusiast&lt;/p&gt;

&lt;p&gt;In today’s hyper-connected world, cybersecurity has shifted from being a specialized field to becoming a core life skill.&lt;br&gt;
If you’re a developer, a student, a system administrator, or even a tech-savvy user — security is your first responsibility.&lt;/p&gt;

&lt;p&gt;A single weak link, a careless click, or a missed update can open the door to devastating attacks.&lt;/p&gt;

&lt;p&gt;That's why I'm sharing five simple, practical cybersecurity habits you should immediately build — no matter where you are in your tech journey.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Stay Updated — Patch Early, Patch Often 🔥
"The longer you delay an update, the bigger the risk you invite."&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Software vulnerabilities are discovered every day, and attackers exploit them fast — often within hours.&lt;br&gt;
Whether it's your operating system, browser, CMS, database, or even a tiny npm package — everything needs regular patching.&lt;/p&gt;

&lt;p&gt;Actionable Tips:&lt;/p&gt;

&lt;p&gt;Set auto-updates for operating systems and browsers.&lt;/p&gt;

&lt;p&gt;Use services like Dependabot for GitHub projects to automatically detect outdated dependencies.&lt;/p&gt;

&lt;p&gt;Check for updates at least weekly if auto-updates are not available.&lt;/p&gt;

&lt;p&gt;Reference:&lt;br&gt;
The Cost of Unpatched Software – IBM Security Report, 2024&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Defend Yourself Against Social Engineering Attacks 🎭
"Sometimes it's easier to hack a human than a system."&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Social engineering — phishing emails, fake support calls, malicious DMs — is still the #1 cause of security breaches worldwide.&lt;/p&gt;

&lt;p&gt;You could have the best firewall in the world, but if you click the wrong link, you're vulnerable.&lt;/p&gt;

&lt;p&gt;Actionable Tips:&lt;/p&gt;

&lt;p&gt;Always verify unknown contacts independently (e.g., call back official numbers).&lt;/p&gt;

&lt;p&gt;Be skeptical of "urgent" emails asking for personal info or credentials.&lt;/p&gt;

&lt;p&gt;Double-check URLs carefully before clicking.&lt;/p&gt;

&lt;p&gt;Real Case Example:&lt;br&gt;
In 2023, MGM Resorts was breached due to a simple phishing attack that cost them over $100 million.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Use Strong, Unique Passwords (and a Password Manager) 🔑
"Your password is your first and most important line of defense."&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Weak passwords like password123 or reused credentials are an open invitation to attackers.&lt;/p&gt;

&lt;p&gt;Actionable Tips:&lt;/p&gt;

&lt;p&gt;Create long (12+ characters), complex, and unique passwords.&lt;/p&gt;

&lt;p&gt;Never reuse passwords across sites.&lt;/p&gt;

&lt;p&gt;Use password managers like Bitwarden, 1Password, or KeePass to securely store them.&lt;/p&gt;

&lt;p&gt;Reference:&lt;br&gt;
Verizon Data Breach Investigations Report (DBIR) 2024&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Enable Two-Factor Authentication (2FA) Everywhere 🔒
Passwords alone are not enough today.
A second factor — like a code from an authenticator app — drastically reduces the risk of account takeover.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Actionable Tips:&lt;/p&gt;

&lt;p&gt;Enable 2FA on email, GitHub, cloud accounts, banking apps — anything critical.&lt;/p&gt;

&lt;p&gt;Prefer apps like Authy or Google Authenticator over SMS.&lt;/p&gt;

&lt;p&gt;Consider hardware security keys (like YubiKey) for extra sensitive accounts.&lt;/p&gt;

&lt;p&gt;Fact:&lt;br&gt;
According to Microsoft, enabling 2FA blocks 99.9% of automated account hacks.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Stay Curious and Keep Learning 📚
"The only constant in cybersecurity is change."&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;New threats emerge every day.&lt;br&gt;
Staying informed doesn’t require becoming a full-time hacker — just 30 minutes a week can make you dramatically safer.&lt;/p&gt;

&lt;p&gt;Actionable Tips:&lt;/p&gt;

&lt;p&gt;Follow top cybersecurity blogs:&lt;/p&gt;

&lt;p&gt;KrebsOnSecurity&lt;/p&gt;

&lt;p&gt;BleepingComputer&lt;/p&gt;

&lt;p&gt;Subscribe to weekly newsletters like The Hacker News.&lt;/p&gt;

&lt;p&gt;Follow cybersecurity experts like Brian Krebs, Troy Hunt, and Katie Moussouris on LinkedIn and Twitter/X.&lt;/p&gt;

&lt;p&gt;Conclusion&lt;br&gt;
🔒 Security is not a feature — it's a way of life.&lt;/p&gt;

&lt;p&gt;Whether you’re writing code, managing servers, using cloud platforms, or simply browsing online — these 5 simple habits can transform you from a soft target into a digital fortress.&lt;/p&gt;

&lt;p&gt;Start today. Your future self will thank you.&lt;/p&gt;

&lt;p&gt;About the Author&lt;br&gt;
👨‍💻 Ivo Pereira&lt;br&gt;
Computer Science Student | Web Developer | Cybersecurity Enthusiast&lt;br&gt;
Sharing knowledge about modern tech, cybersecurity, and secure development practices.&lt;br&gt;
Follow me for more insights into building a safer digital world! 🌍&lt;/p&gt;

&lt;p&gt;Connect with me on &lt;a href="https://github.com/ivocreates" rel="noopener noreferrer"&gt;GitHub&lt;/a&gt; | &lt;a href="https://www.linkedin.com/in/pereira-ivo/" rel="noopener noreferrer"&gt;LinkedIn Profile&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;References&lt;br&gt;
IBM Security — The Cost of a Data Breach Report 2024&lt;/p&gt;

&lt;p&gt;Verizon — Data Breach Investigations Report (DBIR) 2024&lt;/p&gt;

&lt;p&gt;KrebsOnSecurity — Cybersecurity News &amp;amp; Investigation&lt;/p&gt;

&lt;p&gt;Microsoft — Identity Protection Report 2023&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>programming</category>
      <category>cybersecurity</category>
      <category>development</category>
    </item>
    <item>
      <title>The Importance of Password Entropy in Cybersecurity: Strengthening Your Defenses Against Brute-Force Attacks</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Sun, 04 May 2025 17:40:02 +0000</pubDate>
      <link>https://forem.com/ivocreates/the-importance-of-password-entropy-in-cybersecurity-strengthening-your-defenses-against-21i</link>
      <guid>https://forem.com/ivocreates/the-importance-of-password-entropy-in-cybersecurity-strengthening-your-defenses-against-21i</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2o58nrmzxoi57dxaebkf.jpg" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F2o58nrmzxoi57dxaebkf.jpg" alt="Image description" width="800" height="533"&gt;&lt;/a&gt;&lt;br&gt;
In today’s digital age, securing online accounts is more critical than ever. With the rise of cybersecurity threats, it’s essential to understand the importance of strong password practices. While biometric authentication systems and multi-factor authentication (MFA) are gaining popularity, passwords remain the most common form of securing online accounts. However, many users still create weak passwords, making them vulnerable to various types of cyberattacks. This article will focus on the concept of password entropy and its crucial role in resisting brute-force attacks, offering insights into how increasing password complexity can protect your online presence.&lt;/p&gt;

&lt;p&gt;Why Passwords Still Matter&lt;br&gt;
Despite advancements in cybersecurity, passwords remain the first line of defense for securing personal and organizational data. However, many people still use weak passwords, relying on simple, predictable patterns or reusing passwords across multiple platforms. This vulnerability makes it much easier for attackers to gain unauthorized access to personal information. Thus, creating strong and complex passwords is more important than ever.&lt;/p&gt;

&lt;p&gt;The key issue lies in password predictability, which is where the concept of entropy comes in. Entropy measures the unpredictability or randomness of a password, and the higher the entropy, the more secure the password is against attacks. Higher entropy means a password is more difficult to guess, significantly enhancing security.&lt;/p&gt;

&lt;p&gt;The Risk of Weak Passwords&lt;br&gt;
This research explores the relationship between password entropy and its resistance to brute-force attacks. Brute-force attacks involve cybercriminals attempting every possible combination of characters until they crack the password. While this approach can be slow, weak passwords make the process significantly faster for attackers. To illustrate this, I simulated brute-force attacks on both an Apache-based website and an SSH service using passwords of varying entropy levels.&lt;/p&gt;

&lt;p&gt;By utilizing tools in Kali Linux, I was able to measure key metrics such as cracking time, network load, and tool efficiency. This experiment provides valuable insights into how password complexity impacts security.&lt;/p&gt;

&lt;p&gt;Understanding Password Complexity and Entropy&lt;br&gt;
Password Complexity and Entropy&lt;br&gt;
Password complexity refers to how difficult it is to guess or crack a password. One of the most important factors in determining password complexity is entropy. Entropy, introduced by Claude Shannon in 1948, measures the unpredictability or randomness of a password. A password with high entropy is extremely difficult to guess.&lt;/p&gt;

&lt;p&gt;The formula for calculating entropy (H) of a password is:&lt;br&gt;
H(X)=−∑p(x)⋅log2(p(x))&lt;br&gt;
Where:&lt;br&gt;
H(X) is the entropy of the password.&lt;br&gt;
p(x) is the probability of each character in the password.&lt;br&gt;
log2 is the base-2 logarithm.&lt;/p&gt;

&lt;p&gt;In simpler terms, entropy is about how random and unpredictable your password is. A higher entropy value corresponds to a more complex, harder-to-crack password. However, real-world behaviors, such as using simple words or common patterns, can drastically lower effective entropy.&lt;/p&gt;

&lt;p&gt;Online Password Attacks&lt;br&gt;
Cybercriminals use various online password attacks to crack weak passwords. Some common attacks include:&lt;/p&gt;

&lt;p&gt;Dictionary Attacks: Using a list of common words to guess the password.&lt;/p&gt;

&lt;p&gt;Brute-Force Attacks: Trying every possible combination of characters.&lt;/p&gt;

&lt;p&gt;Credential Stuffing: Using leaked credentials from previous breaches to attempt login.&lt;/p&gt;

&lt;p&gt;These attacks can be mitigated by factors like rate-limiting and network speed. However, the complexity of the password itself plays a key role in defending against these attacks.&lt;/p&gt;

&lt;p&gt;Tools for Cracking Passwords&lt;br&gt;
To simulate password attacks, I used several tools available in Kali Linux:&lt;/p&gt;

&lt;p&gt;Hydra: A fast, flexible tool for brute-force password cracking across multiple protocols.&lt;/p&gt;

&lt;p&gt;Medusa: A high-speed password-cracking tool optimized for performance.&lt;/p&gt;

&lt;p&gt;Ncrack: A tool focusing on network reliability and stealth, ideal for cracking network services.&lt;/p&gt;

&lt;p&gt;How I Tested Password Entropy&lt;br&gt;
Environment Setup&lt;br&gt;
For this experiment, I set up the following:&lt;/p&gt;

&lt;p&gt;Operating System: Kali Linux 2024.1&lt;/p&gt;

&lt;p&gt;Target Services: Apache2 web server with HTTP Basic Authentication and OpenSSH server for remote login.&lt;/p&gt;

&lt;p&gt;Authentication Setup: Used a .htpasswd file for Apache and default SSH configuration.&lt;/p&gt;

&lt;p&gt;User Accounts: Created three users with passwords of varying entropy levels: low, medium, and high.&lt;/p&gt;

&lt;p&gt;Password Entropy Calculation&lt;br&gt;
I manually calculated the entropy of each password based on their character set and length. Below are the results:&lt;br&gt;
PasswordLength (L)Character Set Size (N)Entropy &lt;br&gt;
password123: Length = 11, Character Set Size = 36, Entropy = 56.5 bits&lt;br&gt;
Tr4inStat10n: Length = 12, Character Set Size = 62, Entropy = 71.5 bits&lt;br&gt;
V!9x*2qz#B: Length = 10, Character Set Size = 94, Entropy = 65.7 bits&lt;/p&gt;

&lt;p&gt;Attack Simulation&lt;br&gt;
I used Hydra, Medusa, and Ncrack to attack the Apache and SSH services. I ran these attacks with the following parameters:&lt;/p&gt;

&lt;p&gt;5 concurrent threads&lt;/p&gt;

&lt;p&gt;3 login attempts per second&lt;/p&gt;

&lt;p&gt;30-second timeout after success or failure&lt;/p&gt;

&lt;p&gt;I also used Wireshark to monitor network activity and track the progress of the attacks.&lt;/p&gt;

&lt;p&gt;Data Collection&lt;br&gt;
The following metrics were recorded during the attacks:&lt;/p&gt;

&lt;p&gt;Time-to-crack for each password&lt;/p&gt;

&lt;p&gt;Number of packets sent&lt;/p&gt;

&lt;p&gt;Bandwidth consumed during the attack&lt;/p&gt;

&lt;p&gt;Experimental Results: Impact of Entropy on Attack Success&lt;br&gt;
Apache Authentication&lt;br&gt;
Hydra: Fastest in cracking passwords but generated the most network traffic.&lt;/p&gt;

&lt;p&gt;Medusa: Slower but more bandwidth-efficient.&lt;/p&gt;

&lt;p&gt;Ncrack: Balanced speed and efficiency.&lt;/p&gt;

&lt;p&gt;SSH Authentication&lt;br&gt;
SSH took longer to crack due to encryption and rate-limiting protections. Among the tools:&lt;/p&gt;

&lt;p&gt;Hydra: Fast but detected by SSH security mechanisms.&lt;/p&gt;

&lt;p&gt;Medusa: Slower but quieter.&lt;/p&gt;

&lt;p&gt;Ncrack: Efficient and stealthy.&lt;/p&gt;

&lt;p&gt;I plotted the time-to-crack for each password with varying entropy. The results showed that higher entropy passwords took much longer to crack, highlighting the importance of strong passwords.&lt;/p&gt;

&lt;p&gt;What Did I Learn?&lt;br&gt;
The experiment clearly demonstrated that passwords with higher entropy are much harder to crack. Low-entropy passwords were cracked quickly, while higher-entropy passwords required exponentially more time, making them more secure.&lt;/p&gt;

&lt;p&gt;Moreover, SSH authentication proved more resilient to attacks compared to Apache Basic Authentication due to built-in encryption and protections. Among the cracking tools, Hydra was the fastest but had higher traffic, Medusa was slower but stealthier, and Ncrack provided a balanced approach.&lt;/p&gt;

&lt;p&gt;Conclusion: Strengthening Your Passwords&lt;br&gt;
This study reinforces the critical role of password complexity in cybersecurity. Higher entropy passwords are significantly more secure against brute-force attacks. The key takeaway is straightforward: use strong, complex passwords and avoid common words or simple patterns.&lt;/p&gt;

&lt;p&gt;While strong passwords are vital, additional security measures such as multi-factor authentication (MFA) can further enhance your protection. In today’s cyber landscape, it's essential to understand the concept of entropy and apply it to your password practices to keep your online accounts safe.&lt;/p&gt;

&lt;p&gt;Final Thoughts&lt;br&gt;
By increasing the entropy of your passwords, you make it much harder for attackers to gain unauthorized access. Cyber threats are constantly evolving, and weak passwords are no longer acceptable. It’s time to strengthen your defenses by moving away from simple, predictable passwords and adopting more complex alternatives.&lt;/p&gt;

&lt;p&gt;Stay safe and protect your online presence by embracing better password practices today.&lt;/p&gt;

&lt;p&gt;Ivo Pereira | Computer Science Student &amp;amp; Cybersecurity Enthusiast&lt;br&gt;
&lt;a href="https://github.com/ivocreates" rel="noopener noreferrer"&gt;GitHub Profile&lt;/a&gt; | &lt;a href="http://ivocreates.site/" rel="noopener noreferrer"&gt;Portfolio&lt;/a&gt; | &lt;a href="https://www.linkedin.com/in/pereira-ivo/" rel="noopener noreferrer"&gt;LinkedIn&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>webdev</category>
      <category>security</category>
      <category>programming</category>
    </item>
    <item>
      <title>Unlocking the Power of AI: A Developer’s Ultimate Guide to Tools, Prompt Engineering, and Productivity Mastery</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Thu, 01 May 2025 13:09:56 +0000</pubDate>
      <link>https://forem.com/ivocreates/unlocking-the-power-of-ai-a-developers-ultimate-guide-to-tools-prompt-engineering-and-4dj</link>
      <guid>https://forem.com/ivocreates/unlocking-the-power-of-ai-a-developers-ultimate-guide-to-tools-prompt-engineering-and-4dj</guid>
      <description>&lt;p&gt;Written by: Ivo Pereira | Web Developer | AI Enthusiast | Computer Science Student&lt;/p&gt;

&lt;p&gt;Introduction&lt;/p&gt;

&lt;p&gt;Artificial Intelligence (AI) is redefining productivity in the digital era.&lt;br&gt;
For developers, creators, and entrepreneurs alike, AI is not merely a tool — it is a force multiplier that can supercharge creativity, innovation, and efficiency.&lt;/p&gt;

&lt;p&gt;Reality Check:&lt;br&gt;
Those who embrace AI today will shape the future. Those who overlook it risk being left behind.&lt;/p&gt;

&lt;p&gt;In this comprehensive guide, I share insights on:&lt;/p&gt;

&lt;p&gt;The top AI tools and how to use them effectively&lt;/p&gt;

&lt;p&gt;Crafting prompts that get exceptional results&lt;/p&gt;

&lt;p&gt;Smart integration of AI into development workflows&lt;/p&gt;

&lt;p&gt;Techniques to optimize costs and maximize output&lt;/p&gt;

&lt;p&gt;Strategies to avoid common mistakes and stay ahead&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Best AI Tools and Their Ideal Use Cases
The right tool for the right task makes all the difference. Here's a curated list:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Tool    Purpose Best Use Case&lt;br&gt;
ChatGPT (OpenAI)    Text generation, coding assistance  Content creation, code drafting, idea brainstorming&lt;br&gt;
GitHub Copilot  Code autocomplete in IDEs   Accelerating coding, reducing boilerplate&lt;br&gt;
Claude (Anthropic)  Analytical writing, summarization   Research summarization, report drafting&lt;br&gt;
Google Gemini (formerly Bard)   Real-time web research  Gathering updated factual information&lt;br&gt;
Perplexity AI   Search with citations   Quick factual queries with trusted sources&lt;br&gt;
Midjourney / DALL·E 3  Image generation    Visual content, marketing assets&lt;br&gt;
Notion AI   Productivity enhancement    Summarizing meetings, drafting structured notes&lt;br&gt;
Replit Ghostwriter  Code assistance on Replit platform  Live coding, instant project scaffolding&lt;/p&gt;

&lt;p&gt;Pro Tip:&lt;br&gt;
Combine ChatGPT for creative drafts, GitHub Copilot for technical execution, and Perplexity AI for research accuracy.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Integrating AI Into Your Developer Workflow
To future-proof your career, embed AI strategically:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Planning Projects: Generate detailed project roadmaps with ChatGPT.&lt;/p&gt;

&lt;p&gt;Writing Code: Use Copilot to autocomplete functions and suggest best practices.&lt;/p&gt;

&lt;p&gt;Debugging: Analyze and fix errors by pasting logs into ChatGPT for diagnosis.&lt;/p&gt;

&lt;p&gt;Testing: Automate the creation of unit and integration tests.&lt;/p&gt;

&lt;p&gt;Documentation: Speed up writing of README files, changelogs, and API docs.&lt;/p&gt;

&lt;p&gt;Learning: Simplify complex topics via AI explanations tailored to your learning style.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;How to Write Powerful AI Prompts
The secret to AI mastery lies in prompt engineering.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Effective Prompt Structure:&lt;br&gt;
Instruction + Context + Example + Desired Output&lt;/p&gt;

&lt;p&gt;Example:&lt;/p&gt;

&lt;p&gt;Weak: "Write a website."&lt;/p&gt;

&lt;p&gt;Strong: "Develop a responsive landing page in HTML/CSS for a fintech startup. Include a hero section, feature highlights, and contact form. Mobile-first design preferred."&lt;/p&gt;

&lt;p&gt;Best Practices:&lt;/p&gt;

&lt;p&gt;Be specific and detailed&lt;/p&gt;

&lt;p&gt;Request multiple options when needed&lt;/p&gt;

&lt;p&gt;Set output limits ("under 300 words", "three variations")&lt;/p&gt;

&lt;p&gt;Use iterative refinements ("now make it formal", "add humor")&lt;/p&gt;

&lt;p&gt;Powerful Starter Templates:&lt;/p&gt;

&lt;p&gt;"Act as a cybersecurity expert and explain..."&lt;/p&gt;

&lt;p&gt;"Create 3 backend architectures for a SaaS platform..."&lt;/p&gt;

&lt;p&gt;"Rewrite this paragraph for a tech-savvy audience..."&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;How to Save AI Credits and Money
Optimize usage to make the most of your AI subscriptions:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Keep prompts concise and targeted&lt;/p&gt;

&lt;p&gt;Use lower-cost models (e.g., GPT-3.5) for non-critical tasks&lt;/p&gt;

&lt;p&gt;Group related questions in a single session&lt;/p&gt;

&lt;p&gt;Reduce token count by summarizing conversations&lt;/p&gt;

&lt;p&gt;Pro Tip:&lt;br&gt;
Tweak temperature settings for desired behavior:&lt;/p&gt;

&lt;p&gt;0.2–0.5 = Accuracy and focus (coding, facts)&lt;/p&gt;

&lt;p&gt;0.7–1.0 = Creativity and ideation (brainstorming)&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Advanced AI Productivity Strategies
Level up your AI game:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Automate repetitive tasks: Auto-generate templates, snippets, content outlines.&lt;/p&gt;

&lt;p&gt;Build custom AI tools: Create GPTs fine-tuned for your personal workflows.&lt;/p&gt;

&lt;p&gt;Mix different AI platforms: Research via Perplexity, summarize via Claude, expand via ChatGPT.&lt;/p&gt;

&lt;p&gt;Use AI APIs: Integrate AI models into your apps for dynamic experiences.&lt;/p&gt;

&lt;p&gt;Create smart assistants: Bots for bug tracking, content planning, or CRM management.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Real-World Success Examples
Developers: Cut project time by up to 50% using Copilot.&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Entrepreneurs: Build MVPs in days instead of months using AI platforms.&lt;/p&gt;

&lt;p&gt;Writers/Marketers: Increase output volume and creative quality with AI brainstorming tools.&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;Common Mistakes to Avoid
Stay vigilant when using AI:&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;Blindly trusting AI outputs without verifying facts&lt;/p&gt;

&lt;p&gt;Using AI-generated code without understanding it&lt;/p&gt;

&lt;p&gt;Giving vague, incomplete prompts&lt;/p&gt;

&lt;p&gt;Sharing confidential data in public models&lt;/p&gt;

&lt;p&gt;Golden Rule:&lt;br&gt;
AI is your co-pilot — not your autopilot.&lt;/p&gt;

&lt;p&gt;Final Words: The Future Is AI-Augmented&lt;br&gt;
Mastering AI is no longer optional for those who aspire to thrive.&lt;br&gt;
It’s not about replacing human intelligence — it’s about amplifying it.&lt;/p&gt;

&lt;p&gt;Practice daily. Sharpen your prompts. Stay curious.&lt;br&gt;
The next era belongs to those who collaborate intelligently with machines.&lt;/p&gt;

&lt;p&gt;About the Author&lt;br&gt;
Ivo Pereira is a Web Developer, Computer Science student, and passionate advocate for secure, innovative technologies.&lt;br&gt;
He specializes in creating advanced, future-ready web solutions and has a growing focus on AI integration, cybersecurity, and digital creativity.&lt;/p&gt;

&lt;p&gt;Connect with Ivo:&lt;/p&gt;

&lt;p&gt;LinkedIn: &lt;a href="https://www.linkedin.com/in/pereira-ivo/" rel="noopener noreferrer"&gt;https://www.linkedin.com/in/pereira-ivo/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;GitHub: &lt;a href="https://github.com/ivocreates" rel="noopener noreferrer"&gt;https://github.com/ivocreates&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Portfolio: &lt;a href="https://ivocreates.site/" rel="noopener noreferrer"&gt;https://ivocreates.site/&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Stay tuned for more insightful guides, resources, and projects aimed at empowering the tech community.&lt;/p&gt;

&lt;p&gt;Helpful Resources&lt;br&gt;
OpenAI Official Documentation&lt;/p&gt;

&lt;p&gt;GitHub Copilot Documentation&lt;/p&gt;

&lt;p&gt;Learn Prompt Engineering - Free Course&lt;/p&gt;

&lt;p&gt;Perplexity AI Website&lt;/p&gt;

&lt;p&gt;Midjourney Getting Started Guide&lt;/p&gt;

&lt;p&gt;Quick Action Checklist&lt;br&gt;
Use at least one AI tool daily&lt;/p&gt;

&lt;p&gt;Write and refine 3–5 prompts per week&lt;/p&gt;

&lt;p&gt;Start a personal project integrating AI this month&lt;/p&gt;

&lt;p&gt;Build your personal "Prompt Library"&lt;/p&gt;

&lt;p&gt;Teach others — sharing strengthens mastery&lt;/p&gt;

&lt;p&gt;If you found this guide useful, feel free to bookmark, share, and connect.&lt;br&gt;
More cutting-edge insights are on the way!&lt;/p&gt;

</description>
      <category>webdev</category>
      <category>productivity</category>
      <category>ai</category>
    </item>
    <item>
      <title>The Rising Threat of Social Engineering Attacks in the Digital Age</title>
      <dc:creator>Ivo Pereira</dc:creator>
      <pubDate>Mon, 21 Apr 2025 08:19:23 +0000</pubDate>
      <link>https://forem.com/ivocreates/the-rising-threat-of-social-engineering-attacks-in-the-digital-age-6o8</link>
      <guid>https://forem.com/ivocreates/the-rising-threat-of-social-engineering-attacks-in-the-digital-age-6o8</guid>
      <description>&lt;p&gt;&lt;strong&gt;Ivo Pereira&lt;/strong&gt;&lt;br&gt;
Department of Computer Science&lt;br&gt;
Shri Pancham Khemraj Mahavidyalaya Sawantwadi, Affiliated to University of Mumbai.&lt;br&gt;
Maharashtra, India&lt;br&gt;
&lt;em&gt;&lt;a href="//ivopereiraix3@gmail.com"&gt;ivopereiraix3@gmail.com&lt;/a&gt;&lt;br&gt;
&lt;a href="https://github.com/ivocreates" rel="noopener noreferrer"&gt;github.com/ivocreates&lt;/a&gt;&lt;br&gt;
&lt;a href="https://ivocreates.site" rel="noopener noreferrer"&gt;ivocreates.site)&lt;/a&gt;&lt;br&gt;
&lt;a href="https://www.linkedin.com/in/pereira-ivo" rel="noopener noreferrer"&gt;www.linkedin.com/in/pereira-ivo&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Abstract&lt;/strong&gt;&lt;br&gt;
As digital infrastructure becomes more secure, malicious actors increasingly exploit the human element through social engineering. These attacks use psychological manipulation rather than technical exploits to gain unauthorized access to systems, data, or resources. This paper explores the various forms of social engineering, examines a major real-world case study, and evaluates current mitigation strategies. It highlights the urgent need to reinforce human defenses and increase awareness as social engineering becomes the most common entry point in modern cyberattacks.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Keywords&lt;/strong&gt;&lt;br&gt;
Cybersecurity, Social Engineering, Phishing, Psychological Exploits, Human Factors, Twitter Hack, Security Awareness&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;I. Introduction&lt;/strong&gt;&lt;br&gt;
The evolution of cybersecurity has led to robust systems employing firewalls, encryption, intrusion detection, and artificial intelligence. However, as technical defenses improve, attackers increasingly shift focus toward the most vulnerable component—the human user. Social engineering manipulates human psychology to achieve objectives that technical exploits might not. In recent years, such attacks have grown more sophisticated and widespread, targeting both individuals and organizations.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;II. Related Work / Literature Review&lt;/strong&gt;&lt;br&gt;
Previous literature outlines the psychological basis and technological vectors of social engineering. Mitnick and Simon [1] argue that trust manipulation is central to successful social attacks. Work by Hadnagy [2] categorizes attack types including phishing, baiting, and pretexting. The Verizon 2023 Data Breach Report [3] notes that over 70% of breaches involve a human element. While technical cybersecurity measures have been rigorously studied, the psychological component has only recently gained prominence in academic discourse.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;III. Methodology&lt;/strong&gt;&lt;br&gt;
This study uses qualitative research based on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Case analysis of publicized social engineering incidents.&lt;/li&gt;
&lt;li&gt;Review of industry reports from Verizon, MITRE, and Wired Magazine.&lt;/li&gt;
&lt;li&gt;Classification of attack types based on frequency, target, and method.&lt;/li&gt;
&lt;li&gt;Evaluation of current countermeasures from major organizations.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;IV. Results&lt;/strong&gt;&lt;br&gt;
The analysis revealed the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Phishing remains the most prevalent (estimated 3.4 billion daily spam emails [4]).&lt;/li&gt;
&lt;li&gt;Spear phishing is responsible for high-profile data breaches, including government and corporate targets.&lt;/li&gt;
&lt;li&gt;Pretexting and tailgating are common in corporate espionage.&lt;/li&gt;
&lt;li&gt;A lack of employee awareness and policy enforcement significantly contributes to successful attacks.&lt;/li&gt;
&lt;li&gt;The 2020 Twitter breach demonstrated the danger of failing to train internal support teams in social engineering awareness.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;V. Discussion&lt;/strong&gt;&lt;br&gt;
Social engineering attacks are effective because they exploit human trust, urgency, and fear. Attackers often rely on basic psychological triggers—curiosity, helpfulness, or authority. In the Twitter 2020 breach, attackers impersonated internal IT staff and persuaded employees to provide credentials via phone—a method known as vishing (voice phishing). Despite strong system security, poor human training opened a critical vulnerability.&lt;/p&gt;

&lt;p&gt;Prevention requires a multi-layered defense combining technology and human factors:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Security awareness programs must be continuous and scenario-based.&lt;/li&gt;
&lt;li&gt;Multi-Factor Authentication (MFA) reduces impact even if credentials are compromised.&lt;/li&gt;
&lt;li&gt;Simulated phishing drills improve user vigilance.&lt;/li&gt;
&lt;li&gt;Organizations should establish incident response protocols specific to social engineering threats.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;VI. Conclusion&lt;/strong&gt;&lt;br&gt;
Social engineering represents a growing threat in the cybersecurity landscape. As attackers develop increasingly deceptive strategies to manipulate individuals, technological defenses alone are no longer sufficient. Organizations must prioritize the human aspect of cybersecurity, integrating awareness training, behavioral analysis, and proactive response mechanisms. Only by addressing both technical and psychological vulnerabilities can we build truly secure systems.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;&lt;br&gt;
&lt;em&gt;[1] K. Mitnick and W. Simon, The Art of Deception: Controlling the Human Element of Security, Wiley, 2002.&lt;br&gt;
[2] C. Hadnagy, Social Engineering: The Science of Human Hacking, Wiley, 2018.&lt;br&gt;
[3] Verizon, 2023 Data Breach Investigations Report. [Online]. Available: &lt;a href="https://www.verizon.com/dbir/2023" rel="noopener noreferrer"&gt;https://www.verizon.com/dbir/2023&lt;/a&gt;&lt;br&gt;
[4] A. Greenberg, “Inside the 2020 Twitter Hack,” Wired Magazine, Aug. 2020. [Online]. Available: &lt;a href="https://www.wired.com/story/twitter-hack-2020/" rel="noopener noreferrer"&gt;https://www.wired.com/story/twitter-hack-2020/&lt;/a&gt;&lt;br&gt;
[5] MITRE ATT&amp;amp;CK Framework – Social Engineering Tactics. [Online]. Available: &lt;a href="https://attack.mitre.org/techniques/" rel="noopener noreferrer"&gt;https://attack.mitre.org/techniques/&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

</description>
    </item>
  </channel>
</rss>
