9 top anti-phishing tools and services

Phishing ranks low on the list of cyberattacks in terms of technological sophistication. Even more sophisticated phishing variants like spear phishing (focused and often personalized phishing attacks) and whaling (phishing attacks focused on high-profile or...

16 top endpoint protection platforms

Endpoint security has long been an important part of cybersecurity within any enterprise’s overall security architecture, particularly to provide protection for remote devices that connect to an enterprise network. When laptops, smartphones, or desktop computers...

Top 8 weirdest, meanest and dumbest hacks of all time

Hackers are determined, persistent, clever, adaptable, stealthy and merciless. They will exploit any tragedy, even the current COVID-19 pandemic, and take advantage of any vulnerability in your network.Sometimes hacks can be incredibly complex and sophisticated, but...