Blog > Page 56

Stay sharp with security insights

CyberHoot July 2020 Press Release

CyberHoot July 2020 Press Release

Click Image To View Larger Version CyberHoot’s Press Releases are published on a monthly basis. To...

Read more
Hacker’s Latest Scam: Pet Adoptions

Hacker’s Latest Scam: Pet Adoptions

Since Coronavirus (COVID-19) gained pandemic status in early March 2020, hackers have been attacking...

Read more
Cryptanalysis

Cryptanalysis

Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text. Cryptanalysis uses...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Bloatware

Bloatware

Bloatware is software that comes pre-installed with the purchase of a new computer or device. Many...

Read more
Trialware

Trialware

Trialware is software that can be used for a short period of time before it expires. In order to keep...

Read more
Piggybacking

Piggybacking

Piggybacking is a form of cyber attack where a hacker(s) gain access to an unauthorized network,...

Read more
Adware

Adware

Adware and Madware are advertising supported software that displays, typically unwanted advertisements,...

Read more
Social Media Used To Catch Violent Protester

Social Media Used To Catch Violent Protester

7-7-2020 1:34pm Correction: The original article stated Facial Recognition was used to catch protester....

Read more
Disinformation

Disinformation

Disinformation is false or misleading information intentionally spread to deceive viewers and/or...

Read more
Cookie

Cookie

A Cookie, or web cookie, is a small data file used by computers to track website communications and...

Read more
Malware in Macs

Malware in Macs

The Mac Myth Apple's Mac Operating Systems (OS) is impenetrable to malware. Myth. Recent malware...

Read more
Recovery Point Objective (RPO)

Recovery Point Objective (RPO)

A Recovery Point Objective (RPO) is the maximum amount of data that your company is willing to...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."

Tim Ward, Goodwill of Chattanooga, Director, Information Technology

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director