"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
A Wireless Application Protocol (WAP) is an old standard that allowed early mobile phones to access the...
Read moreA Wired Equivalent Privacy (WEP) is a deprecated wireless security protocol that was designed to...
Read moreIn May of 2018, Jeff Bezos received a message on the WhatsApp application on his smartphone, from an...
Read moreLinkjacking is a practice used to redirect one website's links to another. Usually, this is...
Read moreA Media Access Control (MAC) Address is a hardware identification number that is uniquely assigned to...
Read moreA Lightweight Directory Access Protocol (LDAP) is an open, vendor-neutral, industry standard...
Read moreA Zero Day Vulnerability is a security flaw that is unknown to the software vendor or the...
Read moreThis video walks you through how to access 'My Assignments'. When you visit your assignments here you can...
Read moreResponsible Disclosure refers to the best practice followed by most security researchers of not...
Read moreRevenge Porn is sexually explicit images or videos of a person posted online without that person's...
Read moreA Privileged User is a user of a computer who is authorized to bypass normal access control mechanisms,...
Read moreA Command and Control (C&C) Server is a computer being controlled remotely by a cyber criminal that...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.