The 12 best tools for phishing simulations
Phishing simulations can be partially performed automatically with appropriate tools. We present the tools!
Analyses, practical tips and assessments from the world of IT security.
204 articles total - Page 4 of 30
Poorly implemented awareness training often results in little change. The Security Awareness Curve is a novel approach here.
Apple focuses on high privacy and already introduced new features. But how secure is the iPhone from external attacks?
We explain the browser-in-a-browser attack. But what sounds simple at first requires a bit more explanation.
Ransomware on Mac, is there such a thing? Mac users often feel safe and do not expect to be the target of an attack.
The bug known as the Y2K bug is familiar to many - And in 2038, a related problem awaits us in the form of the Y2K38 bug.
What are IP addresses, what is the difference between IPv4 and IPv6 addresses, and what is the scarcity of IPv4 addresses all about?
Arturs Nikitins
Vertrieb
Persönliche Beratung gewünscht?
Unverbindlich · Antwort innerhalb 24h