What is Modern Two-Factor Authentication (2FA)?
Learn about the key features of modern two-factor authentication (2FA) solution, including whether it's safe, secure, and easy to use.
Learn about the key features of modern two-factor authentication (2FA) solution, including whether it's safe, secure, and easy to use.
We're excited to announce two new open-source tools designed to help administrators prevent, manage, and respond to phishing attacks against their organization - IsThisLegit and Phinn.
Organizations are exploring how to gain a competitive advantage by integrating information security and privacy with their business strategy, according to a 2017 cybersecurity report from PricewaterhouseCoopers (PwC).
A Gmail phishing attack leveraging OAuth spread quickly to multiple users. Learn what made this attack incredibly successful, as well as ways to protect yourself or your employees.
An attacker can send phishing dialogs to users by writing a few lines of AppleScript, effectively allowing them to steal Apple ID or local user account credentials. Here’s our technical overview of the dangers of AppleScript.