LogRhythm SIEM is built as a platform of modules. Does a modular approach produce a better SIEM? We investigate.
By Stephen Cooper
in Net Admin
on June 21, 2023
This comparison will examine the pros and cons of two leading antivirus software, Avast and Bitdefender. Which will be better suited to you?
By Steve Adams
in Antivirus
on June 14, 2024
By Lee Munson
in Information Security
on March 18, 2017
The US government may ban encrypted messaging and according to the results of our survey, this could have a big impact on WhatsApp’s popularity.
By Paul Bischoff
in VPN & Privacy
on July 18, 2019
Over the last four and a half years, there have been 478 ransomware attacks on manufacturing companies across the globe. Our research looks at the cost of these attacks, the amount of downtime caused, and the ransoms and data theft involved.
By Rebecca Moody
in Information Security
on August 3, 2023
Ettercap is a penetration testing tool. This system helps you gather information on Web applications and test their security.
By Stephen Cooper
in Net Admin
on February 10, 2023
Trying to find a new Kodi keyboard? Look no further - we’ve done extensive research and found five
By Ian Garland
in Kodi
on January 19, 2023
Comparitech logged 62 ransomware attacks affecting 17.1 million records in the first quarter of 2024
By Paul Bischoff
in News
on April 4, 2024
Cross-site request forgeries are complex attacks that exploit predictable request parameters. They lead to state changes that can cause significant harm to victims.
By Josh Lake
in Information Security
on May 14, 2021