account protection
![Office 365](https://img.helpnetsecurity.com/wp-content/uploads/2017/08/09103303/office365-400x200.jpg)
Mitigating the risk of Office 365 account hijacking
Office 365 – the online, subscription-based version of Microsoft’s Office application suite – is one the most widely used enterprise cloud applications/services, …
![Firefox Monitor](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100120/firefox-monitor-400x200.png)
Firefox Monitor tells you whether your email was compromised in a data breach
After a few months of user testing, Mozilla has launched Firefox Monitor, a free online service that allows users to check whether their email address was involved in a …
![SIM cards](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113048/sim_cards-400x200.jpg)
AT&T sued for enabling SIM swap fraud
A cryptocurrency investor is suing AT&T because criminals were able to empty his accounts through SIM swap fraud (aka account port out fraud), even though he had already …
![Google security](https://img.helpnetsecurity.com/wp-content/uploads/2018/07/09100518/google_security-400x200.jpg)
After extensive testing, Google introduces the Titan Security Key
Google recently shared that since it made employees use physical security keys instead of passwords and one-time codes, none of them – and there are over 85,000 – …
![dislike](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101832/dislike-400x200.jpg)
Malicious actors used Facebook’s own tools to scrape most users’ public info
Facebook has disabled a search tool that allowed anyone to enter a person’s phone number or email address into Facebook and find their account, along with all the information …
![reddit](https://img.helpnetsecurity.com/wp-content/uploads/2016/04/09113324/reddit-400x200.jpg)
Reddit rolls out 2-factor authentication for users
The 234 million or so unique Reddit users are finally getting the option of setting up 2-factor authentication for their account(s). Why is that important? With over 540 …
![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09194933/password-1-400x200.jpg)
Make 2018 your year of taking password security more seriously
The popularity of passwords as a means of authentication is still not waning, so advice on how to opt for passwords that are hard to guess and crack is always timely. Choosing …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112853/password-400x200.jpg)
Phishing is a greater threat to users than keyloggers and third-party breaches
When it comes to loosing access to their accounts, phishing is a greater threat to users than keyloggers and third-party breaches, researchers have found. How many valid …
![Google security](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103613/google_security-400x200.jpg)
Google offers Advanced Protection for high-risk users of its services
High-risk Google users – journalists, human rights and civil society activists, but also campaign staffers and people in abusive relationships – can now take …
![cybersecurity](https://img.helpnetsecurity.com/wp-content/uploads/2017/09/09103021/cybersecurity-400x200.jpg)
Activists targeted with barrage of creative phishing attempts
More often than not, the human element is the weakest link in the security chain. This fact is heavily exploited by cyber attackers, and makes phishing and spear-phishing …
![mobile device](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09111757/mobile-400x200.jpg)
Microsoft users can ditch password-based logins for phone sign-in 2FA
Microsoft added a new feature to its authenticator app, allowing users to sign into their Microsoft account without having to enter their password. “With phone sign-in, …
![USA](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105306/usa-400x200.jpg)
US lawmakers propose bill to stop warrantless phone searches at US border
Four US Congressmen have introduced on Tuesday a new law aimed at protecting Americans from warrantless searches of their digital devices when they cross the US border. The …
Featured news
Sponsored
Don't miss
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD
- Realm: Open-source adversary emulation framework
- Discover the growing threats to data security
- Encrypted traffic: A double-edged sword for network defenders