Please turn on your JavaScript for this page to function normally.
![Authy](https://img.helpnetsecurity.com/wp-content/uploads/2024/07/11143217/twilio-authy-1500-400x200.webp)
Using Authy? Beware of impending phishing attempts
Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement defenses against SIM swapping …
![Heartbeat](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195419/heartbeat-400x200.jpg)
When hacking saves lives: Hacking medical devices and implants
Of all the IoT devices out there, none are more crucial to users than the medical devices that help them simplify the management of certain medical conditions or, in the most …
Featured news
Resources
Don't miss
- Crypto-stealing iOS, Android malware found on App Store, Google Play
- OpenNHP: Cryptography-driven zero trust protocol
- The API security crisis and why businesses are at risk
- Russian cybercrooks exploiting 7-Zip zero-day vulnerability (CVE-2025-0411)
- Casio UK site compromised, equipped with web skimmer