![password](https://img.helpnetsecurity.com/wp-content/uploads/2016/01/09195208/password-400x200.jpg)
The psychological reasons behind risky password practices
Despite high-profile, large-scale data breaches dominating the news cycle – and repeated recommendations from experts to use strong passwords – consumers have yet …
![Confide](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110446/confide-400x200.jpg)
Enhance iMessage security using Confide
One of the new features in iOS 10 offers the possibility of deploying specially crafted applications within iMessage. Most users will probably (ab)use this new functionality …
![Businessman](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09114011/businessman-400x200.jpg)
What’s driving boards of directors to make cyber security a top priority?
Almost half (46 percent) of board members believe compliance regulations help establish stronger security, but nearly 60 percent struggle with meeting increased mandates—a …
![files](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110451/files-400x200.jpg)
Why digital hoarding poses serious financial and security risks
82 percent of IT decision makers admit they are hoarders of data and digital files, according to research conducted by Wakefield Research among 10,022 global office …
![Tesla](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110551/tesla-model_s-400x200.jpg)
Tesla introduces code signing to harden their cars’ security
When researchers from Tencent’s Keen Security Lab discovered that they were able to leverage vulnerabilities to remotely hijack Tesla cars, they reported the issues to …
![Industry](https://img.helpnetsecurity.com/wp-content/uploads/2016/06/09112121/cooling-tower-1368823_1920-400x200.jpg)
ICS-CERT releases new tools for securing industrial control systems
The Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has published newer versions of two tools that can help administrators with securing industrial control …
![osquery](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110448/osquery-400x200.jpg)
OS analysis tool osquery finally available for Windows
Nearly two years after Facebook open sourced osquery, the social networking giant has made available an osquery developer kit for Windows, allowing security teams to build …
![Europol](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110453/europol-400x200.jpg)
Europol identifies eight main cybercrime trends
The volume, scope and material cost of cybercrime all remain on an upward trend and have reached very high levels. Some EU Member States now report that the recording of …
![tunnel](https://img.helpnetsecurity.com/wp-content/uploads/2016/05/09112722/tunnel-400x200.jpg)
Which celebrities generate the most dangerous search results?
Female comedian Amy Schumer knocked DJ Armin van Buuren off of the list to become the most dangerous celebrity to search for online, according to Intel Security. Now in its …
![apps](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110500/apps-400x200.jpg)
By 2018, 25 percent of new mobile apps will talk to IoT devices
With the convergence of devices, bots, things and people, organizations will need to master two dimensions of mobility, according to Gartner. CIOs and IT leaders will need to …
![](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195744/letters-691842_1280-400x200.jpg)
Many tech senior decision-makers don’t understand encryption
Nearly a quarter of tech senior decision-makers in the UK don’t fully understand encryption, according to PKWARE. This number increases to 40% in the retail sector and …
![](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110456/ms-project-springfield-400x200.jpg)
Project Springfield: Cloud-based fuzz testing for uncovering million-dollar bugs
This Moday Microsoft debuted Project Springfield, a cloud-based fuzz testing (aka fuzzing) service that the company has been working on for a quite a while. David Molnar and …
Featured news
Sponsored
Don't miss
- Roundcube flaws allow easy email account compromise (CVE-2024-42009, CVE-2024-42008)
- OpenWrt dominates, but vulnerabilities persist in OT/IoT router firmware
- Sports venues must vet their vendors to maintain security
- RustScan: Open-source port scanner
- Breaking down FCC’s proposal to strengthen BGP security