![password](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/05112959/password-code-400x200.jpg)
Password psychology: People aren’t protecting themselves even though they know better
People aren’t protecting themselves from cybersecurity risks even though they know they should, a study on password psychology by LogMeIn reveals. Password psychology Year …
![Android smartphone](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094650/android-smartphone-400x200.jpg)
Is your smartphone pushing you to overshare?
The device people use to communicate online – a smartphone, desktop, or tablet – can affect the extent to which they are willing to overshare intimate or personal …
![patch](https://img.helpnetsecurity.com/wp-content/uploads/2017/11/09102709/patch-400x200.jpg)
Sensitive data is piling up on enterprise devices, Windows 10 machines behind on patching
Directly after the WHO declared COVID-19 a global pandemic, an estimated 16 million US employees were sent home and instructed to work remotely, while governments around the …
![remcos](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/05143325/remcos-email-delivery-1-400x200.jpg)
Can you trust attachments with unfamiliar extensions?
Microsoft’s security experts have warned on Monday about several email malware delivery campaigns exploiting the COVID-19 pandemic targeting companies in the US and …
![Phishing](https://img.helpnetsecurity.com/wp-content/uploads/2019/07/09093728/phishing1-400x200.jpg)
Phishers target investment brokers, aim for Office, SharePoint login credentials
Phishers are trying to trick investment brokers into sharing their Microsoft Office or SharePoint login credentials by impersonating FINRA, a non-governmental organization …
![encryption](https://img.helpnetsecurity.com/wp-content/uploads/2020/01/29153125/encryption-1-400x200.jpg)
How to prevent permission bloat: Overlooked and hidden access
When it comes to your organizational security, you should leave no stone unturned. Overlooked access rights are one of the most unnoticed security threats your organization …
![glasses](https://img.helpnetsecurity.com/wp-content/uploads/2018/04/09101237/glasses-400x200.jpg)
Why you should be rushing to deploy multi-factor authentication to support remote work
With a third of the population currently working remotely and great uncertainty regarding when this situation is going to change, organizations must shift their business …
![idea](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094319/idea-400x200.jpg)
Preventing account takeover and social engineering attacks
Since the COVID-19 outbreak, digital fraud has increased significantly, especially when it comes to account takeover. In this Help Net Security podcast, Angie White, Senior …
![Magnify](https://img.helpnetsecurity.com/wp-content/uploads/2016/02/09194145/magnify-400x200.jpg)
Half of IT pros believe their cybersecurity teams are ready to detect attacks
A surprising 51 percent of technology professionals and leaders are highly confident that their cybersecurity teams are ready to detect and respond to rising cybersecurity …
![library](https://img.helpnetsecurity.com/wp-content/uploads/2019/04/09094731/library-400x200.jpg)
Online learning surges as people look for ways to be productive at home
People around the world are learning how to work from home and stay productive in response to COVID-19, Udemy reveals. As remote working becomes the new normal, the findings …
![phishing](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101053/phishing-400x200.jpg)
Fake Microsoft Teams notification emails are hitting inboxes
Phishers are using fake Microsoft Teams notification emails to trick users into sharing their Microsoft Teams and Office 365 login credentials. “Should the recipient …
![SaltStack](https://img.helpnetsecurity.com/wp-content/uploads/2020/05/04123031/saltstack-fire-400x200.jpg)
SaltStack Salt vulnerabilities actively exploited by attackers, patch ASAP!
Two vulnerabilities in SaltStack Salt, an open-source remote task and configuration management framework, are being actively exploited by attackers, CISA warns. About …