Please turn on your JavaScript for this page to function normally.
magnify
Microsoft announces limited Azure Sphere bug bounty program

Microsoft has announced a new security research / bug bounty program aimed at testing and improving the security of Azure Sphere, its comprehensive IoT security solution. The …

healthcare
Helping healthcare combat cyber attackers

Hospitals and other healthcare organizations around the globe are under immense pressure as they test and care for patients with COVID-19. They are also under siege by cyber …

remote work
Future of work: Delivering a modern workspace

We are all painfully aware how the current climate of lockdown and working from home has focused the conversations within the technology community regarding the pros and cons …

password
Password psychology: People aren’t protecting themselves even though they know better

People aren’t protecting themselves from cybersecurity risks even though they know they should, a study on password psychology by LogMeIn reveals. Password psychology Year …

Android smartphone
Is your smartphone pushing you to overshare?

The device people use to communicate online – a smartphone, desktop, or tablet – can affect the extent to which they are willing to overshare intimate or personal …

patch
Sensitive data is piling up on enterprise devices, Windows 10 machines behind on patching

Directly after the WHO declared COVID-19 a global pandemic, an estimated 16 million US employees were sent home and instructed to work remotely, while governments around the …

remcos
Can you trust attachments with unfamiliar extensions?

Microsoft’s security experts have warned on Monday about several email malware delivery campaigns exploiting the COVID-19 pandemic targeting companies in the US and …

Phishing
Phishers target investment brokers, aim for Office, SharePoint login credentials

Phishers are trying to trick investment brokers into sharing their Microsoft Office or SharePoint login credentials by impersonating FINRA, a non-governmental organization …

encryption
How to prevent permission bloat: Overlooked and hidden access

When it comes to your organizational security, you should leave no stone unturned. Overlooked access rights are one of the most unnoticed security threats your organization …

glasses
Why you should be rushing to deploy multi-factor authentication to support remote work

With a third of the population currently working remotely and great uncertainty regarding when this situation is going to change, organizations must shift their business …

idea
Preventing account takeover and social engineering attacks

Since the COVID-19 outbreak, digital fraud has increased significantly, especially when it comes to account takeover. In this Help Net Security podcast, Angie White, Senior …

Magnify
Half of IT pros believe their cybersecurity teams are ready to detect attacks

A surprising 51 percent of technology professionals and leaders are highly confident that their cybersecurity teams are ready to detect and respond to rising cybersecurity …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools