![Twitter yubikey](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100653/yubikey-twitter-400x200.jpg)
Twitter adds support for login verification with USB security key
Twitter has some good news for users looking to improve the security of their account: the company has begun rolling out the “login verification with a security …
![network](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100655/network-400x200.jpg)
Know what’s happening on your network and make the most of your security tools
In an ideal world, all organizations would know at all times exactly what’s happening on their network: they would have deep enough pockets to buy the equipment and …
![chess](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100701/chess-400x200.jpeg)
Confidence wavers in face of evolving cybersecurity threats
Webroot found that businesses in the U.S., U.K. and Australia are taking cybersecurity seriously – with almost 100 percent of respondents conducting some form of employee …
![Hand](https://img.helpnetsecurity.com/wp-content/uploads/2017/07/09103603/hand-code-400x200.jpg)
How criminals abuse IDNs to conduct malicious activities
New research from Farsight Security examines the prevalence and distribution of IDN lookalike domain names, also called homographs, over a 12-month period with a focus on 466 …
![vintage computer](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100707/vintage-computer-400x200.jpeg)
IT chiefs keep obsolete systems running just to keep data accessible
89 per cent of IT decision makers in UK enterprises admit they are keeping old or legacy applications alive just to keep the historical data accessible, according to a new …
![Cisco](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100704/cisco-400x200.jpg)
Cisco ASA and Firepower flaw exploited in the wild
A high-severity vulnerability affecting Cisco ASA and Firepower security appliances is being exploited in the wild after an exploit has been released online on Friday. …
![Windows certificate](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100709/windows-certificate-400x200.jpg)
Underground vendors can reliably obtain code signing certificates from CAs
More and more malware authors are switching to buying new, valid code signing certificates issued by Certificate Authorities instead of using stolen (compromised) ones, …
![Wi-Fi](https://img.helpnetsecurity.com/wp-content/uploads/2017/02/09105003/wifi-400x200.jpg)
WPA3: Next generation of Wi-Fi security now available
Wi-Fi Alliance introduced Wi-Fi CERTIFIED WPA3, the next generation of Wi-Fi security, bringing new capabilities to enhance Wi-Fi protections in personal and enterprise …
![DDoS](https://img.helpnetsecurity.com/wp-content/uploads/2017/01/09105254/ddos_attacks-400x200.jpg)
Bot-driven credential abuse, DDoS attacks continue to rise
Cybersecurity defenders face increasing threats from organisations in the form of bot-based credential abuse targeting the hospitality industry and advanced DDoS attacks, …
![Microsoft Azure security](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100712/azure-pass-400x200.jpg)
Microsoft offers new Azure AD tool to nix easily guessed passwords
Predictable, easy-to-guess passwords are often the weak link that ends up breaking the security chain and attackers know this. “They know to account for character …
![hand](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100716/hand-400x200.jpg)
Digital transformation: Insight into getting it right
If digital transformation (DX) is using digital technologies to create new business models and change markets, then the journey has only just begun, according to IDC. The …
![HMRC](https://img.helpnetsecurity.com/wp-content/uploads/2018/06/09100720/hmrc-400x200.jpg)
HMRC collected voiceprints of 5.1 million UK taxpayers
Her Majesty’s Revenue and Customs (HMRC) has collected voiceprints of some 5.1 million UK taxpayers without their explicit consent, and won’t reveal whether these …
Featured news
Sponsored
Don't miss
- Threat intelligence: A blessing and a curse?
- Why CISOs face greater personal liability
- Practical strategies to mitigate risk and secure SAP environments
- SMS Stealer malware targeting Android users: Over 105,000 samples identified
- Microsoft: DDoS defense error amplified attack on Azure, leading to outage