searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters

account protection

Get our top stories in your inbox

You can now use passkeys to log in to your Google account

May 3, 2023

Users can now create passkeys for their Google account, the company has announced on Wednesday. Passkeys will enable users to sign in to their Google account on all major …

Google Authenticator updated, finally allows syncing of 2FA codes

April 26, 2023

Google has updated Google Authenticator, its mobile authenticator app for delivering time-based one-time authentication codes, and now allows users to sync (effectively: back …

WhatsApp announces features to prevent account takeover

April 14, 2023

WhatsApp will be rolling out three new security features in the coming months, to provide users with increased privacy and control over their messages and to help prevent …

Twitter will start charging users for SMS-based 2FA option

February 20, 2023

Twitter has announced that starting with March 20, users who don’t pay the Twitter Blue subscription will no longer be able to use the SMS-based two-factor …

Attackers used malicious “verified” OAuth apps to infiltrate organizations’ O365 email accounts

January 31, 2023

Malicious third-party OAuth apps with an evident “Publisher identity verified” badge have been used by unknown attackers to target organizations in the UK and …

Apple unveils end-to-end encryption for iCloud backup, Photos, etc.

December 8, 2022

Apple is expanding end-to-end encryption options for users and finally offering E2EE for their iCloud backup. Advanced Data Protection for iCloud “iCloud already …

Microsoft adds default protection against RDP brute-force attacks

July 21, 2022

“Win11 builds now have a DEFAULT account lockout policy to mitigate RDP and other brute force password vectors,” David Weston of Enterprise and OS Security at …

GM, Zola customer accounts compromised through credential stuffing

May 26, 2022

Customers of automaker General Motors (GM) and wedding planning company Zola have had customer accounts compromised through credential stuffing, and the criminals have used …

Account pre-hijacking attacks possible on many online services

May 24, 2022

Online accounts getting hijacked and misused is an everyday occurrence, but did you know that account pre-hijacking attacks are also possible? Inspired by previous research on …

Fraud detection is great, but you also need prevention

January 24, 2022

In this interview with Help Net Security, Itay Levy, CEO of Identiq, talks about the importance of fraud detection when it comes to protecting an organization but also its …

Unauthorized account openings increased by 21% in the last 12 months

October 29, 2021

Fifty-eight million consumers had a new account opened without their authorization in the last 12 months, a 21% increase compared to 2020, yet less than half of Americans know …

Credential exposure trends: You need a better password

March 5, 2021

SpyCloud researchers recovered more than 4.6 billion pieces of personally identifiable information and nearly 1.5 billion stolen account credentials from 854 breach sources in …

Posts navigation

1 2 3 4 5

Featured news

  • Introducing the book: Cybersecurity First Principles
  • Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!
  • Threat actors can exfiltrate data from Google Drive without leaving a trace
Spin Up A CIS Hardened Image

Sponsored

The best defense against cyber threats for lean security teams

Webinar: Tips from MSSPs to MSSPs – starting a vCISO practice

Security in the cloud with more automation

CISOs struggle with stress and limited resources

Don't miss

How defense contractors can move from cybersecurity to cyber resilience

Introducing the book: Cybersecurity First Principles

Critical zero-day vulnerability in MOVEit Transfer exploited by attackers!

Threat actors can exfiltrate data from Google Drive without leaving a trace

Zyxel firewalls under attack by Mirai-like botnet

Cybersecurity news
Help Net Security - Daily information security news with a focus on enterprise security.
© Copyright 1998-2023 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us