Help Net Security newsletters: Daily and weekly news, cybersecurity jobs, open source projects, breaking news – subscribe here!

Please turn on your JavaScript for this page to function normally.
Protect against privileged credential attacks with zero trust

Enterprise networks – and the attacks against them – have evolved. No longer static, they are dynamic entities. And yet, IT organizations continue to use traditional security …

Unsurprisingly, most would support eliminating passwords

Password-based authentication is no longer capable of meeting the demands of modern information security, according to LaunchKey. An overwhelming 84% of respondents would …

Average financial services company uses 1,004 cloud applications

Skyhigh Networks analyzed cloud adoption in the financial services industry.The average financial services company uses 1,004 cloud services, which comes as a surprise to many …

Sound-Proof: Two-factor authentication without user interaction

Reaping all the benefits of two-factor authentication without suffering the inconvenience that is usually attached to the option is something that many users dream about …

Privileged accounts are still easy to compromise

A Thycotic survey of 201 Black Hat USA 2015 attendees found that a majority (75%) have not seen a fundamental change in the level of difficulty in compromising privileged …

Dropbox adds support for FIDO U2F secure authentication

Cloud storage giant Dropbox announced to its 400 million users that it supports FIDO U2F for strong two-factor authentication.Dropbox users can now protect their files with …

HTC phone stores fingerprints in easily accessible plaintext

Pressing a finger on your mobile phone’s fingerprint scanner has to be the easiest, most seamless way to unlock the device, and this is why more and more manufacturers …

Security challenges emerging with the rise of the personal cloud

Personal cloud is growing in importance as it shapes how employees operate across their digital lives, according to Gartner. End-user computing (EUC) and digital workplace …

Chrome extension thwarts user profiling based on typing behavior

The problems with passwords have already been well documented, and the main problem with static biometrics (“something you are”: fingerprints, retina patterns, …

Passwords are not treated as critical to security

Considering the cyber world we live in, it’s time to ask whether passwords can still be considered a reliable security component – and if so, how should they be used? Look no …

Top obstacles to EMV readiness

By October 1, 2015, the majority of U.S. businesses must transition to EMV-capable technologies or become newly liable for any costs incurred from fraud using old magnetic …

Apple to introduce two-factor authentication option in iOS 9 and OS X El Capitan

Starting with OS X 10.11 (“El Capitan”) and iOS 9, Apple will introduce a two-factor authentication option that will replace the current two-step verification …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools