
Multi-factor authentication for online services
This guidance describes how to use multi-factor authentication (MFA) to mitigate against password guessing and...

Apple Removes iPhone USB Access Feature, Blocking Out Hackers, Law Enforcement
The move escalates tensions between the phone giant and federal law enforcement when...

Malicious Docker Containers Earn Cryptomining Criminals $90K
Researchers said over a dozen malicious docker images available on Docker Hub allowed...

Microsoft Reveals Which Bugs It Won’t Patch
A draft document lays out its criteria for addressing various flaws and notes...

Dixons Carphone Cyberattack Targets 5.9M Bank Cards
Dixons Carphone said it discovered a massive cyberattack on its processing systems that...

NCSC advice for Dixons Carphone plc customers
Who is this guidance for? Customers of Dixons Carphone plc, who the NCSC...

Bypass Glitch Allows Malware to Masquerade as Legit Apple Files
Malware can to worm its way onto Macs thanks to a recently discovered...

Report: Chinese Hackers Siphon Off ‘Massive’ Amounts of Undersea Military Data
The stolen data included "secret plans to develop a supersonic anti-ship missile for...

Unprotected Server Exposes Weight Watchers Internal IT Infrastructure
Researchers found that a critical Weight Watchers server revealed its IT internal infrastructure....

SaaS security – surely it’s simple?
The NCSC's new SaaS security collection provides a lightweight approach for determining the security of any SaaS application....

Confluence security review
Atlassian Confluence is a group collaborative writing tool. How Confluence performs against the SaaS...

Slack security review
Slack is a real-time messaging and file sharing application designed to aid group collaboration. ...

SaaS security principles
The table below lists each SaaS security principle, along with a brief description of its...

MailChimp security review
MailChimp is an email service provider which allows users to send automated messages, marketing...

SaaS security collection
Software as a Service (SaaS) applications are increasingly popular. Many of us use them on a daily...

G Suite security review
Google G Suite is a collection of productivity tools including spreadsheets, word processing and calendar....

Smartsheet security review
Smartsheet is an application for managing collaborative work. Creating projects and tasks, assigning these...

Understanding Software as a Service (SaaS) security
This guidance introduces the approach the NCSC have developed to help you understand the security...

Zendesk security review
Zendesk is a ticketing system whose primary aim is to improve customer relations....

Basecamp security review
Basecamp is a web-based project management and company-wide communication tool designed to improve the administration of...

Yammer security review
Yammer is an enterprise social networking service which allows users to communicate, collaborate and...

Office 365 security review
Microsoft Office 365 is a set of cloud-based productivity tools including word processing, spreadsheets and...

Trello security review
Trello is a collaboration tool which uses Kanban-style boards to organise projects and teams. ...

Jira security review
Atlassian Jira is an issue tracking and planning tool, primarily aimed at software development. ...

Stride security review
Stride is an enterprise communications tool featuring team chat, video and file sharing...

Google Tackles AI Principles: Is It Enough?
AI offers an immense capacity for good -- and for unintended consequences. ...

Facebook Software Bug Made Some Private Posts Public: 14 Million Affected
A Facebook glitch in May set millions of posts that users composed to...

GDPR: A Compliance Quagmire, for Now
Experts say the devil is in the details when it comes to complying...

Serve websites over HTTPS (always)
Securing websites, so they keep user data private, is an essential element of...

DNA Testing Service MyHeritage Leaks User Data of 92 Million Customers
An unspecified "private" server was found with the account data of users who...