NCSC advice for Ticketmaster customers
Who is this guidance for? Customers of Ticketmaster International, Ticketmaster UK, GETMEIN! and...
Mozilla Announces Firefox Monitor Tool Testing, Firefox 61
Mozilla is testing a new tool that securely checks to see if users’...
EUD Security Guidance: Chrome OS 65
This guidance was developed following testing performed on a Chromebook device running Chrome...
UK Tax Agency Collects 5.1M Biometric Voice IDs, May Violate GDPR
The agency doesn't ask for explicit consent to collect the voiceprints; and, the...
Sneaky Web Tracking Technique Under Heavy Scrutiny by GDPR
Don’t expect tracking methods such as browser fingerprinting to disappear anytime soon, even...
Financial Services Sector Rife with Hidden Tunnels
Attackers use the approach to look like legitimate traffic and hide data exfiltration...
New Phishing Scam Reels in Netflix Users to TLS-Certified Sites
Researchers are warning of a new Netflix phishing scam that leads to sites...
Mylobot Botnet Emerges with Rare Level of Complexity
A new botnet from the Dark Web displays a never-before-seen level of complexity...
Olympic Destroyer Returns to Target Biochemical Labs
The threat actors appear to be in a reconnaissance phase, which could be...
“Unbreakable” Smart Lock Tapplock Issues Critical Security Patch
Researchers were able to discover a way to hack the device in less...
New Banking Trojan Can Launch Overlay Attacks on Latest Android Versions
While other malware families have been searching for new overlay techniques for Android...
Stepping up to multi-factor authentication
Despite being widely available, uptake of multi-factor authentication has been slow and we...
Multi-factor authentication for online services
This guidance describes how to use multi-factor authentication (MFA) to mitigate against password guessing and...
Apple Removes iPhone USB Access Feature, Blocking Out Hackers, Law Enforcement
The move escalates tensions between the phone giant and federal law enforcement when...
Malicious Docker Containers Earn Cryptomining Criminals $90K
Researchers said over a dozen malicious docker images available on Docker Hub allowed...
Microsoft Reveals Which Bugs It Won’t Patch
A draft document lays out its criteria for addressing various flaws and notes...
Dixons Carphone Cyberattack Targets 5.9M Bank Cards
Dixons Carphone said it discovered a massive cyberattack on its processing systems that...
NCSC advice for Dixons Carphone plc customers
Who is this guidance for? Customers of Dixons Carphone plc, who the NCSC...
Bypass Glitch Allows Malware to Masquerade as Legit Apple Files
Malware can to worm its way onto Macs thanks to a recently discovered...
Report: Chinese Hackers Siphon Off ‘Massive’ Amounts of Undersea Military Data
The stolen data included "secret plans to develop a supersonic anti-ship missile for...
Unprotected Server Exposes Weight Watchers Internal IT Infrastructure
Researchers found that a critical Weight Watchers server revealed its IT internal infrastructure....
SaaS security – surely it’s simple?
The NCSC's new SaaS security collection provides a lightweight approach for determining the security of any SaaS application....
G Suite security review
Google G Suite is a collection of productivity tools including spreadsheets, word processing and calendar....
Smartsheet security review
Smartsheet is an application for managing collaborative work. Creating projects and tasks, assigning these...
Understanding Software as a Service (SaaS) security
This guidance introduces the approach the NCSC have developed to help you understand the security...
Zendesk security review
Zendesk is a ticketing system whose primary aim is to improve customer relations....
Basecamp security review
Basecamp is a web-based project management and company-wide communication tool designed to improve the administration of...
Yammer security review
Yammer is an enterprise social networking service which allows users to communicate, collaborate and...
Office 365 security review
Microsoft Office 365 is a set of cloud-based productivity tools including word processing, spreadsheets and...
Trello security review
Trello is a collaboration tool which uses Kanban-style boards to organise projects and teams. ...

