Tens of Thousands of Malicious Apps Using Facebook APIs
The apps are deemed malicious by doing things such as capturing pictures and...
USB Sticks Can Trigger BSOD – Even on a Locked Device
Thanks to auto-play, it’s possible to crash Windows systems by simply inserting the...
Twitter Sold Data To Cambridge Analytica-Linked Company
Twitter is the latest company to face backlash for how it handles data...
NIS Directive – Cyber Assessment Framework
The implementation of the EU Security of Networks and Information Systems (NIS) Directive...
CAF – Objective D
D1 Response and Recovery Planning Capabilities to minimise the impact of a cyber...
CAF – Objective C
C1 Security Monitoring Capabilities to ensure security defences remain effective and to detect...
CAF – Objective A
A1 Governance Appropriate organisational structures, policies, and processes in place to understand, assess and...
CAF – Objective B
B1 Service Protection Policies and Processes Proportionate security measures in place to protect...
B6. Staff awareness and training
Principle Staff have appropriate awareness, knowledge and skills to carry out their organisational...
Introduction to the Cyber Assessment Framework
One of the key objectives of the NIS Directive is to ensure that...
SamSam Ransomware Evolves Tactics: Targeting Whole Companies
The gang behind the Atlanta city shutdown and other attacks is selecting victims...
Behaviour and conduct at CYBERUK 2018: how did we do?
I still can’t believe CYBERUK 2018 is over – after so much hard...
Rubella Crimeware Kit: Cheap, Easy and Gaining Traction
Taking a “dirty deeds done dirt cheap” approach, the kit generates an initial...
Improving authentication across the UK
At the NCSC we hear about huge numbers of new technologies that are...
Europol Smacks Down World’s Largest DDoS-for-Hire Market
Webstresser[.]org, a DDoS-for-hire market believed to be behind at least 4 million cyberattacks...
Researchers Hacked Amazon’s Alexa to Spy On Users, Again
Researchers discovered a flaw in Amazon’s Alexa virtual assistant that enabled them to...
CyBOK – release of the first Knowledge Areas
Work on the new Cyber Security Body of Knowledge is starting to gather...
What’s new in Windows Fall Creators Update (1709)?
Our newly published EUD guidance for Windows 10 Fall Creators Update (1709) takes advantage of...
EUD Security Guidance: Windows 10 – 1709
About this guidance This guidance has been updated to cover the 1709 “Fall...
IoT Security Concerns Peaking – With No End In Sight
Despite numerous talks about IoT vulnerabilities at RSAC this week, a clear resolution on...
Cloud Credentials: New Attack Surface for Old Problem
Researchers show why keeping a handle on user credentials is just as hard...
Data Leak of 48 Million Users by Private Intelligence Firm
Private intelligence gathering firm LocalBlox leaked data on 48 million users that was...
iOS Sync Glitch Lets Attackers Control Devices
Researchers found a new iOS vulnerability called “trustjacking,” which exploits a feature called...
Malicious Russian cyber activity: what does it mean for small organisations?
You may have seen or heard about the recent advisory on Russian state-sponsored...
Automated Bots Growing Tool For Hackers
The use of automated bots is becoming more prevalent for novice attackers as...
Industry 100 inspiring collaboration
I work as Cyber Security Consultant for Sopra Steria, a digital services provider to...
CYBERUK 2018: Growing in confidence
I was heartened and reassured by the feeling of growing confidence at this...
Don’t Trust Android OEM Patching, Claims Researcher
Many Android device manufacturers are not telling the truth when they say they...
Outlook Bug Allowed Hackers to Use .RTF Files To Steal Windows Passwords
Microsoft patched a bug that allowed attackers to steal a target’s Windows account...

