Cloud Credentials: New Attack Surface for Old Problem
Researchers show why keeping a handle on user credentials is just as hard...
Data Leak of 48 Million Users by Private Intelligence Firm
Private intelligence gathering firm LocalBlox leaked data on 48 million users that was...
iOS Sync Glitch Lets Attackers Control Devices
Researchers found a new iOS vulnerability called “trustjacking,” which exploits a feature called...
Malicious Russian cyber activity: what does it mean for small organisations?
You may have seen or heard about the recent advisory on Russian state-sponsored...
Automated Bots Growing Tool For Hackers
The use of automated bots is becoming more prevalent for novice attackers as...
Industry 100 inspiring collaboration
I work as Cyber Security Consultant for Sopra Steria, a digital services provider to...
CYBERUK 2018: Growing in confidence
I was heartened and reassured by the feeling of growing confidence at this...
Don’t Trust Android OEM Patching, Claims Researcher
Many Android device manufacturers are not telling the truth when they say they...
Outlook Bug Allowed Hackers to Use .RTF Files To Steal Windows Passwords
Microsoft patched a bug that allowed attackers to steal a target’s Windows account...
Calls For Regulation Build After Facebook Privacy Fallout
Political actors and privacy activists are calling for more regulations on data privacy...
Word Attachment Delivers FormBook Malware, No Macros Required
A new wave of document attacks targeting inboxes do not require enabling macros...
Mirai Variant Targets Financial Sector With IoT DDoS Attacks
Researchers said a Mirai botnet variant, possibly linked to the IoTroop or Reaper...
Privacy Advocates Blast Facebook After Data Scraping Scandal
Privacy advocates are up in arms after Facebook CEO Mark Zuckerberg said most...
It’s almost time to kick off CYBERUK 2018
Has it really been a year? We are looking forward to throwing open the...
CYBERUK 2018: Let the games begin! (again)
The Games are back this year at CYBERUK 2018! There will be a...
CYBERUK In Practice Track 3: Detect & Defend
Defending against cyber attacks requires a two-pronged approach: proactive and reactive. A good...
How the NCSC thinks about security architecture
The NCSC has a security architecture team who consult on the design and...
Introducing our EUD Guidance for Android 8
We've just published guidance for Android 8 (Oreo). In it we recommend the best...
EUD Security Guidance: Android 8
This guidance is applicable to Android 8 devices configured in work-managed mode...
CYBERUK In Practice Track 2: Mitigation
With CYBERUK 2018 nearly upon us, I thought I'd plug some of the...
CYBERUK In Practice Track 4: Whole System Security
The NCSC's annual conference, CYBERUK 2018, is almost upon us. I'd like to...
Cloudflare Launches Publicly DNS-Over-HTTPS Service
Clouldflare launches DNS-over-HTTPS service called 1.1.1.1 that it says will be a “privacy-first”...
CYBERUK In Practice Track 1: Vulnerabilities and Bug Hunting
With CYBERUK In Practice fast approaching, I wanted to paint a picture of what you...
Bad Microsoft Meltdown Patch Made Some Windows Systems Less Secure
Researcher finds Microsoft’s January Patch Tuesday release included a fix for the Intel...
Manchester will be hosting our biggest CYBERUK yet
CYBERUK provides an important opportunity for the NCSC to facilitate a national conversation...
Facebook Cracks Down On Data Misuse With Expanded Bug Bounty Program
Facebook announced that in the coming weeks it will expand its bug bounty...
GoScanSSH Malware Targets SSH Servers, But Avoids Military and .GOV Systems
Researchers identify a new malware family called GoScanSSH that avoids servers linked to...
Mozilla Tests DNS over HTTPS: Meets Some Privacy Pushback
Mozilla is testing a method of securing DNS traffic via HTTPS, but is...
Zuckerberg Breaks Silence: ‘We Made Mistakes’ Regarding Cambridge Analytica Debacle
Facebook CEO Mark Zuckerberg broke his silence on the Cambridge Analytica scandal that...
Orbitz Warns 880,000 Payment Cards Suspected Stolen
Orbitz said Tuesday a breach of both its consumer and partner platform...

