Serviceteam IT Security News

Even Jedi can't achieve Password Perfection

World Password Day arrives again on May 4th - an auspicious date, in so many...
Serviceteam IT Security News

Google Phishing Attack: users hit with sophisticated phishing

It's not at all a surprise that Google Mail users have today been hit by a massive Phishing attack. Given the rise of exploits being sourced using Google platform services, such as the GOOGLE RECAPTCHA BYPASS and the malware CARBANAK USING GOOGLE SERVICES it was inevitable.
Serviceteam IT Security News

The Secure by Default Partnership Programme 2017

Our CyberUK in Practice conference in Liverpool saw those public sector organisations who...
Serviceteam IT Security News

Auto Lender Exposes Loan Data For Up To 1 Million Applicants

A trove of consumer auto loan data—some 1 million records—has been locked down after a researcher found an exposed and accessible database online. Source: Cloud Security Auto Lender Exposes Loan Data For Up To 1 Million Applicants
Serviceteam IT Security News

IBM Ships USBs for Storewize Infected with Malware

The malware is a dropper discovered by Kaspersky Lab as Reconyc. The dropper is a cybercrime tool used to install other malware on infected computers. IBM said the drives that were infected have a part number 01AC585; Storwize systems with serial numbers beginning with 78D2 aren't compromised.
Serviceteam IT Security News

xDedic Market Spilling Over With School Servers, PCs

In its research, Flashpoint said the United States, Germany, and Ukraine appear to be the most frequently targeted countries. The most exploited sectors are education, followed by healthcare, legal, aviation, and government. Least vulnerable…
Serviceteam IT Security News

Hard Target: Fileless Malware

Researchers say fileless in-memory malware attacks have become a major nuisance to businesses and have become even harder to detect and defend. Source: Malware Hard Target: Fileless Malware  
Serviceteam IT Security News

Low-Cost Ransomware Service Discovered

A new ransomware-as-a-service called Karmen appeals to ransomware newbies with a low price, easy setup and developer updates. Source: Malware Low-Cost Ransomware Service Discovered
Serviceteam IT Security News

New Chrome OS guidance released

We’ve just published guidance for Chrome OS on our website. If you’ve not come across Chrome...
Serviceteam IT Security News

IHG Confirms Second Credit Card Breach Impacting 1,000-Plus Hotels

InterContinental Hotels Group said on Friday that it found malware designed to access payment card data at more than 1,000 of its hotels. Source: Malware IHG Confirms Second Credit Card Breach Impacting 1,000-Plus Hotels
Serviceteam IT Security News

CyberFirst Girls prove inspiration for all

In Ian Levy’s recent blog, he finished by saying it would be good to...
Serviceteam IT Security News

The Cyber Risk Manager's Toolbox – A Masterclass

In Cyber Security, risk management is sometimes seen as an exercise in applying...
Serviceteam IT Security News

Ever wondered how a cyber crime gang operates?

Most people are aware of phishing emails, and the risk of clicking on...
Serviceteam IT Security News

Researcher Warns SIEMs Are Weak Link In Network Security Chain

Security information and event management solutions are supposed to boost security, but researchers say the network analysis tools are ripe attack targets. Source: Cloud Security Researcher Warns SIEMs Are Weak Link In Network Security Cha…
Serviceteam IT Security News

UK firms targeted by China-based ‘systematic’ hacking operation

A China-based cyber gang has compromised UK firms as part of a "systematic" global hacking operation, a new report has revealed. The attacks were found to have breached a wide variety of secret data ranging from personal data to intellectual…
Serviceteam IT Security News

Industry Braces for Repeal of ISP Privacy Rules

Businesses say overturning one of the nation’s strongest internet privacy protection rules will deal a blow to data privacy, security and integrity for businesses and consumers alike. Source: Cloud Security Industry Braces for Repeal of ISP…
Serviceteam IT Security News

NCSC IT: Networking in the cloud

Hopefully you've arrived here having read the other blogs in the series. If...
Serviceteam IT Security News

CyberUK: the unsung heroes of cyber security

Image credit: Hannah from Manchester School of Art working with www.naimuri.com  It's hard...
Serviceteam IT Security News

CyberUK by the numbers

Input metrics are a piece of cake. It’s easy to measure how much...
Serviceteam IT Security News

What does the NCSC think of password managers?

People keep asking the NCSC if it's OK for them to use password managers (sometimes...
Serviceteam IT Security News

Developers need help too

For years, security research has been focused around technology. But now - finally...
Serviceteam IT Security News

Security breaches as communication: what are your users telling you?

Amy has her passwords written on a post-it note under her keyboard. Brian keeps...
Serviceteam IT Security News

Let them paste passwords

One of the things people often tweet to us @ncsc are examples of websites...
Serviceteam IT Security News

Are security questions leaving a gap in your security?

Security questions are widely used as a form of authentication, especially as a...
Serviceteam IT Security News

Take part in LiveLabs at CyberUK

How often do you get the opportunity to get hundreds of guinea pi...  ...
Serviceteam IT Security News

What if your life depended on secure code?

When I introduced the topic of Developer Centred Security to our Research Institute for the Science...
Serviceteam IT Security News

Spending our users' security budgets wisely

We're all busy people. Business demands are constant, and information overload is a...
Serviceteam IT Security News

Your password expiry policy may have reached its expiry date

In cyber security as much as anywhere else, it's important to use the...
Serviceteam IT Security News

BBC Money Box talks passwords

We were happy to see the BBC’s flagship personal finance show visit the thorny...
Serviceteam IT Security News

CyberUK 2017: A thank you to all involved

Now that the dust has settled following CyberUK 2017 in Liverpool last week,...