
Cyber resilience – nothing to sneeze at
Now that summer is finally here you probably can't even remember the series...

Getting a grip on firmware
If you're reading this, you're probably already aware of the importance of keeping...

Making the UK the safest place to live and do business online
Welcome to GCHQ's new National Cyber Security Centre. Why are we here? Over...

The NCSC Cyber Accelerator; a new beginning
Last week we welcomed the latest cohort of the NCSC Cyber Accelerator to a 'Demo...

Bug Bounty Programs Turn Attention to Data Abuse
More companies – particularly social media firms – may follow Facebook’s footsteps in...

Rowhammer Variant ‘RAMpage’ Targets Android Devices All Over Again
The attack allows malicious applications to break out of their sandbox and access...

Welcome to the NCSC Blog
Here at the National Cyber Security Centre we’re keen to share with you...

Norwegian Agency Dings Facebook, Google For “Unethical” Privacy Tactics
Facebook and Google are doing anything they can to nudge users away from...

Ticketmaster Chat Feature Leads to Credit-Card Breach
Name, address, email address, telephone number, payment details and Ticketmaster login details were...

Ready, Set… Android Go?
Just over a year ago, Google announced the launch of Android Go *, a slimline operating...

NCSC advice for Ticketmaster customers
Who is this guidance for? Customers of Ticketmaster International, Ticketmaster UK, GETMEIN! and...

Mozilla Announces Firefox Monitor Tool Testing, Firefox 61
Mozilla is testing a new tool that securely checks to see if users’...

EUD Security Guidance: Chrome OS 65
This guidance was developed following testing performed on a Chromebook device running Chrome...

UK Tax Agency Collects 5.1M Biometric Voice IDs, May Violate GDPR
The agency doesn't ask for explicit consent to collect the voiceprints; and, the...

Sneaky Web Tracking Technique Under Heavy Scrutiny by GDPR
Don’t expect tracking methods such as browser fingerprinting to disappear anytime soon, even...

Financial Services Sector Rife with Hidden Tunnels
Attackers use the approach to look like legitimate traffic and hide data exfiltration...

New Phishing Scam Reels in Netflix Users to TLS-Certified Sites
Researchers are warning of a new Netflix phishing scam that leads to sites...

Mylobot Botnet Emerges with Rare Level of Complexity
A new botnet from the Dark Web displays a never-before-seen level of complexity...

Olympic Destroyer Returns to Target Biochemical Labs
The threat actors appear to be in a reconnaissance phase, which could be...

“Unbreakable” Smart Lock Tapplock Issues Critical Security Patch
Researchers were able to discover a way to hack the device in less...

New Banking Trojan Can Launch Overlay Attacks on Latest Android Versions
While other malware families have been searching for new overlay techniques for Android...

Stepping up to multi-factor authentication
Despite being widely available, uptake of multi-factor authentication has been slow and we...

Multi-factor authentication for online services
This guidance describes how to use multi-factor authentication (MFA) to mitigate against password guessing and...

Apple Removes iPhone USB Access Feature, Blocking Out Hackers, Law Enforcement
The move escalates tensions between the phone giant and federal law enforcement when...

Malicious Docker Containers Earn Cryptomining Criminals $90K
Researchers said over a dozen malicious docker images available on Docker Hub allowed...

Microsoft Reveals Which Bugs It Won’t Patch
A draft document lays out its criteria for addressing various flaws and notes...

Dixons Carphone Cyberattack Targets 5.9M Bank Cards
Dixons Carphone said it discovered a massive cyberattack on its processing systems that...

NCSC advice for Dixons Carphone plc customers
Who is this guidance for? Customers of Dixons Carphone plc, who the NCSC...

Bypass Glitch Allows Malware to Masquerade as Legit Apple Files
Malware can to worm its way onto Macs thanks to a recently discovered...

Report: Chinese Hackers Siphon Off ‘Massive’ Amounts of Undersea Military Data
The stolen data included "secret plans to develop a supersonic anti-ship missile for...