
Sonic Tone Attacks Damage Hard Disk Drives, Crashes OS
Attack uses ultrasonic sound waves to disrupt HHD read/write operations, which could lead...

Millions of IoT Devices Vulnerable to Z-Wave Downgrade Attacks, Researchers Claim
Millions of IoT devices based on the Z-Wave wireless protocol are vulnerable to...

Alexa Eavesdropping Flub Re-Sparks Voice Assistant Privacy Debate
After an Alexa speaker recorded and shared a private conversation, the tech community...

What Will GDPR’s Impact Be On U.S. Consumer Privacy?
GDPR may be going in effect Friday, but U.S. citizens have a ways...

Of mice and cyber
What’s the difference between a combustion engine and a mouse? (no this isn't...

Ahead of GDPR, Information Governance Comes into Its Own
A full 98 percent of US enterprises have embarked on information governance (IG)...

Researchers Say More Spectre-Related CPU Flaws On Horizon
Yet another speculative execution side channel flaw has been disclosed in processors -...

Six Vulnerabilities Found in Dell EMC’s Disaster Recovery System, One Critical
A pen-tester has found five vulnerabilities in Dell EMC RecoverPoint devices, including a...

Intel Responds to Spectre-Like Flaw In CPUs
Intel on Monday acknowledged that its processors are vulnerable to another Spectre-like speculative...

Countdown to GDPR
Anybody who is involved in cyber security or data protection will be acutely...

Wicked Botnet Uses Passel of Exploits to Target IoT
The code is integrated with at least three exploits that target unpatched IoT...

EUD Security Guidance: Windows 10 with Mobile Device Management
About this guidance This ALPHA guidance describes how to securely manage Windows 10 Desktop...

GDPR Security Outcomes
This guidance describes a set of technical security outcomes that are considered to...

Cisco Warns of Three Critical Bugs in Digital Network Architecture Platform
The company urges customers to patch three vulnerabilities that received the highest severity...

One Year After WannaCry: A Fundamentally Changed Threat Landscape
Threatpost talked to several security researchers about what's changed in the past year....

Critical Linux Flaw Opens the Door to Full Root Access
The vulnerability allows an attacker to execute a malware or other payloads on...

Phishing, spear phishing and whaling; does it change the price of phish?
The NCSC - in collaboration with CPNI - has recently published guidance on avoiding...

Avoid scoring a cyber security own goal this summer
This blog signposts to existing advice put together to answer any general...

Increased Cyber Threats: Security steps to take
This guidance outlines the security steps that your organisation should take in response...

Attackers Use UPnP to Sidestep DDoS Defenses
Universal Plug and Play networking protocols can be exploited to bypass DDoS mitigations....

Spray you, spray me: defending against password spraying attacks
One common way that online accounts are breached is through password spraying, whereby lists...

GDPR Phishing Scam Targets Apple Accounts, Financial Data
A phishing scam fooled victims by claiming to be Apple and scooping up...

Bugs in Logitech Harmony Hub Put Connected IoT Devices at ‘High Risk’
Researchers found an array of vulnerabilities in the Logitech Harmony Hub, shedding light...

Secrets of the Wiper: Inside the World’s Most Destructive Malware
The actors behind this kind of code, whether they’re bent on sending a...

Generic application development guidance
This guidance provides advice on how to minimise the loss of data from...

Apple iOS application development guidance
This guidance contains recommendations for the secure development, procurement and deployment of iOS applications. Please familiarise yourself with the generic application...

Google Project Zero Calls Windows 10 Edge Defense ‘ACG’ Flawed
Researchers maintain Microsoft’s vaunted Arbitrary Code Guard in the Edge browser can’t stop...

Application development collection
This guidance provides advice on how to minimise the loss of data from...

Android application development guidance
This guidance contains recommendations for the secure development, procurement and deployment of Android applications. Please familiarise yourself with the generic application...

Major OS Players Misinterpret Intel Docs, and Now Kernels Can Be Hijacked
Apple, Microsoft, Red Hat and others have built an uncannily similar privilege escalation...