androidphonestablet

Android malware found pre-installed on over 30 different Android smartphones

The Independent reports.....This issue that affects big names in the smartphones from Samsung, LG and Google. According to a cyber security firm over 30 different Android smartphones and tablets have been found to have had malware preinstalled…
AFBL-Wesite-Blog

New website for Alternative Finance Business Loans

Team Discovery is pleased to launch a new peer-to-peer lending website for our client “Alternative Finance Business Loans (AFBL)”….Website URL: https://www.alternativefinance.loans/Many of our own clients may benefit from the…
spam-scam

Spammers expose their entire operation through bad backups

This is the story of how River City Media (RCM), Alvin Slocombe, and Matt Ferris, accidentally exposed their entire operation to the public after failing to properly configure their Rsync backups.The data from this well-known, but slippery…
b2social-instagram

Instagram Guide To Social Media Sharing: What, When & How To Share

Instagram – Photo Sharing in Real Time Instagram facts & figures400 million users worldwide use Instagram each month and the network is visited 770 million times per day.Whereas Pinterest is focused on brand communication,…
b2social-pinterest

Pinterest Guide To Social Media Sharing: What, When & How To Share

Pinterest – The Branding Network Pinterest facts & figuresPinterest has 100 million active users worldwide and gets up to 300 million page views a day.Tips for cross-promoting your blog posts on Pinterest On Pinterest,…
b2social-linkedin

LinkedIn Guide To Social Media Sharing: What, When & How To Share

LinkedIn – The International Business Network LinkedIn facts & figures LinkedIn is the biggest international business network. The network mainly serves the purpose of contacting and networking with business contacts, recruiting…
passwordexpired

The problems with forcing regular password expiry

Why CESG - now part of the NCSC - decided to advise against this long-established security guideline.Regular password expiry is a common requirement in many security policies. However, in the Password Guidance published…
Let them paste passwords

Let them paste passwords

One of the things people often tweet to https://twitter.com/ncsc are examples of websites which prevent you pasting in a password. Why do websites do this? The debate has raged - with most commentators raging how annoying it is.So why do…
passwordmanagers

What does the NCSC think of password managers?

People keep asking the NCSC if it's OK for them to use password managers (sometimes called password vaults). If so, which ones? Who should use them - private citizens, small businesses, massive enterprises? And how should people use them?…