
Download the NCSC Advent Calendar Infographic
Throughout December, we've been tweeting definitions of cyber security terms. Our aim has...

CyberFirst girls are brilliant
The CyberFirst Girls Competition was launched on 18 January and we have been inundated...

Open Databases a Juicy Extortion Target
A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks.
Source: Cloud Security Open Databases a Juicy Extortion Target

Which smartphone is the most secure?
When talking about end-user device security, one of the questions I hear most often...

Debunking cloud security myths
In December, Nick Woodcraft from GDS asked the NCSC to join the Technology Leaders Network meeting on Software...

Operational technologies
What would life be like without traffic lights, mass-produced food, energy at the...

Firmware II: Status check
As we noted back in November, it’s common knowledge that keeping device software up...

Please stop saying 'it depends'!
One of the things that I (and many other cyber security people)...

Mozilla’s First Internet Health Report Tackles Security, Privacy
Mozilla released its first Internet Health Report, examining the dangers of over-sharing eroding privacy, and the security of connected devices.
Source: Infrastructure Security Mozilla’s First Internet Health Report Tackles Security, Pri…

Hadoop, CouchDB Next Targets in Wave of Database Attacks
Insecure Hadoop and CouchDB installations are the latest attack targets of cybercriminals who are hijacking and deleting stolen data.
Source: Cloud Security Hadoop, CouchDB Next Targets in Wave of Database Attacks

Carbanak Using Google Services for Command and Control
Carbanak has surfaced again with new campaigns using Google hosted services such as Forms and Sheets as command and control channels.
Source: Cloud Security Carbanak Using Google Services for Command and Control

BBC's Money Box Live: How safe is your password?
Helping people and businesses to stay safe online through safe and secure passwords...

Backing up a bit
In mid-December, we received a comment from Richard via the 'Contact us' form on our...

I'll make you an offer you can't refuse…
One of the terms we didn't include in our advent calendar of definitions was 'malvertising'....

Box.com Plugs Account Data Leakage Flaw
Confidential documents and data belonging to Box.com users were accessible via search engine queries. Box.com has "fixed" the issue.
Source: Cloud Security Box.com Plugs Account Data Leakage Flaw

End User Device Security: Latest releases
We've just published our latest batch of End User Device Security guides. These...

EUD Security Guidance: Android 7
This guidance is applicable to Android 7 devices configured in Device Owner (i.e. corporate liable)...

Cisco Warns of Critical Flaw in CloudCenter Orchestrator Systems
Cisco is warning customers of a privilege escalation flaw in Cisco CloudCenter Orchestrator systems that could allow an attacker to gain root privileges on affected systems.
Source: Cloud Security Cisco Warns of Critical Flaw in CloudCenter…

EUD Security Guidance: Ubuntu 16.04 LTS
This guidance was developed following testing on laptops running Ubuntu 16.04.1 LTS. It's...

EUD Security Guidance: macOS 10.12
This guidance was developed following testing performed on MacBook Pro and MacBook Air...

EUD Security Guidance: iOS 10
This guidance was developed following testing performed on an iPad Air device running...

Making email mean something again
In Dr. Ian Levy's recent blog about Active Cyber Defence, he set out the...

What kinds of people do we need doing cyber security?
On Monday we ran the first-ever NCSC Twitter Q&A. As a brand-new thing,...

*Sorry, no chocolate
There are some words and phrases related to cyber security which are bandied...

SugarCRM Wins PC Magazine’s 2016 Business Choice Award for Best CRM Service
SugarCRM has been named the Best CRM Service by PC Magazine readers in the publication’s annual business choice awards. For the second year in a row, SugarCRM rose above other providers with outstanding scores for overall satisfaction,…

Assuring Smart Meters
Several years ago, as part of the Smart Meter Implementation Project, we embarked...

75% of healthcare industry hit with malware, report
The healthcare vertical is at particular risk from ransomware. This is just one of the findings of the "2016 Healthcare Industry Cybersecurity Report," a just-released survey from SecurityScorecard.
Source: SC Magazine 75% of healthcare industry…

Active Cyber Defence – tackling cyber attacks on the UK
On 1st November, the Chancellor announced the Government's new National Cyber Security...

The Phishing threat following data breaches
Key Points Recent reporting of data breaches affecting customers in the UK reminds...

Fraud report names most sophisticated cyber-attacks globally in 2016
Fraud is in a constant state of evolution to stay a step ahead of the defences deployed to stop it.
Source: SC Magazine Fraud report names most sophisticated cyber-attacks globally in 2016