Please stop saying 'it depends'!
One of the things that I (and many other cyber security people)...
Mozilla’s First Internet Health Report Tackles Security, Privacy
Mozilla released its first Internet Health Report, examining the dangers of over-sharing eroding privacy, and the security of connected devices.
Source: Infrastructure Security Mozilla’s First Internet Health Report Tackles Security, Pri…
Hadoop, CouchDB Next Targets in Wave of Database Attacks
Insecure Hadoop and CouchDB installations are the latest attack targets of cybercriminals who are hijacking and deleting stolen data.
Source: Cloud Security Hadoop, CouchDB Next Targets in Wave of Database Attacks
Carbanak Using Google Services for Command and Control
Carbanak has surfaced again with new campaigns using Google hosted services such as Forms and Sheets as command and control channels.
Source: Cloud Security Carbanak Using Google Services for Command and Control
BBC's Money Box Live: How safe is your password?
Helping people and businesses to stay safe online through safe and secure passwords...
Backing up a bit
In mid-December, we received a comment from Richard via the 'Contact us' form on our...
I'll make you an offer you can't refuse…
One of the terms we didn't include in our advent calendar of definitions was 'malvertising'....
Box.com Plugs Account Data Leakage Flaw
Confidential documents and data belonging to Box.com users were accessible via search engine queries. Box.com has "fixed" the issue.
Source: Cloud Security Box.com Plugs Account Data Leakage Flaw
End User Device Security: Latest releases
We've just published our latest batch of End User Device Security guides. These...
EUD Security Guidance: Android 7
This guidance is applicable to Android 7 devices configured in Device Owner (i.e. corporate liable)...
Cisco Warns of Critical Flaw in CloudCenter Orchestrator Systems
Cisco is warning customers of a privilege escalation flaw in Cisco CloudCenter Orchestrator systems that could allow an attacker to gain root privileges on affected systems.
Source: Cloud Security Cisco Warns of Critical Flaw in CloudCenter…
EUD Security Guidance: iOS 10
This guidance was developed following testing performed on an iPad Air device running...
EUD Security Guidance: Ubuntu 16.04 LTS
This guidance was developed following testing on laptops running Ubuntu 16.04.1 LTS. It's...
EUD Security Guidance: macOS 10.12
This guidance was developed following testing performed on MacBook Pro and MacBook Air...
Making email mean something again
In Dr. Ian Levy's recent blog about Active Cyber Defence, he set out the...
What kinds of people do we need doing cyber security?
On Monday we ran the first-ever NCSC Twitter Q&A. As a brand-new thing,...
*Sorry, no chocolate
There are some words and phrases related to cyber security which are bandied...
SugarCRM Wins PC Magazine’s 2016 Business Choice Award for Best CRM Service
SugarCRM has been named the Best CRM Service by PC Magazine readers in the publication’s annual business choice awards. For the second year in a row, SugarCRM rose above other providers with outstanding scores for overall satisfaction,…
Assuring Smart Meters
Several years ago, as part of the Smart Meter Implementation Project, we embarked...
75% of healthcare industry hit with malware, report
The healthcare vertical is at particular risk from ransomware. This is just one of the findings of the "2016 Healthcare Industry Cybersecurity Report," a just-released survey from SecurityScorecard.
Source: SC Magazine 75% of healthcare industry…
Active Cyber Defence – tackling cyber attacks on the UK
On 1st November, the Chancellor announced the Government's new National Cyber Security...
The Phishing threat following data breaches
Key Points Recent reporting of data breaches affecting customers in the UK reminds...
Fraud report names most sophisticated cyber-attacks globally in 2016
Fraud is in a constant state of evolution to stay a step ahead of the defences deployed to stop it.
Source: SC Magazine Fraud report names most sophisticated cyber-attacks globally in 2016
Student discovers security flaw in Virgin Media recruitment system
A student has discovered a security vulnerability in the software which Virgin Media uses for recruitment and job applications.
Source: SC Magazine Student discovers security flaw in Virgin Media recruitment system
Phishing emails promising invites to cybersecurity conference actually dispersing malware
Threat actors have been discovered trying to infect security-minded individuals with a trojan downloader by sending spear phishing emails that offer free invitations to Palo Alto Networks' Cyber Security Summit in Jakarta, Indonesia.
Source:…
Shadow Brokers claim to leak NSA cyberespionage targets
The Shadow Brokers hacking group has leaked another batch of NSA-linked data containing a list of servers linked to cyberespionage hacking programs.
Source: SC Magazine Shadow Brokers claim to leak NSA cyberespionage targets
EU privacy regulators query Yahoo CEO on breach
Yahoo CEO Marissa Mayer was sent a letter from a watchdog group overseeing privacy regulators in the European Union seeking answers on the affect of a massive breach the company experienced.
Source: SC Magazine EU privacy regulators query Yahoo…
Protecting your organisation from ransomware
Ransomware is a growing global cyber security threat, and one which could affect any organisation...
Macro Security for Microsoft Office
This guidance describes how administrators can help protect their systems from malicious Microsoft...
What can the NCSC do for you?
If you’re browsing this website, you might be wondering how the new National...