
Improving government, one bit at a time
The NCSC's Active Cyber Defence programme - a series of initiatives designed to...

New NCSC report highlights threats to the UK legal sector
Like most businesses, law firms are increasingly reliant on IT and technology to...

Import data, not malware
Today we've released a cornerstone of the NCSC's security architecture practice - our...

Can we manage our cyber risks?
It can sometimes feel like cyber security is just too complex for us to...

Pattern: Safely Importing Data
Introduction Computer systems rarely exist in isolation - they often need to interact...

My cloud isn’t a castle
You may have noticed from my previous blogs, or the talks I’ve given, that I’m...

Learning to love logging
We have just published some guidance which highlights the importance of logging, and...

Introduction to logging for security purposes
Introduction Logging is the foundation on which security monitoring and situational awareness are...

Cyber resilience – nothing to sneeze at
Now that summer is finally here you probably can't even remember the series...

Getting a grip on firmware
If you're reading this, you're probably already aware of the importance of keeping...

Making the UK the safest place to live and do business online
Welcome to GCHQ's new National Cyber Security Centre. Why are we here? Over...

The NCSC Cyber Accelerator; a new beginning
Last week we welcomed the latest cohort of the NCSC Cyber Accelerator to a 'Demo...

Bug Bounty Programs Turn Attention to Data Abuse
More companies – particularly social media firms – may follow Facebook’s footsteps in...

Rowhammer Variant ‘RAMpage’ Targets Android Devices All Over Again
The attack allows malicious applications to break out of their sandbox and access...

Welcome to the NCSC Blog
Here at the National Cyber Security Centre we’re keen to share with you...

Norwegian Agency Dings Facebook, Google For “Unethical” Privacy Tactics
Facebook and Google are doing anything they can to nudge users away from...

Ticketmaster Chat Feature Leads to Credit-Card Breach
Name, address, email address, telephone number, payment details and Ticketmaster login details were...

Ready, Set… Android Go?
Just over a year ago, Google announced the launch of Android Go *, a slimline operating...

NCSC advice for Ticketmaster customers
Who is this guidance for? Customers of Ticketmaster International, Ticketmaster UK, GETMEIN! and...

Mozilla Announces Firefox Monitor Tool Testing, Firefox 61
Mozilla is testing a new tool that securely checks to see if users’...

EUD Security Guidance: Chrome OS 65
This guidance was developed following testing performed on a Chromebook device running Chrome...

UK Tax Agency Collects 5.1M Biometric Voice IDs, May Violate GDPR
The agency doesn't ask for explicit consent to collect the voiceprints; and, the...

Sneaky Web Tracking Technique Under Heavy Scrutiny by GDPR
Don’t expect tracking methods such as browser fingerprinting to disappear anytime soon, even...

Financial Services Sector Rife with Hidden Tunnels
Attackers use the approach to look like legitimate traffic and hide data exfiltration...

New Phishing Scam Reels in Netflix Users to TLS-Certified Sites
Researchers are warning of a new Netflix phishing scam that leads to sites...

Mylobot Botnet Emerges with Rare Level of Complexity
A new botnet from the Dark Web displays a never-before-seen level of complexity...

Olympic Destroyer Returns to Target Biochemical Labs
The threat actors appear to be in a reconnaissance phase, which could be...

“Unbreakable” Smart Lock Tapplock Issues Critical Security Patch
Researchers were able to discover a way to hack the device in less...

New Banking Trojan Can Launch Overlay Attacks on Latest Android Versions
While other malware families have been searching for new overlay techniques for Android...

Stepping up to multi-factor authentication
Despite being widely available, uptake of multi-factor authentication has been slow and we...