
Cyber security: available at good shops everywhere
One of the key objectives of the NCSC is to increase the overall...

CyberUK 2017: Let the cyber games begin!
At CyberUK this year there will be two locations to buy hot drinks:...

DHS Chairman Paints Bleak US Cyber Security Picture
The United States is losing on the cyber-battlefield and face a bleak threat landscape, according to DHS chairman Michael McCaul. But, he says, there is still hope to turn things around.
Source: Cloud Security DHS Chairman Paints Bleak US Cybersecurity…

What's new with Windows 10?
With the release of Windows 10 Anniversary Edition (1607) and the upcoming Creators' Edition,...

EUD Security Guidance: Windows 10
About this guidance This guidance has been updated for the 1607 “Anniversary Edition”...

Cisco Warns of High Severity Bug in NetFlow Appliance
Cisco is warning of a flaw that creates conditions susceptible to a DoS attack in its NetFlow Generation Appliance.
Source: Cloud Security Cisco Warns of High Severity Bug in NetFlow Appliance

Google reCaptcha Bypass Technique Uses Google’s Own Tools
A proof of concept bypass of Google's CAPTCHA verification system uses Google's own web-based tools to pull off the skirting of the system.
Source: Cloud Security Google reCaptcha Bypass Technique Uses Google’s Own Tools

Robots Rife With Cybersecurity Holes
IOActive Labs released a report Wednesday warning that consumer, industrial, and service robots in use today have serious security vulnerabilities.
Source: Cloud Security Robots Rife With Cybersecurity Holes

CyberUK 2017: People – The Strongest Link
Like many of my colleagues, I'm currently rushing around getting things ready for CyberUK...

Open sourcing MailCheck
Picture credit: Paul Downey, Open Government License NCSC’s new London-based headquarters wasn’t the only...

Parting (with our Browser Guidance) is such sweet sorrow
When we were getting the NCSC's new website ready, the question came up...

Cyber Security Schools Programme
With the UK economy becoming increasingly digital, cyber security is central to national security and continues to play an important role in ensuring the UK is a safe place to do business. There is a critical need to increase the availability…

Squirrels, Not Hackers, Pose Biggest Threat to Electric Grid
According to Marcus Sachs, CSO with the North American Electric Reliability Corporation, doomsday fears of a cyberattack against the U.S. electric grid are overblown.
Source: Infrastructure Security Squirrels, Not Hackers, Pose Biggest Threat…

Probably the best cyber security event (in Liverpool in March…)
It is hard to believe that it was only 9 months ago that...

Setting Expectations Between States on Cyberwar
A RSA Conference panel tackles the difficulty in defining cyberwar.
Source: Infrastructure Security Setting Expectations Between States on Cyberwar

Download the NCSC Advent Calendar Infographic
Throughout December, we've been tweeting definitions of cyber security terms. Our aim has...

CyberFirst girls are brilliant
The CyberFirst Girls Competition was launched on 18 January and we have been inundated...

Open Databases a Juicy Extortion Target
A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks.
Source: Cloud Security Open Databases a Juicy Extortion Target

Which smartphone is the most secure?
When talking about end-user device security, one of the questions I hear most often...

Debunking cloud security myths
In December, Nick Woodcraft from GDS asked the NCSC to join the Technology Leaders Network meeting on Software...

Operational technologies
What would life be like without traffic lights, mass-produced food, energy at the...

Firmware II: Status check
As we noted back in November, it’s common knowledge that keeping device software up...

Please stop saying 'it depends'!
One of the things that I (and many other cyber security people)...

Mozilla’s First Internet Health Report Tackles Security, Privacy
Mozilla released its first Internet Health Report, examining the dangers of over-sharing eroding privacy, and the security of connected devices.
Source: Infrastructure Security Mozilla’s First Internet Health Report Tackles Security, Pri…

Hadoop, CouchDB Next Targets in Wave of Database Attacks
Insecure Hadoop and CouchDB installations are the latest attack targets of cybercriminals who are hijacking and deleting stolen data.
Source: Cloud Security Hadoop, CouchDB Next Targets in Wave of Database Attacks

Carbanak Using Google Services for Command and Control
Carbanak has surfaced again with new campaigns using Google hosted services such as Forms and Sheets as command and control channels.
Source: Cloud Security Carbanak Using Google Services for Command and Control

BBC's Money Box Live: How safe is your password?
Helping people and businesses to stay safe online through safe and secure passwords...

Backing up a bit
In mid-December, we received a comment from Richard via the 'Contact us' form on our...

I'll make you an offer you can't refuse…
One of the terms we didn't include in our advent calendar of definitions was 'malvertising'....

Box.com Plugs Account Data Leakage Flaw
Confidential documents and data belonging to Box.com users were accessible via search engine queries. Box.com has "fixed" the issue.
Source: Cloud Security Box.com Plugs Account Data Leakage Flaw