
CyberUK 2017: People – The Strongest Link
Like many of my colleagues, I'm currently rushing around getting things ready for CyberUK...

Open sourcing MailCheck
Picture credit: Paul Downey, Open Government License NCSC’s new London-based headquarters wasn’t the only...

Parting (with our Browser Guidance) is such sweet sorrow
When we were getting the NCSC's new website ready, the question came up...

Cyber Security Schools Programme
With the UK economy becoming increasingly digital, cyber security is central to national security and continues to play an important role in ensuring the UK is a safe place to do business. There is a critical need to increase the availability…

Squirrels, Not Hackers, Pose Biggest Threat to Electric Grid
According to Marcus Sachs, CSO with the North American Electric Reliability Corporation, doomsday fears of a cyberattack against the U.S. electric grid are overblown.
Source: Infrastructure Security Squirrels, Not Hackers, Pose Biggest Threat…

Probably the best cyber security event (in Liverpool in March…)
It is hard to believe that it was only 9 months ago that...

Setting Expectations Between States on Cyberwar
A RSA Conference panel tackles the difficulty in defining cyberwar.
Source: Infrastructure Security Setting Expectations Between States on Cyberwar

Download the NCSC Advent Calendar Infographic
Throughout December, we've been tweeting definitions of cyber security terms. Our aim has...

CyberFirst girls are brilliant
The CyberFirst Girls Competition was launched on 18 January and we have been inundated...

Open Databases a Juicy Extortion Target
A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks.
Source: Cloud Security Open Databases a Juicy Extortion Target

Which smartphone is the most secure?
When talking about end-user device security, one of the questions I hear most often...

Debunking cloud security myths
In December, Nick Woodcraft from GDS asked the NCSC to join the Technology Leaders Network meeting on Software...

Operational technologies
What would life be like without traffic lights, mass-produced food, energy at the...

Firmware II: Status check
As we noted back in November, it’s common knowledge that keeping device software up...

Please stop saying 'it depends'!
One of the things that I (and many other cyber security people)...

Mozilla’s First Internet Health Report Tackles Security, Privacy
Mozilla released its first Internet Health Report, examining the dangers of over-sharing eroding privacy, and the security of connected devices.
Source: Infrastructure Security Mozilla’s First Internet Health Report Tackles Security, Pri…

Hadoop, CouchDB Next Targets in Wave of Database Attacks
Insecure Hadoop and CouchDB installations are the latest attack targets of cybercriminals who are hijacking and deleting stolen data.
Source: Cloud Security Hadoop, CouchDB Next Targets in Wave of Database Attacks

Carbanak Using Google Services for Command and Control
Carbanak has surfaced again with new campaigns using Google hosted services such as Forms and Sheets as command and control channels.
Source: Cloud Security Carbanak Using Google Services for Command and Control

BBC's Money Box Live: How safe is your password?
Helping people and businesses to stay safe online through safe and secure passwords...

Backing up a bit
In mid-December, we received a comment from Richard via the 'Contact us' form on our...

I'll make you an offer you can't refuse…
One of the terms we didn't include in our advent calendar of definitions was 'malvertising'....

Box.com Plugs Account Data Leakage Flaw
Confidential documents and data belonging to Box.com users were accessible via search engine queries. Box.com has "fixed" the issue.
Source: Cloud Security Box.com Plugs Account Data Leakage Flaw

End User Device Security: Latest releases
We've just published our latest batch of End User Device Security guides. These...

EUD Security Guidance: Android 7
This guidance is applicable to Android 7 devices configured in Device Owner (i.e. corporate liable)...

Cisco Warns of Critical Flaw in CloudCenter Orchestrator Systems
Cisco is warning customers of a privilege escalation flaw in Cisco CloudCenter Orchestrator systems that could allow an attacker to gain root privileges on affected systems.
Source: Cloud Security Cisco Warns of Critical Flaw in CloudCenter…

EUD Security Guidance: iOS 10
This guidance was developed following testing performed on an iPad Air device running...

EUD Security Guidance: Ubuntu 16.04 LTS
This guidance was developed following testing on laptops running Ubuntu 16.04.1 LTS. It's...

EUD Security Guidance: macOS 10.12
This guidance was developed following testing performed on MacBook Pro and MacBook Air...

Making email mean something again
In Dr. Ian Levy's recent blog about Active Cyber Defence, he set out the...

What kinds of people do we need doing cyber security?
On Monday we ran the first-ever NCSC Twitter Q&A. As a brand-new thing,...