Posts

Throughout December, we’ve been tweeting definitions of cyber security terms. Our aim has…

The CyberFirst Girls Competition was launched on 18 January and we have been inundated…

A sudden wave of attacks against insecure databases resulting in ransom demands points to wave of data hijacking attacks. Source: Cloud Security Open Databases a Juicy Extortion Target

When talking about end-user device security, one of the questions I hear most often…

In December, Nick Woodcraft from GDS asked the NCSC to join the Technology Leaders Network meeting on Software…

What would life be like without traffic lights, mass-produced food, energy at the…

As we noted back in November, it’s common knowledge that keeping device software up…

One of the things that I (and many other cyber security people)…

Mozilla released its first Internet Health Report, examining the dangers of over-sharing eroding privacy, and the security of connected devices. Source: Infrastructure Security Mozilla’s First Internet Health Report Tackles Security, Privacy

Insecure Hadoop and CouchDB installations are the latest attack targets of cybercriminals who are hijacking and deleting stolen data. Source: Cloud Security Hadoop, CouchDB Next Targets in Wave of Database Attacks