BUSINESS > Services > IT & Telecoms


« Back to News

2016-10-28

Smartphone “Video Jacking” From Power Sockets

Major smartphone brands are vulnerable to the hacking threat called “video jacking' when plugged into public charging stations.

2016-11-10

Google’s Ad Tracking Is Just As Creepy As Facebook's

Google has changed the way it tracks its users across the internet, merging users' personal identity data across Gmail, YouTube without consent.

2016-10-31

Data Strategies Are Not Keeping Up With Cloud Migration

Enterprise data protection strategies might not be fully aligned with IT modernization initiatives driven by cloud computing.

2016-11-07

So Far In 2016 Data Breaches Are Up 20%

The US Identity Theft Resource Center (ITRC) reports 783 data breaches recorded and more than 29 million records exposed so far this year.

2016-10-24

New Virus Attacks All Windows-Based Computers

A new type of malware capable of running on every version of MS Windows that can be detected by only two anti-virus engines.

2016-10-06

Yahoo Secretly Scanned Emails For US Intelligence

Last year Yahoo secretly built a custom software program to search all incoming emails for specific information provided by US intelligence agents.

2016-10-05

Something To Hide? Apple Will Share Your iMessages With The Police

Apple promises that your iMessage conversations are safe and out of reach from anyone other than you and your friends. Really?

2016-10-12

Strategies For A Culture of Cyber-Security

Information security can be an overwhelming concept to grasp, but it's vital to protecting your sensitive business data.

2016-10-05

Five Technologies Changing Our lives In Five Years

Analysts say a handful of technologies are poised to change our lives by 2021. What are they?

2016-10-05

Ever-Evolving Trojan Devices Infects Android Systems

The Trojan known as Android.Xiny continues to evolve and has gained the ability to infect a core Android system process.

2016-09-30

More Questions About The Yahoo Breach

Pressure is mounting on Yahoo to admit when it knew about the attack, & whether there was a delay in reporting it.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

World Privacy Forum (WPF)

World Privacy Forum (WPF)

The World Privacy Forum is a non-profit public interest research group that focuses on privacy and technology issues.

ESG Elektroniksystem- und Logistik-GmbH

ESG Elektroniksystem- und Logistik-GmbH

ESG offer a comprehensive portfolio of cyber and IT services ranging from consulting, solutions and operations to testing, simulation and training.

Executive Women's Forum (EWF)

Executive Women's Forum (EWF)

The Executive Women's Forum is the largest member organization serving emerging leaders and influential female executives in the Information Security, Risk Management and Privacy industries.

Barbara IoT

Barbara IoT

Barbara is an industrial device platform specifically designed for IoT deployments.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

UKsec: Virtual Cyber Security Summit

UKsec: Virtual Cyber Security Summit

Join 100s of UK Cyber Security Leaders Online for Expert Cyber Security Talks, Strategy Insights, Cyber Resilience Tips and More.

Privakey

Privakey

Transaction Intent Verification. Privakey delivers a secure channel to streamline high risk transactions, enabling digital trust between services and their users.

Netgo

Netgo

Netgo group meet the requirements of a complex, digitized world with IT consulting, IT solutions & services, managed & cloud services and software products & development.

Airgap Networks

Airgap Networks

Airgap is fixing the fundamental flaw of excessive trust. We help enterprises modernize their network for a simple and secure infrastructure.

NASK

NASK

NASK is a National Research Institute under the supervision of the Chancellery of the Prime Minister of Poland. Our key activities involve ensuring security online.

Avalor

Avalor

Avalor are on a mission to help security teams make faster, more accurate decisions by making sense of their data. With Avalor you can bring in data from anywhere, normalize it and analyze it.

Mindflow

Mindflow

Mindflow is dedicated to bringing answers to the challenges the cybersecurity field and beyond face today.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

Compugen Systems Inc (CSI)

Compugen Systems Inc (CSI)

Compugen Systems is an IT service delivery company that focuses on enabling your business outcomes.

System360

System360

System360 is one of Houston's top suppliers of network administration, design, security, and support services.

Solid8 Technologies

Solid8 Technologies

Solid8 Technologies is a value added distributor and innovation incubator partnering with leading global Cyber Security software Vendors.