FREE TO VIEW


« Back to News

2022-02-21

Apple Updates AirTag To Combat Stalkers

Apple will update the iPhone and AirTag software with a warning message that using AirTags to track people is a crime in many jurisdictions.

2022-02-21

Rewired: An AI That Can Learn Like A Human Brain

A brain-inspired computer chip that is capable of rewiring itself as it learns, could transform development of human-level Artificial Intelligence. 

2022-02-17

California College Ransomware Attack

Personal data of faculty & students at a California community college has been exposed and IT systems crippled in a “sophisticated” attack.

2022-02-19

Vodafone Portugal Has Been Hacked

A “deliberate and malicious” cyber attack targeting Vodafone Portugal succeeded in knocking mobile networks offline across the country.

2022-02-16

Military Operating Systems Bring AI To The Battlefield

USA vs China: There is an arms race in Artificial Intelligence with the aim to gain decision-making dominance on the battlefield of the future.

2022-02-15

British Foreign Office Hacked

Britain's Foreign, Commonwealth and Development Office needed 'urgent support' when unidentified hackers got inside their network systems.

2022-02-15

Ransomware Attacks On Transport & Logistics Centres

Planes, Ships & Automobiles: In separate incidents, several European transport & logistics hubs have suffered similar ransomware attacks.

2022-02-14

An Invasion Of Ukraine Might Coincide With Cyber Attacks On Western Banks

Russia could conduct sophisticated cyber attacks on the international banking sector if it doesn't get concessions over NATO's ties with Ukraine.

2022-02-14

Most SMEs Do Not Provide Cyber Security Training

A study reveals that 62% of SMEs have experienced a cyber attack, yet 48% admit their employees have not had recent cyber security training.

2022-02-11

Online Fraud Is A British Security Nightmare

Crime Epidemic: Britain has become a target destination for global fraudsters, to a level where it can be considered a threat to national security.

2022-02-11

A Quick Guide To Remote Code Execution (RCE)

When someone takes remote control of your computer there is a real risk that malware is being installed without your knowledge. By Madeline Miller

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Kernelios

Kernelios

Kernelios is a simulator-based training center and an incubator for cyber experts worldwide.

International Telecommunication Union (ITU)

International Telecommunication Union (ITU)

ITU is the United Nations specialized agency for information and communication technologies – ICTs. Areas of activity include cybersecurity.

Sparta Consulting

Sparta Consulting

Sparta Consulting is an information management and business development full service provider.

iONLINE

iONLINE

iONLINE delivers high quality IT services and solutions to businesses in Azerbaijan.

FRSecure

FRSecure

FRSecure is a full-service information security management company that protects sensitive, confidential business information from unauthorized access, disclosure, distribution and destruction.

iSecurity Consulting

iSecurity Consulting

iSecurity delivers a complete lifecycle of digital protection services across the globe for public and private sector clients.

Acceptto

Acceptto

Acceptto offers the first unified and continuous authentication identity access platform with No-Password.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Cyber Security Forum Initiative (CSFI)

Cyber Security Forum Initiative (CSFI)

CSFI is a non-profit organization with a mission to provide Cyber Warfare awareness, guidance, and security solutions through collaboration, education, volunteer work, and training.

Gijima

Gijima

Gijima is one of SA’s leading ICT companies in Cloud & Outsourcing, Systems integration, Human Capital Management & Training, Cybersecurity, and Unified Communications.

F1 Security

F1 Security

F1 Security provides a family of web security solutions including web application firewalls, web shell detection solutions, and web shell scanners.

General Informatics

General Informatics

General Informatics is a team of technology enthusiasts with one mission: to make our clients even more successful through the best use of technology.

Valimail

Valimail

Valimail delivers the only complete, cloud-native platform for validating and authenticating sender identity to stop phishing, protect and amplify brands, and ensure compliance.

Althammer & Kill

Althammer & Kill

Althammer & Kill offers pragmatic solution concepts for data protection and digitization. We advise in the field of data protection, information security and compliance.

SequelNet

SequelNet

SequelNet is an emerging MSP, providing 360° business IT solutions and consulting services.

CallCabinet

CallCabinet

CallCabinet is the premier cross-platform SaaS provider for end-to-end compliant call recording, AI-driven conversation analytics, call QA, and custom business intelligence reporting.