FREE TO VIEW


« Back to News

2021-11-29

Spyware - Apple Starts Legal Action Against NSO Group

The controversial and secretive NSO Group is accused of using its powerful spyware in a concerted attack on Apple's customers, products & servers.

2021-11-29

Russia Wants Control Over Big Tech

Apple, Google, Meta (Facebook), Telegram, TikTok and Twitter could face numerous restrictions, ultimately leading to closure of their operations.

2021-11-29

Trojan Malware Installed On Millions Of Android Devices

Users of over nine million Android devices have installed dozens of games from Huawei that have a trojan malware designed to collect personal data. 

2021-11-29

Non-Profit Organisations & Cyber Security

Non-profit organisations tend to be targeted by cyber criminals due to their lack of smart, sophisticated cyber security technology. By John Giordani

2021-11-26

Ransomware, Iranian Hackers & Pornography

Cyber Crime Trends: Ransomware criminals have taken advantage of widespread remote working to launch increasingly sophisticated attacks.

2021-11-29

5G Networks Lack Adequate Cloud Security

5G systems provide greatly accelerated speed & bandwidth, but they can be vulnerable targets for cyber attacks if they are not properly secured. 

2021-11-24

Artificial Intelligence Could Be As Powerful As A Nuclear Weapon

The lack of regulations and difficulty in setting rules for development of artificial intelligence renders AI more dangerous than nuclear weapons.

2021-11-24

The Cyber Security Industry Will Soon Be Worth Over $300 Billion

Spending on cyber security is increasing fast to keep pace with the rise in cyber crime and malware attacks on governments, business & healthcare.

2021-11-23

Cyber Security Startups Prepare For Takeoff

Launch, Grow & Scale: 100 - plus British startups join the Cyber Runway accelerator programme, to address the UK's cyber security challenges.

2021-11-23

Online Campaign To Influence Presidential Elections - Iranians Charged

The accused hacked information from the US voter database, then threatened voters via email and released a fictitious video promoting fake news.

2021-11-23

Lottery Fraud Costs Victims £1m

Action Fraud are warning British lottery gamers to beware of email fraud asking them to pay an advance fee to release their alleged winnings.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

Cognizant

Cognizant

Cognizant offer services and solutions for IT Infrastructure Security, Enterprise Mobility and Internet of Things.

Mi-Token

Mi-Token

Mi-Token is an advanced two-factor authentication solution that offers unparalleled security, flexibility, cost-effectiveness and ease of use.

PCI Compliance Guide

PCI Compliance Guide

The PCI Compliance Guide is one of the leading educational websites available focused exclusively on PCI compliance.

TUV Sud

TUV Sud

TÜV SÜD is a leading technical service organisation. We specialize in testing, certification, auditing, training, and advisory services for different industries.

Celerium

Celerium

Celerium transforms cyber defense for both companies and industry sectors by leveraging cyber threat intelligence to defend against cyber threats and attacks.

MSPAlliance

MSPAlliance

MSPAlliance is the world’s largest industry association and certification body for cloud computing and managed service professionals.

Digital Beachhead

Digital Beachhead

Digital Beachhead has the expertise to provide a range of Cyber Risk Management and other Professional Services with specifically tailored solutions at competitive prices.

Iterasec

Iterasec

Iterasec provides a full range of security services to hacker-proof your products and make software engineering process secure by design.

Stratia Cyber

Stratia Cyber

Stratia Cyber is an independent, technology agnostic company providing high quality, pragmatic cyber security consultancy and expertise.

PCCW Global

PCCW Global

PCCW Global is a leading communications service provider, offering mobility, voice and data solutions to multinational enterprises, telecomms partners, cloud and application service providers.

ThreatNix

ThreatNix

ThreatNix is a tight knit group of experienced security professionals who are committed to providing competent cybersecurity solutions that adhere to international standards.

Turngate

Turngate

Turngate simplify security investigations so you can see employee activities and entitlements in your enterprise in seconds.

BARR Advisory

BARR Advisory

At BARR Advisory, we build trust through cyber resilience. We help protect the world’s data, people, and information networks through a human-first approach to cybersecurity and compliance.

Netia

Netia

Netia is a Polish telecommunications company providing a range of business services including network solutions, communications, data centre and cloud, and cybersecurity.

Nova Microsystems

Nova Microsystems

Nova's mission is to revolutionize cybersecurity through continuous data analysis and dynamic AI-driven encryption.