FREE TO VIEW


« Back to News

2018-09-07

British Airways Fake Facebook Page

The bogus “British Airways Holidays”page steals personal data by claiming you can win holidays and free air travel by clicking a “Sign Up” button.

2018-09-10

Widepsread Campaign Hacking Instagram Accounts

The hack sees account names, profile pictures, passwords and email addresses changed with new data originating from a Russian provider.

2018-09-06

Germany Promotes Cybersecurity Research

The German government wants to end reliance on digital technologies from the United States, China and others by building its own capabilities.

2018-09-06

Digital Shock: Cybercrime & The Future Of Policing. Part 3

With an online crime reported every ten minutes British Police forces are belatedly investing in cybersecurity training. (£) By Alfred Rolington

2018-09-06

Hackers Breach Cryptocurrency Platform

Cryptocurrency platforms are increasingly targeted by cybercriminals and Atlas Quantum is the latest to be breached with 240,000 users compromised.

2018-09-04

Iranian Political Influence Campaign Goes Global

Iranian influence operations targeting internet users worldwide are significantly bigger than previously identified.

2018-09-03

What Europe Can Do To Catch Dark Web Criminals

Europe gets serious about fighting crime schemes hatched on the dark web, the home of hackers, pedophiles, terrorists, and other undesirables.

2018-09-05

The Best Security Is Based On Zero Trust

When illegitimate users get access to the data centre the architecture implicitly trusts them - there is little to impede intruders once inside.

2018-09-04

Training Young Hackers To Stop Cybercrime

British police chiefs and intelligence officers hope that young people will become their latest recruits in the rapidly evolving cyber war.

2018-09-07

Why Mainframe Security Risks Are Largely Unrecognized

Healthcare records are a top target for hackers, but what about vulnerabilities that aren’t even on the radar of hospital IT departments?

2018-09-07

Organizations Hit With North Korea-Linked Ryuk Ransomware

A recent wave of ransomware attacks against organizations have been linked to a notorious North Korean threat actor.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

IOActive

IOActive

IOActive serves as a trusted security advisor to the Global 500 and other progressive enterprises, helping to safeguard their most important assets and improve their overall security posture.

Cyber Security Recruiters

Cyber Security Recruiters

Cyber Security Recruiters is a niche recruiting firm who finds impact players for our clients in the Information Security Space.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

CYBER 1

CYBER 1

CYBER 1 provides cyber security solutions to customers wanting to be resilient against new and existing threats.

Bit4id

Bit4id

Bit4id provides software and systems for security and identification based on PKI technology.

SynerComm

SynerComm

SynerComm is an IT solution provider specializing in network and security infrastructure, enterprise mobility, remote access, wireless solutions, audit, pentesting and information assurance.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Findcourses.co.uk

Findcourses.co.uk

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

SyncDog

SyncDog

SyncDog is a leader in enterprise security and the preeminent vendor for containerized mobile application security across cloud & on-premise computing environments.

Easy Dynamics

Easy Dynamics

Easy Dynamics is a leading technology services provider with a core focus in Cybersecurity, Cloud Computing, and Information Sharing.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

Rhymetec

Rhymetec

Rhymetec are an industry leader in cloud security, providing innovative cybersecurity and data privacy services to the modern-day SaaS business.

Guardsman Cyber Intelligence (GCI)

Guardsman Cyber Intelligence (GCI)

GCI provides proven cyber intelligence solutions to protect your business against ever present physical and digital threats shadowing your online business.

Blue Cloud Softech Solutions

Blue Cloud Softech Solutions

Blue Cloud Softech propels inspiring digital transformations. We provide AI products, cybersecurity, healthcare technology, and cloud solutions.