FREE TO VIEW


« Back to News

2017-05-10

Thieves Drain Protected Bank Accounts

A known security hole in the networking protocol used by mobile phone providers enabled a string of attacks that emptied bank customer accounts.

2017-05-06

Macron condemns 'massive' Hacking Attack

The campaign of French presidential candidate Emmanuel Macron says it has been the target of a "massive hacking attack"

2017-05-05

Major Cyber-Attack Prevented

Israel’s National Cyber Defence Authority has revealed that it successfully prevented a major cyber-attack on 120 private & public institutions.

2017-05-04

Getting Intelligence Agencies To Adapt To Life Out Of The Shadows

Gone are the days when spy agencies did not officially exist and their personnel & activities were hidden away from public view. By Jamie Collier

2017-05-04

Hackers Could Turn Off Your Car Engine – While You Are Driving

Bosch’s Drivelog Connect product, which enables you to monitor your car’s performance from your smartphone, can be exploited by hackers.

2017-05-03

Cardiff Cyber Security Research Centre - 'first in Europe'

A new UK research centre to tackle cyber-attacks, protect corporate IT networks. IP and critical infrastructure has opened in Cardiff.

2017-05-08

Interpol Located & Shut Down 9,000 Command Servers

An investigation conducted by Interpol resulted in the identification of nearly 9,000 compromised control servers located in Asia.

2017-05-08

Turkey Blocks Wikipedia

Turkey has blocked Wikipedia citing a law that allows it to ban access to websites deemed obscene or a threat to national security.

2017-05-08

Spyware Firms In Breach Of Export Sanctions

Spy equipment producers are breaking international sanctions by agreeing to sell products to countries that abuse human rights.

2017-05-08

Around Half Of Human Jobs Can Be Automated Now

A report by McKinsey shows technologies available today could automate 45% of the activities people are paid to perform.

2017-05-09

Artificial Intelligence Is A Fascist's Dream

As AI becomes more powerful, people need to make sure it’s not used by authoritarian regimes to centralise power & target certain populations.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IoTium

IoTium

Secure Cloud Managed Software Defined IoT Networks. IoTium simplifies establishing and managing secure network infrastructure for Industrial IoT.

CLUSIS

CLUSIS

CLUSIS is an association for the information security industry in Switzerland.

Maverick Technologies

Maverick Technologies

Maverick is an industrial automation, enterprise integration and operational consulting company. Services include industrial cyber security.

Vitrociset

Vitrociset

Vitrociset design complex systems for defence, homeland security, space and transport. Activities include secure communications and cybersecurity.

Flashpoint

Flashpoint

Flashpoint is a globally trusted leader in risk intelligence for organizations that demand the fastest, most comprehensive coverage of threatening activity on the internet.

Blue Ridge Networks

Blue Ridge Networks

Blue Ridge offers a suite of solutions that enable secure remote access to the enterprise network with protection and control of endpoints.

PrimeKey

PrimeKey

PrimeKey provides organisations with the ability to implement security solutions such as e-ID, e-Passports, authentication, digital signatures, unified digital identities and validation.

Red Balloon Security (RBS)

Red Balloon Security (RBS)

Red Balloon Security is a leading embedded device security company, delivering deep host-based defense for all devices.

Merlin Cyber

Merlin Cyber

Merlin is a premier cybersecurity platform that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions.

Blaick Technologies

Blaick Technologies

Blaick is an Israeli cyber-security company which deploys proprietary Artificial Intelligence threats detection technology for early prevention of online cyber crime.

Aristi Technologies

Aristi Technologies

Aristi provides cybersecurity risk and compliance services to help manage your unique cyber risks, safeguarding your systems and data and complying with government and industry standards.

Varutra Consulting

Varutra Consulting

Varutra Consulting is an Cyber Security Consulting, Solutions and Training services firm, providing specialized security services for software, mobile and network.

SignalRed

SignalRed

SignalRed provides the cutting edge next-generation penetration testing and secure development solutions to startups and large enterprises.

Zyxel Networks

Zyxel Networks

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge.

Styx Intelligence

Styx Intelligence

Styx Intelligence’s platform provides visibility and supports remediation against threats targeting your digital assets.

COcyber

COcyber

COcyber aims to enhance collaboration between the cybersecurity civilian and defence spheres. It is a two-year project funded by the European Union and it kicked off in July 2024.