FREE TO VIEW


« Back to News

2015-08-28

Cyber Hackers Can Now Remotely Shoot Someone Else’s Sniper Rifle

American Sniper? A cyber hack that can disable the weapon from a distance, or at least manipulate it into not working properly.

2015-08-28

China Calls US a 'Cyber Bully' After False Accusation

Think Twice: Retaliation against China for the giant OPM Hack could be a big mistake.

2015-08-27

A Drone That Hacks Computers

Aerial Assault: A quadcopter flying hacker that scans the world below for insecure devices and vulnerable WiFi ports.

2015-08-27

Hackers to Military: Replace Us with Robots –Don’t Think So!

Next year’s DARPA Cyber Grand Challenge event will pit humans against machines in a grand hacking war.

2015-08-26

Cyber Insecurity: Going Dark

US tech companies are shielding more data from the U.S. government. But is it now harder to track terrorists?

2015-08-26

Six Ways Cyber Attackers Are Changing Tactics

Adversaries are becoming more sophisticated not only in their approaches to launching attacks, but also in evading detection.

2015-08-26

NSA Map Shows China Cyber Attacks on US

More than 600 corporate, private or government "Victims of Chinese Cyber Espionage"

2015-08-26

US Spies on EU Companies

Espionage on European enterprises gives the US advantages in its strategic orientation.

2015-08-26

Hacker Cracks Satellite Communications Network

The Globalstar satellite network uplink was hacked using a simple software-defined radio system & parts costing less than $1,000

2015-08-25

Japan: Court Rules Against Bitcoin Compensation

Tokyo District Court rules that the virtual currency Bitcoin is "not subject to ownership".

2015-08-25

Legal Issues Of Cyber War Are Big & Complex

What does it it take to trigger self-defense in cyberspace, and what does it mean for a nation-state to have 'effective control' of a hacker?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Titus

Titus

Titus is a global leader in enterprise-grade data protection solutions.

Cybereason

Cybereason

Cybereason provides real-time detection of malicious activity enabling you to identify the cause and scope of an attack and ensure an effective response.

eco

eco

eco, with more than 950 member organizations, is the largest Internet industry association in Europe.

AVG Technologies

AVG Technologies

AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats.

Trinexia

Trinexia

Trinexia (formerly Credence Security) is a specialty Value-added Distributor of Cyber Security, Digital Forensics, Security Awareness, Data Security & Governance solutions.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

BluBracket

BluBracket

BluBracket is the first comprehensive security solution that makes code safe—so developers can innovate and collaborate, and security teams can sleep at night.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

SEMNet

SEMNet

SEMNet is an IT solutions provider and an infrastructure and security consulting firm.

GLIMPS

GLIMPS

GLIMPS-Malware automatically detects malware affecting standard computer systems, manufacturing systems, IOT or automotive domains.

Sentra

Sentra

Sentra is focused on improving data security practices within the cloud, mitigating the risks of damaging data leaks by providing comprehensive visibility into critical data assets.

Trustmarque

Trustmarque

Trustmarque delivers customer-centric IT solutions that enable better outcomes. We combine the technology, expertise and services to release value at every stage of the IT lifecycle.

Threatsys Technologies

Threatsys Technologies

Threatsys’s Integrated cyber security process helps your organizations to ensure that it’s secure from any fraudulent attacks.

Scality

Scality

Scality storage unifies data management from edge to core to cloud. Our market-leading file and object storage software protects data on-premises and in hybrid and multi-cloud environments.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.