GOVERNMENT > Law Enforcement


« Back to News

2023-08-19

Police Error Exposes Personal Data Of Crime Victims

British police forces mistakenly released the data of 1,230 people, wrongly included in the files responding to freedom of information requests.

2023-08-11

Police Officers At Severe Risk As Personal Data Exposed

Critical Incident: Northern Ireland police officers & staff have rendered vulnerable after a massive data breach published their personal details.

2023-07-03

Canada Might Lose Its Dispute With Google

Costly News Links: Google and Meta, the owner of Facebook and Instagram are saying they will block local news from their platforms in Canada.

2023-05-20

$10M Reward For Arrest Of Russian Hacker

Wanted: Mikhail Pavlovich Matveev is believed to be the originator of the Zeus banking Trojan and Cryptolocker ransomware attack. 

2023-05-18

Iranian Government Uses Android Malware For Mobile Surveillance

BouldSpy: Covertly installed Android spyware used to monitor arms shipments, surveil dissident & minority groups, alcohol and drugs trafficking.

2023-05-10

Smart Gun Uses Facial Recognition Technology

James Bond's Pistol: A gun that can only be fired after verifying the shooter’s identity uses facial recognition and fingerprint technology.

2023-05-05

Encryption, Security & Privacy

The Intrusive Nation State: How can fully homomorphic encryption advance security practices while preserving privacy? By Ghazi Ben Amor

2023-04-17

FBI Seizes $112m From 'CryptoRom' Criminals

Cryptocurrency Romance: A $multimillion fraud involves faking a romantic interest in the victim, linked to crypto currency investment scams.

2023-04-12

Criminal Records Office Hit By A "Cyber Incident”

Britain's Criminal Records Office has suffered a two-month long cyber security “incident” resulting in a backlog of visa applications awaiting clearance.

2023-04-05

Law Enforcement Agencies Shut Down Genesis Market

Operation Cookie Monster: One of the largest criminal marketplaces used by online fraudsters has been closed down by law enforcement.

2023-04-04

TikTok Fined £12.7m For Breaching Child Protection Law

The video-sharing site used the data of 1.4 million British children aged under 13 without parental consent, resulting in a punitive fine.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Optimum Insurance

Optimum Insurance

Optimum's Cyber Risk & Data Protection Insurance policies are designed to protect against cyber exposures that arise when a company’s data and customer information is breached or stolen.

Comiq

Comiq

Comiq provide software quality assurance, testing and project management services. Areas of expertise include cybersecurity.

Karlsruhe Institute of Technology (KIT)

Karlsruhe Institute of Technology (KIT)

KIT is a leading research and education institutions with strong capabilities in information systems and security.

REVI-IT

REVI-IT

REVI-IT is a Danish state-owned audit firm focusing on enterprise IT business processes and compliance,

SecureBrain

SecureBrain

SecureBrain software and services help protect against Japanese-specific cybercrime and global internet security threats such as online fraud, phishing, drive-by downloads and malware attacks.

Cybercrime Investigation & Coordinating Center (CICC)

Cybercrime Investigation & Coordinating Center (CICC)

The Cybercrime Investigation and Coordinating Center (CICC) is an attached agency of the Philippines Department of Information and Communications Technology (DICT).

The ai Corporation

The ai Corporation

The ai Enterprise Fraud Solution is an on-prem or cloud-based self-service, machine learning fraud detection and prevention tool set.

Naukrigulf

Naukrigulf

Naukrigulf.com is one of the fastest growing job sites in the Gulf, with thousands of registered job seekers and a robust CV database across many sectors, including cybersecurity.

Cyber Covered

Cyber Covered

Cyber Covered provide complete website & data cover with market leading cyber insurance and powerful compliance software in one affordable package.

New Enterprise Associates (NEA)

New Enterprise Associates (NEA)

As one of the world’s largest and most active venture capital firms, NEA has developed deep domain expertise and insight into our industries of focus - technology and healthcare.

CyberMDX

CyberMDX

CyberMDX delivers proactive security built for hospital devices. 360° visibility, insight, and protection for all connected hospital technologies.

Clone Systems

Clone Systems

Clone Systems is an award winning global cloud based managed security as a service provider.

IntelliGenesis

IntelliGenesis

IntelliGenesis provide comprehensive cyber, data science, analysis, and software development services that provide tailored, secure solutions for your critical data and intelligence needs.

Curatrix Technologies

Curatrix Technologies

Curatrix Technologies is a Managed IT Service provider based in Hampshire, UK, providing high quality and reliable Managed IT Services since 2015.

Aembit

Aembit

Aembit is the Identity Platform that lets DevOps and Security manage, enforce, and audit access between federated workloads

inSOC

inSOC

inSOC is an enterprise-grade AI-driven SOCaaS solution detecting breaches 24/7 with vulnerability management built-in. Designed for MSPs and MSSPs.