GOVERNMENT > Law Enforcement


« Back to News

2019-02-07

Going Postal: ‘We Have Sent You a Message’

Don't be fooled by the latest email fraud campaign pretending to be from the US Postal Service and aimed at infecting your computer with malware.

2019-02-01

Hackers Use PayPal To Go Phishing

Double Jeopardy: Ransom victims are prompted to follow a link to a fake PayPal phishing page, where their login credentials are stolen.

2019-01-25

AI Tools Can Help Police Fight Crime

AI-based cognitive computing can organise evidence like unstructured audio and video data, transforming it into actionable intelligence.

2019-01-17

Cybersecurity Threats In 2019

Professional cybercrime groups are organising themselves to conform with normal business processes, improving their criminal effectiveness.

2019-01-11

Cybercrime Gangs Continue To Innovate

Phishers are using new techniques to carry out their attacks, and obscure their origins, to make the most of every criminal campaign.

2019-01-08

Hackers Demand Ransom For Stolen 911 Documents

Secret information about the murderous 911 attacks has allegedly been stolen from the insurer and is being offered for sale to terrorist groups.

2019-01-07

Cyber Attacks On Business Are Surging

2018 saw a massive increase in global cybercrime with the damage done taking a measurable proportion of GDP, running into billions of dollars

2018-12-31

Dark Web Dealers Voluntarily Ban Deadly Fentanyl

Major dark web drug suppliers have started to voluntarily ban the synthetic opioid fentanyl because it is too dangerous.

2019-01-03

Beware Of Cyber Criminals Demanding Payments In Bitcoin

Cyber-crime syndicates have resorted to transactions using crypto currency or Bitcoin money to avoid detection by the authorities.

2018-12-28

The US Is Buying Phone Hacking Tools For Ghana’s Police

The US State Dept is purchasing phone hacking tools for the Ghanaian police to assist the with investigations into international crime.

2019-01-03

South African Cybercrime Is Advancing Fast

Cybercrime is surging worldwide, not least in S. Africa where security agencies, businesses and law enforcement are running hard to keep up.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

ON-DEMAND WEBINAR: Harnessing the power of Security Information and Event Management (SIEM)

Join our experts as they give the insights you need to power your Security Information and Event Management (SIEM).

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Landry & Associates

Landry & Associates

Landry & Associates is a multidisciplinary firm specializing in risk management, performance and technology management.

HelseCERT

HelseCERT

HelseCERT is the health and care sector's national information security center for Norway.

Secarma

Secarma

Secarma provides penetration testing, security assessments, consultancy, and training services to ensure your digital infrastructure is secure from cybersecurity threats.

Security University

Security University

Security University is a leading provider of Qualified Hands-On Cybersecurity Education, Information Assurance Training and Certifications for IT and Security Professionals.

EUROCONTROL

EUROCONTROL

EUROCONTROL is a pan-European, civil-military organisation dedicated to supporting European aviation. We help our stakeholders protect themselves against cyber threats.

NSA Career Development Programs

NSA Career Development Programs

NSA offers entry-level programs to help employees enhance their skills, improve their understanding of a specific discipline and even cross-train into a new career field.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

ShieldApps

ShieldApps

ShieldApps comprehensive suite of products is designed to protect your personal devices from privacy threats, including hacking attempts, online tracking, fingerprinting, phishing, malware, and more.

Air IT

Air IT

Air IT are a responsive, client-focused and award-winning Managed Service Provider, helping clients achieve success and transformation through their IT and communications.

Edgio

Edgio

Edgio provides unmatched speed, security, and simplicity at the edge through globally-scaled media and applications platforms.

6WIND

6WIND

6WIND deliver virtualized, cloud-native, distributed high performance & secure networking software solutions to support new applications such as 5G, IoT, SD-WAN.

CAT Labs

CAT Labs

CAT Labs is building digital asset recovery and cybersecurity tools to enable governments to fight crypto crime and to protect investors from hacks, fraud and scams.

Sababa Security

Sababa Security

Sababa Security is the first Italian innovation cyber security vendor, that provides security products, training, and managed services to protect diverse IT and OT environments.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Manifest

Manifest

Manifest is a cybersecurity company dedicated to helping enterprises secure their software supply chains.