GOVERNMENT > Law Enforcement


« Back to News

2017-09-11

Police Spy On Their Own: Twitter Accounts Scrutinised

Revealed: A year-long probe into the anonymous Twitter accounts of officers of the Police Service of Northern Ireland (PSNI).

2017-09-08

Crime Has Become Cybercrime

'Ordinary' criminals are making an easy transition to becoming cybercriminals and are beginning to remodel their organizations for greater efficiency.

2017-08-29

Cyber Criminals Have Access To Weapons Grade Hacking Tools

Businesses need to seriously rethink cyber defence with powerful nation-state attack hacking tools now in the hands of ordinary cyber criminals.

2017-08-21

Fighting Digital Crime: Evolving Police Methods

As the cyber-crime landscape continues to evolve, methods of policing it must change as well.

2017-08-18

Online Credit Card Fraud In Australia Surges

Last year criminals stole A$534 million as fraudsters keep pace with Australian consumers moving online.

2017-08-16

Interpol/Group-IB Unmasking Pro-ISIS Hackers

Interpol has teamed up with Russian security firm Group-IB in an effort to identify the members of a pro-ISIS hacker group.

2017-08-16

German Police To Hack Suspect Devices

Forget About Backdoors: Police forces in Germany will be allowed to hack any suspected mobile device using interception software.

2018-06-13

Kenya Is 3rd in Africa for Cybercrime Readiness

Kenya has been ranked third among African countries for its preparedness to fight cyber-crime.

2017-08-14

US Police Make Widespread Use Of Facial Recognition Software

Half of all American adults are included in databases that US police forces use to identify citizens with facial recognition technology.

2017-08-11

Stolen Nude Photos & Hacked Defibrillators: Is This The Future Of Ransomware?

While recent big Ransomware outbreaks caused huge costs to the organisations they infected, they were surprisingly unrewarding for their creators.

2017-08-02

Cyber Criminals Target Your Text

A text message scam called "smishing" that can infect your smartphone and let thieves steal your personal information.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

HyTrust

HyTrust

HyTrust specialises in security, compliance and control software for virtualization and cloud environments.

VdS

VdS

VdS is an independent safety and security testing institution. Cybersecurity services include standards, audit/assessment and certification for SMEs.

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU Center for Cyber & Information Security (NTNU CCIS)

NTNU CCIS is a national centre for research, education, testing, training and competence development within the area of cyber and information security.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

IoT M2M Council (IMC)

IoT M2M Council (IMC)

The IMC is the largest and fastest-growing trade organisation in the IoT/M2M sector.

Level39 (L39)

Level39 (L39)

Level39 is the world's most connected tech community, with over 200 tech startups and scaleups based onsite.

D2 Network Associates (D2NA)

D2 Network Associates (D2NA)

D2NA help businesses deliver and achieve their goals, through innovative IT solutions, robust cyber security services and proactive IT managed services.

Symbol Security

Symbol Security

Through situational learning, simulations, and a gamified user experience, Symbol strengthens the cyber awareness of employees and helps companies lower cyber risk.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Bluefin Payment Systems

Bluefin Payment Systems

Bluefin is the recognized integrated payments leader in encryption and tokenization technologies that protect payments and sensitive data.

SecureTeam

SecureTeam

SecureTeam are a UK-based information security practice, specialising in all areas of cybersecurity.

Filigran

Filigran

Filigran provides threat intelligence, adversary simulation and crisis response open solutions to thousands of cybersecurity and crisis management teams across the world.

NewsGuard Technologies

NewsGuard Technologies

NewsGuard provides transparent tools to counter misinformation for readers, brands, and democracies.