GOVERNMENT > Law Enforcement


« Back to News

2017-08-21

Fighting Digital Crime: Evolving Police Methods

As the cyber-crime landscape continues to evolve, methods of policing it must change as well.

2017-08-18

Online Credit Card Fraud In Australia Surges

Last year criminals stole A$534 million as fraudsters keep pace with Australian consumers moving online.

2017-08-16

Interpol/Group-IB Unmasking Pro-ISIS Hackers

Interpol has teamed up with Russian security firm Group-IB in an effort to identify the members of a pro-ISIS hacker group.

2017-08-16

German Police To Hack Suspect Devices

Forget About Backdoors: Police forces in Germany will be allowed to hack any suspected mobile device using interception software.

2018-06-13

Kenya Is 3rd in Africa for Cybercrime Readiness

Kenya has been ranked third among African countries for its preparedness to fight cyber-crime.

2017-08-14

US Police Make Widespread Use Of Facial Recognition Software

Half of all American adults are included in databases that US police forces use to identify citizens with facial recognition technology.

2017-08-11

Stolen Nude Photos & Hacked Defibrillators: Is This The Future Of Ransomware?

While recent big Ransomware outbreaks caused huge costs to the organisations they infected, they were surprisingly unrewarding for their creators.

2017-08-02

Cyber Criminals Target Your Text

A text message scam called "smishing" that can infect your smartphone and let thieves steal your personal information.

2017-08-02

Russian Arrested For $4billion Bitcoin Theft

The “internationally sought mastermind of a crime organisation” Alexander Vinnik is accused of laundering more than $4bn in bitcoin.

2017-08-01

FBI Take Down Dark Web Drugs Traders

An international law enforcement effort has brought down two of the dark web’s largest marketplaces, AlphaBay and Hansa Market.

2017-08-09

London Police Hampered By Encryption

London's Met Police chief says the fight against terrorism is being made tougher by encryption on the web and messaging services like WhatsApp.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ACIS Professional Center

ACIS Professional Center

ACIS provides training and consulting services in the area of information technology, cybersecurity, IT Governance, IT Service management, information security and business continuity management.

International Association of Professional Security Consultants (IAPSC)

International Association of Professional Security Consultants (IAPSC)

Members of the IAPSC represent a unique group of respected, ethical and competent security consultants.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

Government CSIRT - Chile

Government CSIRT - Chile

Government CSIRT is the Computer Security Incident Response Team for State networks and government cyberspace in Chile.

Bio-Morphis

Bio-Morphis

Bio-Morphis Reflex solution is a paradigm shift in the approach to information systems security.

Ksmartech

Ksmartech

Ksmartech provide services related to security and authentication in all areas where the connection of people to objects, and objects and objects is necessary.

Kickstart

Kickstart

Kickstart supports your startup in scaling deep technology businesses in Switzerland in areas such as AI, Blockchain and Cybersecurity.

Cyber Intelligence House (CIH)

Cyber Intelligence House (CIH)

Cyber Intelligence House provides risk exposure solutions for a wide range of audiences including companies, government agencies, regulators, investors, law enforcement and consumers.

Tenet3

Tenet3

Tenet3's vision is to make optimal cyber strategy development tractable, data driven, with concrete success metrics. The result is cost effective cyber resilience for our customers.

Vanta

Vanta

Vanta helps companies scale security practices and automate compliance for the industry’s most sought after standards - SOC 2, ISO 27001, HIPAA, GDPR, and other security and privacy frameworks.

ALSCO

ALSCO

ALSCO is dedicated to bringing first class IT services, technical support, and solutions to goverment, companies and organizations worldwide.

People Driven Technology

People Driven Technology

People Driven Technology is a customer-obsessed organization. We leverage our decades of business, technology, and engineering experience to deliver outcomes for our clients.

HLB System Solutions

HLB System Solutions

HLB System Solutions: Empowering businesses with proactive IT management, consulting, security, and cloud solutions. Seamless tech for growth!

Emircom

Emircom

Emircom is one of the Middle East's leading independent providers of IT infrastructure services, helping clients to drive growth and deliver measurable outcomes.