GOVERNMENT > Law Enforcement


« Back to News

2017-07-05

Ukraine Police Trace Petya Attack Source

A vulnerability within an obscure piece of Ukrainian accounting software is the root cause of the massive Petya cyberattack.

2017-06-30

Scenarios For Predicting Terrorist Attacks

Suicide bombings, random attacks on soft targets and the use of vehicles in ramming attacks, reflect the enlistment of recruits via social media.

2017-06-28

Intelligence-Led Policing Gets Automated

An Electronic Detective: VALCRI is a semi-automated analysis system that can reconstruct crime situations, generate insights and discover leads.

2017-06-27

UK Fraud Hotspots Revealed

Action Fraud data confirms that London is the capital of the UK for social media hacking, but there are surprising regional variations.

2017-07-04

RBS Bank Warns Of Increased Cybercrime

Last year, there were more than 1.8million reported cases of financial fraud, with losses of more than £768million across Britain.

2017-06-30

Chinese Criminals Are Selling Your Apple Data

A criminal operation run by employees of an Apple “domestic direct sales company and outsourcing company” has been uncovered in China.

2017-06-12

Six Seconds To Hack A Credit Card

Distributed Guessing Attack: Quickly working out the card number, expiry date and security code of a Visa card using nothing more than guesswork.

2017-06-07

WannaCry Was Not A Phishing Attack

Researchers at Malwarebytes say the WannaCry ransomware threat didn’t begin with malware-infected phishing emails, as first suspected.

2017-06-07

Hackers Hit Russian Bank Customers

Russian cyber criminals used malware planted on Android mobile devices to steal from domestic bank customers and were planning to target European lenders before their arrest, investigators and sources with knowledge of the case told Reuters.

2017-06-13

How Cybercrime Affects The Healthcare Industry

Stolen medical records can be used for different types of identity fraud and phishing attack. The threat from these can persist for many years.

2017-06-14

What Makes A Cyber Criminal?

The UK’s National Crime Agency has published research on why some young people become involved in cybercrime. Its not about the money.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Concise Technologies

Concise Technologies

Concise Technologies provide specialist IT and telecoms solutions, support services, managed backup, disaster recovery, cyber security and consultancy to SME businesses across the UK and Europe.

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium

Singapore Cybersecurity Consortium was created to encourage use-inspired research, training and technology awareness in cybersecurity.

Potomac Institute for Policy Studies

Potomac Institute for Policy Studies

Potomac Institute undertakes research on key science, technology, and national security issues facing society, Study areas include cybersecurity.

Blue Lights Digital

Blue Lights Digital

Blue Lights Digital have developed a range of platforms to support digital investigations, as well as providing continued support and education for investigations professionals.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

AVL Mobile Security

AVL Mobile Security

AVL Mobile Security is a market-leading mobile security company for anti-virus and threat intelligence in the mobile Internet.

VietSunshine

VietSunshine

VietSunshine is a leading provider of network security infrastructure and solutions in Vietnam.

Tier1Asset (T1A)

Tier1Asset (T1A)

T1A is Europe’s leading IT refurbisher. We offer certified data erasure using blancco on site and at our facilities, providing environmentally sound disposal of your used equipment.

iosiro

iosiro

iosiro was created to guide companies through securely using blockchain technologies. We help teams launch and manage ICOs, deploy secure dApps, and integrate private networks into business practices.

Fend

Fend

Fend secures smart infrastructure. We provide a robust, highly secure way to have situational awareness of IoT enabled assets.

LinkShadow

LinkShadow

LinkShadow is a next-generation cybersecurity solution that provides unparalleled detection of even the most sophisticated threats.

Qualcomm Technologies

Qualcomm Technologies

Qualcomm invents breakthrough technologies that transform how the world connects, computes and communicates.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Confidencial

Confidencial

Confidencial is a provider of solutions that help organizations secure their most sensitive information, regardless if that information exists inside or is shared outside the organization.

Actelis Networks

Actelis Networks

Actelis Networks is a market leader in cyber-hardened, rapid deployment networking solutions for wide-area IoT applications.

Saidot

Saidot

Saidot is a Finnish AI governance and alignment company committed to helping businesses safely and transparently integrate AI into their operations.