GOVERNMENT > Law Enforcement


« Back to News

2017-02-18

Action Fraud: Social Media Used to Steal Charity Donations

An emerging fraud where social media platforms are used to attract donations to overseas welfare charities that do not exist.

2017-02-14

Stolen Health Records Flooding Dark Web Markets

The large amount of stolen patient data posted for sale to the dark web in recent months has caused prices for most of those records to drop.

2017-02-03

Spanish Police Arrest Banking Malware Suspect

Spanish police have arrested a Russian programmer suspected of developing the Neverquest banking Trojan.

2017-02-01

True Extent Of UK Cybercrime & Fraud Revealed

The Crime Survey for England and Wales shows an estimated 3.6 million cases of fraud and 2 million computer misuse offences in a year.

2017-01-26

Cyber Criminals Set to Get ‘Creative’ in 2017

KPMG think that IoT threats, new EU data laws and industrial scale cybercrime will be the dominant cybersecurity issues in 2017.

2017-01-18

Cyber Criminals Target African Banks

African nations' efforts to tackle cybercrime are gaining momentum as cyber criminals target them with ransomware.

2017-01-18

‘Magic’ Ransomware Is Based On Open-Source Code

Abracadabra: A new ransomware based on open-source code that encrypts user files and ads ‘.magic’ extension to them.

2017-01-17

Anti-Surveillance Clothing Thwarts Facial Recognition

Facial recognition technology is changing public expectations of privacy and some people are developing effective methods of concealment.

2017-01-16

Police Connectivity: In-Car Video & Body Cameras

The ability of police systems to communicate with each other can result in better operational performance.

2017-01-03

Cyber Criminals Are Making $200k A Month

Recorded Future have been researching the dark web for cybecrime forums. It turns out the bad guys can make good money stealing from each other.

2016-12-27

Malicious Ads Expose Millions To Hacking

Millions of Internet users have been exposed to malicious code served from the pixels in tainted banner ads meant to install Trojans and spyware.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Security Compass

Security Compass

Security Compass, the Security by Design Company, enables organizations to shift left and build secure applications by design, integrated directly with existing DevSecOps tools and workflows.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Cyphercor

Cyphercor

Cyphercor is a leading smartphone and desktop-based two-factor authentication (2FA) provider.

Build38

Build38

Build38 provides the highest levels of security for mobile applications.

Emirates International Accreditation Center (EIAC)

Emirates International Accreditation Center (EIAC)

EIACI is the national accreditation body for the United Arab Emirates. The directory of members provides details of organisations offering certification services for ISO 27001.

Cyber Range Malaysia

Cyber Range Malaysia

With Cyber Range Malaysia organizations can train their security professionals in empirically valid cyber war-gaming scenarios necessary to develop IT staff skills and instincts for defensive action.

KETS Quantum Security

KETS Quantum Security

KETS harnesses the properties of quantum mechanics to solve challenging problems in randomness generation and secure key distribution and enable ultra secure communications.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

Green Enterprise Solutions

Green Enterprise Solutions

Green Enterprise Solutions are a Namibian company providing Information and Communication Technology (ICT) services to corporate Namibia.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.

MS Tech Solutions

MS Tech Solutions

MS Tech Solutions is a Jamaican-based, multinational consulting company that specializes in the architecture, implementation and management of key network and Information technologies.

Vortacity Cyber

Vortacity Cyber

Vortacity is a boutique cybersecurity provider specializing in associations, nonprofits, and mission-based organizations.

Scope AI

Scope AI

Scope AI is an innovative technology company specializing in quantum security and machine learning.

Symbiotic Security

Symbiotic Security

Symbiotic Security revolutionizes code security by integrating an AI-driven security coach directly within developers' IDEs.

CQR

CQR

CQR are at the forefront of innovative cyber solutions, dedicated to securing and fortifying Operational technology (OT) infrastructure.

Koop

Koop

Koop’s trust management platform helps navigate the complexities of regulatory compliance, security reviews, and liability insurance in a single place.