GOVERNMENT > Law Enforcement


« Back to News

2015-02-23

Cybercrime and the value of personal data

Put simply, the underground economy is a collection of forums, chat rooms and custom-made websites that are all designed to facilitate, streamline and industrialize cybercrime.

2015-02-19

Deep Dive: A Guide to the Deep-Web for Law Enforcement

There’s a part of the Internet known as the deep web. It is called the deep web because of its massive size, it’s literally ‘deep’. According to The Guardian, you can only access 0.03% of the internet via search engines like Google and the rest is what makes up the deep web.

2015-02-11

UK Police: 'Innocent people' on unregulated photo database

Police forces in England and Wales have uploaded up to 18 million "mugshots" to a facial recognition database. This is despite a court ruling it could be unlawful. They include photos of people never charged, or others cleared of an offence, and were uploaded without Home Office approval.

2015-02-05

FBI access to PRISM surveillance program expands

US Federal Bureau of Investigation (FBI) access to overseas surveillance collected by the National Security Agency (NSA) has expanded in recent years, with the law enforcement agency gaining access to collected, but unprocessed data, in 2009, according to a report released by the government.

2015-02-05

Apple iOS Backdoor: Snowden says iPhone is a Government Spy

Infamous former NSA contractor Edward Snowden thinks that Apple's iPhone has "unique computer software" that authorities can activate remotely to be in a position to gather information about the user.

2015-01-19

Dark Web thrives despite Operation Onymous

There is a part of the web that is still hidden from the majority of the Internet users, a so-called dark web that cannot be found by conventional search engines or accessed by standard browsers.

2015-01-08

FBI briefed on alternate Sony hack theory

FBI agents who are investigating the Sony Pictures hack were briefed recently by a security firm that says its research on the attacks points to laid-off Sony staff and not to North Korea, as the perpetrator.

2015-01-15

Cybercrime? Blogger gets Flogged for ‘Insult to Islam’

A Saudi Arabian blogger has been publicly flogged after being convicted of cybercrime and insulting Islam, reports say.

2014-05-06

Most UK Police Forces don’t investigate Cyber Crime

Ninety Percent of the UK’s Police have no Tactical or Strategic plans for monitoring, training PCs and reducing cyber crime.

2014-06-12

Worlwide Crackdown on Hackers

Two major events targeting Hackers show growing international concern across governments over the growing impact and extent of Cybercrime.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Messageware

Messageware

Messageware is the market leader in securing, enhancing, and customizing Microsoft Exchange and Outlook Web App.

Outpost24

Outpost24

Outpost24 provides easy to deploy and intuitive solutions to continuously identify, remediate and mitigate vulnerabilities in your network.

Australian Cyber Security Centre (ACSC)

Australian Cyber Security Centre (ACSC)

The Australian Cyber Security Centre (ACSC) brings cyber security capabilities from across the Australian Government together into a single location.

Avast Software

Avast Software

Avast Software is a security software company that develops antivirus software and internet security services.

CompliancePoint

CompliancePoint

We design and implement strategies, processes & procedures to mitigate risk, reach compliance goals, protect data assets, and meet industry standards.

Nexcom International

Nexcom International

Nexcom operates six global businesses - IoT Automation, Intelligent Digital Security, Internet of Things, Intelligent Platform & Services, Mobile Computing Solutions, Network & Communications.

WiJungle

WiJungle

WiJungle is an Indian Cyber Security Company that develops and markets a unified network security gateway solution.

Cyber Security Courses

Cyber Security Courses

Cyber Security Courses was formed to help students in the UK find cyber security courses online.

Findcourses.co.uk

Findcourses.co.uk

Findcourses is a dedicated education search engine designed to make it easy for our learners to search and find exactly what they need from our community of trusted training providers.

Deepwatch

Deepwatch

deepwatch’s cloud SecOps platform and relentless customer focus are redefining the managed security services industry.

New Net Technologies (NNT)

New Net Technologies (NNT)

NNT SecureOps provides ultimate protection against all forms of cyberattack and data breaches by automating the essential security controls.

xorlab

xorlab

xorlab is a Swiss cybersecurity company providing specialized, machine-intelligent defense against highly engineered, sophisticated and targeted email attacks.

Indevis

Indevis

Indevis provides IT security, datacenter and network solutions, accompanied by professional consulting, management and support services.

Larsen & Toubro Infotech (LTI)

Larsen & Toubro Infotech (LTI)

LTI is a global technology consulting and digital solutions company with operations in 33 countries.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.