GOVERNMENT > Law Enforcement


« Back to News

2020-08-31

Financial Fraud Using Fake Celebrity Endorsements

Using a primitive form of Deepfake fraud, victims are lured into false investments with fake news articles promoting advice from celebrities.

2020-08-19

Identity Theft - A Very Personal Hacking Attack

Recently, a US Woman was hacked and her personal data held to ransom. She contacted us to tell her story and agreed that we tell it to you here.

2020-08-19

Cyber Crime Is Growing Very Fast Due To Coronavirus

An Interpol assessment of the impact of Covid-19 on cyber crime shows a significant change of focus to business and major corporations.

2020-08-17

NSA And FBI Warn Of Russian Linux Malware

Drovorub malware is a full-featured piece of Linux malware to infiltrate networks, steal confidential information and execute malicious commands.

2020-08-14

Cybercrime In Britain Does Serious Harm

Cyber crime covers a wide range of different offences, all of which are punishable by law in the UK. Be vigilant and avoid becoming a victim.

2020-07-28

Cyber Crime Cost UK Businesses £87billion

Cyber crime in Britain has doubled in the last five years, costing businesses £87billion with a quarter of all companies being affected.

2020-07-28

Problems With Using Big Data For Policing

Algorithmic law enforcement: Police across the world are starting to use Big Data to help them to predict crime and analyse criminal methods.

2020-07-22

Some Hackers Earn $2m A Year

In Britain, cyber crime and fraud are now the most common offences accounting for almost 50% of all crime. Because it's low risk and pays very well.

2020-07-08

Online Shoppers Have Lost Over £16m To Lockdown Fraud

Action Fraud say over 16,000 people were victims of online fraud since the beginning of lockdown, with young people the most at risk.

2020-07-03

Police First Hack Then Demolish Organised Crime Gangs

Police arrest 800 people across Europe after shutting down the encrypted EncroChat platform, used by organised crime groups for drug deals.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Bulb Security

Bulb Security

Whether your internal red team or penetration testing team needs training, or you lack internal resources and need an outsourced penetration test, Bulb Security can help.

SealPath

SealPath

SealPath enables companies to protect and control their documents wherever they are: In their PC, in their corporate network, on a partner’s network, in the cloud.

My Data Recovery Lab

My Data Recovery Lab

We recover data from: HDDs, RAIDs, NAS, SSDs, USB Flash Devices, Desktop Computers, Mobile devices and other data storage media.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Credence Security

Credence Security

Credence Security, previously ARM, the regions speciality distribution company, specializes in IT security, Forensics and Incident Response.

The Data Privacy Group

The Data Privacy Group

The Data Privacy Group provide expert professional services underpinned by world leading automation tools and a consulting team specialized in privacy and data protection.

UM Labs

UM Labs

UM Labs is a developer of security products for Voice over IP (VoIP), protecting SIP trunk connections, safeguarding mobile phone communications and enabling BYOD.

netfiles

netfiles

netfiles offers highly secure data rooms for sensitive business processes and secure data exchange.

AppTec

AppTec

AppTec is a leading software vendor in the field of Unified Endpoint Management and Mobile Security.

Hysolate

Hysolate

Hysolate has transformed the endpoint, making it the secure and productive environment it was meant to be.

CYR3CON

CYR3CON

Harness the power of artificial intelligence with CYR3CON's unique, hacker-centric approach to predicting and preventing cyber attacks.