INTELLIGENCE > > International


« Back to News

2015-12-04

Reverse ATM Fraud: How It Works

Russian hackers have adopted a new technique, dubbed the Reverse ATM Attack to steal Millions of dollars from ATMs of financial institutions.

2015-11-24

Signal: The Snowden-Approved Crypto App Comes to Android

Open Whisper Systems’ encryption tools already have a wide footprint: Their messaging App Signal, used by Edward Snowden, is now available on Android.

2015-11-23

Restricting Encryption Wouldn’t Stop Paris-Style Attacks

It’s not clear that undermining strong encryption would do anything to prevent terrorism.

2015-11-21

After Paris, ISIS Moves Propaganda Machine to Darknet

In a series of blog posts and messages sent to its users right after the Paris attacks, ISIS news & forums are moving entirely to the Dark Net.

2015-11-17

'Jihadi John' Strike: US Says 'We Got Him'

Live by the sword, die by the sword. Extrajudicial execution by drone strike of notorious ISIS killer.

2015-11-19

Where Next? Paris Attacks Show Mumbai Strikes Are Global Blueprint

The response to global terrorism is far from united. As India has shown, getting two premier security agencies to cooperate is a challenge.

2015-11-12

Spyware Rises in Popularity with Governments

FinFisher was being used for activities beyond tracking criminals.

2015-11-09

Can EU Judges Keep NSA Spying in Check ?

According to EU Justice Commissioner, the NSA's blanket surveillance of Europeans will be subject to judicial review.

2015-11-06

Russian Air Crash Investigation Changes The Encryption War

If intercepted communications prove an ISIS bomb caused the crash in Egypt, it could be just the boost surveillance state advocates need.

2015-11-06

NATO’s role in the cyber domain is unclear.

Would NATO go to war in response to a cyber-attack against one of it's members? Opinion By Jamie Collier.

2015-11-02

New Material Promises NSA-proof Wallpaper

A flexible material, thin and tough for wallpaper or woven fabric that can keep electronic emissions in, and electromagnetic pulses out.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

authen2cate

authen2cate

authen2cate is a single-sign-on (SSO) and multi-factor authentication service provider.

CloudDNA

CloudDNA

cloudDNA is the only dedicated Citrix NetScaler consultancy in EMEA. We can help your migration to NetScaler secure networking solutions.

Happiest Minds Technologies

Happiest Minds Technologies

Happiest Minds offers domain centric solutions in IT Services, Product Engineering, Infrastructure Management and Security.

Onapsis

Onapsis

Onapsis is a pioneer in cybersecurity and compliance solutions for cloud and on-premise ERP and business-critical applications.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Moix Security

Moix Security

Moix Security is consulting firm specialising in application and software security. We help organisations design, build, and maintain secure software.

Aporeto

Aporeto

The Aporeto platform protects cloud applications from attack by authenticating and authorizing all communications with a cryptographically signed identity assigned to every workload.

World Congress on Industrial Control Systems Security (WCICSS)

World Congress on Industrial Control Systems Security (WCICSS)

The World Congress on Industrial Control Systems Security (WCICSS) is focused on emerging trends in protection of industrial control systems.

MPC Alliance

MPC Alliance

The mission of the MPC Alliance is to accelerate adoption of MPC (Multi-Party Computation) technology.

Stratus Cyber

Stratus Cyber

Stratus Cyber is a premier Cyber Security company specializing in Managed Security Services. Our services include Blockchain Security, Pentesting, and Compliance Assessments.

Inspira Enterprise

Inspira Enterprise

Inspira Enterprise is a leading digital transformation company with expertise in Cyber Security, Internet of Things (IOT), Blockchain, Big Data & Analytics, Intelligent Automation and Cloud Computing.

riskmethods

riskmethods

riskmethods helps you proactively identify, assess and mitigate supply chain risk. You need to master supply chain risk management—we can help.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

Binarly

Binarly

Binarly has developed an AI-powered platform to protect devices against emerging firmware threats.

Luta Security

Luta Security

Luta Security implements a holistic approach to advance the security maturity of governments and organizations around the world.

AirDroid Business

AirDroid Business

AirDroid Business is an efficient mobile device management solution for Android devices, helping businesses to remotely control and access devices in large quantities using a centralized approach.