INTELLIGENCE > Hot Spots > China


« Back to News

2018-02-26

FBI, CIA & NSA Officials Agree: Stay Away From Huawei Phones

Without disclosing hard evidence, the US intelligence establishment are united in accusing the Chinese telecoms giant of cyber espionage.

2018-02-21

Chinese Police Wearing Face Recognition Glasses

Chinese police are now wearing sunglasses equipped with facial-recognition technology connected to a database of criminal suspects.

2018-02-16

Inspired: China Measures Citizens' Trustworthiness

China is exploring how AI & Big Data can be used to monitor social media interactions and has plans to assign citizens a 'social-reliability' rating.

2017-12-14

German Spies Warn Of Chinese Espionage

The German domestic intelligence agency (BfV) has detected fake LinkedIn profiles from China being used to recruit high level informants.

2017-12-06

China Intends To Be An AI Superpower

The present economic and military balance of power could change as China rushes to develop leading edge artificial intelligence technology.

2017-11-06

China Denies Targeted Cyber Attack

China has denied responsibility for alleged cyberattacks in the United States appearing to target exiled dissident Guo Wengui,

2017-10-26

US Asks China Not to Enforce Cybersecurity Law

The US has asked China not to implement its new cyber security law over concerns it could damage global trade in services.

2017-10-10

China Disrupts WhatsApp

The messaging service WhatsApp has been disrupted in China as the government steps up security ahead of the Communist Party Congress.

2017-10-09

China Wants To Use AI To Predict Civil Disorder

China’s domestic intelligence chief tells police to use Artificial Intelligence to improve their ability to predict social unrest.

2017-06-30

Chinese Criminals Are Selling Your Apple Data

A criminal operation run by employees of an Apple “domestic direct sales company and outsourcing company” has been uncovered in China.

2017-06-13

China Postpones Implementing New Cybersecurity Law

China wants new rules to control how companies store and use information, protect privacy and prevent crime & terrorism. Not everyone is happy.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

National Cyber Security Centre Finland (NCSC-FI)

National Cyber Security Centre Finland (NCSC-FI)

The NCSC-FI develops and monitors the operational reliability and security of communications networks and services in Finland.

Payload Security

Payload Security

Payload Security's VxStream Sandbox is a fully automated malware analysis system.

Cybertrust Japan

Cybertrust Japan

Cybertrust Japan provides a comprehensive security certification and digital authentication service, enabling customers to build and manage highly secure IT infrastructures.

Igloo Security

Igloo Security

Igloo Security is a leader and pioneer in SIEM (Security Information & Event Management), PSIM (Physical Security Information Management) and MSS (Managed Security Services).

Exponential-e

Exponential-e

Exponential-e provide Cloud and Unified Communications services and world-class Managed IT Services including Cybersecurity.

Angoka

Angoka

Angoka provide hardware-based solutions for managing the cybersecurity risks inherent in machine-to-machine communication networks.

Meterian

Meterian

The Meterian Platform is a fuss-free solution to protect you against vulnerabilities in your app’s software supply chain.

Hyperion Gray

Hyperion Gray

Hyperion Gray are a small research and development team focused on innovative work in a variety of areas including Software & Security Research, Penetration Testing, Incident Response, and Red Teaming

Amidas Hong Kong

Amidas Hong Kong

Amidas is your trusted companion on the road to Digital Transformation. We provide a full range of Information Technology Solutions and Professional Services to Enterprise customers.

Across Verticals

Across Verticals

Across Verticals is a boutique cyber security consulting firm that specializes in holistic, deeply technical and end to end cyber security advisory services based on industry best practices.

Cyber Proud

Cyber Proud

Cyber proud is leading a talent revolution to promote and create an inclusive skilled cyber workforce.

Applied Connective Technologies

Applied Connective Technologies

Applied Connective is one team for all your technology needs, from IT to phones, cyber security to physical security, audio/video and the infrastructure to support it.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

Boston Government Services (BGS)

Boston Government Services (BGS)

Boston Government Services is an engineering, technology, and security firm providing mission-focused solutions for the clean energy, nuclear, and federal programs markets.

Sonar

Sonar

AI generated or written by humans, Sonar’s Clean Code Solutions cover your code quality needs, improving code reliability, maintainability, and security.

The Missing Link

The Missing Link

Whether your requirements are large or small, The Missing Link have you covered with our core offerings including IT & Cloud, Cyber Security and Automation.