NEWS > Cybersecurity News


« Back to News

2018-09-04

Tomorrow’s Malware Will Attack When It Sees Your Face

AI may soon make malicious software nearly impossible to detect as it waits for just the right person to sit in front of the computer.

2018-09-03

Banks And Retailers Track How You Type, Swipe And Tap

To fight fraud, a growing number of banks and merchants are tracking visitors’ physical movements as they use websites and apps.

2018-09-03

Threat Posed By Satellite Systems

Satellite communications are vulnerable to hackers which, in the worst-case scenario, could turn satellite antennas into weapons.

2018-09-03

UK Police Fail To Take Digital Advantage

Embracing technology remains one of the biggest challenges facing UK police forces. It has already changed what criminals are able to do.

2018-08-22

Russian Military Spy Software Is On Home Routers

The Russian military is inside hundreds of thousands of routers owned by Americans and others around the world.

2018-08-21

Why Some Computer Viruses Refuse To Die

There are zombies on the internet - odd, undead lumps of code that roam endlessly seeking and finding fresh victims to infect.

2018-08-20

CyberStars Cyber Security Competition

Over 400 university students participate in CyberStars competition in Rwanda as part of an initiative to build cyber skills and capacity.

2018-08-18

A Guided Tour Of The Asian Dark Web

The Asian dark web is not well known. Researchers from IntSights embarked on a six-month long investigation and analysis.

2018-08-17

AI Takes Hacking To Another Level

The nightmare scenario for computer security - artificial intelligence programs that can learn how to evade even the best defenses

2018-08-16

Cybersecurity Training For High School Students

Australia's Big Four banks are partnering with the University of Sydney to deliver cybersecurity training to high school students.

2018-08-15

Cybersecurity Professionals Enticed By The Dark Side

One in every 13 cybersecurity professionals are considered to be ‘grey hats’ while 20 percent have considered becoming black hats.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Herjavec Group

Herjavec Group

Herjavec Group's Managed Security Services practice defends your organization from increasingly sophisticated, targeted cybercrime threats.

Kore Telematics

Kore Telematics

Kore is a leading managed service provider for IoT and M2M applications.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

Tevora

Tevora

Tevora is a specialized management consultancy focused on cyber security, risk, and compliance services.

ATIS Systems

ATIS Systems

ATIS Systems offers first-class complete solutions for legal interception, mediation, data retention, and IT forensics.

Cyber Base

Cyber Base

Cyber Base is an Information Technology company based in Uganda providing software and hardware solutions to clients.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

WolfSSL

WolfSSL

wolfSSL is an embedded SSL/TLS library providing secure communication for IoT, smart grid, connected home, routers, applications, games, phones, and more.

Tetra Tech

Tetra Tech

Tetra Tech is a cybersecurity leader with extensive experience in supporting enterprise-wide programs and systems across multiple business lines from industrial control systems to health IT.

Redpoint Security

Redpoint Security

Redpoint Security is an application security consulting firm that is focused on all aspects of code security.

Persona Identities

Persona Identities

At Persona, we’re humanizing online identity by helping companies verify that their users are who they say they are.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

ABM Technology Group

ABM Technology Group

ABM Technology Group (formerly True IT) provide business information technology services, solutions, and consulting for small to mid-sized organizations.

Getvisibility

Getvisibility

Getvisibility enables customers to detect, classify and protect sensitive information increasing data security, governance, compliance and lowering the risk of losing valuable data.

Neya Systems

Neya Systems

Neya Systems, a leader in advanced off-road autonomy and high-level multi-robot mission planning, provides innovative solutions for uncrewed ground, aerial, and surface vehicles.

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.