NEWS > Cybersecurity News


« Back to News

2016-09-07

UK Police Hire Law Firms To Tackle Cyber Criminals

Private law firms will be hired by police to pursue criminal suspects for profit, under a radical new scheme to target cyber criminals and fraudsters.

2016-08-26

Exploring Alternatives: Terrorism Converging With Cyber Crime

There is growing evidence that terrorists and criminals are converging in cyberspace. Opinion by Norman T Lihou.

2016-09-06

Keyless Entry Renders Millions Of Cars Vulnerable

Tens of millions of cars are made vulnerable to theft by their keyless entry systems, according to a report by computer security experts.

2016-09-06

15 Years After 9/11

Fifteen years ago this September 11th terrorists, using four jetliners as guided missiles, killed 2,977 people in NY. Is the USA any safer today?

2016-09-06

Cyber Spy Group Uncovered After Years Of Attacks

Symantec and Kaspersky Lab researchers have uncovered a new espionage group that is likely backed by a nation-state.

2016-09-06

Red Team: IBM Cyber Security Service Revealed

Despite efforts to find autonomous solutions to cybersecurity, IBM believes that the human factor is still important.

2016-09-05

What Happens When Two Countries Fight A Cyber War?

Imagine you woke up to find a massive cyber-attack on your country. The internet has been reduced to an error message & daily life has halted.

2016-09-05

Interpol Catches The Leader Of $60m Cybercrime Gang

The ringleader of an international criminal network has been arrested in a joint cybercrime operation by Interpol and the Nigerian authorities.

2016-09-05

The True Cost of Cybercrime in Brazil

It is estimated the Brazilian economy loses as much as $8 billion annually to cybercrime.

2016-09-05

$5m Damages Payout For Huge Healthcare Data Breach

The largest settlement ever for potential violations of privacy related to breaches that compromised the electronic data of 4 million patients.

2016-09-02

Zimbabwean Army Prepared For Cyber Warfare

The Zimbabwean army says it stands ready to deal with hostile forces using the internet to destabilise the country.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Arxan Technologies

Arxan Technologies

Arxan is a leader of application attack-prevention and self-protection products for Internet of Things (IoT), Mobile, Desktop, and other applications.

Security Brigade

Security Brigade

Security Brigade is an information security firm specializing in Penetration Testing, Vulnerability Assessment, Web-application Security and Source Code Security Audit.

Fenror7

Fenror7

Fenror7 lowers the TTD (Time To Detection) of hackers, malwares and APTs in enterprises and organizations from 300 days on average to 24 hrs or less.

National Cyber Security Centre (NCSC) - Netherlands

National Cyber Security Centre (NCSC) - Netherlands

NCSC Netherlands coordinates enhancing the cyber resilience of the Netherlands in the digital domain.

ClickDatos

ClickDatos

ClickDatos specializes in consulting, auditing, data protection training, accredited by ISO/IEC 27001 certification.

Akheros

Akheros

Akheros develops cybersecurity learning algorithms which anticipate, detect and prevent offensive and incongruous behaviors of M2M interactions.

Netresec

Netresec

Netresec is an independent software vendor with focus on the network security field. We specialize in software for network forensics and analysis of network traffic.

Vysk Communications

Vysk Communications

Vysk is an award-winning mobile security firm that has developed the world’s most secure system for voice communication.

Hypersecu Information Systems

Hypersecu Information Systems

Hypersecu Information Systems, Inc. is a solution provider dedicated to multi-factor authentication, public key infrastructure and software copyright protection.

Neurosoft

Neurosoft

Neursoft is a fully integrated ICT company with Software Development, System Integration and Information Technology Security capabilities.

Tigera

Tigera

Tigera provides zero-trust network security and continuous compliance for Kubernetes platforms that enables enterprises to meet their security and compliance requirements.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Lineal Services

Lineal Services

Lineal supports clients in meeting their digital forensics, cyber security and eDiscovery needs by providing bespoke solutions to complex problems.

DigitalWell

DigitalWell

DigitalWell provide fully managed IT and communications solutions for a truly innovative end-to-end experience - for your customers and teams.

StrongBox.Academy

StrongBox.Academy

StrongBox.Academy provides cybersecurity training courses that are tailored to the specific needs and challenges of the industry.

Foresights

Foresights

Foresights is a Nordic company utilizing advanced intelligence tradecraft and extensive cyber security capabilities to deliver services and advisory tailored to our client’s critical requirements.