NEWS > Cybersecurity News


« Back to News

2016-08-11

Phineas Fisher Fingered: Hacking the Turkish Government

A notorious hacker has claimed responsibility for hacking Turkey’s ruling party, the AKP, stealing more than 300,000 internal emails and other files.

2016-08-11

Deep Mystery: Looking For MH370

Researchers hunting for the lost Malaysia Airlines MH370 now believe the plane glided down & they have been searching the wrong patch of ocean.

2016-08-11

‘Dropping Elephant’ Is A New Cyber Espionage Group

Kaspersky Lab is monitoring a new cyber espionage group which has a high success rate despite using only low tech attacks.

2016-08-11

The Race To Regulate Self-Driving Cars

Unintended consequences of the the “internet of things” include incomplete & inconsistent laws which depress the benefits without addressing the risks.

2016-08-10

ISIS Suspect Was Sending Encrypted Emails

A senior Indian intelligence official says that an ISIS suspect used tutanota.com, a secure email encryption app, to contact his foreign handler.

2016-08-15

Rio Olympics Hacking Threats

World-class athletes aren't the only ones preparing for the Olympic Games. World-class cybercriminals are also hoping to leave with gold.

2016-08-19

Google Uses AI To Save On It’s Energy Bills

Its artificial intelligence division, DeepMind, has cut Google's data centres' energy consumption by 15%, using a machine-learning algorithm.

2016-08-19

CISOs Need Teamwork & A Strategic Framework

Companies may not fully understand the nature of modern threats. Simply placing a higher priority on security may not lead to improved measures.

2016-08-19

New Airport Security Technology

Threats from terrorism & international crime are prompting a big effort by civil aviation to develop new screening technologies.

2016-08-17

Israeli Business Expands Its Cyber Footprint

Israel Aerospace Industries (IAI) is making big strides growing its cybersecurity business.

2016-08-18

Turning Big Data into Smart Data

Big Data has become one of the key buzzwords for businesses everywhere. But Without structure any amount of data is unusable.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Gospel Technology

Gospel Technology

Gospel presents a totally new way of accessing and controlling data which is enterprise grade scalable, highly resilient, and secure.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

National Cybersecurity Student Association (NCSA) - USA

National Cybersecurity Student Association (NCSA) - USA

The National Cybersecurity Student Association is a one-stop-shop to enhance the educational and professional development of cybersecurity students through activities, networking and collaboration.

Ockam

Ockam

Ockam gives you the tools you need to establish an architecture for trust within your connected device applications.

Cyber Resilience

Cyber Resilience

Cyber Resilience offer an intensive program designed to help you create strategies to quickly become cyber resilient and to manage cyber risks in a measurable and predictable way.

BetaDen

BetaDen

BetaDen provides a revolutionary platform for businesses to develop next-generation technology, such as the internet of things and industry 4.0.

Singular Security

Singular Security

Singular Security help public and private organizations minimize cybersecurity risk and pass their IT compliance audit.

OSI Security

OSI Security

OSI Security's primary services include penetration testing, security auditing, web application security testing and risk management.

Flexxon

Flexxon

Flexxon is the industry leader to develop NAND flash storage devices. Our key focus is to innovate memory devices ensuring data security and reliability.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

Cyber Security Council UAE

Cyber Security Council UAE

The Cyber Security Council's vision is to protect UAE cyberspace, maintain confidence in our digital infrastructure and institutions, and build a cyber-resilient society.

AuthenticID

AuthenticID

Our mission at AuthenticID is to combat fraud worldwide and help businesses protect their enterprise and valuable data assets.

Elitery

Elitery

Elitery is an IT-managed service company that focuses on cloud and cybersecurity services.

7AI

7AI

7AI is the first agentic security platform that harnesses the speed, swarming capabilities, and power of AI to finally give defenders the advantage over evolving threats.

SurgeONE.ai

SurgeONE.ai

SurgeONE.ai is the first AI-driven platform built to transform compliance, cybersecurity, and data across financial services—powered by experts, guided by insight.