NEWS > Cybersecurity News


« Back to News

2015-01-06

Malaysia Airlines flight MH370 theories: 17 possible explanations that could reveal fate of plane

A former airline director has claimed that the US military may have shot down Malaysia Airlines flight MH370 in the latest theory about what happened to the missing plane.

2014-12-10

150 million cars will be connected to the Internet by 2020

In just five years, most cars and trucks will be connected to the Internet, according to a report from Gartner Inc. By 2020, about 150 million vehicles will be connected via Wi-Fi, and 60% to 75% of them will be capable of consuming, creating and sharing Web-based data, the report states.

2014-12-10

North Korea continues cyber warfare against Sony

For the past few weeks, entertainment giant Sony Pictures has seen its computers paralysed by a cyberattack.

2014-12-04

Why REGIN Isn't The New STUXNET

Stuxnet was designed for sabotage, whereas Regin was likely designed for espionage and as a result was deployed with a great deal more of precision.

2014-12-01

MH370: new drift improves search in Australia

Australia is working on new drift modeling to expand the geographical area in which wreckage from missing Malaysia Airlines flight MH370 may come ashore, the Australian search coordinator said on Wednesday.

2014-07-22

10 Cyber Security Predictions for 2015

Active defensive and offensive security continues to rise

2014-09-29

Desmond investment bets on spooks to win cyber war

There are few Irish investors better than Dermot Desmond at spotting the next big thing. His latest investment in Vahna, a cyber-security firm, comes less than two years after Edward Snowden began to massively leak information about the secret world of technology espionage.

2014-10-08

Why we need Tor now more than ever

Since Edward Snowden leaked documents demonstrating the breadth of the National Security Agency’s digital surveillance last year, the global conversation around Internet freedom has shifted from censorship to surveillance. Where once the focus was on China’s Great Firewall or Iran’s vision of a “halal Internet,” now eyes are trained on the use of FinFisher for targeted surveillance or the NSA’s global dragnet.

2014-10-23

Is Big Data the Best Preparation Against Natural Disasters?

Big Data and Open data and analytics have become fundamental tools in disaster reparedness, experts say. But public officials aren’t using them enough.

2014-11-27

Financial services now on the 'front line' of Cyber

Financial services are the front lines for a lot of the cyber battles being sparked today. The reason why is simple - that’s where the money is.

2014-06-12

Worlwide Crackdown on Hackers

Two major events targeting Hackers show growing international concern across governments over the growing impact and extent of Cybercrime.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Eversheds Sutherland

Eversheds Sutherland

Eversheds Sutherland is a global multinational law practice offering a full range of commercial and IT law services including Privacy, Data Protection and Cyersecurity.

MSAB

MSAB

MSAB is a pioneer in forensic technology for mobile device examination.

UZCERT

UZCERT

UZCERT is the national Computer Emergency Response Team for Uzbekistan.

ID Agent

ID Agent

ID Agent provides a comprehensive set of threat intelligence and identity monitoring solutions.

NetGuardians

NetGuardians

NetGuardians is a leading Fintech company recognized for its unique approach to fraud and risk assurance solutions.

Georgia Cyber Center

Georgia Cyber Center

Georgia Cyber Center is dedicated to training the next generation of professionals through education and real-world practice while also supporting innovation in new technologies for online defenses.

Abusix

Abusix

Abusix specializes in Internet security, network abuse handling, antispam and fraud prevention.

Phew

Phew

Phew are New Zealand cyber security specialists with expertise and experience forged in global financial markets, IT&T, management consulting and SME business management.

Redborder

Redborder

Redborder is an Open Source network visibility, data analytics, and cybersecurity Big Data solution that is scalable up to the needs of enterprise networks and service providers.

X4 Technology

X4 Technology

X4 Technology is a leader in finding the very best technology talent for some of the world’s most innovative start-ups and globally recognised brands.

Security BSides

Security BSides

Security BSides is the first grass roots, DIY, open security conference in the world!. BSides is a community-driven framework for building events for and by information security community members.

Accops Systems

Accops Systems

Accops enables secure and instant remote access to business applications from any device and network, ensuring compliant enterprise mobility.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

ISO WISH

ISO WISH

Take your Business to the Next Level with ISO Certification in UAE.

Blue Goat Cyber

Blue Goat Cyber

Blue Goat stands at the forefront of cybersecurity, particularly in medical device security and penetration testing.