NEWS > News Analysis


« Back to News

2018-09-19

Iran Targets Kurds With Spyware

Malware collects the target's mobile data including contact lists, phone call records, SMS messages, geo-location, photos, voice messages and more.

2018-09-19

Snowden Demands A Penalty For Misuse Of Aadhaar Data

The Indian government Aadhaar program is a unique ID that can be obtained by residents of India, using their biometric & demographic data.

2018-09-18

The BA Hack And How Not To Respond To A Cyber Attack

There have been poor responses to cyber attacks on major companies before, but the airline’s actions could be one of weakest in recent history.

2018-09-19

Edward Snowden Reconsidered

Five years since Edward Snowden’s revelations of mass surveillance and his subsequent flight to Moscow, here is a lengthy reflection on his actions.

2018-09-18

What Every Small Business Should Know About Hackers & Cybersecurity

It’s a case of when, not if, a cyber attack will take place and preparation is the key. You cannot simply leave it the IT department to deal with.

2018-09-18

Students Blamed For University & College Cyber Attacks

Analysis of cyberattacks on UK universities' research and academic networks concludes there must be "suspicions" over staff and students.

2018-09-18

A Cyber Attack Could Cause The Next Financial Crisis

The next crisis might come from a cyber attack that causes disruptions to financial services capabilities, especially global payments systems.

2018-09-17

Iranian Hackers Target Universities For Secret Research

Iranian hackers target academic institutions as part of a major campaign to steal unpublished research and obtain intellectual property.

2018-09-14

Cybersecurity Needs A Collective Approach

The boom in cybercrime means it is no longer a problem reserved for the IT department - everyone must work together to tackle the threat.

2018-09-14

How Hackers Skipped Through BA’s Security

Researchers from the threat detection firm RiskIQ shed new light on how attackers pulled off the theft of 380,000 customer transaction records from BA.

Directory of Suppliers

Hack Miami

Hack Miami

HackMiami is the premier resource in South Florida for highly skilled hackers that specialize in vulnerability analysis, penetration testing, digital forensics, and all manner of IT security.

Malvern Cyber Security Cluster

Malvern Cyber Security Cluster

A group of more than 80 small cyber security companies. The Forum acts as a central point of contact for organisations who want to engage with small, innovative companies.

Institute for National Security and Counterterrorism (INSCT)

Institute for National Security and Counterterrorism (INSCT)

INSCT is a center for the study of national security, international security, and counterterrorism. Research programs include New Frontiers in Science, Cyber, & Technology

CERT-In

CERT-In

CERT-In is the Indian national government computer security incident response team.

SchmooCon

SchmooCon

ShmooCon is an annual hacker convention offering three days of demonstrations and discussions of critical infosec issues.

SItesAssure

SItesAssure

SitesAssure specialise in website security, malware removal and firewall protection.

CNS Group

CNS Group

CNS Group provide Information Assurance and IT Security Consulting, Managed Security Services and Penetration Testing services.

Praetorian

Praetorian

Praetorian services include security assessments, penetration testing, code reviews, regulatory compliance solutions, and incident response.

KELA Group

KELA Group

KELA's Radark threat intelligence console automatically tracks Darknet threats, giving immediate notification of compromised company information.

Centre for Development of Advanced Computing (C-DAC)

Centre for Development of Advanced Computing (C-DAC)

C-DAC is the premier R&D organization of the indian Ministry of Electronics & Information Technology. Areas of research include cyber security.

Japan Network Security Association (JNSA)

Japan Network Security Association (JNSA)

JNSA's goal is to promote standardization related to network security and to contribute to greater technological standards in the field.

Pandora Security Labs

Pandora Security Labs

Pandora Labs is a cyber threat detection & intelligence company that secures businesses by identifying & mitigating cyber threats to ensure data security.

Pradeo

Pradeo

Pradeo Security offers a complete, automatic and seamless protection to mobile devices and applications, aligned with your organization security policy while preserving business agility.

Sasa Software

Sasa Software

Sasa Software is a leading cyber security provider of extensive content sanitization and deep malware removal solutions.

Forensic Pathways

Forensic Pathways

Forensic Pathways focus on the provision of digital forensic technologies, offering clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.