NEWS > News Analysis


« Back to News

2015-06-09

NSA Planned to Plant Malware via Google & Samsung Phones

An NSA app-hijacking program, dubbed IRRITANT HORN, deployed to bug users mobile phones.

2015-06-09

UK Secret Report Urges US Data Sharing

Top secret report to the UK Prime Minister recommends a new international treaty to enforce cooperation of the US Internet giants.

2015-06-09

Berners-Lee Urges UK to Fight 'snooper's charter'

Just Say No: Inventor of world-wide-web opposes UK government’s plans to extend surveillance powers.

2015-06-11

FBI, Europol and NCA Want Global Approach to Fighting Cyber-Crime

Law enforcement experts discuss cyber-crime policing during the ‘Know your adversary: Who is the cyber-criminal?' keynote at InfoSec Europe.

2015-06-09

Stegosploit Hidden Image Code is the Future of Online Attacks

Attackers can embed executable JavaScript code within an image to trigger a 'drive-by download'.

2015-06-08

How to Stalk Someone’s Location on Facebook

A new tool lets you easily track movements of other Facebook users by scooping up location data shared in Facebook Messenger chats.

2015-06-08

Russia Faked MH17 Images

Russian authorities doctored satellite images it used to try pin the downing of Malaysia Airlines flight MH17 on Ukraine.

2015-06-08

Data Stolen in Hack Attack on German Parliament

Hackers gained access to the Bundestag's internal server, launching an unprecedented attack using Trojan viruses.

2015-06-08

Pentagon To Relaunch $475 Million Cyber Effort

After cancelling its search for bids on a five-year outsourcing contract, US Cyber Command say a retooled version will be out by October.

2015-06-08

Nasdaq Bets on Bitcoin's Future

The US stock exchange Nasdaq is experimenting with incorporating the underlying technology of the bitcoin cryptocurrency into its pre-IPO trading arm.

2015-06-08

Bigger than Heartbleed - 'Venom' Threatens Datacenters

Before Heartbleed: Worst vulnerabilities ever?

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall And Why Does It Matter

See how to use next-generation firewalls (NGFWs) and how they boost your security posture.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

7Safe

7Safe

7Safe has been delivering hands-on digital security training courses since 2001 and offer e a portfolio of university and industry-accredited courses.

Nexus Group

Nexus Group

Nexus Group develops identity solutions for physical and digital access.

HexaTrust

HexaTrust

The HEXATRUST club was founded by a group of French SMEs that are complementary players with expertise in information security systems, cybersecurity, cloud confidence and digital trust.

Cog Systems

Cog Systems

Cog Systems offer an embedded solution built on modularity, proactive security, trustworthiness, and adaptability to enable highly secure connected devices.

ODSC

ODSC

ODSC is a security systems integrator that provides services and expertise in identity management and access.

Netlawgic Legal Services

Netlawgic Legal Services

Netlawgic is exclusively focused on delivering cyber law solutions to the industry. We provide our clients with specialized attention and problem solving in all aspects of cyber law.

Argo Group

Argo Group

Argo is an international underwriter of specialty insurance. Argo Cyber offers a full spectrum of coverage solutions related to professional and technology services.

Aware

Aware

Aware is the only comprehensive AI solution for governance, risk, compliance and insights for leading collaboration platforms.

RedHunt Labs

RedHunt Labs

RedHunt Labs is a premier Cybersecurity Solutions provider, offering Attack Surface Management solution 'NVADR' and Penetration Testing services.

Opora

Opora

Opora is the leading cybersecurity provider of adversary behavior analytics “ABA” and preemptive security solutions.

Abu Dhabi Gov Digital

Abu Dhabi Gov Digital

Gov Digital (formerly Abu Dhabi Digital Authority - ADDA) enable, support and deliver a digital government that is proactive, personalised, collaborative and secure.

Execweb

Execweb

Execweb are a cybersecurity executive network, comprised of 400+ security practitioners who work at Fortune 500 and SME companies.

Mindsprint

Mindsprint

Mindsprint (formerly Olam Technology and Business Services - OTBS) are a leading edge technology and business services firm.

InfoSecTrain

InfoSecTrain

InfoSecTrain are a leading training and consulting organization dedicated to providing top-tier IT security training and information security services to organizations and individuals across the globe