Deep Sea Mapping: MH370 Search To Resume

The hunt for Malaysia Airlines Flight 370 is about to resume in a desolate stretch of the Indian Ocean, with searchers lowering new equipment deep beneath the waves in a bid to finally solve one of the world's most perplexing aviation mysteries.

The GO Phoenix, the first of three ships that will spend up to a year hunting for the wreckage far off Australia's west coast, is expected to arrive in the search zone Sunday, though weather could delay its progress. After a four-month hiatus, crews will use sonar, video cameras and jet fuel sensors to scour the water for any trace of the Boeing 777, which disappeared March 8 during a flight from Kuala Lumpur to Beijing with 239 people on board.

The search has been on hold for months so crews could map the seabed in the search zone, about 1,100 miles west of Australia. The 23,000-square mile search area lies along what is known as the "seventh arc", a stretch of ocean where investigators believe the aircraft ran out of fuel and crashed, based largely on an analysis of transmissions between the plane and a satellite.

Given that the hunt has already been peppered with false alarms, from underwater signals wrongly thought to be from the plane's black boxes to possible debris fields that turned out to be trash, officials are keen to temper expectations.  

telegraph

Why Digital Brands Have Kicked Traditional Marketing to the Side of the Road »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ThreatConnect

ThreatConnect

ThreatConnect is an enterprise threat intelligence platform by Cyber Squared bridging incident response, defense, and threat analysis for InfoSec & DFIR teams.

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

Kent Interdisciplinary Research Centre in Cyber Security (KirCCS) - University of Kent

KirCCS harnesses expertise across Kent University to address current and potential cyber security challenges.

Ammune.ai

Ammune.ai

Ammune.ai (formerly L7 Defense) helps organizations to protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks.

Team8

Team8

Team8 is Israel’s most prestigious cybersecurity think tank and venture creation foundry.

CyberPilot

CyberPilot

CyberPilot ApS is a Danish cybersecurity company. We work with all types of companies and organisations, both large and small, who want to achieve effective cybersecurity.

ACI Solutions

ACI Solutions

ACI Solutions is a managed IT services and network security provider working with diverse global commercial, government and public sector clients.

CyberInt

CyberInt

CyberInt’s Managed Detection and Response services span globally and include some of the top finance, retail and telecommunication organizations.

Sequitur Labs

Sequitur Labs

Sequitur Labs is developing seminal technologies and solutions to secure and manage connected devices of today and in the future.

Asia Data Destruction (ADD)

Asia Data Destruction (ADD)

ADD is the leading IT Assets Disposal and Data Destruction Company in Thailand.

Sompo International

Sompo International

Sompo International is a global specialty provider of property and casualty insurance and reinsurance services including Cyber & Network Risk.

DataCloak

DataCloak

DataCloak is an innovation company that focus on providing enterprise data-in-motion security solutions based on zero-trust security technology.

DeVry University - Cyber Security Degree

DeVry University - Cyber Security Degree

Explore the dynamic world of data protection with a hybrid or online cyber security degree specialization with DeVry's IT & Networking Bachelor's Degree.

Zephyr Project

Zephyr Project

The Zephyr Project strives to deliver the best-in-class RTOS for connected resource-constrained devices, built to be secure and safe.

HALOCK Security Labs

HALOCK Security Labs

HALOCK is an information security consultancy providing both strategic and technical security offerings.

McAfee

McAfee

McAfee is a worldwide leader in online protection. We’re focused on protecting people, not devices. Our solutions adapt to our customers’ needs and empower them to confidently experience life online.

Cyber News Live

Cyber News Live

Welcome to Cyber News Live where our goal is to create a community and bring public awareness to the 'Cyber' industry.