News

2017-06-12

'Friendly Hackers' Hijack UK Shopping Centre Billboard

Liverpool One shopping centre in the UK has been forced to shut down digital billboards after an unknown hacker tampered with the signage.

2017-06-12

Six Seconds To Hack A Credit Card

Distributed Guessing Attack: Quickly working out the card number, expiry date and security code of a Visa card using nothing more than guesswork.

2017-06-13

UN Investigators Are Targets For Cyber Attack

A group of unknown hackers are targeting United Nations experts investigating potential sanctions violations by North Korea.

2017-06-13

China Postpones Implementing New Cybersecurity Law

China wants new rules to control how companies store and use information, protect privacy and prevent crime & terrorism. Not everyone is happy.

2017-06-07

Cyber-Attacks On UK Political Parties

Will a British political party fall victim to a hack similar to those suffered by the Clinton and Macron presidential campaigns?

2017-05-29

N. Korea Fires Another Ballistic Missile

North Korea has fired what appeared to be another ballistic missile

2017-06-07

WannaCry Was Not A Phishing Attack

Researchers at Malwarebytes say the WannaCry ransomware threat didn’t begin with malware-infected phishing emails, as first suspected.

2017-06-15

Sun Tzu's Art of Cyberwar

These ancient principles are still relevant to understanding the approach of attackers and to the defence of modern IT infrastructures.

2017-06-07

Hackers Hit Russian Bank Customers

Russian cyber criminals used malware planted on Android mobile devices to steal from domestic bank customers and were planning to target European lenders before their arrest, investigators and sources with knowledge of the case told Reuters.

2017-06-07

Stephen Fry: Facebook Classed as Publishers

Stephen Fry has called for Facebook and other “aggregating news agencies” to be reclassified as publishers in order to stop fake news and online abuse spreading by making social media subject to the same legal responsibilities as traditional news websites.

2017-06-13

How Cybercrime Affects The Healthcare Industry

Stolen medical records can be used for different types of identity fraud and phishing attack. The threat from these can persist for many years.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Zurich

Zurich

Zurich is a leading multi-line insurer providing a wide range of property and casualty, and life insurance products and services in more than 210 countries and territories.

CS Group

CS Group

CS Group offers a complete range of security solutions from consultancy to security maintenance and from secure infrastructure design to security governance.

Capsule8

Capsule8

Capsule8 is the only company providing high-performance attack protection for Linux production environments.

Austrian Institute of Technology (AIT)

Austrian Institute of Technology (AIT)

AIT is Austria's largest research and technology organisation and a specialist in the key infrastructure issues of the future including data science and cybersecurity.

ACROS Security

ACROS Security

ACROS Security is a leading provider of security research, real penetration testing and code review for customers with the highest security requirements.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Conduent

Conduent

Conduent delivers mission-critical technology services and solutions on behalf of businesses and governments. Solution areas include digital risk and compliance.

L3Harris Technologies

L3Harris Technologies

L3Harris Technologies is a global aerospace and defense technology innovator, delivering solutions to meet mission-critical needs across air, land, sea, space and cyber domains.

Sotero

Sotero

Sotero is the first cloud-native, zero trust data security platform that consolidates your entire security stack into one easy-to-manage environment.

The Cyber Guild

The Cyber Guild

The Cyber Guild is a not-for-profit organization working to improve the understanding and practice of cybersecurity, and to help raise awareness and education for all.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

BreachBits

BreachBits

BreachBits are on a mission to deliver world-class cyber risk insights continuously at scale in situations where knowing the true risk truly matters.

Early Game Ventures (EGV)

Early Game Ventures (EGV)

Early Game Ventures invests in startups that jumpstart new industries in the emerging markets of Europe.

Sansec Technology

Sansec Technology

Sansec Technology is dedicated to the research and development of cryptographic products and solutions for cyber security.