News

2017-05-10

Malware: Eyes On North Korea

KONNI malware allows the operator to steal files, keystrokes, perform screenshots and execute arbitrary code on the infected host.

2017-05-10

Thieves Drain Protected Bank Accounts

A known security hole in the networking protocol used by mobile phone providers enabled a string of attacks that emptied bank customer accounts.

2017-05-06

Macron condemns 'massive' Hacking Attack

The campaign of French presidential candidate Emmanuel Macron says it has been the target of a "massive hacking attack"

2017-05-05

Major Cyber-Attack Prevented

Israel’s National Cyber Defence Authority has revealed that it successfully prevented a major cyber-attack on 120 private & public institutions.

2017-05-04

Getting Intelligence Agencies To Adapt To Life Out Of The Shadows

Gone are the days when spy agencies did not officially exist and their personnel & activities were hidden away from public view. By Jamie Collier

2017-05-04

Hackers Could Turn Off Your Car Engine – While You Are Driving

Bosch’s Drivelog Connect product, which enables you to monitor your car’s performance from your smartphone, can be exploited by hackers.

2017-05-03

Cardiff Cyber Security Research Centre - 'first in Europe'

A new UK research centre to tackle cyber-attacks, protect corporate IT networks. IP and critical infrastructure has opened in Cardiff.

2017-05-08

Interpol Located & Shut Down 9,000 Command Servers

An investigation conducted by Interpol resulted in the identification of nearly 9,000 compromised control servers located in Asia.

2017-05-08

Turkey Blocks Wikipedia

Turkey has blocked Wikipedia citing a law that allows it to ban access to websites deemed obscene or a threat to national security.

2017-05-08

Spyware Firms In Breach Of Export Sanctions

Spy equipment producers are breaking international sanctions by agreeing to sell products to countries that abuse human rights.

2017-05-08

Around Half Of Human Jobs Can Be Automated Now

A report by McKinsey shows technologies available today could automate 45% of the activities people are paid to perform.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

CybergymIEC

CybergymIEC

CybergymIEC is a global leader in cyber defense solutions and training services.

Cellopoint

Cellopoint

Cellopoint is a leading manufacturer of information security and email lifecycle management (ELM) products.

Digital Security

Digital Security

Digital Security is an Ecuadorian company specialized in providing comprehensive information security solutions.

IoT Defense

IoT Defense

IoT Defense (IOTD) is a cybersecurity and networking company building solutions that enable the protection of networks and the ever-increasing prevalence of IoT devices.

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst

Rogers Cybersecure Catalyst helps Canadians and Canadian companies seize the opportunities and tackle the challenges of cybersecurity.

Splone

Splone

Splone is a Berlin-based IT security research team and consultancy. We help improve IT-security by offering red team assements, penetration tests, audits and customized consulting.

AUREA Technology

AUREA Technology

The photon counter SPD_OEM_NIR from AUREA Technology is designed for quantum key distribution at telecom wavelengths.

Nexon Asia Pacific

Nexon Asia Pacific

Nexon solutions include cloud infrastructure and services, unified communications, managed security services, business continuity, secured high-performance network and business applications.

European Union Agency for Network and Information Security (ENISA)

European Union Agency for Network and Information Security (ENISA)

The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common level of cybersecurity across Europe.

PyNet Labs

PyNet Labs

PyNet Labs is a Training Company serving corporates as well as individuals across the world with ever-changing IT and technology training.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.

OneZero Solutions

OneZero Solutions

OneZero specialize in cybersecurity operations, information assurance, computer network operations, solutions engineering, and project management.

Pistachio

Pistachio

Pistachio is the new evolution of cybersecurity awareness training and attack simulations.

Northern Computer

Northern Computer

Northern Computer provides comprehensive IT solutions that streamline your operations and help you achieve your business goals.

appNovi

appNovi

appNovi inventories everything to map the attack surface, identify missing security agents, and prioritize vulnerabilities based on exposure.

DataTrails

DataTrails

DataTrails enables organizations to prove and verify the provenance and authenticity of any data they use in their business operations.