News

2015-06-11

Anderson Report: Review Of UK Anti-Terror Data Laws.

The UK Government will publish a comprehensive review of laws governing bulk interception of communications on mobile phones & the Internet.

2015-06-09

NSA Planned to Plant Malware via Google & Samsung Phones

An NSA app-hijacking program, dubbed IRRITANT HORN, deployed to bug users mobile phones.

2015-06-09

UK Secret Report Urges US Data Sharing

Top secret report to the UK Prime Minister recommends a new international treaty to enforce cooperation of the US Internet giants.

2015-06-09

Berners-Lee Urges UK to Fight 'snooper's charter'

Just Say No: Inventor of world-wide-web opposes UK government’s plans to extend surveillance powers.

2015-06-11

FBI, Europol and NCA Want Global Approach to Fighting Cyber-Crime

Law enforcement experts discuss cyber-crime policing during the ‘Know your adversary: Who is the cyber-criminal?' keynote at InfoSec Europe.

2015-06-09

US Stuxnet Attack Against N. Korea Failed

Fail: Stuxnet virus used to attack North Korea's nuclear weapons program five years ago.

2015-06-09

Stegosploit Hidden Image Code is the Future of Online Attacks

Attackers can embed executable JavaScript code within an image to trigger a 'drive-by download'.

2015-06-08

How to Stalk Someone’s Location on Facebook

A new tool lets you easily track movements of other Facebook users by scooping up location data shared in Facebook Messenger chats.

2015-06-08

Fixing Security Holes in the Consumer Debt Market

Consumers are losing confidence in the integrity of the debt collection process & lack of transparency provides cover to bad actors.

2015-06-08

Russia Faked MH17 Images

Russian authorities doctored satellite images it used to try pin the downing of Malaysia Airlines flight MH17 on Ukraine.

2015-06-08

Data Stolen in Hack Attack on German Parliament

Hackers gained access to the Bundestag's internal server, launching an unprecedented attack using Trojan viruses.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

E-Tech

E-Tech

E-Tech has been providing system support and information technology consulting services including Internet and Network Security assessments.

IX Associates

IX Associates

IX Associates is a UK based IT Integration business specialising in risk, compliance, eDefence, and network security solutions.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Endian

Endian

Endian’s mission is to provide a secure platform that connects distributed people and things, simplifying the digitalization of businesses.

IXDen

IXDen

IXDen provides a novel software-based approach to OT systems protection, covering Industrial IoT cybersecurity and sensor data integrity.

Aspisec

Aspisec

Aspisec is a cybersecurity company specialized in Firmware Security and Critical Infrastructure Protection.

Syber Technology

Syber Technology

Syber Technology is an IT project implementer empowering IT systems of Small to Medium Enterprises in the Middle East.

Focal Point

Focal Point

We aspire to be the focal point for Medium and Small size companies providing 24/7 cyber security advice, services and solutions.

Viria

Viria

Viria is an information and security technology solution provider that promotes digitalization in a secure way.

Intellias

Intellias

Intellias is a trusted technology partner to top-tier organizations and digital natives helping them accelerate their pace of sustainable digitalization.

BIG Cyber

BIG Cyber

BIG Cyber is a specialized Managed Security Service Provider (MSSP) dedicated to bringing military grade cyber security technology to the gaming industry.

NANDoff Data Recovery

NANDoff Data Recovery

NANDoff is a flat rate data recovery service. We serve the electronics industry around the globe 24/7.

Iris Powered by Generali

Iris Powered by Generali

Iris Powered by Generali is an identity theft resolution provider. Our offering combines expert assistance and support with user-friendly identity protection technology.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

KnoTra Global

KnoTra Global

KnoTra Global is a next-generation Managed Service provider with a portfolio of services including Cybersecurity Solutions, Network Management, IT Leadership, and Day-to-Day Helpdesk and IT services.