BUSINESS > Services > Transport & Travel


« Back to News

2022-05-27

General Motors Hack Exposes Car Owner Information

Credentials Stuffing: Customer data exposed includes first and last names, email and home addresses, usernames and phone numbers.

2022-02-15

Ransomware Attacks On Transport & Logistics Centres

Planes, Ships & Automobiles: In separate incidents, several European transport & logistics hubs have suffered similar ransomware attacks.

2022-02-10

Autonomous Technology To Prevent Collisions At Sea

The US Navy is looking for autonomous collision avoidance and control technologies capable of supporting safe navigation in its ships & submarines.

2021-12-14

Volvo Falls Victim To Hackers

Hackers have stolen an undisclosed amount of research and development data from car maker Volvo, in what might be a possible ransom attack.

2021-12-06

Panama Boosts Maritime Cyber Security

Panama, the world's largest merchant shipping state, is working to improve the cyber security & safety of the many maritime vessels that fly its flag.

2021-11-30

Tesla Drivers Can’t Unlock Their Cars

Network Outage: Technology makes things convenient, but reliance on a server working all the time can be downright dangerous for Tesla drivers.

2021-10-25

Blockchain Can Secure Autonomous Systems

Blockchain could be applied to ensure that teams of robots can perform their tasks, even when some of the individual robots are hacked.

2021-10-13

Ever Increasing Attacks On Maritime Ports & Systems

Attacks on the maritime industry’s systems have increased by 900% in the last three years with reported incidents set to reach record volumes. 

2021-09-30

Connected Cars - What Does Your Car Know About You?

Personal Details: Name, phone number & address - are the most common data that car makers collect, but much more data is becoming available.

2021-09-23

Phishing Scam - Attackers Impersonate US Dept. of Transport

An elaborate email fraud created a new domain, impersonated a known US government brand and launched a clever credential-harvesting operation.

2021-09-10

Outdated Strategies In Maritime Cyber Security

New guidelines address the question of what port organisations need in terms of resources to effectively manage their cyber security risks.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Cybereason

Cybereason

Cybereason provides attack protection with cutting edge EDR and XDR, and industry recognized consulting services to support organizations throughout any stage of the incident lifecycle.

IronScales

IronScales

IronScales combines human intelligence with machine learning to automatically prevent, detect and respond to email phishing attacks.

Nexusguard

Nexusguard

Nexusguard is at the forefront of the fight against malicious Internet attacks, protecting organizations worldwide from threats to their websites, services, and reputations.

IEEE Cyber Science and Technology Congress (CyberSciTech)

IEEE Cyber Science and Technology Congress (CyberSciTech)

CyberSciTech provides a platform for scientists, researchers, and engineers to share their latest ideas and advances in the broad scope of cyber-related science, technology, and application topics.

SystemExperts

SystemExperts

SystemExperts is a premier provider of IT compliance and cyber security consulting services.

Charterhouse Voice & Data

Charterhouse Voice & Data

Charterhouse is your trusted technology partner - designing, provisioning and supporting the technology that underpins your operations including network security and data compliance.

Mosaic Insurance

Mosaic Insurance

Mosaic is a next-generation global specialty insurer distinguished by an exceptional team, agile technology, and a structure that combines Lloyd’s of London strength with a global distribution network

NorthStar

NorthStar

NorthStar provide the visibility needed to track and reduce risk through risk-based vulnerability management and vulnerability exploit prediction.

Resourcive

Resourcive

Resourcive is the first Value Added Sourcing “VAS” consultancy. We deliver strategic IT sourcing solutions to mid-market and enterprise clients.

Helix Security Services

Helix Security Services

Helix Security provides IT & information security consultancy to government and businesses across New Zealand.

Vultara

Vultara

Vultara provides web-based product security risk management tools for electronics manufacturers.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.

Alcatel-Lucent Enterprise (ALE)

Alcatel-Lucent Enterprise (ALE)

We are Alcatel-Lucent Enterprise. Our mission is to make everything connect with digital age networking, communications and cloud solutions.

Permiso Security

Permiso Security

Permiso combines industry leading Identity Security Posture Management with Identity Threat Detection and Response, leaving no place to hide for identity threats lurking in your environment.

LiveAction

LiveAction

LiveAction’s Network Intelligence platform transforms complex data into actionable insights, providing organizations with a comprehensive view of their network.