FREE TO VIEW


« Back to News

2017-05-10

Malware: Eyes On North Korea

KONNI malware allows the operator to steal files, keystrokes, perform screenshots and execute arbitrary code on the infected host.

2017-05-10

Thieves Drain Protected Bank Accounts

A known security hole in the networking protocol used by mobile phone providers enabled a string of attacks that emptied bank customer accounts.

2017-05-06

Macron condemns 'massive' Hacking Attack

The campaign of French presidential candidate Emmanuel Macron says it has been the target of a "massive hacking attack"

2017-05-05

Major Cyber-Attack Prevented

Israel’s National Cyber Defence Authority has revealed that it successfully prevented a major cyber-attack on 120 private & public institutions.

2017-05-04

Getting Intelligence Agencies To Adapt To Life Out Of The Shadows

Gone are the days when spy agencies did not officially exist and their personnel & activities were hidden away from public view. By Jamie Collier

2017-05-04

Hackers Could Turn Off Your Car Engine – While You Are Driving

Bosch’s Drivelog Connect product, which enables you to monitor your car’s performance from your smartphone, can be exploited by hackers.

2017-05-03

Cardiff Cyber Security Research Centre - 'first in Europe'

A new UK research centre to tackle cyber-attacks, protect corporate IT networks. IP and critical infrastructure has opened in Cardiff.

2017-05-08

Interpol Located & Shut Down 9,000 Command Servers

An investigation conducted by Interpol resulted in the identification of nearly 9,000 compromised control servers located in Asia.

2017-05-08

Turkey Blocks Wikipedia

Turkey has blocked Wikipedia citing a law that allows it to ban access to websites deemed obscene or a threat to national security.

2017-05-08

Spyware Firms In Breach Of Export Sanctions

Spy equipment producers are breaking international sanctions by agreeing to sell products to countries that abuse human rights.

2017-05-08

Around Half Of Human Jobs Can Be Automated Now

A report by McKinsey shows technologies available today could automate 45% of the activities people are paid to perform.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Echelon

Echelon

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

Datiphy

Datiphy

Datiphy's data-centric security platform uses behavioral analytics, and data-centric auditing and protection capabilities to mitigate risk.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

OneVisage

OneVisage

Our award-winning 3DAuth digital identity platform turns any consumer mobile device into a real-time 3D facial scanner that securely authenticates the user in seconds.

Brainloop

Brainloop

Brainloop's security architecture enables you to work on and distribute strictly confidential documents both within and beyond the firewall.

ecsec

ecsec

ecsec is a specialized vendor of security solutions including information security management, smart card technology, identity management, cloud computing and electronic signature technology.

Lifespan Technology

Lifespan Technology

Lifespan Technology provides the full range of IT Asset Disposition services. This includes hardware recycling and disposal, data destruction, and hardware resale.

Port53 Technologies

Port53 Technologies

Port53 Technologies is focused on delivering enterprise-grade, cloud-delivered security solutions that are easy to deploy, simple to manage and extremely effective.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

Illuma Labs

Illuma Labs

Illuma Labs delivers real-time voice authentication and fraud prevention solutions.

PSafe

PSafe

PSafe is a leading provider of mobile privacy, security, and performance apps. We deliver innovative products that protect your freedom to safely connect, share, play, express and explore online.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Guidepost Solutions

Guidepost Solutions

Guidepost Solutions are a diverse, global team of investigators, experienced security and technology consultants, and compliance and monitoring experts.

Altospam

Altospam

Altospam is a full service corporate email protection, integrating multiple security levels for your emails.

Zyston

Zyston

Zyston's solutions provide end-to-end management of your cybersecurity needs. Our range of services help protect your business where it needs it the most.