GOVERNMENT > Law Enforcement


« Back to News

2020-02-28

Facebook Scams Offer Fake Money To Steal Personal Data

Facebook is a prime vehicle for hackers to target unsuspecting users with various online scams to get you to disclose confidential information.

2020-02-11

Faster Digital Forensic Analysis

Examining seized devices for incriminating evidence is a time-consuming process. A new set of speedy digital forensic tools will change all that.

2020-02-05

Wawa Breach - Data On 30m Card Users For Sale

Card details of more than 30 million customers have been stolen in a data breach at US retailer Wawa and are now up for sale on the Dark Web.

2020-02-04

Facial Recognition: A Three Billion Image Database

AI technology developed by Clearview allows the identification of anyone it images who has a presence online, not just on a crime database.

2020-02-04

Facebook Crime In Britain Rises 19%

The total number of Facebook-related crimes reported by UK police forces was 32,451 in 2019- 2020, an increase of 19% over the previous year.

2020-02-03

Amazon Prime Scam Cost Victims £1m

An automated call leads to a scammer trying to plant malware and take control of the victim's device to extract vital financial information.

2020-01-29

Cyber Crime Costs Britain $27 Billion

Encouraging companies in all sectors to make investments in improved cyber security will reduce the economic impact of cybercrime on the UK.

2020-01-15

Online Bank Fraud Is Up 40% In The UK

Online fraud in Britain is increasing and criminals are using sophisticated hacking methods to access victims's financial information and passwords.

2020-01-08

GozNym Malware Hackers Sentenced

Jailed: Three members of an international organised cybercrime group who used the GozNym banking Trojan to steal $100 million.

2020-01-06

The Invisible Areas Of The World Wide Web

After more than 20 years of online access the Internet is still in the early evolutionary stages. Some parts of it are visible and others are not.

2020-01-03

Criminals Are Using AI For Attacks

AI is rapidly finding applications in nearly every walk of life and cyber criminals are focusing on manipulating AI systems for malicious purposes.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

Echelon

Echelon

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia.

Institute for Critical Infrastructure Technology (ICIT)

Institute for Critical Infrastructure Technology (ICIT)

ICIT is a leading cybersecurity think tank providing objective research, advisory, and education to legislative, commercial, and public-sector cybersecurity stakeholders.

Centurion Information Security

Centurion Information Security

Centurion Information Security is a consulting firm based in Singapore that specialises in penetration testing and security assessment services.

Garland Technology

Garland Technology

Garland Technology specializes in network access points (TAPs) for 100% visibility allowing you to see every bit, byte, and packet flowing through your network.

Danish Maritime Cybersecurity Unit

Danish Maritime Cybersecurity Unit

The Danish Maritime Cybersecurity Unit is tasked with delivering the initiatives set out in the Cyber and Information Security Strategy for the Maritime Sector.

RFA

RFA

RFA is an institutional-quality IT, financial cloud and cyber-security services provider to the financial service and investment management sector.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

PCS Security (PCSS)

PCS Security (PCSS)

PCS Security provides secure, reliable and state-of-the-art security solutions to help our customers address their security concerns.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

Ministry of Electronics & Information Technology (MeitY)

Ministry of Electronics & Information Technology (MeitY)

The Ministry of Electronics & Information Technology is an executive agency responsible for IT policy, strategy and development of the electronics industry.

Triangle

Triangle

Triangle enable innovative business transformation by ensuring critical hybrid infrastructures are optimised, interoperable and secure.

Protos Labs

Protos Labs

Protos Labs enables insurers & enterprises to make better cyber risk decisions through holistic, real-time risk management tools.

Lintu Solutions

Lintu Solutions

Lintu Solutions is a trusted provider of comprehensive cybersecurity and enterprise risk management solutions.

CyVent

CyVent

CyVent helps you select the right cybersecurity solutions at the right price for your unique situation, without the need to invest endless time evaluating the ever-evolving options.