GOVERNMENT > Law Enforcement


« Back to News

2019-02-20

Apple ‘Subscription Confirmation’ Phishing Scam

Apple users should be alert to a new phishing scam designed to trick them into handing over personal financial information to online criminals.

2019-02-19

Cloud Based Technology For Policing

Cloud-based technology can be an effective tool helping law enforcement modernise work practices and better respond to changing societal issues.

2019-02-11

Dubai Police Hold 2nd Annual Cybersecurity Challenge

Dubai's “Capture the Flag” challenge intends to inspire enthusiasts to learn more about computer science and strengthen problem-solving skills.

2019-02-12

Wicked Dark Web Wish List

The Dark Web is a lawless place, but even the most hidden corners of the darknet are not immune to the laws of supply and demand.

2019-02-11

Five Arrested In UK Cybercrime Raids

London Metropolitan Police have arrested four men and a woman in connection with sophisticated malware attacks on numerous UK businesses.

2019-02-07

Going Postal: ‘We Have Sent You a Message’

Don't be fooled by the latest email fraud campaign pretending to be from the US Postal Service and aimed at infecting your computer with malware.

2019-02-01

Hackers Use PayPal To Go Phishing

Double Jeopardy: Ransom victims are prompted to follow a link to a fake PayPal phishing page, where their login credentials are stolen.

2019-01-25

AI Tools Can Help Police Fight Crime

AI-based cognitive computing can organise evidence like unstructured audio and video data, transforming it into actionable intelligence.

2019-01-17

Cybersecurity Threats In 2019

Professional cybercrime groups are organising themselves to conform with normal business processes, improving their criminal effectiveness.

2019-01-11

Cybercrime Gangs Continue To Innovate

Phishers are using new techniques to carry out their attacks, and obscure their origins, to make the most of every criminal campaign.

2019-01-08

Hackers Demand Ransom For Stolen 911 Documents

Secret information about the murderous 911 attacks has allegedly been stolen from the insurer and is being offered for sale to terrorist groups.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Owl Cyber Defense

Owl Cyber Defense

Owl patented DualDiode Technology enables hardware-enforced network segmentation and deterministic, one-way transfer of all data types and file sizes.

Junglemap

Junglemap

Junglemap provide nanolearning training courses on ransomware, information security and GDPR.

Echoworx

Echoworx

Echoworx primary and exclusive focus is providing organizations with secure email services.

Novastor

Novastor

NovaStor® is an award-winning, international data backup and recovery software company with solutions supporting physical, virtual and cloud environments.

Apozy

Apozy

Apozy replaces a secure web gateway to nullify phishing, malware and impersonation attacks.

Kindus

Kindus

Kindus is an IT security, assurance and cyber security risk management consultancy.

Tier One Technology Partners

Tier One Technology Partners

Tier One Technology Partners is an IT managed services provider that focuses on cybersecurity, cloud services, IT consulting, and infrastructure.

TestArmy

TestArmy

TestArmy CyberForces provide you with a broad spectrum of cybersecurity services to test every aspect of your IT infrastructure security and software development process.

Udacity

Udacity

Udacity's mission is to train the world’s workforce in the careers of the future. Our programs range from beginner to expert levels and deliver the hands-on skills for real-world expertise.

tru.ID

tru.ID

We’re tru.ID, and we're reimagining mobile authentication, one API at a time.

Avalon Cyber

Avalon Cyber

Arm your organization in the fight against cyberattacks by partnering with the experts at Avalon Cyber.

Cybervergent

Cybervergent

Cybervergent (formerly Infoprive) are a leading cybersecurity technology company in Africa. We provide cybersecurity guidance and solutions that help protect your business.

Geobridge

Geobridge

Geobridge was one of the first information security solutions providers to support cryptography and payment applications for payment processors, financial institutions and retail organizations.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

SalvageData Recovery Services

SalvageData Recovery Services

Since 2003, SalvageData has been providing high-quality data recovery with the certifications needed to work with any storage media manufacturer.

Techtron Business IT Services

Techtron Business IT Services

TECHTRON has been providing business IT services since 2004. Our focus is on SMBs and we are good at it. Our customers trust us, they love our high levels of service, and they love what we stand for.