GOVERNMENT > Law Enforcement


« Back to News

2018-08-17

Blackmail Emails Demand Bitcoin Payment

The sender threatens that if you do not pay $1000 in Bitcoin within one day then compromising video will be sent to all of your contacts.

2018-07-24

Fraudsters £350k Spoof University Emails

Action Fraud issue a warning as reports show that fraudsters are registering domain names to look like they belong to UK university email addresses.

2018-07-31

Palestinian Authorities Under Cyber Attack

A group named Gaza Cybergang that has previously targeted Palestinian law enforcement is now back in action targeting government officials.

2018-07-31

Artificial Intelligence & Threat Detection

Two elite Canadian institutions are embarked on a cybersecurity research collaboration, focused on automated threat detection mechanisms.

2018-07-27

Help The Aged: Indian Cops Give Cybersecurity Tips

Police workshops on the latest ATM fraud techniques and phishing, how to protect users' money and what to do in case they fall victim.

2018-07-19

Cybercrime Is A Real Economic Threat

Online scams and cybercrime have the potential to impose irreversible financial, legal and reputational costs. At least take basic precautions.

2018-07-16

The Mueller Investigation Identifies Russian Spies

US Intelligence agencies stand vindicated as Special Prosecutor Mueller indicts agents of the Russian military for 2016 electoral interference.

2018-07-16

US Dark Web Raids Lead to Arrests And Seizures

Guns, drugs, cars, gold bars, crytocurrency and crypto-mining gear all seized as US Homeland Security agents arrest 35+ DarkWeb vendors.

2018-07-09

Crypto-Mining For Cyber Criminals

Malicious crypto-mining malware is becoming a top tactic among cyber criminals according to WatchGuard Security's Q1 threat intelligence update.

2018-07-03

Cryptocurrency Cybercrime Surging In The UK

Action Fraud warn of a wave of fake Wannacry ransomware attacks threatening users that their files will be deleted unless a Bitcoin fine is paid.

2018-06-27

13 Ways Cyber Criminals Spread Malware

A search of darknet forums reveals a wide range of techniques used by criminal hackers to spread malware, steal data and plant crypto ransomware.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Nordic IT Security

Nordic IT Security

Nordic IT Security is a cyber security business forum in Scandinavia bringing together the converging worlds of IT, Cyber and Information Security.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

Cyacomb

Cyacomb

Cyacomb (formerly Cyan Forensics) provides digital forensics software to help police forces find evidence on computers many times faster than before.

Resilia

Resilia

RESILIA is a comprehensive portfolio of tools and training to help your organization achieve global best practice in cyber security.

DynaRisk

DynaRisk

DynaRisk helps companies protect their staff, clients and supply chain from cyber threats by enabling people to take action for themselves.

Prescient

Prescient

Prescient’s Cyber solutions supplement your firm’s existing data security infrastructure with specialized investigations that identify unconventional cyber risks.

Arkose Labs

Arkose Labs

Arkose Labs' Fraud and Abuse Platform combines Telemetry and adaptive Enforcement Challenges to break down the ROI of fraudsters and protect digital businesses.

In-Sec-M

In-Sec-M

In-Sec-M is a non-profit organization that brings together companies, learning and research institutions, and government actors to increase competitiveness of the Canadian cybersecurity industry.

Right-Hand Cybersecurity

Right-Hand Cybersecurity

Right-Hand Cybersecurity empowers businesses to monitor, measure and mitigate employee induced cyber risks in real-time.

Black Hills Information Security (BHIS)

Black Hills Information Security (BHIS)

Black Hills Information Security provide security testing and vulnerability assessment services.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

1Kosmos

1Kosmos

1Kosmos provide Digital Identity and Passwordless Authentication for workforce and customers. Powered by advanced biometrics and blockchain technology.

LocateRisk

LocateRisk

LocateRisk provides more efficiency, transparency and comparability in IT security with automated, KPI-based IT risk analyses.

SecurIT360

SecurIT360

SecurIT360 is a full-service specialized Cyber Security and Compliance consulting firm.

Eventus Security

Eventus Security

Eventus, are a team of highly skilled professionals who are committed to deliver excellence in next generation cyber security services and customized solutions for your enterprise.

OryxAlign

OryxAlign

OryxAlign offer managed IT and cyber security, cloud and digital transformation, and tailored professional and consulting services.