GOVERNMENT > Law Enforcement


« Back to News

2017-02-14

Police Using IoT To Detect Crime

Just the Beginning: A local US Police force is trying to access the records of an Amazon Echo device as evidence in a murder investigation.

2017-02-20

Malware Traders Switch To Less Suspicious File Types

After aggressively using JavaScript email attachments to distribute malware, attackers are now switching to less suspicious file types.

2017-02-28

Google Required To Pass Foreign Emails To FBI

A US judge has ordered Google to comply with FBI search warrants seeking customer emails stored outside the United States.

2017-03-01

Fake Microsoft Phishing Scam

Access to your Microsoft Email Account Disabled? A campaign of fraudulent messages designed to capture your online identity via a fake website.

2017-03-01

Suspect Monitoring & Surveillance Technology

NEC Are Looking Out For Criminal Activity: Monitoring and analysing suspicious behavior has become a pressing need for law enforcement.

2017-03-03

Only In Texas: Ransomware Steals Data From Police

Ukrainian-based hackers hold a local Texas Police Force network server for ransom, resulting in the loss of video evidence.

2017-03-02

Warning: Fake Ransomware

When confronted with what appears to be a crypto-ransomware demand many UK businesses pay up too quickly.

2017-02-15

UK Fraud Hits £1.1bn As Cyber Crime Soars

A 55% year-on-year rise in the value of reported fraud to £1.1bn is a warning about increasing cyber-crime.

2017-02-27

Visualisation Tech Helps Police Process Complex Data

Microsoft is incorporating a visualisation technology to help UK police forces react and record incidents more effectively.

2017-02-27

The Dark Web Is Hidden In Plain Sight

Sites on the Dark Web are a privacy paradox: While anyone who knows a dark web site’s address can visit it, no one knows who hosts that site.

2017-02-23

Cyber Incidents Hit 85% Of Global Companies

Security experts at Kroll say Insider Threat is a key factor in the growth of cybercrime, fraud and security incidents among global companies.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Eversheds Sutherland

Eversheds Sutherland

Eversheds Sutherland is a global multinational law practice offering a full range of commercial and IT law services including Privacy, Data Protection and Cyersecurity.

Information Security Research Association (ISRA)

Information Security Research Association (ISRA)

ISRA is a non-profit organization focused on various aspects of Information Security including security research and cyber security awareness activities.

Kore Telematics

Kore Telematics

Kore is a leading managed service provider for IoT and M2M applications.

Neupart

Neupart

Neupart provides Information Security Management System, Secure ISMS, allowing organisations to automate IT Governance, Risk and Compliance management.

Evidence Talks (ETL)

Evidence Talks (ETL)

A leading forensic computing authority developing unique digital forensic technologies. Tools that detect potential terrorists & criminals & used by the military, enforcement & intelligence commmunity

Corvus Insurance

Corvus Insurance

Corvus' mission is to create a safer, more productive world through technology-enabled commercial insurance.

Slovenska Akreditacija (SA)

Slovenska Akreditacija (SA)

Slovenska Akreditacija (Slovenia Accreditation) is the national standards accreditation body for Slovenia.

Sky Data Vault

Sky Data Vault

Sky Data Vault provide the simplest and most cost effective method of Disaster Recovery / Business Continuity for mission critical systems and applications.

Vilnius Tech Park

Vilnius Tech Park

The region‘s most complex and integrated ICT hub, Vilnius Tech Park aims to attract and unite innovative talent from big data, cyber security, smart solutions, fintech and digital design.

WisePlant

WisePlant

WisePlant's portfolio of solutions and services includes process measurement, secure automation, industrial cybersecurity, functional safety and more.

BIO-key

BIO-key

BIO-key is a pioneer and innovator, we are recognized as a leading developer of fingerprint biometric authentication and security solutions.

Precursor Security

Precursor Security

Precursor Security are information security specialist, delivering all aspects of Security testing, Cyber Risk Management, and Continuous Security Testing.

Evina

Evina

Evina offers the most advanced cybersecurity and fraud protection for mobile payment.

Beaming

Beaming

Beaming is an established Internet Service Provider for businesses across the UK. We deliver reliable voice, data and managed services, including cybersecurity.

Complete Cyber

Complete Cyber

Complete Cyber provide professional cybersecurity services and products to help secure your infrastructure, systems and data.

CHERI Alliance

CHERI Alliance

CHERI Alliance is an industry initiative spearheading the global adoption of the Capability Hardware Enhanced RISC Instructions (CHERI) security technology across the computing industry.