GOVERNMENT > Law Enforcement


« Back to News

2017-01-03

Cyber Criminals Are Making $200k A Month

Recorded Future have been researching the dark web for cybecrime forums. It turns out the bad guys can make good money stealing from each other.

2016-12-27

Malicious Ads Expose Millions To Hacking

Millions of Internet users have been exposed to malicious code served from the pixels in tainted banner ads meant to install Trojans and spyware.

2017-01-04

Smartwatch Technology For Police Forces

A new generation of smartwatches and apps are giving police forces a practical wearable option, offering versatility in a convenient lightweight form.

2016-12-21

Online Con Tricks Senior Executives Out of Millions

‘Whaling’, a form of spear phishing, sees high-net-worth individuals tricked into authorising online payments to cyber scammers posing as employees.

2016-12-20

Tackling Cybercrime: Time For The Regional Gulf Cooperation Council To Join Global Efforts

Gulf countries need to share information, intelligence & lessons learned in order to find the best ways to curb cybercrime. Opinion by Joyce Hakmeh

2016-12-12

A Simple Way To Make Online Banking Safe. Really.

The City of London Police had considered asking financial regulators to make individual savers, rather than banks, liable for fraud losses.

2016-12-13

Cyber Police Stations Across India

Starting A Trend: Maharashtra in India is to become the first state in India to have a cyber police station in every district.

2016-12-14

IBM Watson Fights Real-Time Cyber Crime

IBM's Watson supercomputer is embarking on its biggest challenge yet: Preventing cybercrime in finance, healthcare and elsewhere.

2016-12-15

People Are Saying Machine Learning Will Reduce Cyber-Crime

Global annual cybercrime costs will grow from $3 trillion in 2015 to $6 trillion annually by 2021 it is predicted. Can machines fix that?

2016-12-19

British Police - Stay Safe From Cyber Crime This Christmas

10 Top Tips: Police advice on how to stay on guard and not fall victim to cyber crime this Christmas.

2016-12-05

Inside The Mind Of Cyber Criminals

There are some common misperceptions that security professionals have about cybercrime and the people who do it.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tendo Solutions

Tendo Solutions

Tendo Solutions provides intelligence, security, forensics and risk solutions to clients across different sectors and jurisdictions.

Zentera Systems

Zentera Systems

Zentera's CoIP (Cloud over IP) solution offers enterprise-grade networking and security for the emerging cloud ecosystem.

techUK

techUK

techUK represents companies operating in the tech sector in the UK. Focus areas cover all aspects of ICT including cyber security.

Dispersive Networks

Dispersive Networks

Dispersive Virtual Network is a carrier-grade software-defined programmable network that is inspired by battlefield-proven wireless radio techniques.

Sasa Software

Sasa Software

Sasa Software is a cybersecurity software developer specializing in the prevention of file-based network attacks.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

Zen360Consult

Zen360Consult

Zen360Consult provides Advisory and Training services in the field of Cyber Resilience, which includes Cyber Security /ISMS and Business Continuity.

SBD Automotive

SBD Automotive

SBD Automotive are specialists in automotive technology providing independent research and consultancy to help create smarter, more secure, better connected, and increasingly autonomous cars.

CAPSLOCK

CAPSLOCK

CAPSLOCK delivers career-changing cyber training to help adults re-skill. Learn online to become a cyber security professional and pay no tuition until you land a high-paying job.

TopSOC Information Security

TopSOC Information Security

TopSOC Information Security provide a wide range of security consultation, implementation and training services.

Yogosha

Yogosha

Yogosha is a crowdsourced cybersecurity platform enabling a win-win collaboration with the most talented hackers to detect and fix vulnerabilities on your most critical systems.

Hadrian

Hadrian

Hadrian is modernizing offensive security practices with automation, making them faster and more scalable. Equipped with the hacker’s perspective, companies can now know what their critical risks are.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Ethnos Cyber

Ethnos Cyber

Ethnos Cyber is Africa’s leading cybersecurity and compliance management company. We provide Information Security, Risk Management, Cybersecurity and Compliance Management solutions to clients.

Cyborg Security

Cyborg Security

Cyborg Security is a team of threat hunters, threat intelligence analysts, and security researchers from across North America.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.