NEWS > Cybersecurity News


« Back to News

2015-06-21

Hackers Invade Hospital Networks

Hackers penetrate secure hospital networks, collecting valuable information, by targeting medical devices.

2015-06-21

Cybersecurity in the Boardroom

NYSE Survey: The biggest risks to security are human errors.

2015-06-21

Magnitude Exploit Kit Adobe Flash Player Vulnerability

An example of how cybercriminals rapidly take advantage of recently-patched vulnerabilities through exploit kits.

2015-06-21

Understand Mobile Deep Linking

Dozens of startups have launched around using, improving & discovering deep links. So, what are deep links and where did they come from?

2015-06-19

What’s in the New UK Surveillance Bill?

The government intend wholesale reform but will it perpetuate invasion of privacy or put an end mass surveillance?

2015-06-19

Got Good Cyber Insurance Cover? Beware of Holes in Your Policy.

Just because you have “cyber insurance” doesn't mean your insurer will pay a cyber-related claim.

2015-06-18

Digital Currencies: A Gold Standard for Bitcoin

Bitcoin-like currencies backed by the yellow metal show promise for crisis-scarred libertarians.

2015-06-17

UK MOD to Build Open Source Analytics Platform

The MOD wants a new open source analytics platform to help understand its data.

2015-06-16

Australia is 'one of most aggressive' in Mass Surveillance

Snowden supporters say Australia’s new data retention laws are 'dangerous'.

2015-06-16

Hackers Offered $1k for Vulnerabilites Found in Drupal 8

The Drupal security team are turning to white hat hackers to get higher levels of security.

2015-06-16

Flash Player Attacked in Latest Cyber-Crime

Hackers' persistent attacks on Adobe Flash Player's obsolete editions get worse.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Security Guru

IT Security Guru

IT Security Gurus publish daily breaking news. interviews with the key thinkers in IT security, videos and the top 10 stories as picked by our Editor.

CROW - University of Waikato

CROW - University of Waikato

CROW is the first cyber security lab established in a New Zealand educational institution at the University of Waikato.

Cavirin

Cavirin

Cavirin’s Automated Risk Analysis Platform reduces risk and automates security and compliance.

Bericon Forensics

Bericon Forensics

Bericon is one of the longest established forensic science consultancies in the UK. Activities include computer and mobile phone forensics.

Careers in Cyber Security (CiCS)

Careers in Cyber Security (CiCS)

CareersinCyberSecurity is a leading global job board and career resource for Cyber Security, IT Audit, Technology Risk and Data Protection professionals.

Epati Information Technologies

Epati Information Technologies

ePati Information Technologies is a specialist in information technology and cyber security.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

Global Incubator Network Austria (GIN Austria)

Global Incubator Network Austria (GIN Austria)

GIN Austria is the connecting link between Austrian and international startups, investors, incubators and accelerators with a focus on selected hotspots in Asia.

CYBER.ORG

CYBER.ORG

CYBER.ORG's goal is to empower educators as they prepare the next generation to succeed in the cyber workforce of tomorrow.

CloudSphere

CloudSphere

CloudSphere’s flagship Cloud Governance Platform enables enterprises and cloud service providers to simplify and optimize cloud migration, management, and governance.

Rayzone Group

Rayzone Group

Rayzone Group offers a wide range of Cyber Security solutions and services, providing hollistic protection suitable for both enterprises and National cyber security centers.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

DeXpose

DeXpose

DeXpose is a hybrid dark/deep web monitoring and attack surface mapping platform to help you find compromised data or exposed assets related to your organization way before threat actors.

Waterleaf International

Waterleaf International

Waterleaf provide advanced network and cybersecurity solutions - informed by data sciences. Transforming Connectivity, Security and Information for Municipalities, Government & Enterprise.

Chorology

Chorology

Chorology is a leading provider of intelligently automated, data compliance and posture enforcement solutions.

ioSENTRIX

ioSENTRIX

ioSENTRIX offers tailored, risk-focused assessments that reduce true business risk.