Widgetized Section

Go to Admin » Appearance » Widgets » and move Gabfire Widget: Social into that MastheadOverlay zone

Home » Archives by category » SECURITY INFORMATICS » Law Enforcement

Spora: dangerous criminal malware. Is ISIS behind it?

Spora: dangerous criminal malware. Is ISIS behind it?

Nowadays, ransomware has become the most dangerous type of criminal malware. Most of the new families are prepared by amateurs (script-kiddies) and they are distributed on a small scale. Inside…

New law: Metadata must be kept for two years by Australian telecoms.

New law: Metadata must be kept for two years by Australian telecoms.

Large amounts of telecommunications metadata must now be kept for two years by Australian telecommunications companies, under a new law which came into effect last week. READ ARTICLE HERE…

To counter PRC attacks, Taiwan and U.S. conducting cyber security drill.

To counter PRC attacks, Taiwan and U.S. conducting cyber security drill.

Taiwan wants to join a major anti-hacking drill conducted by the United States to strengthen cyber security ties with its staunchest ally, its vice premier said on Monday, a move…

Secure cloud in Australia: more interaction, encryption, tighter rules, real-time monitoring.

Secure cloud in Australia: more interaction, encryption, tighter rules, real-time monitoring.

Most of the total data in the world today (90%) has been created in the period 2011-2013, and 2014 and beyond will see exponentially increase of data. Australia has put…

New Zealand company Wynyard Group launched crime analytics software.

New Zealand company Wynyard Group launched crime analytics software.

Recently, the New Zealand company Wynyard Group launched a crime analytics software that has the capability of expanding its global network.   Wynyard is teaming up with the British firm…

Recently confiscated American microchips, shows China´s challenging United States.

Recently confiscated American microchips, shows China´s challenging United States.

As China rises to challenge the United States as a power in the Pacific, American officials say  in ways that not only compromise weapons systems but also enable it to…

New Zealand and Australia sharing more biometric info with U.S. Homeland Security.

New Zealand and Australia sharing more biometric info with U.S. Homeland Security.

The Homeland Security Department’s five-month-old Office of Biometric Identity Management OBIM will use a $33 million contract with Accenture to expand its international data sharing capabilities and widen its secure…

Hong Kong also threatened by Chinese hackers.

Hong Kong also threatened by Chinese hackers.

Security experts have warned multinationals with bases in Hong Kong that they are not immune to cyber attack from China despite the shared sovereignty between the Special Administrative Region (SAR)and…

U.S. Pacific goals: contain China and North Korea.

U.S. Pacific goals: contain China and North Korea.

The U.S. Defense Secretary Leon Panetta, speaking at an annual security forum in Singapore, announced the U.S. strategy for The Pacific region: to contain China’s emergence as a global power.…

Papua New Guinea´s Army: We are ready!

Papua New Guinea´s Army: We are ready!

  WE are ready!” That was the emphatic statement of confidence delivered by the Police and Papua New Guinea Defence Force soldiers in Lae on Saturday about their role in…

Page 1 of 212