TECHNOLOGY > > Hackers


« Back to News

2016-11-01

US Has A Strategy To Defend Against Another Massive IoT Attack

The US Dept. of Homeland Security is working fast to find ways to prevent another DDOS service attack like the one that occurred on October 22nd.

2016-10-31

Decrypting the Dark Web

Data analysis can highlight the trends in communication between bad actors who gather in underground forums across the Dark Web.

2016-10-31

Future Of Security: Connect Cyber With Physical Defence

With more items gaining web connectivity as part of the IoT trend, organisations cannot afford to separate physical security from cybersecurity.

2016-10-31

Work Traveling - You’re a Prime Hacker Target

There’s one very important thing to worry about while traveling in unfamiliar places: the security of your email.

2016-10-29

DDoS: Deceptive Denial Attacks

Increasingly sophisticated techniques deployed by attackers using DDOS methods are making the reported size of such attacks redundant.

2016-10-28

Smartphone “Video Jacking” From Power Sockets

Major smartphone brands are vulnerable to the hacking threat called “video jacking' when plugged into public charging stations.

2016-10-27

How To Win The Cyberwar Against Russia

Russia’s election-year hacking of the US political system is an unprecedented situation for the American national security establishment.

2016-10-27

Meet The Fancy Bears

A mysterious group of Russian hackers, known by several different names, are perpetrating a string of high profile and politically motivated hacks.

2016-10-25

Who Is Trying To Disrupt The Internet?

A prolonged Internet outage affecting major sites raises a real concern that this is just a practice run for more widespread internet disruption.

2016-10-25

Russian Citizen Charged With Hacking LinkedIn

A Russian man has been charged with stealing information from computers at LinkedIn and other San Francisco Bay Area companies.

2016-10-26

Media Vulnerable To Election Night Cyber-Attack

US media organisations have failed to properly protect their newsrooms which are vulnerable to a chaos-creating hack around Election Day.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Perforce Software

Perforce Software

Perforce helps companies build complex software products more collaboratively, securely, and efficiently.

Cyber Together

Cyber Together

Cyber Together is dedicated to advancing the cyber security industry by giving businesses access to Israel’s leaders, innovators and great minds in the field of cyber security.

Materna Virtual Solution

Materna Virtual Solution

Materna Virtual Solution security solutions enable user-friendly, secure mobile working environments.

Exatel

Exatel

Exatel is Poland’s leading provider of ICT security services.

VKANSEE

VKANSEE

VKANSEE offer the world's thinnest optical fingerprint sensor for mobile device protection.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Ensconce Data Technology (EDT)

Ensconce Data Technology (EDT)

EDT’s focus is on providing solutions to properly sanitize Solid State Drives (SSD) and Magnetic Drives (HDD) before they are disposed or redeployed.

Dale Peterson

Dale Peterson

Dale Peterson, a leading ICS security and control system IT information expert, provides consulting services to assess and improve the security of SCADA and DCS.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

FortifyData

FortifyData

FortifyData is the next generation of cyber risk management–a comprehensive platform that continuously evaluates your third-party, internal and people risks.

Britive

Britive

The Britive Platform is a cloud-native security solution built for the most demanding cloud-forward enterprises.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

Secura B.V.

Secura B.V.

Secura is an independent specialized cybersecurity expert, providing insights to protect valuable assets and data.

KryptoKloud

KryptoKloud

KryptoKloud offer a suite of Managed Services including Security Monitoring and Incident Response as well as a full portfolio of Compliance, Governance and Audit solutions.

Heyhack

Heyhack

Heyhack is a SOC 2 Type II certified automated penetration testing platform for web apps and APIs.

Vana Solutions

Vana Solutions

Vana Solutions is an Information Technology Services company. We help commercial & federal organizations select, adapt, and integrate the right technology solution so you can move faster.