TECHNOLOGY > > Hackers


« Back to News

2016-06-30

For Sale: Access to 70,000 Hacked Computer Networks

Kaspersky has uncovered an online marketplace where criminals sell access to more than 70,000 hacked corporate & government servers for $6 each.

2016-06-29

Hackers Target Vulnerabilities Across US Politics

Russian hackers have burrowed deep into the US political system, sweeping in law firms, lobbyists, consultants, foundations and think tanks.

2016-06-27

British Companies Buy Bitcoins As Ransom Money

A cyber-security survey finds that one third of UK companies are buying Bitcoin in anticipation of ransomware attacks.

2016-06-21

Has The Cyber ‘Pearl Harbor’ Already Happened?

The impact of the attack on the US Office of Personnel Management reverberates and the full impact may not yet be apparent.

2016-06-19

The Use Of Intelligent Deception in Cyber Security

Hackers only need to be successful once, while organizations protecting sensitive information need to successfully thwart threats every day.

2016-06-17

Son Of Stuxnet: Irongate Malware

Newly discovered malware targeting industrial control systems has the researchers who discovered it intrigued.

2016-06-15

Tor’s Developer Leaves After Lurid Sexual Allegations

Senior Tor developer, Wikileaks hacker and Snowden advocate is forced to resign after rumors of assault emerged online.

2016-06-14

North Korea’s Psychological Cyberwar Against Its Neighbour

Zombie DDOS attacks, targeted email propaganda and planting fake news videos are all parts of a coordinated campaign against South Korea.

2016-06-13

First LinkedIn, Now Twitter ... Hacked User IDs For Sale

Hackers may have used malware to collect more than 32 million Twitter login credentials that are now being sold on the dark web.

2016-06-07

SWIFT Hackers Linked to ‘North Korean’ Lazarus Group

Symantec can link the malware used by the Sony hackers to attacks on the SWIFT interbank platform.

2016-06-03

Cybercrime Economy: The Business Of Hacking

The profile of typical cyber attackers – and the interconnected nature of their underground economy – have evolved in the last several years.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Momentum

Momentum

The Cyber Security team at Momentum offers a professional and specialist recruitment service across Cyber & IT Security.

Ammune.ai

Ammune.ai

Ammune.ai (formerly L7 Defense) helps organizations to protect their infrastructure, applications, customers, employees, and partners against the growing risk of API-borne attacks.

Combitech

Combitech

Combitech is the Nordic region’s leading cyber security consultancy firm, with about 260 certified security consultants helping companies and authorities prevent and manage cyber threats.

Telecommunications Industry Association (TIA)

Telecommunications Industry Association (TIA)

TIA works to secure trust in networks by advocating public policy positions on the security of ICT equipment and services related to critical infrastructure, supply chain and information sharing.

CSL Group

CSL Group

CSL solutions provide complete end-to-end connectivity services for Security, Fire, Telecare and other mission critical M2M/IoT applications.

Ellipsis Technologies

Ellipsis Technologies

Ellipsis Technologies is a diversified technology company that develops innovative security software for websites and online applications.

Shift Technology

Shift Technology

Shift Technology provides insurance companies with an innovative SaaS solution to improve and scale fraud detection.

Anect

Anect

Anect is a leading provider of ICT security and services for hybrid and cloud solutions.

Synelixis Solutions

Synelixis Solutions

Synelixis Solutions is a high-tech company founded to provide complete telecommunications, networking, security, control and automation solutions.

HCC Embedded

HCC Embedded

HCC’s mission is to ensure that data stored or communicated by an embedded IoT application is secure, safe and reliable.

Police Digital Security Centre (PDSC)

Police Digital Security Centre (PDSC)

PDSC is a not-for-profit organisation, owned by the police, that works across the UK in partnership with industry, government, academia and law enforcement.

Field Effect Software

Field Effect Software

Field Effect Software build sophisticated and integrated IT security, threat surface reduction, training and simulation capabilities for enterprises and small businesses.

Realsec

Realsec

RealSec is an international company and is a developer of encryption and digital signature systems and Blockchain for the Banking and Methods of Payment sectors, Government and Defense and Multisector

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

Bitdefender

Bitdefender

Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide.