TECHNOLOGY > > Hackers


« Back to News

2016-03-22

North Korea Denies Cyber Attacks On South Korea

North Korea denies it conducted cyber attacks against officials from rival South Korea, calling the South's accusation that it did so a "fabrication".

2016-03-23

Ukraine Blackout – The Future Of War

To see how cyber will play into armed conflict, look no further than the attacks on the Ukrainian energy sector.

2016-03-15

Hard Lessons From The Cyberattack On Ukraine

Investigation into cyberattacks that caused rolling blackouts in Ukraine reveal how vulnerable power suppliers are to malware.

2016-03-08

Many Organisations Are Too Lax About Mobile Data Threats

Mobile devices can be a critical part of any cyber attack and mobile data breaches are more common than you might think.

2016-03-04

ISIS Hack The Wrong Google

Hackers affiliated with ISIS who promised to take down Google appear to have mistakenly attacked the wrong target.

2016-02-29

Retailers Are Hardest Hit by Malware

Those in the retail sector who have not yet suffered a breach may see one in the near future.

2016-02-29

Cyberattack Paralyzed U.S Hospital

Doctors have been locked out of patient records for more than a week by hackers who are demanding money to release the data.

2016-02-29

Android Banking Trojan Xbot Is Also Ransomware

New Android malware steals online banking credentials and can hold a device's files hostage delivering a particularly nasty one-two punch.

2016-03-01

Cybercrime: Is the Sky Really Falling?

Cybercrime is so rampant today that no-one is immune. Not even the chief examiner for Digital Forensics Inc, Daniel Libby.

2016-03-01

Belgian Government Plagued By Hackers

Latest Incident: Hackers claim to have made a successful DDoS attack on the Belgian National Bank, shutting down the bank’s website.

2016-02-24

Know Your Enemy: The Most Popular Hacking Methods

The Easy Way: Outsiders want to become insiders with the least possible effort, and insiders help them do so - mostly accidentally.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer SIT is a research centre specialising in all areas of IT security.

Armadillo Sec

Armadillo Sec

Armadillo provide penetration testing and vulnerability assessment services.

Axis Capital

Axis Capital

AXIS Insurance’s Professional Lines Division is a leading underwriter of technology/cyber coverage and other specialty products around the globe.

Securely

Securely

Securely Ltd. is an IT consulting and services firm specializing in PKI solutions and products.

Infosistem

Infosistem

Infosistem is a Croatian ICT company with extensive expertise and experience in enterprise and SMB ICT projects and solutions.

Department of Justice & Equality - Cybercrime Division

Department of Justice & Equality - Cybercrime Division

The Cybercrime division is responsible for developing policy in relation to the criminal activity and coordinating a range of different cyber initiatives at national and international level.

HiScout

HiScout

HiScout is your integrated management system for IT governance, risk & compliance.

ClearShark

ClearShark

Since 2001, ClearShark has been a go-to adviser in the U.S. Public Sector for creating customized and integrated solutions for the most secure of networks.

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

National Coordinator for Security and Counterterrorism (NCTV) - Netherlands

The NCTV serves the Netherlands’ national security. We protect national interests, identify threats and strengthen resilience.

American Technology Services (ATS)

American Technology Services (ATS)

American Technology Services provides unparalleled services in information technology to support small and mid-sized business. From top-level strategy, to managed services and infrastructure support.

Positka FSI Pte Ltd

Positka FSI Pte Ltd

Positka, being a Splunk Singapore partner, provides Splunk & Phantom Services, Cybersecurity & Risk Management, Analytics & Big Data, Lean Process Optimization, and Managed Security Services.

Cyber Explorers

Cyber Explorers

Cyber Explorers is a fun, free and interactive learning platform for future digital superstars. An exciting addition to UK curriculum delivery or after school activities.

Avatar Managed Services

Avatar Managed Services

Avatar offers proven, process driven IT support to companies who want to utilize their technology to their best advantage.

GetReal Security

GetReal Security

GetReal Security is the world’s leading authority on malicious digital content and deepfake protection.