TECHNOLOGY > > Hackers


« Back to News

2016-02-05

US Critical Infrastructure Is At Cyber Risk

Modern warfare or crime fighting is not just about bullets, bombs and missiles in physical space. It’s also about hacking in cyber space.

2016-02-03

10 Most Notorious Hacking Groups

Hacking has grown massively in the past few years and has become professional. Who are the 10 of the most notorious hacking groups so far?

2016-01-29

Ukraine’s Power Grid Attacked By Russia

Highly destructive malware that infected at least three regional power authorities in Ukraine

2016-01-26

Ukraine Is Blaming Russian State Sponsored Hackers

The Ukrainian Government is suffering a series of power outages likely caused by cyber attacks caused by Russian hackers.

2016-01-26

‘I Hacked Citrix’ - Mystery Russian ‘w0rm’

Citrix, a US software company, specialising in virtualisation & cloud computing, has been compromised by a Russian hacker called w0rm.

2016-01-31

ISIS Hackers Join Forces with AnonGhost

Hackers supportive of the Islamic State militant group (ISIS) have teamed up with the Pro-Palestinian hacking group AnonGhost.

2016-01-27

When ISIS Turns to Cyber Warfare

A US cybersecurity software firm PKWare has made predictions for potential computer attacks in the US and the forecast is scary.

2016-01-25

US Says China Stole Military Robot Designs

Chinese army allegedly hacked a QinetiQ specialist who worked on embedded software in microchips that control military robots.

2016-01-21

Russian Hackers Warn EU Trains Are Vulnerable to Hijack

Russian hackers have exposed gaping holes in computer systems that control train networks across Europe.

2016-01-13

Indian ‘Black Hats' Hack Pakistani Websites

A group of Indian hackers hacked and vandalized seven Pakistani websites including that of Pakistani Lawyers' Bar Council.

2016-01-13

Cyber Security In Modern Railways

Railways are part of national critical infrastructure. New research identifies a long list of security issues affecting railroad systems.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Roka Security

Roka Security

Roka Security is a boutique security firm specializing in full-scale network protection, defending against advanced attacks, and rapid response to security incidents.

44CON

44CON

44CON is an Information Security Conference & Training event taking place in London. Designed to provide something for the business and technical Information Security professional.

ISO Quality Services Ltd

ISO Quality Services Ltd

ISO Quality Services is an independent organisation that specialises in the implementation, certification and continued auditing of ISO and BS EN Management Standards including ISO 27001..

qSkills

qSkills

QSkills is an independent training provider specialized high-quality IT and IT management training courses including IT security.

Cobalt Strike

Cobalt Strike

Cobalt Strike is penetration testing software designed to execute targeted attacks.

Trulioo

Trulioo

Trulioo is a leading global identity and business verification company providing secure access to data sources worldwide to instantly verify consumers and businesses online.

Excellium Services

Excellium Services

Excellium’s Professional Services team combines expertise and experience that complements your in-house security resources.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

Kapalya

Kapalya

Kapalya empowers businesses and their employees to securely store sensitive files at-rest and in-transit across multiple platforms through a user-friendly desktop and mobile application.

Outsource UK

Outsource UK

Outsource UK is an independent recruitment company supplying highly-skilled technology, change and engineering talent to clients within a range of specialist sectors including Cyber Security.

BlackCloak

BlackCloak

BlackCloak provides Concierge Cyber Security for high-net-worth individuals and corporate executives to protect them from cybercrime, reputational risks, hacking and identity theft.

Cyber Ireland

Cyber Ireland

Cyber Ireland brings together Industry, Academia and Government to represent the needs of the Cyber Security Ecosystem in Ireland.

1898 & Co

1898 & Co

Keep your critical assets secure with a comprehensive portfolio of services from high-level assessments to fully managed security services designed for operational technology applications.

Navisite

Navisite

Navisite is a combination of eight respected IT consulting and managed service providers that were brought together under the Navisite brand.

ACL Digital

ACL Digital

ACL Digital, an ALTEN Group company, is a leader in design-led digital experience, innovation, enterprise modernization, and product engineering services converging to Technology, Media & Telecom.

Exalens

Exalens

With deep roots in AI-driven cyber-physical security research and intrusion detection, at Exalens, we are enhancing operational resilience for cyber-physical systems at the OT edge.