TECHNOLOGY > > Hackers


« Back to News

2015-11-12

Spyware Rises in Popularity with Governments

FinFisher was being used for activities beyond tracking criminals.

2015-11-04

RBS Says Most Scam Victims Recover Nothing

The bank is not generally responsible for fraud, unless their advice, delays or other errors have resulted in the money being stolen.

2015-11-04

Stolen Credit Card Details Cost £1 Online

In the wake of the TalkTalk cyber-attack credit card details are on sale online for as little £1 each as fears rise over the security of personal data

2015-11-03

EU Will Fund Car, Hospital & Airport IT Security

ENISA is stepping up to address numerous threats to critical infrastructure and help governments & businesses plan their response.

2015-10-28

Hackers Compromise Cisco Web

Malicious, data stealing JavaScript injected in the Cisco Web VPN login page of targeted organizations is hosted on legitimate sites.

2015-10-28

Banks Under Constant Hacker Attacks

When Hackers are looking to steal as much money as possible as quickly as possible, they go where the money is.

2015-10-30

China Still Hacking US Firms Despite Xi’s Vow

Chinese government hackers have attempted to penetrate US company networks despite a pledge they would not do so.

2015-10-30

FBI Say ISIS Is Going After US Vulnerabilities

The big underlying concern is a cyber attack on the power grid & other critical infrastructure.

2015-10-23

The World's First Hack: the Telegraph and the Invention of Cyber Privacy

Concern over personal data interception did not start with GCHQ and the NSA, hacking can be traced all the way back to the 19th century

2015-10-21

US Concerns Over Kremlin Links to Cyber Gangs

Moscow has long been known to source its technology, world-class hacking talent and intelligence information from cyber crime rings.

2015-10-21

Russia - NATO Cyber War Heats Up

Cyberattacks have become far more aggressive and numerous since NATO and Russia recommenced hostilities with each other.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Cybercom Group

Cybercom Group

Cybercom offers strategic advice, testing & quality assurance, security solutions, system development, integration, management and operation services.

Texplained

Texplained

Texplained specializes in security audits of microchips to identify vulnerabilities and protect against invasive cyber attacks.

Information-Technology Promotion Agency (IPA) - Japan

Information-Technology Promotion Agency (IPA) - Japan

IPA is an implementing agency in Japan with a role to address Information Security, IT Systems Reliability and IT Resource Development.

BitRaser

BitRaser

BitRaser serves your needs for a managed & certified data erasure solution that can support internal & external corporate audit requirements with traceable reporting.

Nozomi Networks

Nozomi Networks

Nozomi Networks is a leader in Industrial Control System (ICS) cybersecurity, with a comprehensive platform to deliver real-time cybersecurity and operational visibility.

Proficio

Proficio

Proficio is a world-class Managed Security Service Provider providing managed detection and response solutions, 24×7 security monitoring and advanced data breach prevention services worldwide.

Codified Security

Codified Security

Codified is a testing platform for mobile application software. We make it easier than ever for companies to detect and fix security vulnerabilities and ensure their applications are compliant.

NESECO

NESECO

NESECO is an IT security integration and consulting firm providing security products, solutions, support, consulting, and training services.

Scantist

Scantist

Scantist is a cyber-security spin-off from Nanyang Technological University (Singapore) which leverages its expertise to provide vulnerability management solutions to enterprise clients.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Glocomp Systems

Glocomp Systems

Glocomp Systems is one of Malaysia’s premier ICT infrastructure distributor offering a comprehensive portfolio of solutions including cybersecurity and privacy.

Curity

Curity

The Curity Identity Server brings identity and API security together, enabling highly scalable and secure user access to digital services.

Mondoo

Mondoo

Mondoo is a powerful security, compliance, and asset inventory tool that helps businesses identify vulnerabilities, track lost assets, and ensure policy compliance across their entire infrastructure.

Strategic Technology Solutions (STS)

Strategic Technology Solutions (STS)

Strategic Technology Solutions specialize in providing Cybersecurity and Managed IT Services to the legal industry.

Tamnoon

Tamnoon

Tamnoon is the Managed Cloud Detection and Response platform that helps you turn CNAPP and CSPM alerts into action and fortify your cloud security posture.

Pontiro

Pontiro

At Pontiro, we are enabling a new era of data-sharing. Bridging the gap between protected data and valuable insights through the use of cutting edge Homomorphic Encryption.