TECHNOLOGY > > Hackers


« Back to News

2015-10-07

Six Emerging CyberSecurity Risks

NY Cyber Security Summit: A panel of experts recently discussed emerging cybersecurity risks. Here is what you need to know.

2015-10-07

'Hackers for Hire'- Major Police Effort To Fight Criminal Gangs.

A “small number” of hackers offer "cybercrime as a service” creating a market a for criminal gangs to bid for targets to be attacked.

2015-10-05

Why Is China Hacking Norway?

Half of all cyber intrusions in the Nordic states target Norwegian companies and Norway seems to be the main target of Chinese hackers.

2015-10-02

U.S & China Talk Truce But Cyber War Remains

James Clapper, Director of National Intelligence, tells U.S Senate hearing on cybersecurity that he is not optimistic about the agreement.

2015-09-29

The Differences Between Targeted Attacks and Advanced Persistent Threats

Very different and equally nasty, dealing with either of them calls for prudent strategy and dedication.

2015-09-29

8 Ways to Fend Off Spyware

Spyware, malware, phishing and, more recently, ransomware - the list of online threats can be confusing and daunting.

2015-09-23

Hackers Can Spy on Every Mobile

There is a security hole in modern telecommunication systems that allows cyber criminals to listen in & to read text messages.

2015-09-22

Vodafone Leaked Email on 'hacking' of Reporter

Vodafone Australia under pressure over the potentially unlawful access of private phone records to track down a journalist’s source.

2015-09-21

Iran and Saudi Marching To Cyber War!

As the two powers vie for regional dominance in Yemen and Syria they have begun using cyber attacks to release critical intelligence.

2015-09-16

Five Months After the OPM Attack.

The 21.5 million victims of the largest known U.S government breach will just begin receiving their notifications at the end of September.

2015-09-16

Russia & China Use Hacked Databases to Find US Spies

Foreign intelligence agencies are reportedly crosschecking hacked databases & compromised information for evidence.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

IBackup

IBackup

IBackup is a Web Based Online Backup service provider.

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

Cybellum

Cybellum

Cybellum brings the entire product security workflow into one dedicated platform, allowing device manufacturers to keep the connected products they build cyber-secure and cyber-compliant.

NetLib Security

NetLib Security

NetLib Security’s powerful, patented data security platform helps companies control data loss prevention (DLP) by managing what data can be transferred outside of their network.

Office of the National Security Council (UVNS) - Croatia

Office of the National Security Council (UVNS) - Croatia

UVNS coordinates, harmonizes the adoption and controls the implementation of information security measures and standards in the Republic of Croatia.

Pentest People

Pentest People

Pentest People are a UK-based security consultancy focussing on bringing the benefits of Pentesting as a Service (PTaaS) to all its clients.

NFIR

NFIR

NFIR is a specialist in the field of cyber security incident response and digital forensics.

GuardSI

GuardSI

GuardSI was created to protect companies from growing threats to security such as fraud, hacking, internal theft, accidents and human mistakes that can directly affect the business.

Eaton

Eaton

Eaton provides comprehensive cybersecurity services for operational technology (OT) to help keep your operations and personnel safe.

Hawk Network Defense

Hawk Network Defense

HAWK.io is the First Fully Automated, Multi-Tenant, Cloud-Based, MDR Service Company.

InfusionPoints

InfusionPoints

InfusionPoints is your independent trusted partner dedicated to assisting you in building your secure and compliant business solutions.

Akamai Technologies

Akamai Technologies

Akamai's leading security, compute, and delivery solutions are helping global companies make life better for billions of people, billions of times a day.

Infoline Tec Group Berhad

Infoline Tec Group Berhad

Infoline Tec Group Berhad is principally involved in providing IT infrastructure solutions, cybersecurity service provider and solutions, managed IT and other IT services.

CXI Solutions

CXI Solutions

CXI Solutions: Your trusted partner in cybersecurity. We offer a full range of cybersecurity solutions to protect your business from digital attacks and virtual threats.

Continent 8 Technologies

Continent 8 Technologies

Continent 8 Technologies is the leading provider of managed hosting, connectivity, cloud and cybersecurity solutions to the global online gambling industry.

Digital Twin Consortium (DTC)

Digital Twin Consortium (DTC)

Digital Twin Consortium is a global ecosystem of users who are driving best practices for digital twin usage and defining requirements for new digital twin standards.