TECHNOLOGY > > Hackers


« Back to News

2015-07-24

Hacking Team's Malware Uses a UEFI Rootkit

A Hacking Team tool that can modify a computer’s UEFI (Unified Extensible Firmware Interface) even after the hard drive is wiped.

2015-07-25

Finland – Prolific Hacker Arrested & Sentenced

Julius Kivimaki found guilty of 50.700 “instances of aggravated computer break-ins” affecting Harvard, MIT & a host of companies.

2015-07-24

UK Government £1m scheme for SMEs to Fight Cyber Attacks

Protecting businesses against cyber attack and making the UK the safest place in world to do business online.

2015-07-21

The Top Five Cyber Security Vulnerabilities

InfoSec Institute's Top Tips: Five Keys Areas of Vulnerability.

2015-07-21

Adobe Tackles New Flash Threat After Hacker Team Leak

Holes in Adobe Flash only come to light following Hacking Team data dump.

2015-07-21

Cyberwarfare is Common in Russia

Hacker Hell: It's a virtual civil war ...

2015-07-17

The Right for Privacy in a World Where Everything is Shared

The latest revelations about Hacking Team, its products & it its clientele seem to shock everyone. Lets’ see how truly shocking this is.

2015-07-07

‘Great Cannon’ China’s Weapon Shoots Down Internet Sites

‘Great Cannon’ is a powerful tool built to intercept data and redirect it to specific websites.

2015-07-08

Biter Bitten: The Hacking Team Hit by Breach

One of the most elusive spyware and malware providers to government agencies has been hit by hackers.

2015-06-30

Cyberwars Between Nations Are Difficult to Prove

The OPM attack is merely the latest of a number of high-profile hacking attacks and attributing blame is a challenge.

2015-06-29

The Cybersecurity Company Helping Sony Fend Off Hackers

Bad news for everyone else is excellent news for those in the business of fighting such cyber villains.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Itaccel

Itaccel

IT Accel began a decade ago as a band of technical recruiters who wanted to bring our experience and depth of knowledge to solving complex human resou

Trust Guard

Trust Guard

Trust Guard services provide complete security for your website.

Engage Black

Engage Black

Engage Black provides solutions for securing and protecting cryptographic keys, data at rest, and data in motion.

Security Network Munich

Security Network Munich

Security Network Munich brings together leading players in the field of information and cyber security through joint research and innovation projects.

Uniscon

Uniscon

Uniscon is a leading provider of cloud security solutions in Europe.

CyberVista

CyberVista

CyberVista is a cybersecurity training education and workforce development company. Our mission is to eliminate the skills gap by creating job ready professionals.

Infowhiz solutions

Infowhiz solutions

Infowhiz provides solutions for backup/disaster recovery and network security.

Canadian Institute for Cybersecurity (CIC)

Canadian Institute for Cybersecurity (CIC)

The Canadian Institute for Cybersecurity (CIC) is a comprehensive multidisciplinary training, research and development, and entrepreneurial unit.

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

Spohn Solutions

Spohn Solutions

Spohn combines highly-experienced staff with a vendor neutral approach to deliver optimal solutions for IT Security and Compliance.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

Cybergroot

Cybergroot

Cybergroot provides Cybersecurity Assessment services and professional Information Security trainings.

SE Ventures

SE Ventures

SE Ventures provides capital to big ideas and bold entrepreneurs who can benefit from Schneider Electric's deep domain expertise, R&D assets, and global customer base.

Total Secure Technology

Total Secure Technology

Total Secure Technology provides trusted Managed IT Security and Managed IT Services for organizations looking to increase their cybersecurity defensive posture.

Nukke

Nukke

Nukke offers advanced cybersecurity software and tailored solutions for your business.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.