TECHNOLOGY > > Hackers


« Back to News

2015-08-26

Six Ways Cyber Attackers Are Changing Tactics

Adversaries are becoming more sophisticated not only in their approaches to launching attacks, but also in evading detection.

2015-08-26

NSA Map Shows China Cyber Attacks on US

More than 600 corporate, private or government "Victims of Chinese Cyber Espionage"

2015-08-26

Hacker Cracks Satellite Communications Network

The Globalstar satellite network uplink was hacked using a simple software-defined radio system & parts costing less than $1,000

2015-08-25

Bitdefender Suffers Data Breach, Customer Records Stolen

Bitdefender has become the latest cybersecurity firm to be targeted by hackers.

2015-08-21

When Your White Hat Is Really a Black Hat

Can you really trust all the people working for your company (or hired contractors) to protect sensitive data?

2015-08-14

Sun Tzu 2.0: Is CyberWar the new Warfare?

The dynamics of warfare are changing along with the threat landscape. How do nations fight a cyber-battle?

2015-08-14

The Robots Taking Your Job Could Get You Killed

Poorly implemented automation in chemical & pharmaceutical plants is highly vulnerable to a catastrophic cyber attack.

2015-08-14

Switzerland & Austria Investigate Claims of Electronic Spying at Iran Talks

A computer virus was used to spy on the recent high-level Iran nuclear talks. Who would do that?

2015-08-14

Hackers Target Internet Address Bug to Disrupt Sites

A recently identified bug allows attackers to crash software, taking the DNS service offline & preventing URLs from working.

2015-08-14

The NSA Playset: 5 Better Tools To Defend Systems

Cutting edge security tools made accessible & easier to use, tapping into the open source software community.

2015-08-07

Spyware Demo Shows how Spies Hack Mobiles

Stolen Hacking Team mobile hacking software was recently published on the web. It works.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

InfoSec People

InfoSec People

InfoSec People is a boutique cyber and technology recruitment consultancy, built by genuine experts.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Modulo Security

Modulo Security

Modulo provides automated Governance, Risk, and Compliance (GRC) solutions.

SMESEC

SMESEC

SMESEC is a lightweight Cybersecurity framework for protecting small and medium-sized enterprises (SME) against Cyber threats.

Cybersecurity Manufacturing Innovation Institute (CyManII)

Cybersecurity Manufacturing Innovation Institute (CyManII)

CyManII was established to create economically viable, pervasive, and inconspicuous cybersecurity in American manufacturing to secure the digital supply chain and energy automation.

Trail of Bits

Trail of Bits

Trail of Bits combine high-end security research with a real-world attacker mentality to reduce risk and fortify code.

Evalian

Evalian

Evalian is a data protection services provider. Working with organisations of all sizes, we specialise in Data Protection, GDPR, ISO Certification & Information Security.

Fluid Attacks

Fluid Attacks

Fluid Attacks specialize in red team operations as well as technology development that continuously enhance our security testing services.

Gunnison Consulting Group

Gunnison Consulting Group

Gunnison Consulting Group serves the Federal Government with high quality IT consulting services.

CFTS

CFTS

CFTS 'Computer Facilities Technical Services' is a Ugandan ICT Support Company that specialises in infrastructure and support services including network security.

Core4ce

Core4ce

Core4ce is a mission-oriented company that serves as a trusted partner to the national security community.

Eviden

Eviden

Eviden is an Atos business that brings together its digital, big data and security business lines. It will be a global leader in data-driven, trusted and sustainable digital transformation.

Simpson Associates

Simpson Associates

Simpson Associates is a Data Transformation and managed services provider that helps organisations gain valuable insights from their data and make better-informed decisions.

Orchid Security

Orchid Security

Orchid Security provides unprecedented insight and action to your identity security with the help of advanced technologies like Large Language Models (LLM).

DOT Security

DOT Security

DOT Security provides advanced security services for businesses of all sizes.

DevOcean

DevOcean

DevOcean, the leader in Cybersecurity Exposure Remediation, helps organizations cut through the chaos by automatically consolidating, prioritizing, and streamlining fixes.