TECHNOLOGY > > Hackers


« Back to News

2015-04-27

Iran’s Cyber Attacks Are Getting Much More Sophisticated

“Cyber gives Iran a usable weapon, in ways nuclear technology does not”

2015-04-25

Russian Hackers Use Flash Zero-Day Flaws

Russian hacking group APT 28 attacked an "international government entity", using unpatched software flaws.

2015-04-23

Gang Warfare: Hacking Groups Clash In Cyberspace

Elite Cyber Crime Group Strikes After Attack by APT Gang

2015-04-23

Leading Belgian Newspaper Hit by Cyber Attack

Le Soir threatened after re-publishing controversial cartoons from the French satirical magazine Charlie Hebdo.

2015-04-21

How Syrian Electronic Army Hacked Email Accounts of Assad’s Opponents

The group of hackers aligned with Syrian President Bashar al-Assad have been busy.

2015-04-22

Russia's Cyber Attacks Grow More Brazen

Russia has ramped up cyber attacks against the United States to an unprecedented level.

2015-04-16

China’s Cyber Attacks on Governments and Corporates in Asia

The Chinese government is accused of being behind a newly discovered set of cyber attacks across Southeast Asia over the past ten years.

2015-04-22

Wi-Fi on Planes is Vulnerable to Inflight Hacking

Hackers on commercial flights could now bring down the plane they are on by using the on board Wi-Fi.

2015-04-14

French Media’s Emergency Meeting After Isis Hack

Crisis: All TV5Monde broadcasts were brought down in a blackout by hackers claiming allegiance to Isis.

2015-04-14

Seeing Your Business Through the Eyes of a Hacker

Attacks are growing more sophisticated and more damaging. Companies need to take a different approach.

2015-04-09

How Credible is the Anonymous Threat to Israel?

Anonymous threaten to "erase Israel from cyberspace."

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Astra

Astra

Astra's website security solution provides real-time protection against malware, hackers, SQLi, XSS, DDoS, LFI and RFI.

Karamba Security

Karamba Security

Karamba provide an IoT Security solution for ECUs in automobiles which ensures that all cars are protected (not just autonomous cars).

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

Competence Center for Applied Security Technology (CAST)

Competence Center for Applied Security Technology (CAST)

CAST offers a range of services in the field of secure modern information technology and a contact point for all questions regarding IT security.

Data Shepherd

Data Shepherd

Data Shepherds primary focus is to protect your business. We achieve this by offering extensive and unique expertise in innovative IT and Cyber security solutions.

Digital Security

Digital Security

Digital Security is an Ecuadorian company specialized in providing comprehensive information security solutions.

Oceania Cyber Security Centre (OCSC)

Oceania Cyber Security Centre (OCSC)

OCSC engages with government and industry to conduct research, develop training opportunities and build capacity for responding to current and emerging cyber security issues.

Digital Fingerprints

Digital Fingerprints

Digital Fingerprints provides continuous authentication with behavioural biometrics. Protection against account takeover and session takeover. Compliant with GDPR and PSD2.

Veratad Technologies

Veratad Technologies

Veratad Technologies, LLC is a world class provider of online/real-time Identity Verification, Age Verification, Fraud Prevention and Compliance Solutions.

Netstar

Netstar

Netstar is an IT Support company based in Central London providing fully managed IT Support, Cyber Security and Technology Consulting services.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

eCentre@LindenPointe

eCentre@LindenPointe

The eCenter@LindenPointe provides assistance to the development, management and promotion of STEM (Science, Technology, Engineering, Mathematics) related business ventures.

ASPIA InfoTech

ASPIA InfoTech

ASPIA Infotech is a leading Information and cybersecurity organization focused on innovative approaches to avert targeted attacks.

Dion Training Solutions

Dion Training Solutions

Dion Training Solutions offer comprehensive training in areas such as project management, cybersecurity, agile methodologies, and IT service management.

Doherty Associates

Doherty Associates

Drawing on our deep industry knowledge and business insight, Doherty deliver intelligent IT solutions and services that help people work more securely, more productively and more creatively.

SecuCenter

SecuCenter

Secucenter is a trusted partner for SOC services, offering security expertise in a cost-effective way.