TECHNOLOGY > > Hackers


« Back to News

2015-07-27

Hundreds of Thousands' of Vehicles At risk of Attack

Chrysler contemplate mass recall & software update to protect recent model Jeeps from remote control takeover.

2015-07-27

Dating Website Admits Hackers Have Stolen Data on Millions

Impact Team: Ashley Madison dating is website is thoroughly hacked for personal data for 37m people.

2015-07-24

Hacking Team's Malware Uses a UEFI Rootkit

A Hacking Team tool that can modify a computer’s UEFI (Unified Extensible Firmware Interface) even after the hard drive is wiped.

2015-07-25

Finland – Prolific Hacker Arrested & Sentenced

Julius Kivimaki found guilty of 50.700 “instances of aggravated computer break-ins” affecting Harvard, MIT & a host of companies.

2015-07-24

UK Government £1m scheme for SMEs to Fight Cyber Attacks

Protecting businesses against cyber attack and making the UK the safest place in world to do business online.

2015-07-21

The Top Five Cyber Security Vulnerabilities

InfoSec Institute's Top Tips: Five Keys Areas of Vulnerability.

2015-07-21

Adobe Tackles New Flash Threat After Hacker Team Leak

Holes in Adobe Flash only come to light following Hacking Team data dump.

2015-07-21

Cyberwarfare is Common in Russia

Hacker Hell: It's a virtual civil war ...

2015-07-17

The Right for Privacy in a World Where Everything is Shared

The latest revelations about Hacking Team, its products & it its clientele seem to shock everyone. Lets’ see how truly shocking this is.

2015-07-07

‘Great Cannon’ China’s Weapon Shoots Down Internet Sites

‘Great Cannon’ is a powerful tool built to intercept data and redirect it to specific websites.

2015-07-08

Biter Bitten: The Hacking Team Hit by Breach

One of the most elusive spyware and malware providers to government agencies has been hit by hackers.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Business Intelligence Associates (BIA)

Business Intelligence Associates (BIA)

BIA's TotalDiscovery is a defensible and cost-effective corporate preservation and legal compliance software solution.

Lloyd's

Lloyd's

As an insurance market, Lloyd’s can provide access to more than 65 expert cyber risk insurers in one place.

CyberSmart

CyberSmart

CyberSmart is a platform that allows you to maintain compliance, achieve certification and secure your organisation.

idappcom

idappcom

idappcom provides unique industry approved software solutions for auditing and enhancing the threat recognition and response capabilities of your corporate security defences.

Cobalt Labs

Cobalt Labs

Pen Testing as a Service for Modern SaaS Businesses. Cobalt is redefining the modern pen test for companies who want serious hacker-like testing built into their development cycle.

exceet Secure Solutions

exceet Secure Solutions

exceet Secure Solutions is your experienced specialist for Internet of Things (IoT), Heath Telematics, electronic signatures and timestamps and IT security.

Wüpper Management Consulting (WMC)

Wüpper Management Consulting (WMC)

Specialized in compliance, risk management and holistic information security WMC GmbH has longtime implementation experience in global projects.

XLAB

XLAB

XLAB is an R&D company with a strong research background in the fields of distributed systems, cloud computing, security and dependability of systems.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

AVORD

AVORD

AVORD is a cloud-based security testing platform that allows clients to manage security testing requirements in a far more productive and efficient way.

Bl4ckswan

Bl4ckswan

Bl4ckswan is a Management Consulting firm specialized in the delivery of information security and compliance services.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance (PIRC)

Partners in Regulatory Compliance provides an array of cybersecurity services including cybersecurity policy management, risk assessments and regulatory compliance consulting.

Falconfeeds

Falconfeeds

Falconfeeds empowers businesses and security professionals with immediate access to the latest and historical threat intelligence data.

Tracer

Tracer

Tracer (formerly Appdetex) is a next-generation brand protection solution. It constantly finds, analyzes, and stops brand abuse across Web2 and Web3 digital channels.

Tosibox

Tosibox

Tosibox mission is to Safeguard Critical OT Environments with a Purpose-Built Cybersecurity Platform.