TECHNOLOGY > > Hackers


« Back to News

2018-10-24

New iPhone Bug Gives Anyone Access To Your Photos

A recently discovered bug in iOS 12 allows attackers with physical access to your iPhone to access your contacts and photos.

2018-10-22

35 Million 2018 US Voter Records For Sale

Current voter registration data found for sale on a hacking forum, includes full name, phone numbers, physical addresses & voting history.

2018-10-23

How Cyber Criminals Are Using Social Media To Hack Bank Accounts

Criminals use social media to check when customers are contacting banks about problems to then pose as the bank to hack people's data.

2018-10-23

China Is 'biggest state sponsor of Cyber-Attacks on the West'

China, not Russia, has become the biggest state sponsor of cyber-attacks in its bid to steal commercial secrets, according to Crowdstrike.

2018-10-18

British National Cyber-Centre Thwarts Hostile Hackers

The NCSC say it is defeating about 10 attacks every week, mostly carried out by state-sponsored hackers employed by hostile nations.

2018-10-22

Guide To All Things Criminal On The Web

An overview of the common kinds of cybercrime, with real-world examples and suggestions for tools you can use to protect yourself.

2018-10-18

Mobile Security Threats Put Businesses At Risk

A significant lack of visibility into non-corporate devices and networks is putting businesses at risk of data leakage and phishing attacks.

2018-10-17

Cyberwars Heat Up In AsiaPac To Battle Chinese Aggression

Governments in the Asia-Pacific region are strengthening their offensive capabilities in the fight against Chinese cyberwarfare.

2018-10-18

Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods

New analysis by CrowdStrike reveals a continued blurring of lines between covert methods employed by criminals and known nation-state actors.

2018-10-16

Pentagon Weapons Systems Vulnerable To Cyber-Attacks

Issues included being able to turn a weapon on or off, affect missile targeting, adjust oxygen levels or manipulate what is seen on control screens.

2018-10-12

Canada Says It Was Targeted By Russian Cyber Attacks

Canada said it too was targeted by Russian cyber-attacks at its Center for Ethics in Sports and at the World Anti-Doping Agency.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

Quotium

Quotium

Quotium provides automated testing technologies to make business software applications secure and robust.

Echelon

Echelon

Echelon Company is a provider of information security services specializing in certification of security software and hardware products in Russia.

Absolute Software

Absolute Software

Absolute provides persistent endpoint security and data risk management solutions for mobile devices - computers, tablets, and smartphones.

Secure India

Secure India

Secure India provides Forensic Solutions that help Government and Business in dealing with prevention and resolution of Cyber related threats.

EG-CERT

EG-CERT

EG-CERT is the national Computer Emergency Response Team for Egypt.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

California Cybersecurity Institute (CCI) - Cal poly

California Cybersecurity Institute (CCI) - Cal poly

The CCI provides a hands-on research and learning environment to explore new cyber technologies and train and test tactics alongside law enforcement and cyberforensics experts.

Octane OC

Octane OC

OCTANe is building the SoCal of tomorrow. We drive innovation and growth by connecting people, resources and capital. Our Incubator focus is FinTech, Data Analytics and Cybersecurity.

FifthDomain

FifthDomain

We are a specialist cyber security education and training company tackling the global cyber security skills shortage.

Cognyte

Cognyte

Cognyte is a global leader in investigative analytics software that empowers a variety of government and other organizations with Actionable Intelligence for a Safer World.

Core Sentinel

Core Sentinel

Australia's #1 Penetration Testing Service. Make Your Systems Fully Compliant With Our OSCE CREST/CISA Certified Penetration Testing.

Harvey Nash

Harvey Nash

Harvey Nash is a leading global provider of talent and technology solutions.

Whitaker Brothers

Whitaker Brothers

Whitaker Brothers data destruction equipment can be found in 115 countries and every single continent in the world, from major military organizations to small offices.

Galvanick

Galvanick

Galvanick enables your operations and IT teams to protect your industrial systems and networks against digital threats.

YSecurity

YSecurity

At YSecurity, we simplify compliance, prevent breaches, and help startups scale with confidence. Focus on growth—we’ll handle the security.