TECHNOLOGY > > Hackers


« Back to News

2018-10-25

Almost Half Of Cyber-Attacks Are Directed At SMEs

Some 43% of all cyberattacks target SMEs, according to data compiled by SCORE. Here are some ways to stay safe.

2018-10-24

New iPhone Bug Gives Anyone Access To Your Photos

A recently discovered bug in iOS 12 allows attackers with physical access to your iPhone to access your contacts and photos.

2018-10-22

35 Million 2018 US Voter Records For Sale

Current voter registration data found for sale on a hacking forum, includes full name, phone numbers, physical addresses & voting history.

2018-10-23

How Cyber Criminals Are Using Social Media To Hack Bank Accounts

Criminals use social media to check when customers are contacting banks about problems to then pose as the bank to hack people's data.

2018-10-23

China Is 'biggest state sponsor of Cyber-Attacks on the West'

China, not Russia, has become the biggest state sponsor of cyber-attacks in its bid to steal commercial secrets, according to Crowdstrike.

2018-10-18

British National Cyber-Centre Thwarts Hostile Hackers

The NCSC say it is defeating about 10 attacks every week, mostly carried out by state-sponsored hackers employed by hostile nations.

2018-10-22

Guide To All Things Criminal On The Web

An overview of the common kinds of cybercrime, with real-world examples and suggestions for tools you can use to protect yourself.

2018-10-18

Mobile Security Threats Put Businesses At Risk

A significant lack of visibility into non-corporate devices and networks is putting businesses at risk of data leakage and phishing attacks.

2018-10-17

Cyberwars Heat Up In AsiaPac To Battle Chinese Aggression

Governments in the Asia-Pacific region are strengthening their offensive capabilities in the fight against Chinese cyberwarfare.

2018-10-18

Lesser Skilled Cybercriminals Adopt Nation-State Hacking Methods

New analysis by CrowdStrike reveals a continued blurring of lines between covert methods employed by criminals and known nation-state actors.

2018-10-16

Pentagon Weapons Systems Vulnerable To Cyber-Attacks

Issues included being able to turn a weapon on or off, affect missile targeting, adjust oxygen levels or manipulate what is seen on control screens.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Infosecurity Europe, 3-5 June 2025, ExCel London

Infosecurity Europe, 3-5 June 2025, ExCel London

This year, Infosecurity Europe marks 30 years of bringing the global cybersecurity community together to further our joint mission of Building a Safer Cyber World.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

Libraesva

Libraesva

Libraesva secures email communications for organisations, helping them eliminate email borne threats, preserve email data and provide an environment for their people to communicate safely.

CLUSIF

CLUSIF

Clusif is the reference association for digital security in France. Its mission is to promote the exchange of ideas and feedback through working groups, conferences and publications.

The Media Trust

The Media Trust

The Media Trust continuously scans websites, ad tags and mobile apps and alerts on anomalies affecting websites and visitors.

Bangladesh Association of Software & Information Services (BASIS)

Bangladesh Association of Software & Information Services (BASIS)

BASIS is the national trade body for Software & IT Enabled Service industry of Bangladesh.

LSoft Technologies

LSoft Technologies

LSoft Technologies is a leader in data recovery software technologies.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

BwCIRT

BwCIRT

BwCIRT is the Computer Incident Response Team (CIRT) for Botswana and provides an official point of contact for dealing with computer security incidents.

Conatix

Conatix

Conatix was formed to apply recent advances in AI and other fields of technology to insider fraud, one of the most intractable problems in cybersecurity.

VeriClouds

VeriClouds

VeriClouds is a password verification service that helps organizations detect compromised passwords and stop account takeover attacks.

Client Solution Architects (CSA)

Client Solution Architects (CSA)

Client Solution Architects (CSA) is a leading digital transformation consulting firm focused on the U.S. Defense Department and all U.S. Federal enterprise information technology service areas.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

ERCOM

ERCOM

Ercom, a subsidiary of the Thales Group, is a French company known for its mobility security solutions.

WillJam Ventures

WillJam Ventures

WillJam Ventures are a private equity firm focused on investing in world-class cybersecurity companies that will become the next generation of leaders in protecting the world’s digital assets.

TerraZone

TerraZone

TerraZone is a global cyber security and privacy solutions provider to governments and enterprises.

CRYPTIQ

CRYPTIQ

CRYPTIQ empowers businesses to navigate the ever-evolving cybersecurity landscape with confidence and clarity.

Cure53

Cure53

Cure53 offers classic black-box penetration tests (zero-knowledge) as well as white-box tests and code audits.