TECHNOLOGY > > Hackers


« Back to News

2017-08-29

Cyber Criminals Have Access To Weapons Grade Hacking Tools

Businesses need to seriously rethink cyber defence with powerful nation-state attack hacking tools now in the hands of ordinary cyber criminals.

2017-08-23

HBO Offers Hackers $250,000 'bug bounty'

HBO reportedly offered $250,000 in ransom to the group that hacked its servers under the guise of a “bug bounty”.

2017-08-21

N. Korea Will Unleash Cyber Attacks On The US

US officials are increasingly concerned the rogue regime will respond to international pressure by lashing out with a weapon it has already mastered.

2017-08-16

Nazi Website Taken Over By Anonymous

Hacker collective Anonymous have taken over a notorious Nazi website, following clashes in the US between protesters and white nationalists.

2017-08-16

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?

Is it possible for the US to simply flick a switch and shut down the North Korean nuclear programme from 11,000km away?

2017-08-16

German Police To Hack Suspect Devices

Forget About Backdoors: Police forces in Germany will be allowed to hack any suspected mobile device using interception software.

2017-08-11

Stolen Nude Photos & Hacked Defibrillators: Is This The Future Of Ransomware?

While recent big Ransomware outbreaks caused huge costs to the organisations they infected, they were surprisingly unrewarding for their creators.

2017-08-09

Hackers Steal Game of Thrones Script

TV producer HBO has been the target of a cyberattack, suffering theft of full episodes of upcoming shows and scripts for Game of Thrones.

2017-08-09

Russia Will Try To Hack German Elections

The appearance of normality as Germany prepares for national elections conceals the question of how Russia will inject itself into the ballot.

2017-08-07

Briton Who Stopped WannaCry Arrested

"Accidental Hero" who found the hidden Wannacry killswitch is arrested by the FBI charged with writing malicious software targeting bank accounts.

2017-08-04

TalkTalk Still Feeling The Effects Of Cyber Attack

UK telecoms business TalkTalk is still counting the costs: Profits hammered. Customers deserting. The CEO replaced.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ANS Group

ANS Group

ANS are a strong team of straight-talking tech and business experts. Our mission is to make digital transformation accessible to all.

Axial

Axial

Axial Systems is one of the UK’s leading solution providers and systems integrators in network, security and services.

Cyber 360

Cyber 360

Cyber 360 is a Cybersecurity contract and fulltime placement firm dedicated to identifying and hiring Cybersecurity professionals.

Cyber Fusion Center - Maryville University

Cyber Fusion Center - Maryville University

Maryville University Cyber Fusion Center is a virtual lab for working on real-world cyber security challenges.

BlueID

BlueID

BlueID is an IDaaS technology product which enables your objects to securely connect and interact with your users’ smart phones and smart watches.

Certus Software

Certus Software

Our Secure Data Erasure solutions protect customer data confidentiality by completely erasing it from data storage devices.

Applied Risk

Applied Risk

Applied Risk is an established leader in Industrial Control Systems security, focused on critical infrastructure security and combating security breaches that pose a significant threat.

Anect

Anect

Anect is a leading provider of ICT security and services for hybrid and cloud solutions.

Totalsec

Totalsec

Totalsec is a Grupo Salinas company with a team of professionals in cybersecurity and information security providing Security Consulting, Solutions Integration, and Managed Security Services.

SensorHound

SensorHound

SensorHound’s mission is to improve the security and reliability of the Internet of Things (IoT).

Invest Ottawa

Invest Ottawa

The IO Accelerator Program is designed to rapidly and systematically accelerate the development and commercial success of high growth technology firms.

Vivitec

Vivitec

Vivitec security services are tailored for your business, industry, risk, technology, and size to ensure great protection and planned response for the inevitable cyber-attacks on your business.

Grip Security

Grip Security

Grip Security provides comprehensive visibility, governance and data security to help enterprises effortlessly secure a burgeoning and chaotic SaaS ecosystem.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

Kralos

Kralos

Kralos are an experienced team of Software and IT experts, specialized in the development of innovative cybersecurity solutions.

Clango

Clango

Clango employs an identity-centric approach to optimizing your cybersecurity investment while minimizing risk.