TECHNOLOGY > > Hackers


« Back to News

2017-09-07

Will GDPR Protect Privacy Or Just Lead To More Hacks?

Implementation of the new EU Data Protection Regulations will create some unintended and possibly unwelcome consequences.

2017-09-11

Car Industry In Crisis Over AI and Hackers

Car security technology requires broad, sweeping changes in standards and the ways in-vehicle networks and devices are made to become secure.

2017-09-13

AI Attacks Are Just Around The Corner

Hackers will get help from robots and artificial intelligence and the first AI-enhanced cyber-attack could come in the next 12 months.

2017-08-30

Russia's US Election Hacks More Persistent Than First Thought

Voting systems across the US were far more susceptible to Russian hacking efforts during last year's presidential election than previously known

2017-08-29

Carelessness Is Just As Risky As Deliberate Exfiltration

Panama Papers Pt.2: A Panamanian broker has accidentally exposed 52,000 financial and legal documents of wealthy individuals.

2017-08-29

N. Korea Targets S Korea’s Bitcoin Exchange.

North Korea has likely launched a cyber-attack against South Korean virtual currency exchanges in the face of heavier economic sanctions.

2017-08-29

Cyber Criminals Have Access To Weapons Grade Hacking Tools

Businesses need to seriously rethink cyber defence with powerful nation-state attack hacking tools now in the hands of ordinary cyber criminals.

2017-08-23

HBO Offers Hackers $250,000 'bug bounty'

HBO reportedly offered $250,000 in ransom to the group that hacked its servers under the guise of a “bug bounty”.

2017-08-21

N. Korea Will Unleash Cyber Attacks On The US

US officials are increasingly concerned the rogue regime will respond to international pressure by lashing out with a weapon it has already mastered.

2017-08-16

Nazi Website Taken Over By Anonymous

Hacker collective Anonymous have taken over a notorious Nazi website, following clashes in the US between protesters and white nationalists.

2017-08-16

Can US Cyber Weapons Stop N. Korea’s Nuclear Missiles?

Is it possible for the US to simply flick a switch and shut down the North Korean nuclear programme from 11,000km away?

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Quttera

Quttera

Quttera provides Website Security Solutions for Small & Medium Businesses, Enterprises and Organizations.

Hiscox

Hiscox

Hiscox offers cyber and data risks insurance to protect your business against the risks of holding data and using computer systems..

KPN Security

KPN Security

KPN Security is the largest and most complete provider of IT security services in the Netherlands.

Norwegian Center for Information Security (NorSIS)

Norwegian Center for Information Security (NorSIS)

NorSIS) is an independent organization that works to increase knowledge and understanding of information security for businesses and individuals.

Crossmatch

Crossmatch

Crossmatch is a world leader in risk-based composite authentication and biometric identity management.

Malware Patrol

Malware Patrol

Malware Patrol provides intelligent threat data that protects against cyber attacks.

Cyber Risk Opportunities

Cyber Risk Opportunities

Cyber Risk Opportunities was formed to enable middle-market executives to become more proficient cyber risk managers so their organizations can thrive.

H-ON Consulting

H-ON Consulting

H-ON Consulting develops and applies robust cyber security procedures enabling control systems to be secure.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Cytelligence

Cytelligence

Cytelligence is a cyber security consulting company with deep expertise in Cyber Breach Response, Cyber Breach Investigations, and Digital Forensics.

Open Systems

Open Systems

Open Systems is a Secure Access Service Edge (SASE) pioneer delivering a complete solution to network and security.

Blumira

Blumira

Blumira provides comprehensive, hybrid cloud security monitoring and reporting for organizations of all sizes, enabling them to detect and respond to cloud security threats quickly and effectively.

CYBRI

CYBRI

CYBRI is a cybersecurity company helping businesses detect and remediate mission-critical vulnerabilities before they get exploited by hackers.

Barclay Simpson

Barclay Simpson

Barclay Simpson is proud to have a long history of delivering cyber security, technology and governance recruitment services.

Ever Nimble

Ever Nimble

Ever Nimble are award-winning experts in IT support, cybersecurity, and cloud technology. Our proactive approach will enhance your security and protect you from cyber security threats.

DeltaSpike

DeltaSpike

DeltaSpike empowers individuals and organizations worldwide through its comprehensive cybersecurity solutions.