TECHNOLOGY > > Hackers


« Back to News

2016-10-31

Future Of Security: Connect Cyber With Physical Defence

With more items gaining web connectivity as part of the IoT trend, organisations cannot afford to separate physical security from cybersecurity.

2016-10-31

Work Traveling - You’re a Prime Hacker Target

There’s one very important thing to worry about while traveling in unfamiliar places: the security of your email.

2016-10-29

DDoS: Deceptive Denial Attacks

Increasingly sophisticated techniques deployed by attackers using DDOS methods are making the reported size of such attacks redundant.

2016-10-28

Smartphone “Video Jacking” From Power Sockets

Major smartphone brands are vulnerable to the hacking threat called “video jacking' when plugged into public charging stations.

2016-10-27

How To Win The Cyberwar Against Russia

Russia’s election-year hacking of the US political system is an unprecedented situation for the American national security establishment.

2016-10-27

Meet The Fancy Bears

A mysterious group of Russian hackers, known by several different names, are perpetrating a string of high profile and politically motivated hacks.

2016-10-25

Who Is Trying To Disrupt The Internet?

A prolonged Internet outage affecting major sites raises a real concern that this is just a practice run for more widespread internet disruption.

2016-10-25

Russian Citizen Charged With Hacking LinkedIn

A Russian man has been charged with stealing information from computers at LinkedIn and other San Francisco Bay Area companies.

2016-10-26

Media Vulnerable To Election Night Cyber-Attack

US media organisations have failed to properly protect their newsrooms which are vulnerable to a chaos-creating hack around Election Day.

2016-10-25

Hackers 'weaponised' Malware To Mount Massive Assault

The huge weekend attack on global Internet access is believed to have been unleashed by hackers using common IoT devices.

2016-10-19

Stolen NSA Hacking Tools For Sale In Bizarre Auction

The hackers who are auctioning off Cyber-weapons allegedly stolen from the NSA are growing annoyed and want cash.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Council for Information & Communication Technologies (CTIC)

Council for Information & Communication Technologies (CTIC)

CTIC was set up to address specific issues in the field of ICT relevant to the implementation of electronic government.

Baffin Bay Networks

Baffin Bay Networks

Baffin Bay Networks operates globally distributed Threat Protection Centers™, offering DDoS protection, Web Application Protection and Threat Inspection.

PBOSecure

PBOSecure

PBOSecure is a dynamic and progressive IT consultancy company specializing in IT and Industrial Control System (ICS) security.

International Accreditation Forum (IAF)

International Accreditation Forum (IAF)

The IAF is the world association of Conformity Assessment Accreditation Bodies. Its primary function is to develop a single worldwide programme of conformity assessment.

Seavus Accelerator

Seavus Accelerator

Seavus Accelerator's goal is to create an enabling and stimulating environment for start-ups growth and provide continuous high quality acceleration and investment support.

Hexaware Technologies

Hexaware Technologies

Hexaware is an automation-led next-generation service provider delivering excellence in IT, BPO and Consulting services.

Datrix

Datrix

Datrix is a leading Smart Infrastructure and Cyber Security solutions provider. We deliver critical networking, communications and cyber security solutions to public and private sector organisations.

Trianz

Trianz

Trianz Cybersecurity Services are Powered by One of the World’s Largest Databases on Digital Transformation. We Understand Evolving Risks, Technologies and Best Practices.

Allied Telesis

Allied Telesis

Allied Telesis delivers the secure, flexible, and agile solutions needed to meet the expectations of any industry’s critical mission.

BDO Global

BDO Global

BDO is an international network of public accounting, tax and advisory firms which perform professional services under the name of BDO.

HashDit

HashDit

HashDit products and services focus on helping build a safe ecosystem for both protocol users and smart contract developers on BNB Chain.

HWG Sababa

HWG Sababa

HWG Sababa is a cybersecurity provider that offers a comprehensive suite of strategic managed security solutions, services, and consultancy.

AddSecure

AddSecure

AddSecure is a leading European provider of secure IoT connectivity and end-to-end solutions.

Washington Technology Solutions (WaTech)

Washington Technology Solutions (WaTech)

WaTech operates the state’s core technology infrastructure – the central network and data center, provides strategic direction for cybersecurity and protects state networks from growing cyber threats.

Vorlon

Vorlon

Vorlon's agentless patent-pending solution facilitates risk profiling of apps, and provides AI-driven behavioral analytics with response recommendations.