TECHNOLOGY > > Hackers


« Back to News

2016-04-06

Biggest Data Leak Ever Exposes World's Most Rich & Powerful

An obscure law firm in Central America is the source of what's being called the largest information leak in history.

2016-04-05

Russian Cyber War Training Can Be A Killer

Russia is developing and testing military grade Cyber War weapons on real targets, and finding out what works and what needs improvement.

2016-04-04

Cars Really Are Increasingly Vulnerable To Cyberthreats

Modern cars are "increasingly vulnerable" to hacking after researchers proved it is possible to disable brakes and manipulate steering remotely.

2016-03-31

5 Major US Hospital Hacks

In real-world war, combatants typically don’t attack hospitals. In the cyber realm, hackers have no such scruples.

2016-03-30

TalkTalk Launches Secure Biometric Authentication

TalkTalk has become one of the first major companies to use biometric authentication following last year's £60m data breach.

2016-03-30

Swedish Police Investigate Media Cyber-Attacks

Swedish police say they are investigating major cyber attacks against some of the country's leading media companies.

2016-03-30

Anonymous Threaten ISIS After Belgium Attacks

Anonymous has come forward and issued a threat against the Islamic State terrorist group, warning of impending cyber-attacks.

2016-03-25

Now Ambulances Are Vulnerable To Hackers

Cybersecurity in connected-vehicles is a big concern and few vehicles are more connected than ambulances.

2016-03-22

North Korea Denies Cyber Attacks On South Korea

North Korea denies it conducted cyber attacks against officials from rival South Korea, calling the South's accusation that it did so a "fabrication".

2016-03-23

Ukraine Blackout – The Future Of War

To see how cyber will play into armed conflict, look no further than the attacks on the Ukrainian energy sector.

2016-03-15

Hard Lessons From The Cyberattack On Ukraine

Investigation into cyberattacks that caused rolling blackouts in Ukraine reveal how vulnerable power suppliers are to malware.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Chertoff Group

Chertoff Group

The Chertoff Group provide security advice and risk management services covering cyber security, insider threat, physical security and asset protection.

Perkins Coie LLP

Perkins Coie LLP

Perkins Coie LLP is an internationalk law firm with offices across the USA and Asia. Practice areas include Privacy and Data Security.

Idemia

Idemia

Idemia is a global leader in security and identity solutions.

Lynx Technology Partners

Lynx Technology Partners

Lynx Technology Partners is a full service, full life-cycle risk-based security consulting firm.

CYSEC Academy

CYSEC Academy

CYSEC Academy offer cyber certifications, cyber assurance and cyber defense training, hands-on learning training modules, public, private and bespoke training courses.

Inseego

Inseego

Inseego provides Enterprise SaaS solutions and IoT & Mobile solutions, which together form the backbone of intelligent, reliable and secure IoT services with deep business intelligence.

Axence

Axence

Axence provides professional solutions for the comprehensive management of IT infrastructure for companies and institutions all over the world.

KOVRR

KOVRR

Kovrr financially quantifies cyber risk on demand. Our technology enables decision makers to seamlessly drive actionable cyber risk management decisions.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Systems Assessment Bureau (SAB)

Systems Assessment Bureau (SAB)

Systems Assessment Bureau is an internationally recognized ISO Certification Body with a unique vision of “Excel together with global standards”.

Celcom

Celcom

Celcom is the oldest mobile telecommunications provider in Malaysia, providing solutions and services to consumers and businesses.

Cynomi

Cynomi

Cynomi is a leading strategic cybersecurity operations platform that automates cybersecurity knowledge and expertise to empower teams with little to no in-house expertise.

Acora

Acora

Acora provide a range of best-in-class managed services, Microsoft-centric business software, and cloud solutions designed to help mid-market organisations succeed in the digital economy.

Tidal Cyber

Tidal Cyber

We formed Tidal for one simple reason—we believe that defenders need and deserve tools and services that make achieving the benefits of threat-informed defense practical and sustainable.

c0c0n

c0c0n

c0c0n is the longest running conferences in the area of Information Security and Hacking, in India.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.