TECHNOLOGY > > Hackers


« Back to News

2015-11-12

Spyware Rises in Popularity with Governments

FinFisher was being used for activities beyond tracking criminals.

2015-11-04

RBS Says Most Scam Victims Recover Nothing

The bank is not generally responsible for fraud, unless their advice, delays or other errors have resulted in the money being stolen.

2015-11-04

Stolen Credit Card Details Cost £1 Online

In the wake of the TalkTalk cyber-attack credit card details are on sale online for as little £1 each as fears rise over the security of personal data

2015-11-03

EU Will Fund Car, Hospital & Airport IT Security

ENISA is stepping up to address numerous threats to critical infrastructure and help governments & businesses plan their response.

2015-10-28

Hackers Compromise Cisco Web

Malicious, data stealing JavaScript injected in the Cisco Web VPN login page of targeted organizations is hosted on legitimate sites.

2015-10-28

Banks Under Constant Hacker Attacks

When Hackers are looking to steal as much money as possible as quickly as possible, they go where the money is.

2015-10-30

China Still Hacking US Firms Despite Xi’s Vow

Chinese government hackers have attempted to penetrate US company networks despite a pledge they would not do so.

2015-10-30

FBI Say ISIS Is Going After US Vulnerabilities

The big underlying concern is a cyber attack on the power grid & other critical infrastructure.

2015-10-23

The World's First Hack: the Telegraph and the Invention of Cyber Privacy

Concern over personal data interception did not start with GCHQ and the NSA, hacking can be traced all the way back to the 19th century

2015-10-21

US Concerns Over Kremlin Links to Cyber Gangs

Moscow has long been known to source its technology, world-class hacking talent and intelligence information from cyber crime rings.

2015-10-21

Russia - NATO Cyber War Heats Up

Cyberattacks have become far more aggressive and numerous since NATO and Russia recommenced hostilities with each other.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Encode

Encode

Encode delivers a cutting edge Security Analytics & Response Orchestration platform and best of breed Cyber Security Operations and Services.

MetaFlows

MetaFlows

MetaFlows’ SaaS malware detection & prevention software passively analyzes the behavior and the content of Internet traffic.

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA)

Professional Insurance Agents (PIA) offer commercial insurance services including Cyber Liability insurance.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

Torsion Information Security

Torsion Information Security

Torsion is an innovative information security and compliance engine, which runs either in the cloud or your data centre.

Cyber Security Specialists

Cyber Security Specialists

Cyber Security Specialists Limited provide Security services across a wide range of markets, from multi-national Corporate Organisations and Government Agencies, through to smaller Businesses.

Center for Cyber Safety and Education

Center for Cyber Safety and Education

The Center for Cyber Safety and Education works to ensure that people across the globe have a positive and safe experience online through our educational programs, scholarships, and research.

Block Armour

Block Armour

Block Armour is a Mumbai and Singapore based venture focused on harnessing emerging technologies to counter growing Cybersecurity challenges in bold new ways.

National Cyber Security Centre (NCSC) - New Zealand

National Cyber Security Centre (NCSC) - New Zealand

The role of the NCSC is to help New Zealand’s most significant public and private sector organisations to protect their information systems from advanced cyber-borne threats.

Infosec (T) Ltd

Infosec (T) Ltd

Infosec (T) Limited is an independent Tanzania based consultancy specializing in IT governance, information security and IT audit.

Stage2Data

Stage2Data

Stage2Data is one of Canada’s most trusted cloud solution providers offering hosted Backup and Disaster Recovery Services.

Nettoken

Nettoken

Nettoken is the first identity management platform designed for everyday internet users, to encourage awareness and control of our ever expanding digital footprint and personal cybersecurity.

ARIA Cybersecurity Solutions

ARIA Cybersecurity Solutions

The ARIA ADR Automatic Detection & Response solution was designed to find, verify, and stop all types of attacks - automatically and in real time.

Fifosys

Fifosys

Fifosys is a professional technology infrastructure specialist, delivering a broad portfolio of high quality technical and strategic managed services.

Twingate

Twingate

Twingate help organizations secure and manage access to their technology resources in a world where people work from anywhere.

Buzz Cybersecurity

Buzz Cybersecurity

Buzz Cybersecurity systems and services are designed to proactively guard against common and uncommon cyber threats.