TECHNOLOGY > > Hackers


« Back to News

2016-05-13

Swiss Defense Ministry Targeted

Russian hackers suspected of industrial espionage.

2016-05-12

IS Forms Mega Hacking Group

The super hacking unit is labeled United Cyber Caliphate (UCC).

2016-05-13

Pentagon Wants to ‘Fingerprint’ The World’s Hackers

DARPA plans to track hackers to create “algorithms for developing predictive behavioral profiles,” linking malicious activity to individuals.

2016-05-12

No Phone Is Safe from Hackers & Spies

The illusion of privacy: Hackers only need your phone number in order to listen in on phone calls, read texts or track your geographic location.

2016-05-09

Search It Yourself: Panama Papers Database Goes Public

The body behind the Panama Papers revelations makes an enormous database of financial data public today.

2016-05-06

One Massive Hack Last Year - Nobody Noticed!

Hackers stole a database with the details of 57 million people.The breach was discovered only after the data was put up for sale on the dark web.

2016-05-04

Fear This Man And His Hacking Empire

Hacking Team is among the few dozen private contractors feeding the world’s law enforcement & intelligence agencies with spyware.

2016-05-02

Bangladesh Bank Hackers Compromised SWIFT

Attackers who stole $81 million from the Bangladesh central bank hacked into software from the SWIFT financial platform.

2016-04-26

How To Deal With The Rising Tide Of Ransomware

Of all the money-making schemes hackers employ, the most prevalent is ransomware.

2016-04-26

Cybercrime Increases As Crooks Get AI Smarter

Symantec's 2016 Internet Security Threat Report reveals that 2015 saw an increase in hacking numbers and smarter attacks.

2016-04-27

Russia Blamed For Swedish Air Traffic Hack

A major cyberattack on Sweden's air traffic control system is allegedly due to Russia testing out its electronic warfare capabilities.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

National Institute of Standards & Technology (NIST) - USA

National Institute of Standards & Technology (NIST) - USA

NIST is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Areas covered include IT and cybersecurity.

Academic Centres of Excellence in Cyber Security Research

Academic Centres of Excellence in Cyber Security Research

The ACE-CSRs scheme is part of the UK Government’s National Cyber Security Strategy, working with academia and industry to make the UK more resilient to cyber attacks.

Matta

Matta

Matta is a cyber security consulting company providing information security services and solutions including vulnerability assessments, penetration testing and emergency response.

Quadron  Cybersecurity Services

Quadron Cybersecurity Services

Quadron Cybersecurity Services is a specialist in digital security, data and system protection.

Taqnia Cyber

Taqnia Cyber

Taqnia Cyber specializes in the fields of cyber security, intelligence, operations, and training. It offers its services and consultations to both public and private sectors.

Sternum

Sternum

Sternum provides reliable and effective endpoint security for any IoT device, using robust technology and seamless integration.

Granted Consultancy

Granted Consultancy

Granted Consultancy is a business consultancy that specialises in securing funding to support companies with the development and commercialisation of new and innovative products and technologies.

Thomsen Trampedach

Thomsen Trampedach

Thomsen Trampedach offers a tailored-made brand protection solution to each customer using a proprietary enforcement automation and reporting tool and a multilingual enforcement team.

ADGS

ADGS

ADGS is a deeptech company focused in the fields of Agent-Based simulations (Emergent Behavior), Cybersecurity and Biometrics, Social Dynamics, Natural Language Processing and Artificial Intelligence.

SIXGEN

SIXGEN

SIXGEN provides incident response, operational and penetration testing, red teaming, tool development, cyber training development and continuous monitoring.

Tromzo

Tromzo

Tromzo's mission is to eliminate the friction between developers and security so you can scale your application security program.

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV)

Inflection Point Ventures (IPV) is a 6000+ members angel investing firm which supports new-age entrepreneurs by connecting them with a diverse group of investors.

TAFEcyber

TAFEcyber

TAFEcyber is an Australian based consortium focusing on the skilling of the fast-growing cyber security workforce through education and training.

Synersoft BLACKbox

Synersoft BLACKbox

Synersoft, the maker of path-breaking and disruptive technology for SMEs, now branded as BLACKbox, is an incubated and invested portfolio company of CIIE - IIM-Ahmedabad.

Orchid Security

Orchid Security

Orchid Security provides unprecedented insight and action to your identity security with the help of advanced technologies like Large Language Models (LLM).

Cyber Civil Rights Initiative (CCRI)

Cyber Civil Rights Initiative (CCRI)

CCRI is the leading organization serving thousands of victims around the world and advocating for technological, social, and legal innovation to fight online abuse.