TECHNOLOGY > > Hackers


« Back to News

2015-06-09

Stegosploit Hidden Image Code is the Future of Online Attacks

Attackers can embed executable JavaScript code within an image to trigger a 'drive-by download'.

2015-06-08

Rethinking Cybersecurity in the Age of the Hacker

If even the best-resourced companies are losing the cyber-security battle, what hope is there for the rest of us?

2015-06-08

Bigger than Heartbleed - 'Venom' Threatens Datacenters

Before Heartbleed: Worst vulnerabilities ever?

2015-06-06

Russia's Greatest Weapon May Be Its Hackers

In hacker jargon, it’s called a “cyber-to-physical effect.” It’s when a hacker reaches out from the virtual world into the real one, often with catastrophic consequences.

2015-06-06

Flaw in YouTube Allows Removal of Any Video

Russian security researcher Kamil Hismatullin has discovered a critical flaw in YouTube.

2015-06-01

North Korean Hackers 'could kill', Warns Defector

North Korean hackers are capable of attacks that could destroy critical infrastructure and kill people.

2015-06-03

Hackers Build New Tor Client Designed to Beat the NSA

A new Tor client called Astoria designed specifically to make eavesdropping harder for the world's richest, most aggressive & most capable spies.

2015-06-03

Keeping Passwords Safe From Cracking

Researchers have come up with an effective & easy-to-implement solution for protecting passwords from attackers.

2015-06-01

Hacker’s Into Commercial Airline Systems

Potential vulnerabilities in the US’s pending shift to satellite-based air traffic control from current ground-based systems.

2015-06-01

Obama Authorizes Sanctions Against Hackers

The US goes after overseas attackers when foreign governments won't.

2015-06-01

Malware Remodeled

Malware is getting through enterprise defenses as attackers code new strains and re-clothe old ones.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ClearedJobs.Net

ClearedJobs.Net

ClearedJobs.Net is a career site and job fair company for professionals seeking careers in the defense, intelligence and cyber security communities.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

One Identity

One Identity

One Identity delivers identity governance, access management, and privileged account management solutions that facilitate and secure your digital transformation.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

Zecurion

Zecurion

Zecurion data loss prevention (DLP) solution is an easy-to-use solution for securing confidential data at rest and in motion.

Defence Intelligence

Defence Intelligence

Defence Intelligence is an information security firm specializing in advanced malware protection.

AAROH

AAROH

AAROH helps customers in Government, Law Enforcement, and Enterprises to identify, prevent, detect, resolve and protect from threats, crimes, breaches & fraud.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

Combis

Combis

COMBIS is a regional high-tech ICT company focused on the development of application, communication, security and system solutions and the provision of services.

Totaljobs

Totaljobs

Totaljobs is the UK’s largest hiring platform. We have over 280,000 live jobs adverts on our site, helping you to find any type of job in any industry, including cybersecurity.

Jerusalem Venture Partners (JVP)

Jerusalem Venture Partners (JVP)

JVP’s Center of Excellence in Be’er Sheva aims to identify, nurture and build the next wave of cyber security and big data companies to emerge out of Israel.

LogicHub

LogicHub

LogicHub is built on the principle that every decision process for threat detection and response can and should be automated.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

Prism Infosec

Prism Infosec

Prism Infosec is an award-winning independent cyber security consultancy, CREST STAR, NCSC CHECK member, CAA ASSURE audit provider and PCI Qualified Security Assessor.

WPScan

WPScan

With WPScan, you'll be the first to know about vulnerabilities affecting your WordPress installation, plugins, and themes.

Delta Partners

Delta Partners

Delta Partners is a venture capital firm investing in Ireland and the United Kingdom with a strong focus on early stage technology companies.