TECHNOLOGY > > Hackers


« Back to News

2015-05-11

Hacked. Or, How to Become a Four-Star General

"Someone hacked into the Department of Defense [DoD] network," Gen. Keith Alexander

2015-05-01

Forget Hackers, The Biggest Internet Security Threat Is Closer to Home

According to Verizon the biggest threat to your private information may actually be you!

2015-04-30

How Terrorists Are Turning Robots Into Weapons

It's time to rethink security with the rise of robotics.

2015-04-28

United Airlines Bans Researcher After 'joke tweet'

United Airlines ban a security researcher from a flight after he tweeted that he might be able to hack the aircraft's systems.

2015-04-27

US Healthcare: Data Breaches Are Increasingly Common

Prevention is better (and much less costly) than cure.

2015-04-27

Iran’s Cyber Attacks Are Getting Much More Sophisticated

“Cyber gives Iran a usable weapon, in ways nuclear technology does not”

2015-04-25

Russian Hackers Use Flash Zero-Day Flaws

Russian hacking group APT 28 attacked an "international government entity", using unpatched software flaws.

2015-04-23

Gang Warfare: Hacking Groups Clash In Cyberspace

Elite Cyber Crime Group Strikes After Attack by APT Gang

2015-04-23

Leading Belgian Newspaper Hit by Cyber Attack

Le Soir threatened after re-publishing controversial cartoons from the French satirical magazine Charlie Hebdo.

2015-04-21

How Syrian Electronic Army Hacked Email Accounts of Assad’s Opponents

The group of hackers aligned with Syrian President Bashar al-Assad have been busy.

2015-04-22

Russia's Cyber Attacks Grow More Brazen

Russia has ramped up cyber attacks against the United States to an unprecedented level.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

SureCloud

SureCloud

SureCloud is a Governance, Risk and Compliance (GRC) and Cybersecurity Solutions provider.

Cryptomathic

Cryptomathic

Cryptomathic is an expert on commercial crypto - we develop, deliver and support the most secure and efficient off-the-shelf and customised solutions.

PSC

PSC

PSC is a leading PCI and PA DSS assessor and Approved Scanning Vendor.

NetDiligence

NetDiligence

NetDiligence is a privately-held cyber risk assessment and data breach services company.

Base Cyber Security

Base Cyber Security

Base Cyber Security is an information and cyber security talent service provider and career specialist.

Human Security

Human Security

Human (formerly White Ops) Bot Mitigation Platform enables complete protection from sophisticated bot attacks across advertising, marketing and cybersecurity.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

Cardonet

Cardonet

Cardonet is an IT Support and IT Services business offering end-to-end IT services, 24x7 IT Support to IT Consultancy, Managed IT and Cyber Security.

OnSecurity

OnSecurity

OnSecurity replaces the overhead of traditional penetration testing firms with a simple online interface, making it easy to book tests as and when needed.

Guardz

Guardz

Guardz helps small and growing businesses to go from zero or low cyber protection to having comprehensive security – in the quickest and most straightforward way.

View

View

View is the leader in smart building technologies including OT cybersecurity to securely connect buildings to the cloud and manage building networks and OT devices.

Prizsm Technologies

Prizsm Technologies

Prizsm is a computational storage capability that provides flexible, easy-to-use, resilient solutions for quantum-resistant, hyper-secure cloud storage and communications.

DOT Europe

DOT Europe

DOT Europe is a consensus based organisation which brings a diverse membership together to agree on their collective stance on EU tech policy.

Edera

Edera

Edera is changing the way containers are run and secured, making isolation a reality and fundamentally transforming computing in the process.

International Maritime Cyber Security Organisation (IMCSO)

International Maritime Cyber Security Organisation (IMCSO)

The IMCSO mission is to be the standard in the maritime cyber security industry, a collective voice, working towards alignment and standardisation.

Identifly

Identifly

Identifly is the leading Australian independent identity consultancy and partner in Australia, helping enterprises implement large scale identity security projects fast.