TECHNOLOGY > > Hackers


« Back to News

2021-12-16

Hackers Compromise Indian Prime Minister's Twitter Account

Cryto Currency Deception: Narendra Modi's 73million followers were sent false messages about India's intentions to adopt Bitcoin as official currency.

2021-12-15

Stolen: Personal Details Of 80k Australian Government Employees

Over 80,000 South Australian government workers had their private data stolen in a ransomware attack & their employer is getting the blame.

2021-12-14

Volvo Falls Victim To Hackers

Hackers have stolen an undisclosed amount of research and development data from car maker Volvo, in what might be a possible ransom attack.

2021-12-07

Multiple Location Supermarket Suffers Supply Chain Attack

Total IT Outage: 300 Spar convenience stores in the UK have been knocked offline, unable to process card payments as their IT supplier is attacked.

2021-12-06

NSO Spyware Used To Hack The State Department

NSO Group’s spyware has been used by an unknown assailant to hack the mobile phones of at least nine United States State Department employees.

2021-11-30

Britain Is Fighting A Ransomware Epidemic

The NCSC has tackled a record number of cyber incidents over the past year and ransomware attacks from Russia are the dominant feature.

2021-11-30

Worldwide Cyber Security Threats

Cyber security threats, risks & challenges share many common factors in exploiting vulnerabilities, but vary significantly from one country to another.

2021-11-29

Spyware - Apple Starts Legal Action Against NSO Group

The controversial and secretive NSO Group is accused of using its powerful spyware in a concerted attack on Apple's customers, products & servers.

2021-11-29

Trojan Malware Installed On Millions Of Android Devices

Users of over nine million Android devices have installed dozens of games from Huawei that have a trojan malware designed to collect personal data. 

2021-11-26

Ransomware, Iranian Hackers & Pornography

Cyber Crime Trends: Ransomware criminals have taken advantage of widespread remote working to launch increasingly sophisticated attacks.

2021-11-22

British Students Learn About Ethical Hacking

Career Opportunities: Training to becoming a Certified Ethical Hacker (CEH) can be a smart career move and skilled practitioners are very well paid.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

DTEX Systems

DTEX Systems

DTEX Systems is the global leader for insider risk management. We empower organizations to prevent data loss by proactively stopping insider risks from becoming insider threats.

Trusted Knight

Trusted Knight

Trusted Knight is a leading provider of security software solutions focused on defeating newly developed malware and crimeware trojans.

Myra Security

Myra Security

Myra technology monitors, analyzes, and filters malicious internet traffic before virtual attacks can do any real harm.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

Puleng Technologies

Puleng Technologies

Puleng provides customers with a client-centric strategy to manage and secure the two most valuable assets an organisation has - its Data and Users.

2Keys

2Keys

2Keys designs, deploys and operates Digital Identity Platforms and Cyber Security Platforms through Managed Service and Professional Service engagements.

ChaosSearch

ChaosSearch

ChaosSearch is a massively scalable ELK-compatible log analysis platform delivered as a fully managed service with high-performance and low cost.

Telsy

Telsy

Telsy is a security partner for ICT solutions and services. We help you implement effective security solutions that increase your risk mitigation ability and your responsiveness.

SLVA Cybersecurity

SLVA Cybersecurity

SLVA Cybersecurity excel at delivering security-as-a-service, fit-for-purpose, within the constraints of realistic budgets and business expectations.

Tsaaro Academy

Tsaaro Academy

Tsaaro Academy is a unique privacy certification training platform and here you earn a privacy certification CEH, CISM and DPO from India’s No.1 Privacy training platform.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

Assura

Assura

Assura provides innovative cybersecurity advisory and managed services to all industries including government, healthcare, financial, manufacturing, and transportation sectors.

Tanzania Industrial Research and Development Organization (TIRDO)

Tanzania Industrial Research and Development Organization (TIRDO)

TIRDO is a multi-disciplinary research and development organization.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.

Root Evidence

Root Evidence

Root Evidence's mission is delivering evidence-driven solutions that distill digital risk into quantifiable business outcomes.