TECHNOLOGY > > Hackers


« Back to News

2019-05-17

British Hackers Convicted For Stealing £10m

The gang used malware to steal the email log-in details of businesses worldwide, to identify high-value financial transaction and divert money.

2019-05-14

WhatsApp Penetrated By Spyware

Hackers have installed surveillance software on phones and other appliances exploiting a major weakness in Facebook’s WhatsApp messenger.

2019-05-17

‘Chinese Spies’ Had NSA Cyber Weapons Before The Shadow Brokers Leak

Chinese spies obtained NSA cyber weapons more than a year before they were leaked in one of the most high-profile hacks of the last decade.

2019-05-21

Young Hacker Makes $1m. Legally.

It Pays To Be Ethical: A 19-year-old Argentinian has made history as the first to earn over $1,000,000 in bug bounty awards.

2019-05-10

Israel Responds To A Cyber Attack With Bombs

Israeli Defence Forces have said that they launched air-strikes on a building which is believed to have housed Hamas digital warfare operatives.

2019-05-03

Beware Of ‘How To' Guides To The Dark Web

Hacking For Dummies: All you need to get rich quick is some good tutorial material from the Dark Web, right? Wrong.

2019-05-03

Cyber Criminals Are Catching Up With Nation-state Hackers

Sophisticated cyber criminals are starting to franchises their hacking tools and to develop new technology to sell to other cyber criminals.

2019-04-30

Nasty Phishing Scam Targets Instagram

The Nasty List: Instagram is cautioning users not to fall for a widespread phishing scam which is trying to collect log-ins and hack users accounts.

2019-04-23

Ethical Hacker Guilty Of Malware Attacks

The so-called WannaCry hero has gone bad and offered a guilty plea to two charges related to malware attacks on US-based banking systems.

2019-04-23

Hackers Delight: Poor Password Security

Britain's National Cyber Security Centre has found that millions of people are using easy-to-guess passwords on sensitive accounts.

2019-04-23

FBI Believes Russia Hacked Florida Elections

Russian hackers breached “at least one” Florida county government using a spearphishing campaign according Robert Mueller’s report.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Orolia

Orolia

Orolia are experts in deploying high precision GPS time through network infrastructure to synchronize critical operations.

Massive Alliance

Massive Alliance

Massive is a global service agency providing internet monitoring, data & security threat surveillance and reputation management.

IDnow

IDnow

IDnow is the world’s fastest, most flexible and most secure identity verification platform, delivering instant verification of the identity documents used by 7 billion people.

Naoris Protocol

Naoris Protocol

Naoris is the world’s first holistic blockchain-based cybersecurity ecosystem, bringing a game-changing solution to address 35 years of industry similar practice.

Sonrai Security

Sonrai Security

Sonrai Security delivers an enterprise security platform focused on identity and data protection inside AWS, Azure, and Google Cloud.

Iowa Cyber Hub

Iowa Cyber Hub

Iowa Cyber Hub is a cybersecurity education partnership between Iowa State University and Des Moines Area Community College.

36 Group

36 Group

36 Group's criminal law team, has the experience and specialist knowledge to conduct effectively trials heavily concerned with the growing phenomenon of Cybercrime.

BlueHalo

BlueHalo

BlueHalo is purpose-built to provide industry capabilities in the domains of Space Superiority and Directed Energy, Missile Defense and C4ISR, and Cyber and Intelligence.

BCyber

BCyber

BCyber is a Swiss Cyber Security company that provides security products, training, and managed services to protect diverse IT and OT environments against cyber, physical, and cyber-physical threats.

IDECSI

IDECSI

IDECSI delivers cutting-edge technology and engages all employees in the security system for effective and cost-efficient data protection.

Quantum Security Services

Quantum Security Services

Quantum Security Services is a specialist information security firm providing a range of risk, compliance and technical security services.

Axient

Axient

Axient advances defense and civilian missions from aerospace to cyberspace with multi-domain test and analysis, mission engineering and operations, and advanced technologies.

Semgrep

Semgrep

Semgrep is a fast, open-source, static analysis tool for profoundly improving software security and reliability.

Kong

Kong

Kong - powering the API world. Increase developer productivity, security, and performance at scale with the unified platform for API management, service mesh, and ingress controller.

SecondSight

SecondSight

SecondSight’s Vertical AI embodies a full-spectrum approach to cyber insurance, facilitating accurate digital risk profiling.

itm8

itm8

itm8 is a Nordic digital transformation partner offering a wide range of services in IT operations and Cloud Services, Digital Transformation, Application Services, ERP, and Cyber Security.