TECHNOLOGY > > Hackers


« Back to News

2018-06-18

Profile Of An Ethical Bug Hunter

Ethical hacking has moved on from academic researchers and lone wolf hackers and has become a big business, in the form of bug hunting.

2018-06-18

Expect A Cyber Attack On The FIFA World Cup In Russia

The Wold Cup could suffer attack vectors from fake ticket spam and infiltration of governing body infrastructure with destructive payloads.

2018-06-14

Chinese Hackers Steal Naval Warfare Secrets

A contractor using an unsecured network was the entry point for Chinese hackers to steal top secret data about the US Navy's submarine missiles.

2018-06-07

Chinese & Russian Hackers Target S. Korea Ahead Of US / N. Korea Summit

Whilst S Korea has long been a target of it's northern neighbour, the experts at FireEye say the pace of attacks from elsewhere is intensifying.

2018-06-06

UK Will Name The Nations Sponsoring Cyber Attacks

Britain will name and shame foreign states that hire hackers to carry out cyber attacks or interfere via the Internet in national elections.

2018-06-06

Terrorists Deploy New Techniques To Counter Digital Forensics

Terror groups are using new and better techniques to hide data in computers and phones to reduce the intelligence value of seized laptops & phones.

2018-06-01

N Korean Cyber Attacks Continue Despite Peace Talks

Experts see an intensification in the level of cyber attacks from N Korea in the build up to talks with S Korea and the US on de-nuclearisation.

2018-05-28

Spies Hack Journalism

A Leak. A Whistelblower. A Spy. In a world in which foreign intelligence services hack, leak and fabricate, journalists have to use extreme caution.

2018-05-25

An Iranian Hacker Confesses

Understanding the hierarchy of Iran's hackers offers insight into how to defend against the prospect of attacks from the Islamic Republic.

2018-05-22

Hacking The Vote

More than 20 elections scheduled in N. America and Europe over the next two years will provide “fertile ground” for interference.

2018-05-18

How Do Hackers Hide Their IP Address?

Cyber-criminals could be operating from any part of the world and can remain untraceable because they can hide their IP addresses from prying eyes.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

ISTQB

ISTQB

ISTQB has defined the "ISTQB Certified Tester" scheme that has become the world-wide leader in the certification of competences in software testing.

Arsenal Insurance Company

Arsenal Insurance Company

Arsenal is an insurance provider based in Moscow, Russia. Services offered include Cyber Risk insurance.

Duo Security

Duo Security

Duo combines security expertise with a user-centered philosophy to provide two-factor authentication, endpoint remediation and secure single sign-on tools.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic (MyCSC)

MyCyberSecurity Clinic's main goal is toward establishing an international reference centre for excellence in the field of digital forensics and data recovery services.

Software Diversified Services (SDS)

Software Diversified Services (SDS)

SDS provides the highest quality mainframe software and award-winning, expert service with an emphasis on security, encryption, monitoring, and data compression.

Rostelecom

Rostelecom

Rostelecom is Russia’s largest integrated provider of digital services and solutions, covering all market segments including consumer, governmental and private organizations.

In Fidem

In Fidem

In Fidem specializes in information security management, with a bold approach that views cybersecurity as a springboard to organizational transformation rather than a barrier to innovation.

Data Protection Commission (DPC)

Data Protection Commission (DPC)

The Data Protection Commission (DPC) is the national independent authority responsible for upholding the fundamental right of individuals in the EU to have their personal data protected.

Xmirror Security

Xmirror Security

Xmirror Security focuses on integrated detection and defense of the continuous threat to the DevSecops software supply-chain with artificial intelligence technology as the core.

Quantum Ventura

Quantum Ventura

Quantum Ventura is a technology innovation company with a single mission of delivering customer-centric advanced solutions to US Federal & State Governments and Private Sector customers.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

Innov8tif

Innov8tif

Innov8tif is an AI company specialised in providing ID assurance solutions — helping digital businesses to prevent frauds by verifying and authenticating customers identity.

Vault Cloud

Vault Cloud

Vault Cloud, Australia's National Cloud, is an Australian owned and operated company specialising in secure, sovereign, hyperscale cloud infrastructure.

Cybersecurity Elastic Laboratory (CEL)

Cybersecurity Elastic Laboratory (CEL)

CEL specialize in providing top-tier services in vulnerability diagnosis and penetration testing, offering a comprehensive suite of solutions to mitigate cyber risks.

ViroSafe

ViroSafe

ViroSafe is a leading value-added distributor of IT security solutions in Norway.