TECHNOLOGY > > Hackers


« Back to News

2016-10-27

Meet The Fancy Bears

A mysterious group of Russian hackers, known by several different names, are perpetrating a string of high profile and politically motivated hacks.

2016-10-25

Who Is Trying To Disrupt The Internet?

A prolonged Internet outage affecting major sites raises a real concern that this is just a practice run for more widespread internet disruption.

2016-10-25

Russian Citizen Charged With Hacking LinkedIn

A Russian man has been charged with stealing information from computers at LinkedIn and other San Francisco Bay Area companies.

2016-10-26

Media Vulnerable To Election Night Cyber-Attack

US media organisations have failed to properly protect their newsrooms which are vulnerable to a chaos-creating hack around Election Day.

2016-10-25

Hackers 'weaponised' Malware To Mount Massive Assault

The huge weekend attack on global Internet access is believed to have been unleashed by hackers using common IoT devices.

2016-10-19

Stolen NSA Hacking Tools For Sale In Bizarre Auction

The hackers who are auctioning off Cyber-weapons allegedly stolen from the NSA are growing annoyed and want cash.

2016-10-19

Overwhelming Cyber Attacks On Healthcare

Healthcare organisations struggle to manage the risks of massive data breaches, which are hard to detect & often take months to discover.

2016-10-17

Hillary Clinton Says WikiLeaks Is 'Russian Propaganda'

Clinton fires back as Wikileaks release more hacked emails, calling the website a “propaganda arm of the Russian government”. What's going on?

2016-10-14

US And Russia Face Off Over Syria & Cyber Attacks

Relations between the US and Russia are taking a nosedive. Will the their global cyber conflict escalate?

2016-10-13

Hacking The Vote: Russia Wins, America Loses

Russia has finally issued a response to the allegations of hacking American government servers and it proved to be a very unsubtle one.

2016-10-12

Hackers Target Election Systems in 20 US States

The US government has formally accused Russia of political hacking and say Moscow is attempting to “interfere” with the 2016 Presidential election.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Protective Intelligence

Protective Intelligence

Protective Intelligence brings together a group of information security specialists with a passion for delivering high-quality solutions.

Center for Internet Security (CIS)

Center for Internet Security (CIS)

CIS is a nonprofit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats.

Adroit Technologies

Adroit Technologies

Adroit Technologies has been developing award winning real-time software for the industrial automation markets for over 25 years.

Fortress Group

Fortress Group

Fortress is specialized in confidential and discrete recruitment solutions and temporary staffing in the field of security and risk management.

SecuPi

SecuPi

SecuPi delivers data-centric security with data-flow discovery, real-time monitoring, behavior analytics, and protection across web and enterprise applications and big data environments.

Enigmatos

Enigmatos

Enigmatos is an Israeli based Automotive Cyber Security company. We provide solutions to the ever growing threat of vehicle hacking.

Jacobs

Jacobs

Jacobs is at the forefront of the most important security issues today. We are inspired to be the best and deliver innovative, mission-focused outcomes that matter to our clients.

Lionfish Cyber Security

Lionfish Cyber Security

Lionfish Cyber Evolution & Empowerment Model™ empowers SMBs to prepare and protect themselves against cyber threats using a unique combination of on-demand training, support and managed services.

PPC Protect

PPC Protect

PPC Protect is an entirely automated click fraud prevention solution.

Belcan

Belcan

Belcan is a global supplier of engineering, manufacturing & supply chain, workforce and government IT solutions to customers in the aerospace, defense, automotive, industrial, and private sector.

PT Prima Cyber Solusi

PT Prima Cyber Solusi

PT Prima Cyber Solusi is focused on protecting your business from the massive and devastating impacts that cyber-attacks may cause.

SecAlliance

SecAlliance

SecAlliance is a cyber threat intelligence product and services company.

Cynical Technology

Cynical Technology

Cynical Technology is a Nepalese cybersecurity company with expertise in security consulting, auditing, testing and compliance.

Elba

Elba

Employee security needs to be reinvented. SaaS security needs to involve end-user and awareness needs to be actionable. Meet elba, the 5-in-one cybersecurity hub with no compromises.

Security Compliance Associates (SCA)

Security Compliance Associates (SCA)

The sole focus of SCA is safeguarding critical information and complying with information security regulations.

Custom Computer Specialist (CCS)

Custom Computer Specialist (CCS)

CCS offers an extensive range of services including cybersecurity solutions, consulting, implementation, and support to help our clients maximize the value derived from IT investments.