TECHNOLOGY > > Hackers


« Back to News

2017-04-18

WikiLeaks Has Published The CIA’s Secrets For Infecting Windows

Wikileaks' release of CIA secret hacking tools includes software to build customised malware to compromise computers running Windows.

2017-04-14

Half Of All Canadian Businesses Hacked

Fifty percent Of Canadian bosses say that they know for certain that their company experienced a breach. A further 10% thought they probably had.

2017-04-13

TeamSpy Malware Returns to Steal Data

A new spam campaign has emerged using the TeamSpy data-stealing malware which gives cybercriminals full access to compromised computers.

2017-04-10

Geolocation, Russian Hackers & False Flag Operations

Experts at ICIT say malicious actors can easily position their breach so that it can be attributed to Russian state-sponsored hackers.

2017-03-31

WikiLeaks Will Share CIA's Hacking Secrets

Tech companies are not lining up to accept Wikileaks offer to get access to the stolen CIA hacking tools to help fix software vulnerabilities.

2017-03-30

Hackers Threaten To Attack Israel's Cyber Infrastructure

People associated with the Anonymous hackers' organisation are threatening to attack Israel's cyber infrastructure on April 7th.

2017-03-23

Hack Headlines Cause Financial Damage

Many large companies would prefer to pay ransom to avoid public shaming & other devastating consequences of a security breach.

2017-03-15

Information Warfare Isn’t Just Russian – It’s Also American As Apple Pie

The American public are still seeking to understand the events that occurred during 2016 Presidential Election & probably will be for some time.

2017-03-15

Italian Bank Cyber Spy Attacks

Mario Draghi, president of the European Central Bank, and former Italian Prime Minister Matteo Renzi were among those hacked in a cyber-spying operation that targeted more than 18,000 e-mail accounts

2017-03-15

Could Hackers Turn the Lights Out?

For a long-time computer security experts have warned about the threat hackers pose to the systems that help control the power stations, water treatment plants and transport systems we rely on.

2017-03-15

Now China Tells US To Stop Spying

China's first reaction to WikiLeaks' disclosure of a trove of CIA documents that alleged the agency was able to hack digital devices worldwide.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Datiphy

Datiphy

Datiphy's data-centric security platform uses behavioral analytics, and data-centric auditing and protection capabilities to mitigate risk.

Jetico

Jetico

Jetico provides pure & simple data protection software for all sensitive information throughout the lifecycle. Solutions include data encryption and secure data erasure.

Exabeam

Exabeam

Exabeam is a global cybersecurity leader that delivers AI-driven security operations.

SaferVPN

SaferVPN

SaferVPN is a Virtual Private Network services provider offering secure encrypted access to the internet.

Jumio

Jumio

Jumio’s end-to-end identity verification and authentication solutions fight fraud, maintain compliance and onboard good customers faster.

Connectitude

Connectitude

Connectitude IIoT Platform ™ is a complete solution for industrial IIoT.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

BrandShelter

BrandShelter

BrandShelter specializes in providing online brand protection for companies and trademark owners.

CYDEF

CYDEF

CYDEF provides comprehensive, state-of-the-art cybersecurity protection that is accessible and affordable to organizations of any size.

Prompt Security

Prompt Security

Prompt Security provides an LLM agnostic approach to ensure security, data privacy and safety across all aspects of Generative AI.

Protega

Protega

Protega is a company specialized in Managed Cybersecurity Services (MSS) & SOC 24×7; management, risk & compliance (GRC); implementation of data protection technologies; and Red Team services.

Robust Intelligence

Robust Intelligence

Robust Intelligence enables enterprises to secure their AI transformation with an automated solution to protect against security and safety threats.

Sacumen

Sacumen

Sacumen is a niche player in the cybersecurity market, solving critical problems for security product companies.

TeamT5

TeamT5

TeamT5 Inc. is a leading cybersecurity company dedicated to cyber threat research and solutions.

Defence Logic

Defence Logic

Defence Logic is a cyber security company serving clients in many business sectors. Our consultancy services include Penetration Testing, Security Reviews and Monitoring.

Platview Technologies

Platview Technologies

Platview Technologies is an innovative and agile cybersecurity company with the goal of safe-guarding businesses with our world-class, industry-leading services and technology solutions.