TECHNOLOGY > > Hackers


« Back to News

2016-12-27

Malicious Ads Expose Millions To Hacking

Millions of Internet users have been exposed to malicious code served from the pixels in tainted banner ads meant to install Trojans and spyware.

2016-12-22

Yahoo’s Latest Billion Breach!

The scale of a second Yahoo data breach is massive, but although the attack took place in 2013 it is only in December 2016 that Yahoo made this public, because even they did not know about it until November 2016!

2016-12-21

No Password Is Too Complex For Hackers

Another huge data breach and another reason that the current password security system for business applications and websites is flawed.

2016-12-19

Putin Personally Interfered With The US Election

US intelligence believes that Vladimir Putin was personally involved in election hacking in a vendetta against Hillary Clinton.

2016-12-09

AI Ushers In A Whole New Era Of Hacking

Hackers won't necessarily always be human. AI promises to revolutionise cybersecurity and could one day become the go-to hacking tool.

2016-12-12

Russia Has Foiled Cyberattacks By A Foreign Spy Agency

A "large-scale" cyberattack by foreign intelligence services meant to destabilise the country’s financial system has been thwarted.

2016-12-14

Surprise: N Korea Hacked S Korea Cyber Command

N Korea appears to have hacked S Korea's cyber command in what could be the latest cyberattack against Seoul.

2016-12-19

Medical Implants Can be Hacked

Research shows it is possible to transmit life-threatening signals to implanted medical devices with no prior knowledge of how the devices work.

2016-12-13

Five Biggest Data Breaches In History (That We Know About)

Data Loss is up 30% in the first 6 months of 2016 and Identity Theft is now the favourite tactic for hackers and cyber criminals. Here are 5 big ones.

2016-12-07

Yes, Russia Weaponised Social Media In The US Elections

Russia didn't just hack & leak documents from US political groups, it used social media as a weapon to influence perceptions about the election.

2016-11-30

US Navy Personnel Data Breached

The US Navy is investigating a data breach after personal information of more than 130,000 sailors was accessed.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

C3IA Solutions

C3IA Solutions

C3IA Solutions is an NCSC-certified Cyber Consultancy providing assured, tailored advice to keep your information secure and data protected.

AhnLab

AhnLab

AhnLab provides a range of information security solutions including network security, endpoint security, antivirus and consulting services.

Ministry of Defence Georgia - Cyber Security Bureau

Ministry of Defence Georgia - Cyber Security Bureau

The aim of the Cyber Security Bureau is to establish and develop stable, effective and secure Information and Communication Technology systems for the Civil Office of MoD of Georgia.

First National Technology Solutions (FNTS)

First National Technology Solutions (FNTS)

First National Technology Solutions is a leading provider of flexible, customized hosted and remote managed services including IT security and compliance.

MASS

MASS

MASS provides world-class capabilities in electronic warfare operational support, cyber security, information management, support to military operations and law enforcement.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

Ampliphae

Ampliphae

Ampliphae gives you an easy-to-deploy, sophisticated and affordable cloud-discovery, security and compliance platform.

Eureka Technology Partners

Eureka Technology Partners

Eureka Technology Partners are committed to helping you focus on your business by taking care of your IT infrastructure and data security needs.

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

National Institute for Research & Development in Informatics (ICI Bucharest) - Romania

ICI Bucharest is the most important institute in the field of research, development and innovation in information and communication technology (ICT) in Romania.

BT Security

BT Security

BT provides telecommunications and network infrastructure services to keep businesses around the world connected and secure.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

Zama

Zama

Zama - pioneering homomorphic encryption. We believe people shouldn't care about privacy. Not because it doesn't matter, but because it shouldn't be an issue!

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.

Protega

Protega

Protega is a company specialized in Managed Cybersecurity Services (MSS) & SOC 24×7; management, risk & compliance (GRC); implementation of data protection technologies; and Red Team services.

Sonar

Sonar

AI generated or written by humans, Sonar’s Clean Code Solutions cover your code quality needs, improving code reliability, maintainability, and security.

12Port

12Port

12Port network security solutions help companies tackle modern cybersecurity threats cost-effectively while implementing zero-trust architectures.