TECHNOLOGY > > Hackers


« Back to News

2016-11-14

Cyber Attack Takes Liberia’s Entire Internet Down

A cyber-attack knocked Liberia’s Internet offline, as hackers targeted the nation’s infrastructure using a mass DDOS technique.

2016-11-18

Inside Anonymous - ‘Civil War’ Over Its Fight With ISIS

Hacktivist collective Anonymous cannot agree on strategy or tactics in it's self-appointed task of tackling IS Cyber Jihad.

2016-11-19

Nude Celebrity Photo Hacker Jailed

“Celebgate” perpetrator who hacked the Apple iCloud would have been foiled by two-step authentication.

2016-11-18

Cyber-attacks & Hacking: What You Need To Know

Is the UK Government's investment of £1.9 Billion in cybersecurity defence plus a retaliatory capability really enough to address all the threats?

2016-11-11

The US Cyber Threat Against Russia

Off The Record: The US has penetrated Russia’s electric grid, telecommunications networks and the Kremlin’s command systems.

2016-11-08

IoT Is A Cyberwar Nightmare

The world got a glimpse of the future when a large-scale cyberattack prevented access to many key websites, exposing big concerns about the IoT.

2016-11-04

How Did WikiLeaks Get Clinton's Emails?

Julian Assange strongly denies US accusations that Russia is the source of the flood of hacked secret political emails released by Wikileaks.

2016-11-01

Shadow Brokers Release Secret List Of NSA-Compromised Servers

The Shadow Brokers hacking group who claimed to have leaked a portion of the NSA’s hacking tools and exploits is back with a Bang.

2016-11-07

North vs. South: Cyber Warfare In Korea Is Escalating

N. Korean government entities spearheading propaganda efforts are operating task forces to post comments on Internet portals in S. Korea.

2016-11-09

Find The Hacker With Action Security Intelligence

Developing actionable security intelligence requires gathering multiple insights regarding the identity, methods & motivation of the attacker.

2016-11-08

Cyber Strikeback: Putin’s Aide Hacked

Retaliation? Secret correspondence belonging to a top aide to Russian President Vladimir Putin hacked and leaked.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Lacuna Talent

Lacuna Talent

Lacuna Talent delivers the combined power of Via Resource, the international Cyber Security recruiter, and Lacuna Talent, the Specialist AI/Data recruiter.

PortSwigger

PortSwigger

PortSwigger's Burp Suite is an integrated platform for performing security testing of web applications.

Altius IT

Altius IT

Altius IT reviews your website for security vulnerabilities and provides a report identifying vulnerabilities and recommendations to make secure.

PhishLabs

PhishLabs

PhishLabs provides 24/7 services that help organizations protect against the cyberattacks targeting their employees, their customers and their brands.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

Unitrends

Unitrends

Unitrends helps IT pros do more with less by providing an all-in-one enterprise backup and continuity solution.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

Pryv

Pryv

Pryv is a Swissmade software for privacy, personal data collection, usage, sharing and storage.

Ciphertex Data Security

Ciphertex Data Security

Ciphertex is a leading data security company that specializes in portable data encryption and privacy protection storage systems.

Votiro

Votiro

Votiro is an award-winning cybersecurity company that specializes in file sanitization, ensuring every organization is safe from zero-day and undisclosed attacks.

Ipstack

Ipstack

Ipstack offers one of the leading IP to geolocation APIs and global IP database services worldwide. Protect your site and web application by detecting proxies, crawlers or tor users at first glance.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

Prophaze Technologies

Prophaze Technologies

Prophaze enable organizations and SaaS providers to improve their web application cybersecurity and reduce costs through AI automation.

RightCue Assurance

RightCue Assurance

RightCue Assurance identify opportunities for improvement in the Information Security for your organisation and work with you to reduce cyber risk.

Sensity

Sensity

Sensity is a company that offers an AI-driven solution to detect and verify deepfakes and other forms of identity fraud.

Alpha Echo

Alpha Echo

Specialising in security advice and enterprise-wide Cyberworthiness, Alpha Echo helps Australia deliver on cyber outcomes at a military grade level.