TECHNOLOGY > Hackers


« Back to News

2020-07-14

Attacks On Financial Services Are Increasingly Sophisticated

Sophisticated new attack vectors combined with poorly trained staff and malicious users hold a growing threat to the British financial system.

2020-07-06

Journalist’s Phone Hacked Using An ‘Invisible’ Technique

The iPhone was infected by “network injection,” a fully automated technique which intercepts a cellular signal when it visits a website.

2020-07-06

Iran’s Nuclear Site Attacked Following Attempts To Hack Israel's Water System

A cyber attack is thought to have caused a fire at Iran's Natanz nuclear enrichment facility, after a failed attempt to poison Israel's water supply.

2020-07-06

Hackers Extort $1.14m From University of California

The University of California has paid a ransom of $1.14 million to hackers to restore encrypted data following an attack on its School of Medicine.

2020-06-27

Companies Are Coughing Up Ransom To Recover Their Data

One in six of those attacked with malware have surrendered by paying out the ransom following a data breach. One firm paid over £70million.

2020-06-27

Amazon Web Services Fights Off Massive DDoS Attack

Amazon's online cloud, which provides the infrastructure on which many websites rely, has defended itself against the largest DDoS attack ever.

2020-06-26

How Hackers Invade Your Computer

Hacking attempts are aimed at the most vulnerable, insecure computers that can be hijacked and used to launch many other attacks.

2020-06-24

Australia Assaulted By Severe State-Backed Cyber Attacks

Australia has not directly accused China and yet the scale, nature of the targeting and the signature methods used all point one direction.

2020-06-23

Beware Trojan Mobile Banking Apps

The FBI advises users to exercise extreme caution when downloading banking Apps to mobile devices, as they could hide 'malicious intent'.

2020-06-19

The Future Of Ransomware Is In The Cloud

Ransomware has become a multibillion dollar industry for cyber criminals, who are staring to focus on the fast-growing Cloud computing sector.

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Software Engineering Institute (SEI)

Software Engineering Institute (SEI)

At the CERT Division of SEI we study and solve cybersecurity problems, research security vulnerabilities in software, and develop information and training to help improve cybersecurity.

PlainID

PlainID

PlainID provides IAM teams with a simple and intuitive means to control their organization’s entire authorization process.

Asseco Group

Asseco Group

Asseco Poland stands at the forefront of the multinational Asseco Group. We are a leading provider of state-of-the-art IT solutions in Central and Eastern Europe.

Cyber Defense Agency (CDA)

Cyber Defense Agency (CDA)

Cyber Defense Agency is a premier professional services firm specializing in cyber security, computer network defense, and information security.

Agesic

Agesic

Agesic is an institution that leads the development of the Digital Government and the Information and Knowledge Society in Uruguay.

Purple Security

Purple Security

Purple Security arises from the association of specialists in offensive security (ethical hackers, white hats) and experts in insurance, compliance and implementation of industry standards.

Simply Hired

Simply Hired

Simply Hired is a job search engine that collects job listings from all over the web, including company career pages, job boards and niche job websites.

Satori Cyber

Satori Cyber

The Satori Cyber Secure Data Access Cloud is the first solution on the market to offer continuous visibility and granular control for data flows across all cloud and hybrid data stores.