TECHNOLOGY > Hackers


« Back to News

2020-05-15

Beware The Latest Malware

Malware attacks are more damaging than ever before. How can you protect your business against the latest threats? By Chester Avey

2020-05-13

Iran Fingered For Attack On Israeli Water Infrastructure

Iranian hackers are reported to have used servers located in the US to deliver an attack on Israel's water and sewage infrastructure.

2020-05-05

Hackers Are Selling Your Social Media Data

An investigation shows that Social Media companies are failing to clamp down on scammers selling people's personal details.

2020-05-04

Zoom 5.0 Aims To Reduce 'Zoom Bombing'

Zoom is a prime target for hackers and spies but security researchers are saying that even the new 5.0 app with encryption is a privacy threat.

2020-05-04

Hackers Attack Israel’s Water Infrastructure

Hackers have targeted supervisory control and data acquisition (SCADA) systems at water treatment plants and pumping stations.

2020-04-29

Ransomware Authors Go Beyond Malicious Encryption

Ransomware is mutating into a phenomenon with two-pronged extortion at its core, adding data theft to the threat of blackmail. By David Balaban

2020-04-28

Cyber Criminals Exploit Lockdown Workers

Home-based WiFi networks and 4G connections for remote work don’t have anything like the resilience of corporate security technologies.

2020-04-23

Google Reports 18m Coronavirus Scam Emails Every Day

Hackers are sending roughly 18 million hoax emails every day and the COVID-19 virus may now be the biggest phishing topic ever.

2020-04-23

Increased Cyber Threats From North Korea

US security agencies are warning Financial institutions they could soon be attacked by a fresh wave of North Korean state-sponsored hackers.

2020-04-22

How Coronavirus Helps Hackers Get Rich

Cybercrime’s response to the COVID-19 outbreak is a toxic cocktail of malware distribution and fraud to take advantage of our fears. By David Balaban

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Synology

Synology

Synology provides high-performance, reliable, and secure Network Attached Storage (NAS) products.

European Council on Foreign Relations (ECFR)

European Council on Foreign Relations (ECFR)

ECFR is a pan-European think-tank conducting research and promote informed debate on European foreign policy. Cyber security is becoming an intrinsic element of foreign policy debate.

e-Share

e-Share

e-Share is the leader in solutions designed to secure information shared during the dynamic collaboration processes that occur beyond an organization’s own IT borders.

Cipher Tooth

Cipher Tooth

CipherTooth is a superior system for delivering secure content over the Internet.

Network Integrity Systems

Network Integrity Systems

Network Integrity Systems is a leader in network infrastructure security and offers solutions specifically developed for Government and Private Enterprise.

International Consortium of Minority Cybersecurity Professionals (ICMCP)

International Consortium of Minority Cybersecurity Professionals (ICMCP)

ICMCP was launched to help bridge the ‘great cyber divide’ that results from the underrepresentation of minorities and women in the field of cyber security.

Crosser

Crosser

The Crosser Platform enables real-time processing of streaming or batch data for Industrial IoT, Data Transformation, Analytics, Automation and Integration.

SYSGO

SYSGO

SYSGO is the leading European provider of real-time operating systems for critical embedded applications in the Internet of Things (IoT).