TECHNOLOGY > Hackers


« Back to News

2015-01-18

Sony has a $60 million Cyber Insurance policy

Sony Pictures Entertainment holds $60 million in Cyber insurance with Marsh, according to documents leaked by the group claiming responsibility for the attack on the movie studio.

2015-01-14

‘Anonymous’ Call For Revenge On Charlie Hebdo Terrorists

“Anonymous from around the world have decided to declare war against you, terrorists” a purported member of the hacktivist group said in a video uploaded to YouTube, referring to the killers responsible for the attack on French satirical newspaper Charlie Hebdo. Speaking in French on Anonymous’s Belgian channel, the cyber vigilante warned terrorists, “We will track all your online activity, we will close your accounts on every social network.”

2014-12-23

New York premiere of Sony film The Interview cancelled

The New York premiere of The Interview, a comedy about the assassination of North Korea's president, has been cancelled amid threats from hackers. Now Sony Pictures has cancelled the planned US release on 25 December of the film The Interview, after major cinema chains decided not to screen it.

2014-12-10

150 million cars will be connected to the Internet by 2020

In just five years, most cars and trucks will be connected to the Internet, according to a report from Gartner Inc. By 2020, about 150 million vehicles will be connected via Wi-Fi, and 60% to 75% of them will be capable of consuming, creating and sharing Web-based data, the report states.

2014-12-10

North Korea continues cyber warfare against Sony

For the past few weeks, entertainment giant Sony Pictures has seen its computers paralysed by a cyberattack.

2014-06-19

Massive eBay Hack – 145m Users Affected

A database containing millions of eBay user data, including passwords has been hacked.

2014-06-27

Two weeks to save your computer from major cyber attack.

The UK National Crime Agency teamed up with the FBI and other cybercrime experts to take down a criminal network’s ‘command-and-control’ – but admit they cannot keep it down for long.

2014-11-27

Exposing Cybersecurity Cracks: A Global Perspective

A Ponemon Report uncovers the deficient, disconnected and in-the-dark conditions that challenge IT security professionals. Areas of focus include a deficit in security solution effectiveness; a disconnect regarding the perceived value of confidential data; and limited visibility into cybercriminal activity.

2014-08-20

Two weeks to save your computer from major cyber attack

Computer users have under two weeks to save themselves from a cyber attack blamed for millions of pounds of fraud across the world.

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Tenable Network Security

Tenable Network Security

Tenable Network Security - Don't rely only on CVSS to prioritize. Use machine learning to predict what is most likely to be exploited.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Cyber Security Service Supplier Directory

Cyber Security Service Supplier Directory

Free Access: Cyber Security Service Supplier Directory listing 4,000+ specialist service providers.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Council on Foreign Relations (CFR)

Council on Foreign Relations (CFR)

CFR is dedicated to better understanding the world and the foreign policy choices facing the USA and other countries. Cyber security is covered within the CFR topic areas.

CrowdStrike

CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

Teradata

Teradata

Teradata is a leading provider of enterprise big data analytics and services. Applications include Cyber Security Analytics.

M5 Network Security

M5 Network Security

M5 Network Security provide cybersecurity services to military, government and large corporations.

Napatech

Napatech

Napatech develops and manufactures high speed network accelerators specifically designed for real-time network monitoring and analysis applications.

AuditSafe

AuditSafe

AuditSafe provides audit services for Information Security, Risk Management and Corporate Governance.

Practical Assurance

Practical Assurance

Practical Assurance helps companies navigate the rough terrain of information security compliance.