Althought IT security professionals are winning the war against traditional security threats such as spam and application code exploits, cyber criminals are switching tactics to social network phishing,...
Patch ASAP, urges Citrix - then scan your network for any indicator of compromise
Met plans to use live facial recognition at 'specific location' in London to 'help protect the vulnerable'
If exploited, the vulnerabilities could enable hackers to steal confidential health details of patients
UN experts demand detailed investigation into alleged Saudi involvement in Jeff Bezos' phone hacking
UN report based on technical probe by specialists at FTI Consulting
Government sources indicate that Huawei's role in the UK's 5G networks will be limited to the periphery