Computing Enterprise Security Review 2016 Moving defence to real time Key highlights from the research include: • GDPR and ransomware are the two issues focusing minds. • There are big differences...
Hacker was unable to access users' credit card numbers, passwords, or copies of other sensitive documents, the online gambling operator claims
Patch ASAP, urges Citrix - then scan your network for any indicator of compromise
Met plans to use live facial recognition at 'specific location' in London to 'help protect the vulnerable'
If exploited, the vulnerabilities could enable hackers to steal confidential health details of patients
UN experts demand detailed investigation into alleged Saudi involvement in Jeff Bezos' phone hacking
UN report based on technical probe by specialists at FTI Consulting