When people think about their information and privacy few stray beyond email, text messaging, instant messaging, documents, social networks, browser history, diary entries, address book, who they call...
Hacker was unable to access users' credit card numbers, passwords, or copies of other sensitive documents, the online gambling operator claims
Patch ASAP, urges Citrix - then scan your network for any indicator of compromise
Met plans to use live facial recognition at 'specific location' in London to 'help protect the vulnerable'
If exploited, the vulnerabilities could enable hackers to steal confidential health details of patients
UN experts demand detailed investigation into alleged Saudi involvement in Jeff Bezos' phone hacking
UN report based on technical probe by specialists at FTI Consulting