Altor Juniper
On by Tom Jowitt 0

Juniper is to offload its Junos Pulse mobile security business as part of a wide-ranging restructure

Read more

Russia © Alexey Usov Shutterstock 2012
On by Max Smolaks 0

The Russian Interior Ministry offers £81,600 for a method to track users of the anonymous Tor network

Read more

Cloud computing © alexmillos Shutterstock 2012
On by Tom Jowitt 0

Researchers use free Cloud accounts to create a botnet, rather than hijacking computer resources from innocent victims

Read more

ChristopherGraham350
On by Max Smolaks 0

The privacy watchdog gets money to cope with the additional workload created by the controversial DRIP bill

Read more

Creativa
On by Max Smolaks 0

Inadequate security resulted in the loss of more than a million customer credit and debit card numbers

Read more

Emmental Cheese
On by Max Smolaks 0

Cyber criminal gang devises a new, complex method of hijacking SMS to steal money

Read more

Young man in handcuffs - copyright Fotolia
On by Tom Jowitt 0

Two arrests made in London as police swoop on international gang that defrauded eBay's online ticketing service

Read more

ilolab
On by Max Smolaks 0

Hackers steal partially encrypted records from an events website that belongs to the bank

Read more

TAILS-Logo large
On by Max Smolaks 0

TAILS Linux, used by Edward Snowden to communicate with journalists, is patching holes in one of its network overlays

Read more

Huawei E355 2
On by Steve McCaskill 0

Huawei E355 XSS flaw is described as "close to as being bad as can be" with users advised to switch off scripting functionality

Read more