Feeds

Cashpoint mugger flashes distractionary chesticles

Cunning jub-based attack

Beginner's guide to SSL certificates

Two Eastern European women last Saturday relieved a Parisian of €300 by using a cunning jub-based attack on their hapless victim.

The man was intercepted at a bank in Paris's 6th arrondissement by the pair of female ne'er-do-wells, one of whom demanded cash and tried to distract him using a newspaper as he extracted wonga from the cashpoint.*

The exact nature of the newspaper ruse is not noted, but it evidently failed, since one of the women then flashed her jubs at the man and "put her hand between his legs", as Le Parisienne puts it.

Her accomplice quickly swiped the chap's 300 bucks, and the two breast bandits legged it. They have not yet been identified, either facially or mammarily. ®

Bootnote

* EAOE, in this case. The schoolboy French isn't what it was, mes braves.

Choosing a cloud hosting partner with confidence

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Managing SSL certificates with ease
The lack of operational efficiencies and compliance pitfalls associated with poor SSL certificate management, and how the right SSL certificate management tool can help.