More from The Register
Peace-sign selfie fools menaced by fingerprint-harvesting tech
Cute photo? Your biometrics just got raided, boffins warn
Realistic Brits want at least 3 security steps on bank accounts
Which breach were your details revealed in, then?
We are 'heroes,' says police chief whose force frisked a photographer
Brit plod used Terrorism Act to collar snapper. Hello, 2005
Evaluation Guide for Mobile App Security Testing
What do you need to look for when identifying, evaluating, and implementing mobile app security testing solutions?
Advanced In-Memory Computing
With the rise of real time and on-demand applications, massive data is generated which needs better and faster processing that derives meaningful patterns from the data generated.
Achieving the Dynamic Data Center
Examining the emergence of clustering in the enterprise data center, and a set of criteria to consider when evaluating options for managing advanced, clustered IT infrastructure.
Customer Communication Management in the Cloud
What role does customer communication management play today in financial services firms’ business?