Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
Scroll down for all the latest news and information covering IT forensics.
Subscribe to our FREE weekly newsletter for all the latest industry news…
Attackers increasingly use methods that leave few traces behind—so we are in an arms race where the key difference is training.
Several healthcare providers were affected by the attack, including local companies and national outlets, and the federal government.
Ingenious Hammertoss uses social media and steganography to hide Russian state-sponsored attackers' activities.
The final of the Cyber Security Challenge UK 2015 is well underway, with 42 contestants taking part in a simulated real-life cyber-terrorism incident
Cisco spots trojan downloader with a difference in a targeted email attack
The people behind Backoff have been using surveillance cameras to verify that machines are in fact POS devices.