Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
Scroll down for all the latest news and information covering IT forensics.
Subscribe to our FREE weekly newsletter for all the latest industry news…
Since its source code was leaked in July, Tinba has gotten a host of new—and dangerous—features.
Collaboration beyond sharing malware samples is the goal.
New capabilities are expanding the malware's target area and threat level.
Malware authors are looking for more bang for the buck.
The malware uses the Tor anonymity network to attack its victims.
Criminals, as ever, adapt to go after low-hanging fruit.