Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
Scroll down for all the latest news and information covering IT forensics.
Subscribe to our FREE weekly newsletter for all the latest industry news…
The final of the Cyber Security Challenge UK 2015 is well underway, with 42 contestants taking part in a simulated real-life cyber-terrorism incident
The platform has dozens of modules, and there may be dozens more to be uncovered.
The people behind Backoff have been using surveillance cameras to verify that machines are in fact POS devices.
Cloud Atlas uses an unusual set of tactics that are not very common in the APT world, including using cloud accounts for C&C communications.
But new details of the hack emerge, as regulators consider vendor regulations.
Since its source code was leaked in July, Tinba has gotten a host of new—and dangerous—features.