Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
Scroll down for all the latest news and information covering IT forensics.
Subscribe to our FREE weekly newsletter for all the latest industry news…
Sheer scale, sophistication and lifespan of the group puts all others in the shade
Cisco spots trojan downloader with a difference in a targeted email attack
The people behind Backoff have been using surveillance cameras to verify that machines are in fact POS devices.
But new details of the hack emerge, as regulators consider vendor regulations.
A new variant has been tweaked with a domain generation algorithm (DGA) to avoid traffic detection.
New capabilities are expanding the malware's target area and threat level.