Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
Scroll down for all the latest news and information covering IT forensics.
Subscribe to our FREE weekly newsletter for all the latest industry news…
Given the high value customers casinos serve, stolen credit and debit cards from this sector are prized by attackers.
The final of the Cyber Security Challenge UK 2015 is well underway, with 42 contestants taking part in a simulated real-life cyber-terrorism incident
Kaspersky Lab finds link to QWERTY code leaked by Snowden
The people behind Backoff have been using surveillance cameras to verify that machines are in fact POS devices.
Cloud Atlas uses an unusual set of tactics that are not very common in the APT world, including using cloud accounts for C&C communications.
The criminals first gain physical access to the ATMs, which are shockingly insecure.