Cookies enable us to provide the best experience possible and help us understand
how visitors use our website.
Scroll down for all the latest news and information covering IT forensics.
Subscribe to our FREE weekly newsletter for all the latest industry news…
The final of the Cyber Security Challenge UK 2015 is well underway, with 42 contestants taking part in a simulated real-life cyber-terrorism incident
Sheer scale, sophistication and lifespan of the group puts all others in the shade
The two malwares have been working together and now have conjoined code.
The people behind Backoff have been using surveillance cameras to verify that machines are in fact POS devices.
Cloud Atlas uses an unusual set of tactics that are not very common in the APT world, including using cloud accounts for C&C communications.
The criminals first gain physical access to the ATMs, which are shockingly insecure.