Data thieves rely on an ever growing cache of high-tech surveillance weaponry to extract valuable information from their victims. Here are 10 illegal and legal ways cyber crooks tap into networks and computers to capture data and conversations
At the Black Hat conference, researchers plan to demonstrate a weakness in domain validation using secure sockets layer Web sessions, allowing hackers to get passwords. This is especially true in open Wi-Fi networks
Theives can lift precious data from computers by simply tapping into an electrical outlet or using a laser pointer that senses keyboard vibrations. Security experts speaking at Black Hat USA 2009 tell howrn
An Eastern Management Group survey found Asterisk and other open source telephony software beat out Nortel, when measured by the number of lines installed. Why an Infonetics analyst is skeptical
The application acceleration vendor is upgrading its software to allow traffic shaping products to share information about data flows and application performance.