Data thieves rely on an ever growing cache of high-tech surveillance weaponry to extract valuable information from their victims. Here are 10 illegal and legal ways cyber crooks tap into networks and computers to capture data and conversations
Personal development is about helping individuals become effective leaders able to set direction, persuade others to follow and deliver IT benefits to the business. But no matter how inventive the training courses on offer, many CIOs, like the unfortunate delegate in Herefordshire, are struggling to apply them to the practical problems of running an IT department
With financial support from the likes of Bell, Rogers and Microsoft, the newly formed NCFTA hopes to boost cybercrime research and development in Canada. Read what some of the organizations involved had to say