Security News
Monitoring tools can be used for legitimate and malicious purposes. The first category includes parental control and employee monitoring software, the second one screenshot grabbers, keyloggers, v...
NULL
http://www.computerworld.com/article/2688809/ceo-indicted-for-companys-alleged-mobile-spyware-app.html By Grant Gross IDG News Service Sept 29, 2014
http://www.washingtonpost.com/world/national-security/italian-spyware-firm-relies-on-us-internet-servers/2014/03/03/25f94f12-9f00-11e3-b8d8-94577ff66b28_story.html By Ellen Nakashima and Ashkan...
http://www.nextgov.com/cybersecurity/2013/09/are-your-g20-briefings-laced-spyware/69888/ By Aliya Sternstein Nextgov.com September 4, 2013
http://arstechnica.com/security/2012/12/how-spyware-on-rental-pcs-captured-users-most-intimate-moments/ By Dan Goodin Ars Technica Dec 18 2012
http://www.computerworld.com/securitytopics/security/story/0,10801,103450,00.html By Lucas Mearian JULY 22, 2005 COMPUTERWORLD The Federal Deposit Insurance Corp. (FDIC) today issued a list of...