Data thieves rely on an ever growing cache of high-tech surveillance weaponry to extract valuable information from their victims. Here are 10 illegal and legal ways cyber crooks tap into networks and computers to capture data and conversations
Jacqueline Miller is on a one-woman quest to educate companies about the germs they leave on their keyboards, mice and phones. She tells ComputerWorld Canada why IT departments should be the first to clean up their act
Microsoft Corp. introduced a new line of keyboards and mice on Wednesday, including some with fingerprint readers that lets users scan a finger instead of having to enter a log-in name and password when accessing online services or logging on to the PC.