2/1/08

Combating Computer Espionage

Combating Computer Espionage February 1st, 2008 In some cases, spies and covert operations are found in war grounds or politically tense regions ... . In severe cases though, certain spyware better labeled as <strong class="keyword">malware</strong>, are used for criminal purposes ... . For instance, <strong class="keyword">malware</strong> can take note of your keystrokes or take note of your credit card number<br /><br />Posted in <strong><a rel="nofollow" target="_blank" href="http://technorati.com/blogs/http://www.softwaredig.com">Software Dig</a></strong> (<a rel="nofollow" target="_blank" href="http://technorati.com/search/http%3A%2F%2Fwww.softwaredig.com" style="color:#390;"><img src="http://static.technorati.com/images/bubble_h11.gif" alt="View Technorati URL search" style="border:none;"/> 1 link from 1 site</a>) <br /><br /><img width="1" height="1" src="http://static.technorati.com/y/995196299.gif?anM9MCZyZWY9YXBpfC9zZWFyY2g/cXVlcnk9bWFsd2FyZSZsYW5ndWFnZT1lbiZrZXk9YmYyMjQ5ZjVhOTRmMzY1MmZjNjc0ODBjZWExYjg0MjQmZm9ybWF0PXJzc3wyMHxodHRwOi8vd3d3LnNvZnR3YXJlZGlnLmNvbS9jb21iYXRpbmctY29tcHV0ZXItZXNwaW9uYWdlLyZ2aXNpdG9yaWQ9LSZ1c2VyaWQ9LSZzZXNzaW9uaWQ9Mzk4ZGM2NTYwMTMxMTAyNzIzNjVkNTZkZDBiMTViZTYmdXNlcmNsYXNzPTEmYWJjbGFzcz1iJmFic3dpdGNoPWQmbWVtYmVyPS0="/>