Theft and corporations

Nothing new really; corporate espionage is thriving and can be done in many ways: hacking, developing spywares, phishing with e-mail appearing genuine, and other legal (although ethical problematic) methods like Google hacking, i.e. using Google search features to obtain maximum information.
The interest of the article really lies in those factual descriptions of the different methods used. “Corporate espionage: Not if, but when” (12 March 2008),1000002000,39365959,00.htm


About Audrey Guinchard

Senior Lecturer @ University of Essex (UK)
This entry was posted in Offences - Theft. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s