Free Workshop: Investigating Insider Threats — February 20-27

A piece of software designed to assume control of the computer, sometimes surreptitiously.