Keystroke logging

April 2021’s Most Wanted Malware: Dridex Remains in Top Position Amidst Global Surge in Ransomware Attacks

Retrieved on: 
Thursday, May 13, 2021

The phishing emails used QuickBooks\xe2\x80\x99s branding and were trying to lure the user with fake payment notifications and invoices.

Key Points: 
  • The phishing emails used QuickBooks\xe2\x80\x99s branding and were trying to lure the user with fake payment notifications and invoices.
  • Increasingly, these hackers are using double extortion methods, where they will steal sensitive data from an organization and threaten to release it publicly unless a payment is made.
  • AgentTesla is an advanced RAT (remote access Trojan) that has been active since 2014 and functions as a keylogger and password stealer.
  • Dridex contacts a remote server, sends information about the infected system and can also download and execute arbitrary modules on command.

Avast Identifies APT Group Targeting Government Agencies in East Asia

Retrieved on: 
Wednesday, December 9, 2020

PRAGUE, Dec. 9, 2020 /PRNewswire/ -- Avast (LSE:AVST), a global leader in digital security and privacy products, has identified a new advanced persistent threats (APT) campaign targeting government agencies and a government data center in Mongolia.

Key Points: 
  • PRAGUE, Dec. 9, 2020 /PRNewswire/ -- Avast (LSE:AVST), a global leader in digital security and privacy products, has identified a new advanced persistent threats (APT) campaign targeting government agencies and a government data center in Mongolia.
  • Avast Threat Intelligence researchers found that the APT group planted backdoors and keyloggers to gain long-term access to government networks belonging to the government of Mongolia.
  • Avast researchers consider LuckyMouse, also known as EmissaryPanda and APT27, is likely to be behind the APT campaign.
  • The group, which has previously attacked targets in the area, is well-known for going after national resources and political information on near neighbors.

Workpuls - The Only Employee Monitoring Software That Protects Workers' Privacy

Retrieved on: 
Thursday, May 21, 2020

Most monitoring software allow business owners to record employees' screens, they have keyloggers, they track emails, scan USBs, etc.

Key Points: 
  • Most monitoring software allow business owners to record employees' screens, they have keyloggers, they track emails, scan USBs, etc.
  • While these features can be great to protect the company's data, they can also be seen as too intrusive.
  • Workpuls has recognized that privacy is one of the main issues employers face when getting employee buy-in for a monitoring software, which is why they've created a tool that lets you supervise workers without invading their privacy.
  • Workpuls is an employee monitoring and time tracking software that helps remote teams stay organized and productive.

CHERRY'S New SECURE BOARD 1.0 Keyboard Alleviates Endpoint Security Vulnerabilities, Including USB Attacks

Retrieved on: 
Monday, December 2, 2019

hardware/software keyloggers

Key Points: 
  • hardware/software keyloggers
    The CHERRY SECURE BOARD 1.0 protects the workplace by incorporating two distinct features to help protect the integrity of customers input data and support network security.
  • When the CHERRY SECURE BOARD 1.0 is in encryption mode, the USB channel is locked, preventing any other devices from malicious activity, providing secure communication.
  • The CHERRY SECURE BOARD 1.0: An Added Layer of Endpoint Security
    The CHERRY SECURE BOARD 1.0 security keyboard includes an integrated reader for both smart cards, and cards/tags with an RF/NFC interface.
  • The CHERRY SECURE BOARD 1.0 also includes:
    To request a brochure of CHERRY's product offerings in the Security industry, please visit www.cherryamericas.com .

Advanced Cyber Security (ACS) Announces Agreement with First Data for Enhanced Security at the Point of Sale

Retrieved on: 
Thursday, May 2, 2019

This practice of tricking unsuspecting victims into clicking on links that look legitimate is called "phishing".

Key Points: 
  • This practice of tricking unsuspecting victims into clicking on links that look legitimate is called "phishing".
  • According to ACS CEO, Dan DelGiorno, "Keylogging spyware has become a problem that is global in scope.
  • This will help keep them informed and more actively involved in their cyber security."
  • For more information, visit www.firstdata.com and follow us on Twitter at @FirstData and LinkedIn .

Afilias Launches DeviceAssure to Close Security Gaps from Counterfeit Mobile Devices

Retrieved on: 
Sunday, February 24, 2019

While counterfeit phones cost the mobile ecosystem more than 45 Billion annually in lost sales, the bigger costs are hidden.

Key Points: 
  • While counterfeit phones cost the mobile ecosystem more than 45 Billion annually in lost sales, the bigger costs are hidden.
  • Counterfeit mobile devices are often the platform for perpetrating cyber-crime such as:
    KEYLOGGING:Device logs keystrokes to capture user names, passwords and other sensitive information that can be exploited to e.g.
  • DeviceAssure is expected to offer immediate benefits to:
    Financial Services providers: Each day, millions of people access their most sensitive accounts from mobile devices.
  • Afilias' mobile and web services division has deep expertise in the mobile industry, focusing on providing real time intelligence on mobile devices, web and app and mobile operator traffic.

Realtors® Highlight the Importance of Defending Against a Data Breach

Retrieved on: 
Monday, November 5, 2018

The forum, officially titled, "Defending against the Data Breach: Protect from Spyware, Malware, Ransomware & Keyloggers," was led by Robert Siciliano, CEO of Safr.Me, who presented a host of tips on how Realtors can stay safe from data breaches.

Key Points: 
  • The forum, officially titled, "Defending against the Data Breach: Protect from Spyware, Malware, Ransomware & Keyloggers," was led by Robert Siciliano, CEO of Safr.Me, who presented a host of tips on how Realtors can stay safe from data breaches.
  • "Every few seconds, someone's identity is stolen because data is breached, computers are hacked, or credit cards are compromised.
  • The system we function under, combined with the conveniences of technology can be easily flawed by simple scams," Siciliano said.
  • NAR is providing tools and resources for Realtors to ensure the data of their clients is protected," said NAR CEO Bob Goldberg.