Latest (all topics)
Top stories
Web site of the day
Gadget of the day
Video of the day
Innovations
Hardware
All-in-One printer
Apple Mac
Audio
Backup
Book
Broadband
Camcorder
CD drive
Desktop PC
Digital camera
DVD drive
Gaming
Graphics card
Hard disk
Input device
Laptop
LCD
Mobile phone
Modem
Monitor
Motherboard
Multimedia
Networking
PDA
Printer
Processor
Projector
Scanner
Server
Tuning
UPS
Video
Web camera
Whiteboard
Miscellaneous
Software
Apple Mac
Audio
Backup
Business
Developer
Educational
Game
Graphics
Internet
Linux
Networking
Operating System
PDA
Security
Server
Utilities
Miscellaneous
 
Fraudsters Cook Up Keylogging Surprises
 
PC Tools’ Malware Research Centre has warned of a 57% increase in keylogging activity over the past month affecting both consumer and enterprise users in Europe and the U.S.

According to European reports recent keylogging cases have cost between £5000 and £50,000 for individuals, and up to £250,000 for banks and corporations. In the U.S. the financial figures are equally concerning - and many individuals face difficulty getting their lost funds returned.

“We understand the devastation when someone unwittingly provides personal information on the internet through no fault of their own,” said Michael Greene, Vice President for Product Strategy. “Our hope is that consumers and business IT managers stay ahead of this potential problem.”

Like anything else, keylogging can be used for good, or for evil. Keylogging is the tool of choice for industry pirates who target specific corporate officers and individuals to steal sensitive information. Regardless of the privacy issues, there are also security issues as well. Some Trojans will install keylogger software as part of their kit.

There are also keyloggers geared for employers to spy on employees, or for parents to spy on their children. For software keyloggers, there are detection routines. For hardware keyloggers, the only way to detect them is through physical inspection. Since hardware keyloggers are physical devices (or, as we shall see, a few well placed wires), physical security can prevent hardware keylogging. It is also possible to confuse hardware keyloggers by sending tons of bogus data in between valid keystrokes.

For consumers, the problem happens in more subtle ways where the thief simply installs the threat and waits for a victim. It often happens in a hotel lobby where a computer is provided for busy travellers. That computer may have keylogging tracking software embedded and the unsuspecting traveller is snared as he or she makes a quick bank transaction or credit card payment.

“We urge individuals and business users to safeguard sensitive personal information…” concluded Greene.

[Best Security Software Pricing UK]
[Best Security Software Pricing US]




 
BIOS, Dec 21, 06 | Print | Send | Comments (0) | Posted In Security
Related Articles

People Cannot Be Patched
Steganos Security Suite 2007
Creating A Culture Of Security
Panda Software Internet Security 2007
Malware Shift Creates New Challenges
Porn Affects Your Pupils!
Malware Writers Stick To Same Old Plot
Nuwar.B Worm Drives Up Stock Market Prices
'Happy New Year' Worm Spreading Rapidly
Norton 360 Beta For Vista Now Available

More...
   
     
© 2006 Black Letter Publishing Ltd. - Disclaimer - Terms - About - Contact - Advertise - Newsletter

Hosted By Gradwell - Powered By Eclipse Internet - Statistics By OneStat - Sponsored By Ipswitch