Blog Posts Tagged with "keylogger"

71d85bb5d111973cb65dfee3d2a7e6c9

How Fast Can Your Password Be Cracked? Instantly...

July 02, 2012 Added by:f8lerror

Instantly with a JavaScript keylogger. In this brief tutorial, we show you how we can use the Metasploit JavaScript Keylogger auxiliary module in a penetration testing phishing campaign or user awareness training. This is intended for informational and/or educational purposes only...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Campaign Targeting Activists Escalates with New Surveillance Malware

April 08, 2012 Added by:Electronic Frontier Foundation

The malware installs a remote administration tool called DarkComet RAT, which can capture webcam activity, disable the notification setting for certain antivirus programs, record key strokes, steal passwords, and more...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Spoofed Email with Keylogger Malware Costs Company $100,000

April 04, 2012 Added by:Headlines

In one complaint received by the IC3, a business claimed their computer was infected with a virus after opening the attachment in the e-mail they received. As a result, the business lost nearly $100,000 when fraudsters successfully wired money from the company's bank account...

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Majority of SpyEye Trojan C and C Located in United States

March 28, 2012 Added by:Headlines

"SpyEye, along with ZeuS, are notorious banking Trojans that have helped thieves steal more than $100 million around the world. Without an end-user PC solution, banks face great difficulty protecting individual customers from the sophisticated threats posed..."

Comments  (0)

69dafe8b58066478aea48f3d0f384820

Symantec Identifies New Duqu Trojan Driver Variant

March 20, 2012 Added by:Headlines

Symantec reports the discovery of a previously unseen driver (mcd9×86.sys) for Duqu that was apparently compiled as recently as February of this year, giving reason to believe the malware is very much alive and kicking...

Comments  (0)

Bd86d2b4bd72ac0ca847696eec3759f3

Can You Stamp Out Spambots? No, But Stop Being a Victim

March 01, 2012 Added by:Michelle Drolet

Attackers avoid creating recognizable patterns of attack, installing backdoors for easy re-entry. There are limitless ways of eluding detection by anti-malware tools. Heuristics and fuzzy logic are an improvement, but a far cry from the detection needs of organizations...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

The Implications of Malware-as-a-Service

January 25, 2012 Added by:Pierluigi Paganini

Criminal operations are managed as corporations and malware is designed as a service, with a maniacal attention paid to product quality. The life cycle is the most amazing aspect: From design, release, to after sales support - each stage is implemented with care and attention...

Comments  (0)

03b2ceb73723f8b53cd533e4fba898ee

Duqu: The Worst May Come for Critical Infrastructure

January 04, 2012 Added by:Pierluigi Paganini

The modular nature of Duqu should cause us to jump from our chairs. It is reasonable to assume that Duqu is a work in progress, and the ability to change its structure at different times using modules designed specifically for precise goals makes this malware unique and formidable...

Comments  (0)

7ddc1f3000a13e4dfec28074e9e7b658

Some Facts About Carrier IQ

December 19, 2011 Added by:Electronic Frontier Foundation

There is an additional configuration file (called a "Profile") that determines what information is sent from the phone to a carrier. Profiles are programs in a domain-specific filtering language - they are normally written by Carrier IQ to the specifications of a telco or other client...

Comments  (0)

296634767383f056e82787fcb3b94864

Was Iran's Downing of RQ-170 Related to the Malware Infection at Creech AFB?

December 04, 2011 Added by:Jeffrey Carr

Iran took over the controls of a Lockheed Martin RQ-170 Sentinel stealth drone and landed it with minimal damage. As of this writing, the U.S. Air Force hasn't yet confirmed or denied the attack. I've left a message with the on-call PA officer at Creech Air Force Base...

Comments  (3)

69dafe8b58066478aea48f3d0f384820

Duqu May Actually Be An Advanced Cyber Weapon

November 17, 2011 Added by:Headlines

“Why go to all this trouble to deploy a simple key-logger? Given that there are additional drivers waiting to be discovered, we can liken Duqu to a sophisticated rocket launcher – we have yet to see the real ammunition appear..."

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Size Isn't Everything

October 26, 2011 Added by:Javvad Malik

Having a long padded out password isn’t enough. Because there are a whole multitude of things that should be taken into consideration before declaring something is the answer to all your security issues. It’s a security concept called defense in depth...

Comments  (1)

91648658a3e987ddb81913b06dbdc57a

US Drone Fleet Infected with Computer Virus

October 10, 2011 Added by:Ron Baklarz

We will probably never know how the infections occurred. Were vendor support connections the cause? Was an infected thumb drive or disk the culprit? At any rate, these types of incidents underscore the enemy's desire to exploit cyber-security to their advantage...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Capturing Logins with Keyscan and Lockout_Keylogger

September 26, 2011 Added by:Dan Dieterle

Sometimes a penetration tester may have remote access to a user’s machine, but he may not have the password, or the user has a very long complex password that would take too long to crack. Backtrack 5′s Metasploit Framework has a utility for capturing keys pressed on a target machine...

Comments  (0)

8c4834b99847b9f7c9ee94b45df086f9

Talk of Password Demise Greatly Exaggerated

August 08, 2011 Added by:Emmett Jorgensen

Overall criminals and blackhat hackers have a variety of tools at their disposal to overcome passwords and encryption. But this doesn’t mean that passwords are obsolete. On the contrary, if used properly they are still incredibly effective at protecting our data...

Comments  (1)

69dafe8b58066478aea48f3d0f384820

Canadian Hacker Arrested for Creating Zombie Botnet

July 20, 2011 Added by:Headlines

Canadian authorities have arrested a 24 year old professional information security manager on charges of creating a botnet. Joseph Mercer also infected systems with keylogging software to harvest information, as well as software that allowed him to capture images from unsuspecting victim's webcams...

Comments  (2)

Page « < 1 - 2 > »