Blog Posts Tagged with "keylogger"
July 02, 2012 Added by:f8lerror
April 08, 2012 Added by:Electronic Frontier Foundation
The malware installs a remote administration tool called DarkComet RAT, which can capture webcam activity, disable the notification setting for certain antivirus programs, record key strokes, steal passwords, and more...
April 04, 2012 Added by:Headlines
In one complaint received by the IC3, a business claimed their computer was infected with a virus after opening the attachment in the e-mail they received. As a result, the business lost nearly $100,000 when fraudsters successfully wired money from the company's bank account...
March 28, 2012 Added by:Headlines
"SpyEye, along with ZeuS, are notorious banking Trojans that have helped thieves steal more than $100 million around the world. Without an end-user PC solution, banks face great difficulty protecting individual customers from the sophisticated threats posed..."
March 20, 2012 Added by:Headlines
Symantec reports the discovery of a previously unseen driver (mcd9×86.sys) for Duqu that was apparently compiled as recently as February of this year, giving reason to believe the malware is very much alive and kicking...
March 01, 2012 Added by:Michelle Drolet
Attackers avoid creating recognizable patterns of attack, installing backdoors for easy re-entry. There are limitless ways of eluding detection by anti-malware tools. Heuristics and fuzzy logic are an improvement, but a far cry from the detection needs of organizations...
January 25, 2012 Added by:Pierluigi Paganini
Criminal operations are managed as corporations and malware is designed as a service, with a maniacal attention paid to product quality. The life cycle is the most amazing aspect: From design, release, to after sales support - each stage is implemented with care and attention...
January 04, 2012 Added by:Pierluigi Paganini
The modular nature of Duqu should cause us to jump from our chairs. It is reasonable to assume that Duqu is a work in progress, and the ability to change its structure at different times using modules designed specifically for precise goals makes this malware unique and formidable...
December 19, 2011 Added by:Electronic Frontier Foundation
There is an additional configuration file (called a "Profile") that determines what information is sent from the phone to a carrier. Profiles are programs in a domain-specific filtering language - they are normally written by Carrier IQ to the specifications of a telco or other client...
December 04, 2011 Added by:Jeffrey Carr
Iran took over the controls of a Lockheed Martin RQ-170 Sentinel stealth drone and landed it with minimal damage. As of this writing, the U.S. Air Force hasn't yet confirmed or denied the attack. I've left a message with the on-call PA officer at Creech Air Force Base...
November 17, 2011 Added by:Headlines
“Why go to all this trouble to deploy a simple key-logger? Given that there are additional drivers waiting to be discovered, we can liken Duqu to a sophisticated rocket launcher – we have yet to see the real ammunition appear..."
October 26, 2011 Added by:Javvad Malik
Having a long padded out password isn’t enough. Because there are a whole multitude of things that should be taken into consideration before declaring something is the answer to all your security issues. It’s a security concept called defense in depth...
October 10, 2011 Added by:Ron Baklarz
We will probably never know how the infections occurred. Were vendor support connections the cause? Was an infected thumb drive or disk the culprit? At any rate, these types of incidents underscore the enemy's desire to exploit cyber-security to their advantage...
September 26, 2011 Added by:Dan Dieterle
Sometimes a penetration tester may have remote access to a user’s machine, but he may not have the password, or the user has a very long complex password that would take too long to crack. Backtrack 5′s Metasploit Framework has a utility for capturing keys pressed on a target machine...
August 08, 2011 Added by:Emmett Jorgensen
Overall criminals and blackhat hackers have a variety of tools at their disposal to overcome passwords and encryption. But this doesn’t mean that passwords are obsolete. On the contrary, if used properly they are still incredibly effective at protecting our data...
July 20, 2011 Added by:Headlines
Canadian authorities have arrested a 24 year old professional information security manager on charges of creating a botnet. Joseph Mercer also infected systems with keylogging software to harvest information, as well as software that allowed him to capture images from unsuspecting victim's webcams...
Why Enterprises Are Struggling So Much with ... Eric Kronthal on 03-07-2014
Making Sense of Split Tunneling ... nat ravitz on 03-07-2014
Patching WordPress Username Disclosure... Neo on 03-07-2014