George Waller from StrikeForce Technologies demonstrations how this malicious software sneaks onto your computer and then steals your sensitive data
keylogger - News, Features, and Slideshows
The Associated Press's Twitter account was hijacked this afternoon and used to tweet a false message that reported two explosions at the White House had left U.S. President Barack Obama injured. One security expert says the incident underscores the need to adopt out-of-band two-factor authentication and keystroke encryption.
It was a bad idea from the start, but even as bad ideas go, this one went horribly wrong.
Whitepapers about keylogger
Phishing 2.0 - Why phishing is back as the No. 1 web threat, and how web security can protect your company
In this white paper we will: • Summarize the decline of Phishing 1.0. • Discuss how phishing has turned toward business and become more costly. • Outline the structure of new Phishing 2.0 attacks. • Delineate how the new campaigns evade standard antiphishing countermeasures. • Describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.