The main idea behind keyloggers is to get in between any two links in the chain of events between when a key is pressed and when information about that keystroke is displayed on the monitor. Once installed, the keylogger records all your keystrokes, and then e-mails the information and other data to the computer hacker. Keyloggers can be installed without your knowledge or consent when you visit a Web site or read an e-mail, install a program, or perform other activities. Keyloggers have been around for a long time, but today they may be the most dangerous threat an enterprise faces.Ī keylogger is a piece of malicious software, usually called "spyware" or "malware," that records every keystroke you make on a keyboard. Just look at some of the names done in by a tiny chunk of code in the last 12 months: RSA, Lockheed Martin, Epsilon, Oakridge Nuclear Weapons Lab, Sony, Iranian Nuclear Program and Linked-In to name just a few. ![]() Keyloggers are on the rise and they are no match for even the most security-conscious organizations. ![]() How keyloggers work and spread, why anti-virus applications won't stop them, and how you can protect your enterprise. Keyloggers: The Most Dangerous Security Risk in Your Enterprise
0 Comments
Leave a Reply. |