Sensitive business information stored on a computer is vulnerable, especially when a keystroke logger program is involved. Once it's installed, a keystroke logger maintains a record of every key typed ...
Business.com on MSN

What is keystroke logging?

There is more than one way to monitor your employees' actions during the workday. Is keystroke logging a viable option for ...
PUBLISHER’S NOTE: Please note that, as of 9/29/03, all of your valued Network World Fusion newsletters will be delivered to you from nwfnews.com. If you use filters to manage your newsletters based on ...
Keyloggers are one of the most dangerous types of malware, as hackers can use these programs to monitor exactly what you are typing. This can be catastrophic for your business if your login details or ...
COMMENTARY--What if every keystroke you typed was recorded? Programs that do this have existed for years, and are often traded on shadowy Web sites. Alone, they are mere curiosities, but when coupled ...
A keylogger is a malicious software designed to clandestinely capture the keystrokes made on a device, transmitting this sensitive information to a hacker via a command-and-control (C&C) center. The ...
This wonderful little gadget is for sale over at Thinkgeek. It is colored an innocuous IBM grey so no one will notice when you attach it to their keyboard. It fits between the back of the PC and the ...
Hewlett-Packard's decision to hire investigators who assumed fake identities in order to obtain personal records has blown up in the company's face. The ensuing scandal has generated resignations, ...
Mario Simbaqueba Bonilla, a Colombian citizen, was sentenced today to nine years in prison, resulting from his guilty plea to a 16-count indictment involving a complex computer fraud scheme ...
Attackers have been observed targeting businesses on a worldwide scale during the last two months with the HawkEye keylogger malware according to a report from IBM X-Force. As part of the April and ...
A research team from the Georgia Institute of Technology says it has discovered a keyboard keylogger attack that can be done through a compromised Apple iPhone. The attack relies on exploiting the ...