
By Shelly Palmer | Article Rating: |
|
June 25, 2012 06:45 AM EDT | Reads: |
7,885 |

Keylogging has taking center stage, and it now deserves our proper attention. After all, keyloggers have been identified as the #1 Global Threat to consumers, corporations and government agencies in the recent 2012 Verizon Data Breach Investigations Report. Symantec Corporation coined 2011 as “The Year of the Hack,” when they saw an 81 percent increase in cyber attacks.
Keyloggers have been credited for many of the world’s most notable breaches: RSA/EMC, Lockheed Martin, Google Epsilon, Oakridge Nuclear Weapons Lab, Citibank, World Bank and tens of millions of consumers around the world.
What makes the keylogger the preferred weapon of choice is that they have been designed to avoid detection from anti-virus and anti-malware programs and the fact that they can be embedded into any type of download (mp3, video) or attached to any type of web link. Social Networking websites, like Facebook, have become the favorite place for hackers to propagate their spyware.
Keyloggers work by hooking the Windows or Apple message queue. It is relatively easy to place a hook and inspect all the messages (such as keystroke messages) before they are sent to the application (i.e. desktop application or browser). The keyloggers then log the keystroke messages into a file. Typically, the keylogger communicates with the hacker via an IRC channel and delivers the captured keystroke file to the hacker.
Current anti-virus and anti-malware tools are based on scanning a computer for files with a particular signature. The database containing signatures of known bad files has to be continuously updated. The major caveat in this approach is the existence of the signature of a known problematic file. Spammers and criminals are currently deploying sophisticated software which dynamically changes the file signature, making anti-spam and anti-virus tools no longer effective against keyloggers. Also, there is significant time between detecting a new keylogger on the internet and the anti-keylogging signature being updated on anti-virus/spyware software. This time gap can be a month or longer.
Anti-keylogging keystroke encryption to the rescue. Keystroke encryption uses a different approach to defend against keyloggers. Rather than trying to detect keyloggers, it takes a preventive approach. It takes control of the keyboard at the lowest possible layer in the kernel. The keystrokes are then encrypted and sent to desktop applications and the browser via an “Out-of-Band” channel, bypassing the Windows and Apple messaging queue. Look for keystroke encryption products with a built in self-monitoring capability, such as GuardedID. This prevents it from being bypassed by other software.
Published June 25, 2012 Reads 7,885
Copyright © 2012 SYS-CON Media, Inc. — All Rights Reserved.
Syndicated stories and blog feeds, all rights reserved by the author.
More Stories By Shelly Palmer
Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.
![]() Oct. 5, 2017 12:15 AM EDT Reads: 3,494 |
By Elizabeth White ![]() Oct. 4, 2017 05:15 PM EDT Reads: 1,051 |
By Pat Romanski ![]() Oct. 4, 2017 05:15 PM EDT Reads: 1,091 |
By Liz McMillan ![]() Oct. 4, 2017 05:15 PM EDT Reads: 1,066 |
By Pat Romanski ![]() Oct. 4, 2017 03:30 PM EDT Reads: 439 |
By Elizabeth White Oct. 4, 2017 03:15 PM EDT Reads: 1,572 |
By Liz McMillan ![]() Oct. 4, 2017 03:15 PM EDT Reads: 472 |
By Pat Romanski Oct. 4, 2017 02:00 PM EDT Reads: 1,488 |
By Liz McMillan ![]() Oct. 4, 2017 02:00 PM EDT Reads: 637 |
By Elizabeth White ![]() Oct. 4, 2017 01:30 PM EDT Reads: 511 |
By Pat Romanski Oct. 4, 2017 01:00 PM EDT Reads: 1,518 |
By Elizabeth White ![]() Oct. 4, 2017 12:15 PM EDT Reads: 809 |
By Liz McMillan Oct. 4, 2017 11:45 AM EDT Reads: 1,557 |
By Elizabeth White ![]() Oct. 4, 2017 09:15 AM EDT Reads: 1,181 |
By Pat Romanski ![]() Oct. 4, 2017 08:45 AM EDT Reads: 1,193 |
By Elizabeth White ![]() Oct. 4, 2017 08:15 AM EDT Reads: 486 |
By Elizabeth White ![]() Oct. 4, 2017 02:00 AM EDT Reads: 4,747 |
By Elizabeth White ![]() Oct. 1, 2017 02:00 PM EDT Reads: 1,103 |
By Liz McMillan ![]() Sep. 29, 2017 10:00 AM EDT Reads: 1,409 |
By Liz McMillan ![]() Sep. 28, 2017 05:00 PM EDT Reads: 1,255 |