keyloggers
Cheating is not decent: keyboard spies and protection against them

Technologies of modern computer espionage can boggle the imagination. Some programs are able to find out almost any data about a PC user – from the applications used by him to his passwords, which give access to the online services he uses and files he works with.

What are keyloggers?

In the spyware variety, keyloggers are among the most dangerous and well-disguised. Quite often, a user does not suspect that such a program has been installed on his or her computer – the PC doesn’t show any signs of dangerous spy software presence.

 » Read more about: Cheating is not decent: keyboard spies and protection against them  »


spyrix_personal_monitor
Spyrix Personal Monitor was tested

New version of Spyrix Personal Monitor was tested by our testing team. The review is available by the link Spyrix Personal Monitor

 » Read more about: Spyrix Personal Monitor was tested  »


pentagon_insider_threat_program
Hundreds of Pentagon personnel are subject to total surveillance by US Government

The surveillance is part of the “Insider Threat” program. Secrecy News has obtained the report to Congress according to which virtual activities and correspondence of at least a hundred thousand personnel at the Defense Department are being monitored continuously.

The “Insider Threat” was adopted in 2013 and require federal officers to notice and report law authorities about any strange behaviour of co-workers or their intent to disclose confidential information. As most experts agree,

 » Read more about: Hundreds of Pentagon personnel are subject to total surveillance by US Government  »


keysweeper_wireless_keyboard_keylogger
Keylogger in the form of a USB-charging device can intercept information from wireless keypads

When we talk about keyloggers, we primarily mean hacking tools, installed on the victim’s computer, which allow you to record all the keystrokes for the purpose of stealing information. It is commonly known that such a risk is fairly easy preventable by regularly scanning your PC for viruses and other malicious software. However, these security measures are not a hindrance for the device invented by an enthusiast named Samy Kemkar (Samy Kamkar).

This device called Keysweeper looks very similar to a charger with a USB interface;

 » Read more about: Keylogger in the form of a USB-charging device can intercept information from wireless keypads  »


REFOG Personal Monitor
REFOG Personal Monitor was tested

New version of REFOG Personal Monitor was tested by our testing team. The review is available by the link REFOG Personal Monitor

 » Read more about: REFOG Personal Monitor was tested  »


gpu rootkit linux keylogger
A GPU-based rootkit prototype and a keylogger for Linux presented

Security researchers from Team Jellyfish have implemented a theoretical method of applying GPU to monitoring activity of the system, and produced a working prototype of a rootkit and a keylogger running on the GPU to hide its presence in the system. It is interesting to note that when the rootkit and the keylogger gain access to the GPU, they do without traditional hooks and changing code of the operating system kernel.

Tracking the buffer containing data about keystrokes pressed is done directly from the GPU using DMA.

 » Read more about: A GPU-based rootkit prototype and a keylogger for Linux presented  »


Employee privacy rights
A British student was sentenced to jail for using keylogger

A British student was sentenced to jail for using keylogger.

A Birmingham university student plugged hardware keyloggers in school’s computers. With the help of spy soft he managed to access the exam application and increase his marks, and consequently, has been jailed.

The Telegraph reports that bioscience student Imran Uddin, 25, was sentenced to 4 month of jail after using a keylogger to steal staff passwords at the University of Birmingham in the UK.

 » Read more about: A British student was sentenced to jail for using keylogger  »


staffcop standart
StaffCop Standard was tested

New version of StaffCop Standard was tested by our testing team. The review is available by the link StaffCop Standard

 » Read more about: StaffCop Standard was tested  »


keyloggers
Spying on employees’ computers: pros and cons

More and more companies encounter the problem when their workers use office hours for their private purposes instead of professional duties. They negatively influence company’s efficiency and cause financial losses.

Some employers solve this difficult issue by spying on their workers’ computers. The others deem this unethical. Let us get into this problem and find out which opinion is true.

Spying on employees’ computers – arguments in favour:

A large team of workers.

 » Read more about: Spying on employees’ computers: pros and cons  »


Employee privacy rights
Employers can fire staff due to private communication

On January 12th, 2016 the European Court of Human Rights judged that a company could check his employee’s private correspondence.

In 2007 a Romanian engineer was fired for using Yahoo Messenger to chat with his brother and fiancée. At the same time, company policy clearly prohibited to use this resource for private purpose during office hours.

The engineer argued in (ECHR) that his employer had violated his human right to correspond confidentially,

 » Read more about: Employers can fire staff due to private communication  »