Technologies of modern computer espionage can boggle the imagination. Some programs are able to find out almost any data about a PC user – from the applications used by him to his passwords, which give access to the online services he uses and files he works with.
What are keyloggers?
In the spyware variety, keyloggers are among the most dangerous and well-disguised. Quite often, a user does not suspect that such a program has been installed on his or her computer – the PC doesn’t show any signs of dangerous spy software presence.
New version of Spyrix Personal Monitor was tested by our testing team. The review is available by the link Spyrix Personal Monitor
The surveillance is part of the “Insider Threat” program. Secrecy News has obtained the report to Congress according to which virtual activities and correspondence of at least a hundred thousand personnel at the Defense Department are being monitored continuously.
The “Insider Threat” was adopted in 2013 and require federal officers to notice and report law authorities about any strange behaviour of co-workers or their intent to disclose confidential information. As most experts agree,
When we talk about keyloggers, we primarily mean hacking tools, installed on the victim’s computer, which allow you to record all the keystrokes for the purpose of stealing information. It is commonly known that such a risk is fairly easy preventable by regularly scanning your PC for viruses and other malicious software. However, these security measures are not a hindrance for the device invented by an enthusiast named Samy Kemkar (Samy Kamkar).
This device called Keysweeper looks very similar to a charger with a USB interface;
New version of REFOG Personal Monitor was tested by our testing team. The review is available by the link REFOG Personal Monitor
Security researchers from Team Jellyfish have implemented a theoretical method of applying GPU to monitoring activity of the system, and produced a working prototype of a rootkit and a keylogger running on the GPU to hide its presence in the system. It is interesting to note that when the rootkit and the keylogger gain access to the GPU, they do without traditional hooks and changing code of the operating system kernel.
Tracking the buffer containing data about keystrokes pressed is done directly from the GPU using DMA.
A British student was sentenced to jail for using keylogger.
A Birmingham university student plugged hardware keyloggers in school’s computers. With the help of spy soft he managed to access the exam application and increase his marks, and consequently, has been jailed.
The Telegraph reports that bioscience student Imran Uddin, 25, was sentenced to 4 month of jail after using a keylogger to steal staff passwords at the University of Birmingham in the UK.
More and more companies encounter the problem when their workers use office hours for their private purposes instead of professional duties. They negatively influence company’s efficiency and cause financial losses.
Some employers solve this difficult issue by spying on their workers’ computers. The others deem this unethical. Let us get into this problem and find out which opinion is true.
Spying on employees’ computers – arguments in favour:
A large team of workers.
On January 12th, 2016 the European Court of Human Rights judged that a company could check his employee’s private correspondence.
In 2007 a Romanian engineer was fired for using Yahoo Messenger to chat with his brother and fiancée. At the same time, company policy clearly prohibited to use this resource for private purpose during office hours.
The engineer argued in (ECHR) that his employer had violated his human right to correspond confidentially,