Affordable Access

Publisher Website

The rise and rise of the keyloggers

Authors
Journal
Network Security
1353-4858
Publisher
Elsevier
Publication Date
Volume
2007
Issue
6
Identifiers
DOI: 10.1016/s1353-4858(07)70052-1
Keywords
  • Features
Disciplines
  • Design

Abstract

Keyloggers come in different forms – both as covert software and as hardware devices designed to intercept and store keyboard strokes for later collection. They have been designed for legitimate purposes, such as preventing employees from entering sensitive information, but have been given a new lease of life by internet criminals. They deliver such software in trojan horse form and then use it without the victim's knowledge to steal account passwords and other information. Simon Heron of Network Box explores the various sub-categories of keylogging hard devices and software tools, and documents their installation and operating methods. He also explores techniques for retrieving information over public networks using techniques such as IRC and P2P relaying. The attractions of making money through extortion by carrying out denial of service (DoS) attacks are diminishing. The criminals who control botnets do not want to risk their network if a company calls their bluff. It takes some time and effort to create a botnet and if you are forced into launching an attack, you expose that botnet to discovery and decapitation.

There are no comments yet on this publication. Be the first to share your thoughts.

Statistics

Seen <100 times
0 Comments

More articles like this

A rise is a rise is a rise.

on British medical journal (Clini... Aug 02, 1986

TB is on the rise.

on Hawaii dental journal 1994

The rise and rise of private care.

on The Health service journal Oct 11, 1990
More articles like this..