Cyber Theft Awareness
There are growing reports occurring daily of the successful acts of cyber theft against individuals and businesses. I want to continue in my efforts to raise your awareness to assist you from becoming its next victim, but at he end of the day it is your decision and responsibility to take the action necessary to protect yourself and those that you communicate with online.
The biggest threat today is the keylogger trojan virus, a malicious virus software that recognizes and monitors your keystrokes. The attackers collect your data information to be shared and sold over the black market of other attackers.
Let’s define the technique….
“Keystroke logging, often referred to as keylogging or Keyboard Capturing, is the action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. It also has very legitimate uses in studies of human-computer interaction. There are numerous keylogging methods, ranging from hardware and software-based approaches to acoustic analysis.”
The best defense against keyloggers is prevention. One of the most common infection sources is peer-to-peer (P2P) filesharing networks, such as Kazaa, Morpheus, Gnutella, and dozens of others. Keyloggers are also commonly sent as email attachments and via links in instant messages that point to the infected file.
Why keyloggers are a threat
(Provided by Security Analyst Summit 2014)
Unlike other types of malicious program, keyloggers present no threat to the system itself. Nevertheless, they can pose a serious threat to users, as they can be used to intercept passwords and other confidential information entered via the keyboard. As a result, cyber criminals can get PIN codes and account numbers for e-payment systems, passwords to online gaming accounts, email addresses, user names, email passwords etc.
Once a cyber criminal has got hold of confidential user data, s/he can easily transfer money from the user’s account or access the user’s online gaming account. Unfortunately access to confidential data can sometimes have consequences which are far more serious than an individual’s loss of a few dollars. Keyloggers can be used as tools in both industrial and political espionage, accessing data which may include proprietary commercial information and classified government material which could compromise the security of commercial and state-owned organizations (for example, by stealing private encryption keys).
Your concern to be proactive and aware is a direct reflection of concern for your own personal protection , as well as NOT indirectly giving access to the data or information of someone else.
It goes beyond just YOU.
GET PROTECTED……GET EDUCATED
CLICK the IMAGE BELOW