- Security
- By Ionut Ilascu
- May 11th, 2015
New Malware Pieces Run Completely on Graphics Card
Proof-of-concept code is now publicly available
- Security
- By Ionut Ilascu
- March 25th, 2015
PacMan Ransomware Targets Danish Chiropractors via Well-Crafted Phishing
Legitimate Windows utilities prevented from running
- Advisories
- By Ionut Ilascu
- November 20th, 2014
New Configuration for Citadel Trojan Aims at Password Managers
Keylogging function is activated by specific processes
- Security
- By Ionut Ilascu
- October 28th, 2014
Keylogging Framework Used by Multiple Actors in Watering-Hole Attacks
ScanBox targets a diverse set of organizations
- Security
- By Ionut Ilascu
- October 20th, 2014
Keylogger in Phishing Email Also Takes Screenshots
Attacker receives pic of researcher catching malware traffic
- Virus alerts
- By Ionut Ilascu
- October 17th, 2014
Modular Malware for OS X Relies on Open-Source Keylogger Code
Ventir malicious package is similar to Morcut/Crisis
- Windows
- By Bogdan Popa
- October 7th, 2014
Microsoft Likely to Remove Windows 10 User Tracking Tech, Expert Says
Windows 10 Preview has tech to monitor user activities
- Windows
- By Bogdan Popa
- October 4th, 2014
Windows 10 Preview Allegedly Acting as a “Keylogger,” Keeping Track of Every Click
The Privacy Statement for Windows 10 Preview reveals some untold aspects of the new OS testing version
- iWorld
- By Filip Truta
- October 1st, 2014
Warning: Some iOS 8 Keyboards Are Keyloggers
You basically agree to send keystrokes to a server
- Security Blog
- By Ionut Ilascu
- September 3rd, 2014
Rogue Code Injected in Industrial Site for Reconnaissance Purposes
Attackers possibly planning a watering hole attack
- Security Blog
- By Ionut Ilascu
- August 29th, 2014
Bifrose Backdoor Variant Uses Tor, May Work Against It
This Bifrose can do more than just record activity on the affected system
- Security
- By Ionut Ilascu
- July 14th, 2014
Keyloggers Installed at Hotel Business Centers, the U.S. Secret Service Warns
Advisory letter recommends several practices for safer public computers
- Security Blog
- By Eduard Kovacs
- March 1st, 2014
Former Purdue University Student Sentenced to 90 Days in Prison for Changing Grades
The student who acted as his lookout got 18 months' probation
- Linux & Opensource Blog
- By Silviu Stahie
- February 4th, 2014
How to Spy on Your Own Linux OS with the Logkeys Keylogger
The application hasn't been updated in a while but it still works
- Security Blog
- By Eduard Kovacs
- January 31st, 2014
11 California High School Students Expelled After Hacking Computers to Change Grades
No charges have been filed, but authorities are still investigating
- Security
- By Filip Truta
- January 10th, 2014
Keyloggers Become Irrelevant with the SecurePro Keyboard
Mac/PC-compatible peripheral takes a “billion-billion” years to crack
- Security Blog
- By Eduard Kovacs
- January 3rd, 2014
Two Former Purdue Students Admit Hacking Computers to Change Grades
Both of the hackers will be sentenced in February 2014