Video | Business Headlines | Internet | Science | Scientific Ethics | Technology | Search

 


Computer Saboteurs Caught By Keyghost

KeyGhost News Release
8 May 2001

COMPUTER SABOTEURS CAUGHT BY KEYGHOST

Hidden 'hardware' keylogger is deterring fraudsters and revealing internal saboteurs of valuable corporate data and computer systems. The new KeyGhost device logs and encrypts every keystroke made during unauthorised computer activity. It can't be found, so it can't be disabled. It does not need any software, so it can be used under any operating system!

Police and insurers remind us that prevention against computer sabotage is better than cure. Yet still we get caught out, and pay a heavy price for it. "The most serious financial losses occurred through theft of proprietary information," summarised the 2000 security survey conducted by the CSI and with participation of the San Francisco FBI Computer Intrusion Squad. "71% of respondents detected unauthorised access by insiders."

Jon Scott, author of "These people want to destroy your business - and they are online", confirms that the majority of unauthorised computer entries originate from inside the company's firewall.

These examples probably under-estimate the true extent of the problem, as they incorporate neither the costs of business interruption, nor data loss. Clearly, where there's a will to bypass the security system and destroy a business, there's a way to do it.

Despite a plethora of security preventative measures available few are impenetrable. As software security solutions run off the computer operating system, they can be disabled by anyone who knows how. The more difficult to detect and disable, the greater the protection. Hidden, independent, and encrypted 'hardware' devices like the KeyGhost that monitor computer usage, are being implemented for added protection.

The KeyGhost is already being used around the world to deter invasion and reveal where within an organisation cyber crime has taken place. It is a sly little keylogger that registers every single character, control and function keys typed on the keyboard. As a discrete fail-safe device with its own processor, KeyGhost is unlike any security measure available. It works independent to the operating system and can store up to 2,000,000 keystrokes in non-volatile flash memory, enough for up to 8 months monitoring or back up. The stored keystrokes are protected with 128-bit encryption. This independent protection and discretion is causing the downfall of even the most determined intruder.

"We advise our customers with caution when installing KeyGhost. The reason is that privacy laws in the U.S. and some other countries state that devices like KeyGhost may not be implemented surreptitiously. But organisations wanting to protect themselves against corporate espionage or other costly cyber-crime, can implement KeyGhost for use as a deterrent as long as they state clearly why the computer is being monitored," explained Despina Kerdemelidis, CEO of KeyGhost. "In the U.S. companies are advised to inform staff of the KeyGhost installation and to attach surveillance warning labels telling them that they are being monitored."

The KeyGhost keylogger was devised initially for data back up and retrieval. Since then other uses for the product have come to the fore, such as protection against fraud, corruption, child pornography, harassment and espionage.

KeyGhost is sold all over the world and is being used by a large cross section of both industry and the community. Customers include government intelligence agencies, private investigators, banks, corporates, programmers, writers, concerned parents, and even partners of Internet chat-cheaters. The KeyGhost product is marketed through international resellers and via the Internet under the trade name "KeyGhost". Visit the site at www.keyghost.com.

About KeyGhost Ltd

KeyGhost Ltd is a technology company specialising in developing and marketing the 'KeyGhost' - a hardware keystroke logging device for personal computers. Our mission is to identify computer security risks and develop transparent and user-friendly computer security solutions using the latest available technology in hardware and software. Manufactured in New Zealand and marketed internationally, the KeyGhost protects computer resources and increases computer security. Several areas have been identified where a hardware device such as the KeyGhost can be in great demand:

- as a tool for computer fraud investigations,

- as a monitoring device for detecting unauthorised access,

- as a deterrent to prevent unacceptable use of company resources, and

- as a back up tool that creates a log of all keystrokes typed on a keyboard.

The KeyGhost is powered by its own chip and can store up to 2,000,000 keystrokes in non-volatile flash memory, which does not require power to retain storage. This enables the device to operate independently of both the hardware and the operating system running on the PC.

When downloading KeyGhost log files it is easy to recognise if employees are misusing the computer. With games, for instance, repeat sequences such as inverted t-logs (w,a,s,d), control keys and function keys are clearly visible. The device also compresses repeated keystrokes to stop anyone trying to fill up the two million maximum keystroke log by holding down a key.

The postage stamp sized device is very easy to install without the knowledge of the person using the computer, as there is no software to download. However, should the Privacy Act require it, users ought to be informed that their computer is being monitored. KeyGhost welcomes enquiries from resellers and distributors. Further information about the KeyGhost product range can be found at www.keyghost.com.

- Ends -

For further information please contact Despina or Theo at:

despina@keyghost.com Tel: +64 3 3888 179 theo@keyghost.com Tel: +64 3 3793 883


© Scoop Media

 
 
 
 
 
Business Headlines | Sci-Tech Headlines

 

Watch This Space: Mahia Rocket Lab Launch Site Officially Opened

Economic Development Minster Steven Joyce today opened New Zealand’s first orbital launch site, Rocket Lab Launch Complex 1, on the Mahia Peninsula on the North Island’s east coast. More>>

Earlier:

Marketing Rocks!
Ig Nobel Award Winners Assess The Personality Of Rocks

A Massey University marketing lecturer has received the 2016 Ig Nobel Prize for economics for a research project that asked university students to describe the “brand personalities” of three rocks. More>>

ALSO:

Nurofen Promotion: Reckitt Benckiser To Plead Guilty To Misleading Ads

Reckitt Benckiser (New Zealand) intends to plead guilty to charges of misleading consumers over the way it promoted a range of Nurofen products, the Commerce Commission says. More>>

ALSO:

Half A Billion Accounts, Including Xtra: Yahoo Confirms Huge Data Breach

The account information may have included names, email addresses, telephone numbers, dates of birth, hashed passwords (the vast majority with bcrypt) and, in some cases, encrypted or unencrypted security questions and answers. More>>

ALSO:

Rural Branches: Westpac To Close 19 Branches, ANZ Looks At 7

Westpac confirms it will close nineteen branches across the country; ANZ closes its Ngaruawahia branch and is consulting on plans to close six more branches; The bank workers union says many of its members are nervous about their futures and asking ... More>>

Interest Rates: RBNZ's Wheeler Keeps OCR At 2%

Reserve Bank governor Graeme Wheeler kept the official cash rate at 2 percent and said more easing will be needed to get inflation back within the target band. More>>

ALSO:

Get More From Scoop

 
 
 
 
 
 
 
 
 
Sci-Tech
Search Scoop  
 
 
Powered by Vodafone
NZ independent news