Video | Business Headlines | Internet | Science | Scientific Ethics | Technology | Search

 

Computer Saboteurs Caught By Keyghost

KeyGhost News Release
8 May 2001

COMPUTER SABOTEURS CAUGHT BY KEYGHOST

Hidden 'hardware' keylogger is deterring fraudsters and revealing internal saboteurs of valuable corporate data and computer systems. The new KeyGhost device logs and encrypts every keystroke made during unauthorised computer activity. It can't be found, so it can't be disabled. It does not need any software, so it can be used under any operating system!

Police and insurers remind us that prevention against computer sabotage is better than cure. Yet still we get caught out, and pay a heavy price for it. "The most serious financial losses occurred through theft of proprietary information," summarised the 2000 security survey conducted by the CSI and with participation of the San Francisco FBI Computer Intrusion Squad. "71% of respondents detected unauthorised access by insiders."

Jon Scott, author of "These people want to destroy your business - and they are online", confirms that the majority of unauthorised computer entries originate from inside the company's firewall.

These examples probably under-estimate the true extent of the problem, as they incorporate neither the costs of business interruption, nor data loss. Clearly, where there's a will to bypass the security system and destroy a business, there's a way to do it.

Despite a plethora of security preventative measures available few are impenetrable. As software security solutions run off the computer operating system, they can be disabled by anyone who knows how. The more difficult to detect and disable, the greater the protection. Hidden, independent, and encrypted 'hardware' devices like the KeyGhost that monitor computer usage, are being implemented for added protection.

The KeyGhost is already being used around the world to deter invasion and reveal where within an organisation cyber crime has taken place. It is a sly little keylogger that registers every single character, control and function keys typed on the keyboard. As a discrete fail-safe device with its own processor, KeyGhost is unlike any security measure available. It works independent to the operating system and can store up to 2,000,000 keystrokes in non-volatile flash memory, enough for up to 8 months monitoring or back up. The stored keystrokes are protected with 128-bit encryption. This independent protection and discretion is causing the downfall of even the most determined intruder.

"We advise our customers with caution when installing KeyGhost. The reason is that privacy laws in the U.S. and some other countries state that devices like KeyGhost may not be implemented surreptitiously. But organisations wanting to protect themselves against corporate espionage or other costly cyber-crime, can implement KeyGhost for use as a deterrent as long as they state clearly why the computer is being monitored," explained Despina Kerdemelidis, CEO of KeyGhost. "In the U.S. companies are advised to inform staff of the KeyGhost installation and to attach surveillance warning labels telling them that they are being monitored."

The KeyGhost keylogger was devised initially for data back up and retrieval. Since then other uses for the product have come to the fore, such as protection against fraud, corruption, child pornography, harassment and espionage.

KeyGhost is sold all over the world and is being used by a large cross section of both industry and the community. Customers include government intelligence agencies, private investigators, banks, corporates, programmers, writers, concerned parents, and even partners of Internet chat-cheaters. The KeyGhost product is marketed through international resellers and via the Internet under the trade name "KeyGhost". Visit the site at www.keyghost.com.

About KeyGhost Ltd

KeyGhost Ltd is a technology company specialising in developing and marketing the 'KeyGhost' - a hardware keystroke logging device for personal computers. Our mission is to identify computer security risks and develop transparent and user-friendly computer security solutions using the latest available technology in hardware and software. Manufactured in New Zealand and marketed internationally, the KeyGhost protects computer resources and increases computer security. Several areas have been identified where a hardware device such as the KeyGhost can be in great demand:

- as a tool for computer fraud investigations,

- as a monitoring device for detecting unauthorised access,

- as a deterrent to prevent unacceptable use of company resources, and

- as a back up tool that creates a log of all keystrokes typed on a keyboard.

The KeyGhost is powered by its own chip and can store up to 2,000,000 keystrokes in non-volatile flash memory, which does not require power to retain storage. This enables the device to operate independently of both the hardware and the operating system running on the PC.

When downloading KeyGhost log files it is easy to recognise if employees are misusing the computer. With games, for instance, repeat sequences such as inverted t-logs (w,a,s,d), control keys and function keys are clearly visible. The device also compresses repeated keystrokes to stop anyone trying to fill up the two million maximum keystroke log by holding down a key.

The postage stamp sized device is very easy to install without the knowledge of the person using the computer, as there is no software to download. However, should the Privacy Act require it, users ought to be informed that their computer is being monitored. KeyGhost welcomes enquiries from resellers and distributors. Further information about the KeyGhost product range can be found at www.keyghost.com.

- Ends -

For further information please contact Despina or Theo at:

despina@keyghost.com Tel: +64 3 3888 179 theo@keyghost.com Tel: +64 3 3793 883


© Scoop Media

 
 
 
Business Headlines | Sci-Tech Headlines

 

"Broad-Based Growth": GDP Rises 1 Percent In June Quarter

Gross domestic product (GDP) rose 1.0 percent in the June 2018 quarter, up from 0.5 percent last quarter, Stats NZ said today. This is the largest quarterly rise in two years. More>>

ALSO:

Judicial Review: China Steel Tarrif Rethink Ordered

On 5 July 2017 the Minister determined not to impose duties on Chinese galvanised steel coil imports. NZ Steel applied for judicial review of the Minister’s decision. More>>

Debt: NZ Banks Accelerate Lending In June Quarter

New Zealand's nine major lenders boosted lending at the fastest quarterly pace in almost two years as fears over bad debts subsided. More>>

ALSO:

Balance Of Trade: Annual Current Account Deficit Widens To $9.5 Billion

New Zealand’s current account deficit for the year ended June 2018 widened to $9.5 billion, 3.3 percent of GDP, Stats NZ said today. More>>

ALSO: