Video | Business Headlines | Internet | Science | Scientific Ethics | Technology | Search

 

Computer Saboteurs Caught By Keyghost

KeyGhost News Release
8 May 2001

COMPUTER SABOTEURS CAUGHT BY KEYGHOST

Hidden 'hardware' keylogger is deterring fraudsters and revealing internal saboteurs of valuable corporate data and computer systems. The new KeyGhost device logs and encrypts every keystroke made during unauthorised computer activity. It can't be found, so it can't be disabled. It does not need any software, so it can be used under any operating system!

Police and insurers remind us that prevention against computer sabotage is better than cure. Yet still we get caught out, and pay a heavy price for it. "The most serious financial losses occurred through theft of proprietary information," summarised the 2000 security survey conducted by the CSI and with participation of the San Francisco FBI Computer Intrusion Squad. "71% of respondents detected unauthorised access by insiders."

Jon Scott, author of "These people want to destroy your business - and they are online", confirms that the majority of unauthorised computer entries originate from inside the company's firewall.

These examples probably under-estimate the true extent of the problem, as they incorporate neither the costs of business interruption, nor data loss. Clearly, where there's a will to bypass the security system and destroy a business, there's a way to do it.

Despite a plethora of security preventative measures available few are impenetrable. As software security solutions run off the computer operating system, they can be disabled by anyone who knows how. The more difficult to detect and disable, the greater the protection. Hidden, independent, and encrypted 'hardware' devices like the KeyGhost that monitor computer usage, are being implemented for added protection.

The KeyGhost is already being used around the world to deter invasion and reveal where within an organisation cyber crime has taken place. It is a sly little keylogger that registers every single character, control and function keys typed on the keyboard. As a discrete fail-safe device with its own processor, KeyGhost is unlike any security measure available. It works independent to the operating system and can store up to 2,000,000 keystrokes in non-volatile flash memory, enough for up to 8 months monitoring or back up. The stored keystrokes are protected with 128-bit encryption. This independent protection and discretion is causing the downfall of even the most determined intruder.

"We advise our customers with caution when installing KeyGhost. The reason is that privacy laws in the U.S. and some other countries state that devices like KeyGhost may not be implemented surreptitiously. But organisations wanting to protect themselves against corporate espionage or other costly cyber-crime, can implement KeyGhost for use as a deterrent as long as they state clearly why the computer is being monitored," explained Despina Kerdemelidis, CEO of KeyGhost. "In the U.S. companies are advised to inform staff of the KeyGhost installation and to attach surveillance warning labels telling them that they are being monitored."

The KeyGhost keylogger was devised initially for data back up and retrieval. Since then other uses for the product have come to the fore, such as protection against fraud, corruption, child pornography, harassment and espionage.

KeyGhost is sold all over the world and is being used by a large cross section of both industry and the community. Customers include government intelligence agencies, private investigators, banks, corporates, programmers, writers, concerned parents, and even partners of Internet chat-cheaters. The KeyGhost product is marketed through international resellers and via the Internet under the trade name "KeyGhost". Visit the site at www.keyghost.com.

About KeyGhost Ltd

KeyGhost Ltd is a technology company specialising in developing and marketing the 'KeyGhost' - a hardware keystroke logging device for personal computers. Our mission is to identify computer security risks and develop transparent and user-friendly computer security solutions using the latest available technology in hardware and software. Manufactured in New Zealand and marketed internationally, the KeyGhost protects computer resources and increases computer security. Several areas have been identified where a hardware device such as the KeyGhost can be in great demand:

- as a tool for computer fraud investigations,

- as a monitoring device for detecting unauthorised access,

- as a deterrent to prevent unacceptable use of company resources, and

- as a back up tool that creates a log of all keystrokes typed on a keyboard.

The KeyGhost is powered by its own chip and can store up to 2,000,000 keystrokes in non-volatile flash memory, which does not require power to retain storage. This enables the device to operate independently of both the hardware and the operating system running on the PC.

When downloading KeyGhost log files it is easy to recognise if employees are misusing the computer. With games, for instance, repeat sequences such as inverted t-logs (w,a,s,d), control keys and function keys are clearly visible. The device also compresses repeated keystrokes to stop anyone trying to fill up the two million maximum keystroke log by holding down a key.

The postage stamp sized device is very easy to install without the knowledge of the person using the computer, as there is no software to download. However, should the Privacy Act require it, users ought to be informed that their computer is being monitored. KeyGhost welcomes enquiries from resellers and distributors. Further information about the KeyGhost product range can be found at www.keyghost.com.

- Ends -

For further information please contact Despina or Theo at:

despina@keyghost.com Tel: +64 3 3888 179 theo@keyghost.com Tel: +64 3 3793 883


© Scoop Media

 
 
 
Business Headlines | Sci-Tech Headlines

 

Mycoplasma Bovis: More Properties Positive

One of the latest infected properties is in the Hastings district, the other three are within a farming enterprise in Winton. The suspect property is near Ashburton. More>>

ALSO:

Manawatū Gorge Alternative: More Work Needed To Choose Route

“We are currently working closely and in partnership with local councils and other stakeholders to make the right long-term decision. It’s vital we have strong support on the new route as it will represent a very significant long-term investment and it will need to serve the region and the country for decades to come.” More>>

ALSO:

RBNZ: Super Fund Chief To Be New Reserve Bank Governor

Adrian Orr has been appointed as Reserve Bank Governor effective from 27 March 2018, Finance Minister Grant Robertson says. More>>

ALSO:

ScoopPro: Helping PR Professionals Get More Out Of Scoop

Scoop.co.nz has been a fixture of New Zealand’s news and Public Relations infrastructure for over 18 years. However, without the financial assistance of those using Scoop in a professional context in key sectors such as Public Relations and media, Scoop will not be able to continue this service... More>>

Insurance: 2017 Worst Year On Record For Weather-Related Losses

The Insurance Council of New Zealand (ICNZ) announced today that 2017 has been the most expensive year on record for weather-related losses, with a total insured-losses value of more than $242 million. More>>

ALSO: