![]() For all these tools, the price varies according to storage capacity and features (time keeping, Wi-Fi access.). These vendors also sell other kind of recording devices, such as video (recording VGA, HDMI or DVI), RS232 and even Ethernet loggers. Many vendors also highlight their usage for monitoring employees. They can be bought on many websites, even Amazon, making them commonly used in private life, for example during a divorce 4. We can assume they are used for espionage, while no public communication exists for such usage apart from a few articles 1 2 3. The only condition for attackers is the usage of an external keyboard. Hardware keyloggers can be bought online for a couple of dollars and are very appreciated due to their discretion because they cannot be discovered by endpoint security software.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |