Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Virtual Keypads- No More Immune To Internet Frauds

The discussion on multi-factor certification for electronic business by patrons, whether big or small, retail or commercial, is becoming vociferous, and almost everybody says that industry wide utilization is almost certain.

In a hope to combat cyber crimes, certain Internet banking websites instructs clients to utilize "virtual keypads", wherein the client inserts the account number on a numerical grid on the screen by clicking. It's a much reliable technique than entering the number with the help of keyboard.

The technique aims to prevent keystroke-logging applications that retain the typed details of user's. However, the virtual keypads seem equally susceptible to trespassers.

Hispasec Systems, a Spanish security organization, has exposed particulars of "Trojan horse" applications that can secure video images of unwary individual's computer usage. The sneaky software observes every bank detail the user types on virtual keypad.

A recently discovered Trojan merges both the keystroke-logging and video- intercepting roles. The default option allows trespassers command the distant computer's keyboard and mouse and rather than saving the whole screen, the package only captures imagery of the nearby sections clicked by the user. The snoop gets smaller record making the strife easier to execute.

Trojan Horses are created to grab onscreen images of aimed computers and catch user's authorization details. Owing to the growth in phishing- backed keyloggers, many banks have modified the user authorization technique in their sites. A popup window in the browser asks the user to click on the numerical keypad to log on. The malevolent code pauses for the existing window to visit the site from where they need to proctor information. After entering the site, the program slides over the screen supported by the mouse and transfers data to a specific site for exploiting the ID.

Usually, the Trojan is intolerant about incorrect instructions; it breaks down often under unaccustomed users but slides unobserved under the guidance of skilled hands.

The innovative qualities of Windows Vista will make it tougher for trojans to perform their dastardly job. Few of them incorporate enhanced security system, safe-mode IE, Windows Protector and less admittance to the core for rootkits.

Related article: Virtual Cyber Attack finds Flaws in Cyber Security

ยป SPAMfighter News - 10/5/2006

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next