Explore the latest news and trends  

Sign up for our weekly security newsletter


Be the first to receive important updates on security





Send

Cyber-criminals Intercept Keystrokes on PCs Inside Hotel Business Hubs

The United States Secret Service is cautioning hotel operators against malware, which seizes customers' sensitive information by logging keystrokes, after infecting PCs installed at their business hubs, published consumerist.com dated July 14, 2014.

In a report by Brian Krebs, cyber security specialist, it's understadable that the Secret Service along with NCCIC (National CyberSecurity and Communications Integration Center) of the Department of Homeland Security issued a security advisory for industries only, explaining how officials from Texas lately detained suspects who had been tampering with PCs located at business centers within Dallas/Fort Worth.

Apparently, the malware wasn't brought along on a compact disk alternatively USB stick, rather the suspects placed it within the cloud, while just took the same down on the hotels' PCs.

The advisory said that the suspects managed in acquiring huge volumes of data comprising hotel guests' Internet banking credentials, PII (Personally Identifiable Information), personal web-mail as well as retirement accounts. In addition, they filched more sensitive data available on the business hubs' PCs, it stated. Consumerist.com published this dated July 14, 2014.

Reportedly, each and every stroke that guests made on keyboards of the hijacked computers would become readable for the crooks through their e-mail ids. There's little information as to how many hotel visitors actually got impacted due to the criminals' sinister operations.

However, Krebs says many security suggestions are provided to enhance public PCs' safety that such businesses offer.

A particular recommendation is to minimize guests' account privileges in order that they won't be able to remove or add fresh software to any computer they use. While this isn't a complete remedy, still less tech-savvy cyber-crooks may be discouraged from doing the kind of activities they're involved in.

The advisory further cautioned that the cyber-criminals neither deployed sophisticated assaults nor needed highly technical expertise, while also didn't involve in abusing any software, operating system or Web-browser.

Krebs notes that gaining physical access of any computer most simplifies the method for hijacking it, considering there are so many tools with which such a system can be navigated onto another operating system that enables altering the intended system's data.

» SPAMfighter News - 7/23/2014

3 simple steps to update drivers on your Windows PCSlow PC? Optimize your Slow PC with SLOW-PCfighter!Email Cluttered with Spam? Free Spam Filter!

Dear Reader

We are happy to see you are reading our IT Security News.

We do believe, that the foundation for a good work environment starts with fast, secure and high performing computers. If you agree, then you should take a look at our Business Solutions to Spam Filter & Antivirus for even the latest version of Exchange Servers - your colleagues will appreciate it!

Go back to previous page
Next