Banks on Security Alert Against Keyloggers
High-tech criminal gangs with access to sophisticated keylogging viruses pose a growing threat to banks and financial institutions.
See Also: LIVE Webinar | Stop, Drop (a Table) & Roll: An SQL Highlight Discussion
Recently, Englandâ€™s High Tech Crime Unit foiled an effort to steal over $100 million from a Japanese bank in London.Â The gang gained access to Sumitomo Corp.â€™s computer systems, installed keyloggers in order to learn usersâ€™ passwords, and were getting set to transfer the money to 10 bank accounts scattered around the globe when they were discovered.Growing Threat
So what exactly is keylogging?Â Itâ€™s the practice of using a small hardware device or (more commonly) software to record every action performed at a given computerâ€™s keyboard.Â Once keylogging software is installed, itâ€™s a relatively simple matter for hackers to analyze it to learn sensitive information such as credit-card and bank-account numbers, user names, and of course passwords.
Keylogging is far from new; for several years, itâ€™s been spread through e-mail viruses.Â And â€œcommunityâ€ PCs in such places as airports and libraries have been found with hardware keyloggers installed.Â
Consumers who fall prey to keylogging may find fraudulent activity in their various online accounts.Â Now, as evidenced by the Sumitomo case, online criminals are upping the ante by going after corporate information.
Webroot, a security firm, says 15% of the PCs it tests have some sort of keylogging installed.Â
Whether youâ€™re at work or at home, you should follow basic security procedures to prevent a keylogger from being installed on your computer:
- Never click on attachments in e-mail unless you know they are legitimate.
- Use good anti-virus software, and update it regularly.
- Scour your home PC by running a reputable spyware-finding program, such as Lavasoftâ€™s Ad-Aware.
Â© National Security Institute, Inc.Â â€“ This article is the property of the National Security Institute and may not be copied or redistributed in any fashion without an appropriate licensing agreement.Â For more information and FREE samples, visit http://nsi.org/SECURITYsense2.htmlÂ .