Image 01 Image 02 Image 03 Image 01 Image 02 Image 03 Image 03 Image 03 Image 03 Image 03 Image 03 Image 03 Image 01 Image 02 Image 03 Image 03 Image 03


Malware Captures Credentials Through Keystroke-logging
Key-logging allows malware to capture keystrokes when a user types into a specific application or a specific field on a web page (e.g. password). Cybercriminals use key-logging to capture credentials and personal information to enable account takeover and financial fraud and to gain access to sensitive information. Malware uses various techniques to log keystrokes, including hooking into the keyboard driver and related operating system services.  
Organizations should address the threat of key-logging malware on customers' and employees' endpoints as it represents a critical threat that can compromise access to external and internal application and data. 

Block Malware Infection, Remove Existing Malware

Controls should be implemented to prevent malware from infecting managed and unmanaged devices that access the enterprise. If infected, the controls need to quickly remove existing malware from end users' machines and prevent future infections by stopping attempts to exploit system vulnerabilities and malware installation processes. Special focus should be given to resource consumption and management overhead when balancing strength of the protection and risk reduction with end user and IT security impact. 

Secure Against Malicious Application Access
or Tampering 

Relevant operating system, application or browser services should be protected against malware access and tampering. Organizations should deploy capabilities that prevent interception of user keystrokes, such as keystroke encryption, when using sensitive applications or entering login and personal information.