Title
Keyloggers: silent cyber security weapons
Date Issued
01 February 2020
Access level
metadata only access
Resource Type
journal article
Author(s)
Bhardwaj A.
University of South Pacific
Publisher(s)
Elsevier Ltd
Abstract
Cyber attackers are always seeking to design and push malicious software programs to unsuspecting users, to intentionally steal or cause damage and exploit data on end user systems. Malware types include spyware, keyloggers, rootkits and adware. In the past, script kiddies hacked computers to show off their skills and have fun. Today, hacking computers has become a huge cybercrime industry. Even as systems have improved in terms of both hardware and software, cyber attacks continue unabated. The privilege level at which keyloggers execute is higher than typical malware, which makes them almost impossible to detect and remove. Dr Akashdeep Bhardwaj of the University of Petroleum & Energy Studies, Dehradun, and Dr Sam Goundar of the University of South Pacific, demonstrate how a keylogger can gather keystrokes and screenshots along with online transactions without a scanner being able to detect it. They also suggest a form of virtual keyboard that could defeat this kind of malware.
Start page
14
End page
19
Volume
2020
Issue
2
Language
English
OCDE Knowledge area
Ciencias de la computación Ingeniería de sistemas y comunicaciones
Scopus EID
2-s2.0-85079602032
Source
Network Security
ISSN of the container
13534858
Sources of information: Directorio de Producción Científica Scopus