PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Vendor Offers Solution to Encrypt Keystrokes

By Mercator Advisory Group
April 12, 2011
in Analysts Coverage
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
An announcement today from Strikeforce Technologies identifies several recent data breaches — including Epsilon, RSA, and Heartland — as instances when hackers used keystroke logging spyware to obtain authentication credentials from unwitting computer users. The company offers a solution called GuardedID that encrypts keystrokes, rendering this type of attack useless to perpetrators.

“In the past week, we’ve probably all received emails from our credit card companies, banks and other online vendors about our email addresses being stolen as a result of this Epsilon breach,” said Mark L. Kay, StrikeForce Technology’s CEO. “Our GuardedID software, which encrypts keystroke data, is designed to render these types of intrusions irrelevant. We are experiencing a dramatic upswing in the number of calls we are fielding as people become more aware of our current activities and successes in the banking, healthcare and insurance industries.”

ComputerWorld, in an article published April 7, 2011, cites sources indicating that the Epsilon breach came as a result of a well-coordinated phishing “campaign that utilized Win32.BlkIC.IMG, which disabled anti-virus software, a Trojan keylogger called iStealer, which was used to steal passwords, and an administration tool called CyberGate, which is used to gain complete remote control of compromised systems.”

“In the case of Epsilon and RSA, it appears that the intended victims of these ‘spearphishing’ attacks were the employees of these major data protection services themselves,” said George Waller, StrikeForce’s CTO. “If the ‘pros’ can get scammed by the various hacks, then we all can. We need to be proactive to protect ourselves, and demand that our data protection centers and the corporations that use them immediately take steps to protect against keylogging hacks. StrikeForce’s keystroke encryption software, GuardedID® is designed specifically to render keylogger attacks moot.”

Click here to read the press release.

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    bank chatbot

    When It Comes to Chatbots, Banks Are Falling Behind Fintechs

    February 20, 2026
    embedded payments finance

    How Developers Are Driving the Future of Embedded Payments

    February 19, 2026
    gift card strategy

    The Gift Card Shift: From Convenience to Core Shopping Strategy

    February 18, 2026
    Tina Shirley

    From Cross-Border Payments to Community Banks: The Future of Zelle®

    February 17, 2026
    Startups: Fintechs Data Streaming Technology in Banking, corporates Enriched Data vs Faster Payments

    Fighting Fraud in the Era of Faster Payments

    February 13, 2026
    cross-border payments

    Solving for Fraud in Cross-Border Payments Requires Better Counterparty Verification

    February 12, 2026
    agentic commerce

    Demystifying the Agentic Commerce Enigma

    February 11, 2026
    payment gateways

    How Payment Gateways for Businesses Can Help You Offer Your Customers More Options

    February 10, 2026

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result