PaymentsJournal
No Result
View All Result
SIGN UP
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
PaymentsJournal
  • Commercial
  • Credit
  • Debit
  • Digital Assets & Crypto
  • Digital Banking
  • Emerging Payments
  • Fraud & Security
  • Merchant
  • Prepaid
No Result
View All Result
PaymentsJournal
No Result
View All Result

Vendor Offers Solution to Encrypt Keystrokes

By Mercator Advisory Group
April 12, 2011
in Analysts Coverage
0
0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn
An announcement today from Strikeforce Technologies identifies several recent data breaches — including Epsilon, RSA, and Heartland — as instances when hackers used keystroke logging spyware to obtain authentication credentials from unwitting computer users. The company offers a solution called GuardedID that encrypts keystrokes, rendering this type of attack useless to perpetrators.

“In the past week, we’ve probably all received emails from our credit card companies, banks and other online vendors about our email addresses being stolen as a result of this Epsilon breach,” said Mark L. Kay, StrikeForce Technology’s CEO. “Our GuardedID software, which encrypts keystroke data, is designed to render these types of intrusions irrelevant. We are experiencing a dramatic upswing in the number of calls we are fielding as people become more aware of our current activities and successes in the banking, healthcare and insurance industries.”

ComputerWorld, in an article published April 7, 2011, cites sources indicating that the Epsilon breach came as a result of a well-coordinated phishing “campaign that utilized Win32.BlkIC.IMG, which disabled anti-virus software, a Trojan keylogger called iStealer, which was used to steal passwords, and an administration tool called CyberGate, which is used to gain complete remote control of compromised systems.”

“In the case of Epsilon and RSA, it appears that the intended victims of these ‘spearphishing’ attacks were the employees of these major data protection services themselves,” said George Waller, StrikeForce’s CTO. “If the ‘pros’ can get scammed by the various hacks, then we all can. We need to be proactive to protect ourselves, and demand that our data protection centers and the corporations that use them immediately take steps to protect against keylogging hacks. StrikeForce’s keystroke encryption software, GuardedID® is designed specifically to render keylogger attacks moot.”

Click here to read the press release.

0
SHARES
0
VIEWS
Share on FacebookShare on TwitterShare on LinkedIn

    Get the Latest News and Insights Delivered Daily

    Subscribe to the PaymentsJournal Newsletter for exclusive insight and data from Javelin Strategy & Research analysts and industry professionals.

    Must Reads

    fraud as a service

    Keeping Up with the Most Dangerous Fraud Trends of 2026

    December 8, 2025
    open banking

    Open Banking Has Begun to Intrude on Banks’ Customer Relationships

    December 5, 2025
    conversational payments

    Conversational Payments: The Next Big Shift in Financial Services  

    December 4, 2025
    embedded finance

    Inside the Embedded Finance Shift Transforming SMB Software

    December 3, 2025
    metal cards

    Metal Card Magnitude: How a Premium Touch Can Enthrall High-Value Customers

    December 2, 2025
    digital gift cards

    How Nonprofits Can Leverage Digital Gift Cards to Help Those in Need

    December 1, 2025
    stored-value prepaid

    How Stored-Value Accounts Are the Next Iteration of Prepaid Payments

    November 26, 2025
    google crypto wallet, crypto regulation

    Crypto Heads Into 2026 Awaiting Its ‘Rocketship Point’

    November 25, 2025

    Linkedin-in X-twitter
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Commercial
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Digital Banking
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter
    • About Us
    • Advertise With Us
    • Sign Up for Our Newsletter

    ©2024 PaymentsJournal.com |  Terms of Use | Privacy Policy

    • Commercial Payments
    • Credit
    • Debit
    • Digital Assets & Crypto
    • Emerging Payments
    • Fraud & Security
    • Merchant
    • Prepaid
    No Result
    View All Result