Security researchers have discovered over 2,000 WordPress sites —possibly more— infected with a keylogger that's being loaded on the WordPress backend login page and a cryptojacking script (in-browser cryptocurrency miner) on their frontends.
Synaptics issued a security brief regarding the reports of a HP Synaptics Keyboard Driver that contained keylogging functionality. In their security brief, Synaptic states that their driver is being mischaracterized as a keylogger and it's simply a debug tool that was purposely added to the driver to help OEMs manufacturers.
With that said, if you have an HP laptop, you may be wondering if your laptop has the driver installed that contains this debug trace, or keylogging, feature. This article will tell you how to check if you have the affected driver installed on your laptop and how to update it to the latest version.
Nearly 5,500 WordPress sites are infected with a malicious script that logs keystrokes and sometimes loads an in-browser cryptocurrency miner.
Research carried out by Google engineers and academics from the University of California, Berkeley and the International Computer Science Institute has revealed that phishing attacks pose a more significant threat to users losing access to their Google accounts when compared to keyloggers or password reuse.
This past Thursday, a former University of Iowa student appeared in court on charges of hacking his school and professors and changing grades for himself and a few other fellow students.
Kansas University (KU) officials have expelled a student for installing a hardware keylogger and using the data acquired from the device to hack into the school's grading system and chang his grades.
A new version of the Svpeng Android banking trojan has started making victims during the past month, and at the origin of this sudden surge in activity is a criminal selling a new and improved version of Svpeng on a Russian underground hacking forum.
The German Federal Labour Court has ruled that companies can't install keyloggers to monitor employees because such an action violates personal privacy rights.
HP has issued an update to remove a keylogging mechanism found in the audio drivers included with some of its high-end laptops.
The audio driver installed on some HP laptops includes a feature that could best be described as a keylogger, which records all the user's keystrokes and saves the information to a local file, accessible to anyone or any third-party software or malware that knows where to look.
A large SPAM campaign is underway where victims receive an email that pretends to be a requested invoice and contains a password for a password protected encrypted Word document attachment. These password protected word documents contain embedded VBScript files that will download and install the Urlsnif keylogger.
A spam campaign posing as convincing bank transfer statements is tricking users into installing malware on their devices, malware that's capable of several damaging functions.
Zachary Shames pleaded guilty today to charges of developing and selling malware that was later used to infect thousands of victims.
Researchers have devised a system that can recognize a user's keystrokes by exploiting available WiFi signals. Using these attacks, under the right set of circumstances, hackers or other criminals could potentially monitor what you are typing purely on WiFi signals.