Daily Tips Ndtricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 30 July 2013

Keylogging the FBI Way

Posted on 08:49 by Unknown

Magic Lantern may seem something out of a science fiction movie but it is very real and operational. With the Federal Bureau of Investigation at its helm, the tool has been behind many official surveillance activities which have not, always, been legal. Our info graphic tells more about the Magic Lantern, whose history can be traced back to 2001. This was when the FBI began its work on monitoring software that could be, remotely, installed without the user’s knowledge.

With the passage of time, the rootkit became advanced enough to steal vast amount of data from the target system, helping the FBI bust several extortion syndicates and identity theft cases. Magic Lantern also has support from some of the big antivirus makers like McAfee and Norton. They have ensured that a backdoor is left open for Magic Lantern to place a Trojan in any monitoring system, protected by them.

Our info graphic has a lot more details:


Keylogging the FBI Way, FBI's Magic Lantern!


Source: Mobistealth.


Author Bio:
Jane Andrew has been working on different aspects of privacy and security in the digital era.She writes for Mobistealth and tweets @janeandrew01.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Infographics, Security Tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Being Smart For Used Smartphones
    On seeing our article on " Interesting Facts About Smartphone " You might be dying to have a Smartphone, it’s in, it’s cool, it’...
  • Protect Your Business Information: Data Security Guidelines
    We live in a digital era and there are not only traditional hazards that endanger our business. Cyber attacks are becoming more and more co...
  • Invisible Yahoo Detector
    Invisible detect users on Yahoo! Messenger (YM)         Use our Invisible Yahoo Scanner to detect if a Yahoo Messenger users is in fact offl...
  • 5 Reasons To Use A Website Builder
    If you don’t have a personal website, but you’re dreaming about launching one, you’ve come to the right place. In this article I’m going to...
  • Tips and Tricks about Online Bargains
    The internet, with the myriads of interconnected computers and sites, its not impossible that there is something good waiting to be discover...
  • Pros And Cons Of IPhones
    Img. Credit:  freedigitalphotos There is a great deal of buzz in the smart phone arena as of late. With the HTC Droid DNA and the upcoming ...
  • Spider Silk: The Super Material of the Future
    Today's scientists and researchers are more advanced than they have ever been before thanks to the use of highly effective traditional ...

Categories

  • android apps
  • apps
  • blogging
  • Blogging How To
  • Blogging Tips
  • Blogging Tools
  • business
  • Buying Guide
  • Cloud Computing
  • Computer Tips
  • Computer tricks
  • domain
  • Downloads
  • Earn Online
  • Facebook
  • Facebook Tricks
  • freewares
  • gadgets
  • games
  • Gaming
  • Gaming Tips
  • Gaming Tools
  • Google Glass
  • how to
  • Infographics
  • iphone
  • iphone apps
  • Mobile Tips
  • Mobile Tricks
  • Online Tips
  • Online Tricks
  • Other Tricks
  • printers
  • QR Code
  • recycle
  • review
  • Security Tips
  • seo
  • social media
  • softwares
  • Tech
  • tips
  • Tips -Computer Tips
  • tricks
  • Useful Tools
  • Web host
  • website
  • wet mobile
  • windows phone 8
  • youtube

Blog Archive

  • ▼  2013 (331)
    • ►  December (3)
    • ►  November (11)
    • ►  October (23)
    • ►  September (27)
    • ►  August (26)
    • ▼  July (25)
      • Pros And Cons Of Spybot Search And Destroy Anti-Sp...
      • Keylogging the FBI Way
      • Recording Your Every Move
      • Need A Hand With Cyber Security?
      • The Numbers Behind Facebook
      • Stellar Drive Defrag [Review]
      • How To Turn Your IPhone Into A Unlocked Wireless D...
      • Most Popular Mobile Phone Games
      • Blue Screen of Death - Take a Deep Breath
      • How Does A Computer System Generate So Much Heat?
      • Reviews Of New Internet Security Tools
      • Surprising News On What People Do With Their Mobil...
      • How To Optimize Your WordPress Blog For Speed?
      • Why Recycling Your Old Laptop Is Important?
      • The Most Important Phonecalls Of All Time
      • Do Password Strength Meters Actually Work?
      • Best Picture Sharing Apps of iPhone And Android
      • Simple Solution for Wordpress Contact Form Problem
      • Factors That Affect Your Broadband Speed
      • What? You Actually Call People On Your Phone?
      • Coolest Online Learning Technologies
      • How Scientists are Using the Internet?
      • Protecting Your Data Before It’s Too Late
      • 10 Easy Steps To Configuring An Internet Answering...
      • How To Buy An Unavailable Domain?
    • ►  June (36)
    • ►  May (56)
    • ►  April (30)
    • ►  March (31)
    • ►  February (31)
    • ►  January (32)
  • ►  2012 (43)
    • ►  December (11)
    • ►  November (2)
    • ►  October (2)
    • ►  September (9)
    • ►  August (18)
    • ►  July (1)
Powered by Blogger.

About Me

Unknown
View my complete profile