Daily Tips Ndtricks

  • Subscribe to our RSS feed.
  • Twitter
  • StumbleUpon
  • Reddit
  • Facebook
  • Digg

Tuesday, 30 July 2013

Keylogging the FBI Way

Posted on 08:49 by Unknown

Magic Lantern may seem something out of a science fiction movie but it is very real and operational. With the Federal Bureau of Investigation at its helm, the tool has been behind many official surveillance activities which have not, always, been legal. Our info graphic tells more about the Magic Lantern, whose history can be traced back to 2001. This was when the FBI began its work on monitoring software that could be, remotely, installed without the user’s knowledge.

With the passage of time, the rootkit became advanced enough to steal vast amount of data from the target system, helping the FBI bust several extortion syndicates and identity theft cases. Magic Lantern also has support from some of the big antivirus makers like McAfee and Norton. They have ensured that a backdoor is left open for Magic Lantern to place a Trojan in any monitoring system, protected by them.

Our info graphic has a lot more details:


Keylogging the FBI Way, FBI's Magic Lantern!


Source: Mobistealth.


Author Bio:
Jane Andrew has been working on different aspects of privacy and security in the digital era.She writes for Mobistealth and tweets @janeandrew01.
Email ThisBlogThis!Share to XShare to FacebookShare to Pinterest
Posted in Infographics, Security Tips | No comments
Newer Post Older Post Home

0 comments:

Post a Comment

Subscribe to: Post Comments (Atom)

Popular Posts

  • Windows 8: How To Eliminate Shut Down Problem
               Windows 8 latest operating system launched by Microsoft known for its Modern UEFI interface, windows defender with antivirus prog...
  • 5 Reasons To Use A Website Builder
    If you don’t have a personal website, but you’re dreaming about launching one, you’ve come to the right place. In this article I’m going to...
  • GRAPHENE: A Material That Enabled the Creation of Flexible Smartphones
    Infographic By Quib.ly
  • Spider Silk: The Super Material of the Future
    Today's scientists and researchers are more advanced than they have ever been before thanks to the use of highly effective traditional ...
  • Being Smart For Used Smartphones
    On seeing our article on " Interesting Facts About Smartphone " You might be dying to have a Smartphone, it’s in, it’s cool, it’...
  • Tips to Prevent Data Loss!
    How do you protect yourself from losing important data? Do you save your work as often as possible? Do you do backups? Here are a few effect...
  • Preventing Data Breaches
    Understanding how data and security breaches occur can help you put a plan in place to protect your company moving forward. Your customers ...
  • The Most Important Phonecalls Of All Time
    Imagine a world without telephones, it’s pretty inconceivable. In a time when near enough everyone is little more than a punch of a few dig...
  • Increase Your Traffic With The Help Of Social Networks
    One of the best ways to increase website’s traffic is via social networking. Before even the Google Penguin exists, social networks have mad...
  • Samsung Galaxy S3 (Root, Recovery and Custom ROMs):
    Introduction: After the Samsung Galaxy S3 was released, there were many rooting tools introduced into the market due to its increase in dem...

Categories

  • android apps
  • apps
  • blogging
  • Blogging How To
  • Blogging Tips
  • Blogging Tools
  • business
  • Buying Guide
  • Cloud Computing
  • Computer Tips
  • Computer tricks
  • domain
  • Downloads
  • Earn Online
  • Facebook
  • Facebook Tricks
  • freewares
  • gadgets
  • games
  • Gaming
  • Gaming Tips
  • Gaming Tools
  • Google Glass
  • how to
  • Infographics
  • iphone
  • iphone apps
  • Mobile Tips
  • Mobile Tricks
  • Online Tips
  • Online Tricks
  • Other Tricks
  • printers
  • QR Code
  • recycle
  • review
  • Security Tips
  • seo
  • social media
  • softwares
  • Tech
  • tips
  • Tips -Computer Tips
  • tricks
  • Useful Tools
  • Web host
  • website
  • wet mobile
  • windows phone 8
  • youtube

Blog Archive

  • ▼  2013 (331)
    • ►  December (3)
    • ►  November (11)
    • ►  October (23)
    • ►  September (27)
    • ►  August (26)
    • ▼  July (25)
      • Pros And Cons Of Spybot Search And Destroy Anti-Sp...
      • Keylogging the FBI Way
      • Recording Your Every Move
      • Need A Hand With Cyber Security?
      • The Numbers Behind Facebook
      • Stellar Drive Defrag [Review]
      • How To Turn Your IPhone Into A Unlocked Wireless D...
      • Most Popular Mobile Phone Games
      • Blue Screen of Death - Take a Deep Breath
      • How Does A Computer System Generate So Much Heat?
      • Reviews Of New Internet Security Tools
      • Surprising News On What People Do With Their Mobil...
      • How To Optimize Your WordPress Blog For Speed?
      • Why Recycling Your Old Laptop Is Important?
      • The Most Important Phonecalls Of All Time
      • Do Password Strength Meters Actually Work?
      • Best Picture Sharing Apps of iPhone And Android
      • Simple Solution for Wordpress Contact Form Problem
      • Factors That Affect Your Broadband Speed
      • What? You Actually Call People On Your Phone?
      • Coolest Online Learning Technologies
      • How Scientists are Using the Internet?
      • Protecting Your Data Before It’s Too Late
      • 10 Easy Steps To Configuring An Internet Answering...
      • How To Buy An Unavailable Domain?
    • ►  June (36)
    • ►  May (56)
    • ►  April (30)
    • ►  March (31)
    • ►  February (31)
    • ►  January (32)
  • ►  2012 (43)
    • ►  December (11)
    • ►  November (2)
    • ►  October (2)
    • ►  September (9)
    • ►  August (18)
    • ►  July (1)
Powered by Blogger.

About Me

Unknown
View my complete profile