Half Sized Blog Element (Single Author Style)
Half Sized Blog Element (Multi Author Style)
Information Security Strategy: Stop Punishing End Users
For many years, companies have focused their security efforts on implementing rules to lock down the end user. I learned the hard way that this strategy doesn’t necessarily lead to better security.
The ultimate keylogger: FBI’s Magic Lantern
While keyloggers maybe popularly associated with hackers and identity thieves in the digital realm, they have one more master that we often overlook i.e. the FBI. The Magic Lantern was a special program which used tricks only known to black hat hackers. It infiltrates a target’s system and steals all kinds of data. This infographic looks at how the Magic Lantern progressed over time, and precisely what the rootkit can help steal from a target’s system.
Information Security Strategy: Stop Punishing End Users
For many years, companies have focused their security efforts on implementing rules to lock down the end user. I learned the hard way that this strategy doesn’t necessarily lead to better security.
The ultimate keylogger: FBI’s Magic Lantern
While keyloggers maybe popularly associated with hackers and identity thieves in the digital realm, they have one more master that we often overlook i.e. the FBI. The Magic Lantern was a special program which used tricks only known to black hat hackers. It infiltrates a target’s system and steals all kinds of data. This infographic looks at how the Magic Lantern progressed over time, and precisely what the rootkit can help steal from a target’s system.

