Developments in the world of serious and organised crime online.
Friday, 30 March 2007
Keyloggers: How they work and how to detect them
Source: Viruslist.com Summary: first part of a two-part article on keylogger technology -- one of the most commonly used tools in cybercrime and phishing in particular. This is a relatively basic introduction to the subject.