Friday, 30 March 2007

Keyloggers: How they work and how to detect them

Source: Viruslist.com
Summary: first part of a two-part article on keylogger technology -- one of the most commonly used tools in cybercrime and phishing in particular. This is a relatively basic introduction to the subject.

No comments: