Upload
frank-maiorca
View
15
Download
0
Tags:
Embed Size (px)
Citation preview
NewCoLogo
Keystroke GuardThe technology that everybody needs October 15th, 2014
About us
NBBI: Strategic Worldwide Marketing & Distribution Partner StrikeForce Technologies, Inc. (Edison, NJ) Founded in 2001 CEO was former CIO at JP Morgan – 26 years CTO was Chief Scientist at Bell Labs, Bell Core, & CSC Chairman - Steve Cooper (1st - CIO of DHS) Products – Protecting over 70 Million Computers - 100 countries Own 5 key cyber security patents, three additional patents are
pending: – Multi-Factor Out-of-Band Authentication (OOBA)
– Keystroke Encryption for PCs & Macs
– Keystroke Encryption for Mobile Device Browsers (Apple & Android)
– Keystroke Encryption for Mobile Applications (Apple & Android)
The Digital War has Begun!
The global battle to steal your secrets is turning hackers into
arms dealers.
July, 2014
Hackers are Targeting:
• Banking Industry – Large Dollar Transactions
• Retailers – Large Quantities of Credit Cards
• Corporations – Intellectual Property
• Consumers – Identity Theft
• Government – Secrets & Espionage
• Healthcare – Personal Health Information
Recent Breaches
Target
The forensics report showedthat Target was breached because a hacker sent an infected email to Target’s third-party HVAC vendor. The infected email contained a keylogger that stole the vendor’s login credentials.
People familiar with the investigation said the evidence gathered so far revealed that hackers were able to make a significant foray into J.P. Morgan's computer system. People with knowledge of the probe said it appeared between two and five U.S. financial institutions may have been affected. The names of all targeted banks couldn't be immediately determined.
J.P. Morgan and federal cyber investigators are in discussions as they examine the apparent attack on the bank's computer system, forensics revealed that Malware was the cause.
"Companies of our size unfortunately experience cyberattacks nearly every day," said Trish Wexler, a J.P. Morgan spokeswoman said Wednesday. "We have multiple layers of defense to counteract any threats and constantly monitor fraud levels."
JP Morgan Chase
FBI probes hacking incident atJ.P. Morgan. Attack appears tohave been caused by malicious computer code.
Home Depot
Forensics revealed that keylogging malware was found on employees’ computer systems.
Oregon Employment Dept.
Malware was used toattack the company’scomputer systems.
Community Health Systems
The APT Group used highlysophisticated malware toattack the company’scomputer systems.
Breach Commonalities
Malware was used to steal credentials and remotely login or
steal data.
Explosive Admission!
On May 7th, 2014, Symantec's senior vice presidentfor information security, Brian Dye, told the Wall StreetJournal that “anti-virus is dead".
He is leading Symantec towards a new approach that focuses on spotting hackers within a system and minimizing damage from them instead of trying to keep them out. "We don't think of antivirus as a moneymaker in any way," he told the Journal.
Our Computers are Under Attack!
• In the last 12 months, 401 million viruses were introduced on Internet.
• Best Anti-Virus software has 20 million known viruses.
• 1.1 million viruses are added per day.
• It takes an Anti-Virus software company an average of 28-30 days before it can address a known virus it finds.
The New Battleground is the Keyboard.
14
• 69% of all breaches contained malware.
• 98% of malware breaches used a keylogger.
• AV Software cannot stop a zero-day attack.
Successful keylogger breaches include:
Web Server
SSL Connection
Internet
Application Level
Browsers
Message Filter
Keyboard Driver
Normal data route without Keystroke Guard
SSL Connection
Messaging Service
Message Filter
How Does Keystroke Guard Work?
Web Server
SSL Connection
Internet
Application Level
Message Filter
Keyboard Driver
Normal data route without Keystroke Guard
Key
log
gin
g
Vu
lner
abil
ity
Message Hooking
Message Filtering
Replacing Driver
SSL Connection
Messaging Service
Message Filter
How Does Keystroke Guard Work?
Browsers
Web Server
SSL Connection
Internet
Application Level
Message Filter
Keyboard Driver
Normal data route without Keystroke Guard
Key
log
gin
g
Vu
lner
abil
ity
Message Hooking
Message Filtering
Replacing Driver
SSL Connection
Messaging Service
Message Filter
How Does Keystroke Guard Work?
“Out-of-Band” pathway for encrypted keystrokes
circumventing 99.9% of all keylogging
Browsers
Mobile Devices’ Vulnerabilities & Limitations
• Downloaded apps & files fail to detect malware
• Doesn’t include an encrypted password vault
• Anti-Virus cannot scan the mobile device’s kernel
• Data dictionaries & keyboard cache files not protected
By late 2014, 50% of all internet transactions will be conducted on mobile devices.
AES 256 Bit Encrypted
Password Vault
Encrypted Keyboard & Browser
User-Definable Strong Password
Generator One-Time-Password (OTP)
Generator
Conclusion
NBBI & StrikeForce are Industry leaders in developing and marketing cyber security solutions for the prevention of data breaches & identity theft.
Our Solutions Protect:• The network from unwanted access• The desktop from keylogging malware• Mobile device browsers from keyloggers and data leakage• Mobile applications from keyloggers and data leakage