Installing a Keylogger
From Blackhat
00:00 - 01:06
1m 6s

A hacker sends a company employee a fraudulent email prompting him to change his password. The employee downloads a PDF, which is a keylogger posing as password security guidelines. Once the keylogger has been downloaded, the hacker gets the employee's credentials and logs into the system.


Please sign in to write a comment.
  • Jason Frieling
    over 5 years ago
    I used this clip for a staff email.
Video Transcript

Related Clips

This clip discusses the ways in which to protect your data and network from ransomware attacks, which lock up a victim's files until money is paid.
Dade and his friends discover that the Da Vinci virus is a worm performing financial fraud through salami slicing, also known as penny shaving.
A counselor advises a couple that their personal information may have been compromised by someone with the online name, "Fear and Loathing." The counselor explains to Cindy how Fear and Loathing could have infected her computer and installed a keylogger through the use of a phishing email or link.
Johnny's sisters, Susan and Mary, create a chip that can be inserted into the brain to allow an individual to be connected to the internet at all times. However, that means the individual is exposed to computer threats such as viruses, pop-ups, and spyware. When The General implants the chip, which contains a virus, the virus takes over and makes him arms nuclear missiles. It is up to Johnny to defeat the virus and save the world from destruction.
War in the 21st century will be waged on many fronts -- one of which will be a digital battlefield with no guns or bombs.