Products
Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

The Smart Watch as a Hardware Keylogger

25 January 2016

French college student Tony Beltramelli has e-published his scientific research on the use of so-called “smart watches” and special algorithms to track the users of these watches.

The topic of the paper (and this fundamentally new approach to hacking attacks) involves the interception and deep analysis of data from the accelerometer of a worn device. In this case the device in question is a smart watch (the Samsung Gear Live, for example) or fitness bracelet. These devices are worn on the wrist, which makes it possible to intercept data the user has typed in with this wrist on any physical or touch keyboard.

This specific study is dedicated to a method for intercepting keypresses on a standard 12-key numerical keypad such as those used at ATMs or for entering PIN codes in mobile applications.

The data from the accelormeter is collected by the worn device, then transmitted via Bluetooth to a nearby smartphone, and then from the phone to a server via GPRS/LTE. On the server the data is processed using a special algorithm in Java, Python, and Lua that imitates a neural network.

The algorithm cancels out noise, looks for signs of a PIN code being entered, and decodes it with a reliability of 59-73%. After processing by a neural net the reliability of the decoding process is significantly increased (up to 92%).

The developer has posted outgoing codes from this process on GitHub and video demonstrations of the process on YouTube.

The only thing that remains unclear is why anyone would enter a PIN code with the same they use for their watch. Watches are usually worn on the left hand, but most right-handed people enter their codes with their right hand.

Lenovo: spyware found on Thinkpad series laptops

16 October 2015

laptopFor the third time this year, Lenovo has been caught spying on the buyers of its devices.

Initial concerns were caused by the pre-installed Superfish tool that violated users’ privacy. After that, users found non-removable loaders of unknown software in the system BIOS of these laptops.

The newest discovery is a “Lenovo Customer Feedback Program 64” process found in the task manager of a refurbished Thinkpad laptop with Windows 7 OEM installed. Once a day, is sends comprehensive information about the use of the system to a certain address.

Information about this software is provided in the user agreement, but it’s very well hidden.

Another curious fact is that the information is not sent to Lenovo directly, but to a company called Omniture, which specializes in marketing and web analytics. It means that the results of this
monitoring are likely to convert into additional revenue for Lenovo.
Users of Thinkpad laptops are seriously concerned by the fact that the company tries to make money even on the buyers of expensive premium equipment.

Kid’s psychological defense from the Internet

29 May 2015

Nowadays, everywhere we look, we can see children with smartphones, tablets, laptops and other devices with the Internet access. What exactly are they doing online and what kinds of problems they encounter is something no more than 15 percent of parents are aware of.

bad-mood

Some of them watch carton, others play harmless games, but there are also those who might have serious problems, while their parents remain in the dark.

More »

Children and social media

29 May 2015

The means of communication between people have changed significantly in recent years. This trend primarily affects the children. A 4-year old kid using a computer with Internet access is not a big surprise these days.

deti-i-seti

By the age of ten, children already have accounts on various social media web-sites and services, while a personal smartphone is practically their only link to the outside world.

A mere five years ago children, whose education was neglected by their parents, were receiving most of the information from TV, which was quite a problem to begin with. Now, however, things have drastically changed and it is the Internet that shapes the minds of our children, while parents bear full responsibility for controlling this process.

More »

About Webcam Snapshot Function

19 May 2015

In our eighth product line we have added a periodic snapshot creation function. Snapshots are created using a connected webcam, and according to the reviews, our users find it quite helpful.

refog-pm-webcam

There are three major questions in relation to this function, and below we will try to address them.

  1. How do you disable webcam activity indicator?
  2. How do you increase snapshot creation frequency?
  3. How to take a video instead of a snapshot?

More »

Keyloggers and the Law: Learn from the Mistake of Others

14 May 2015

Yet another story of a criminal case against someone using keyloggers has caused quite a storm; thus, we would like to discuss whether this program is actually legal or not.

shutterstock_154122851

Also, we want to inform you about a new very important update to our program’s interface that is supposed to help our users avoid innocent infringement.

01

More »

Time-and-attendance applications

5 May 2015

Time-and-attendance applications offer an alternative solution for companies worried about insufficient productivity of their employees.

The way these applications work is rather simple. Most of them save information about the open window (an application or a web-site) at any specific moment, computer’s operating time as well as the time the user was actually being active.

And as is the case with personnel monitoring systems, a mere mention of these programs causes a storm of emotions and opposite opinions.

Very often this is a sign of time-and-attendance applications being used heedlessly, at the wrong place and time or in an unbalanced manner. Instead of improving the situation, all this can potentially make it significantly worse.

Let’s see when using such programs is really justified or whether it will do more harm than good.

More »

Video surveillance systems review

21 April 2015

In our previous reviews on various information security, employee supervision software and hardware monitoring systems for offices we have already stressed that many tools can effectively function only in combination with video surveillance systems.

video-surveillance

Main difficulties associated with these systems are in:

  • them being rather expensive
  • extremely difficult selection of the necessary equipment
  • equipment compatibility

The more requirements are imposed on a ready-for-use video surveillance system, the more difficult the product selection is.

Below we review main surveillance systems classes and take a closer look at modern solutions.

More »

How to find a stolen laptop, tablet or phone with the help of applications?

9 April 2015

Nowadays, we are hearing more and more news of how people are getting back their lost or stolen devices thanks to various software applications capable of disclosing identities and geographical location of thieves.

notebook-thief

And it’s not just the iPhones that we’re talking about. The same happens to numerous Android and other OS devices, as owners of tablets and laptops are successfully getting them back.

Below is a brief overview of “antitheft” functions of different platforms and third-party software.

More »

Network devices with parental control features

7 April 2015

We all want to keep ourselves, our children and our computers safe from Internet threats. And people often pay quite a lot of money for professional antiviruses, firewalls and other intricate information security software. This is of course a proper approach than just ignoring threats or using free or unauthorized software of dubious efficiency.

But neither should you overlook some absolutely free ways to protect your computer from already known dangerous sites, viruses, phishing and adult content.

router

In this article we will take a look at both modern routers’ features and free DNS-filters.

More »