Products
Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keylogger
Keystrokes recording software. Keylogger free trial
Hoverwatch
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

Microsoft and Verizon patent user surveillance technologies

9 July 2013

A new patent by Microsoft (patent number 0120278904) describes a surveillance system that uses special camera-like devices to detect the presence of people in a room and calculate their number. The patent describes a possible use case where such a system is used to monitor the number of people watching a movie. When a certain threshold is exceeded, the system requests that an extended content license be purchased. The content can be played only a certain number of times, within a certain time period and for a certain number of viewers of specific ages.

patent
According to the patent, such a system can be used in various types of devices: from tablets, consoles and PC’s to mobile phones.

Verizon has a similar patent, but it provides more details about user monitoring.

The system is based on devices equipped with a microphone, a camera, an infrared camera and a laser sensor. The concept is strikingly similar to existing devices – for instance, Kinect for Xbox.

The described system can not only determine the number of people in a room, but also analyze their activities and identify their behavior (and show relevant ads, for example). The system will recognize the age of specific individuals and detect the presence and type of pets in front of it.

The system can also connect to users’ mobile phones for greater control accuracy.

Google is currently submitting a similar patent for its Google TV service, but little is known about it yet.

The capabilities of such systems are described in patent applications as entirely voluntary user actions. However, this will hardly prevent content providers (game and movie companies) from requiring a connection to such a system.

As in many other similar situations, this news worried lots of users. Blogs and forums were filled with references to Orwell’s “1984” novel and concerns about possible illegal use of such systems for user monitoring.
Try the free 3-day version of Personal Monitor. It will never send the information it collects to third parties and will let you know exactly who was doing what on your PC.

Viruses against the road police of the Moscow region

9 July 2013

Kaspersky Lab experts have discovered a virus that was intentionally planted into the Strelka-ST video surveillance systems that belong to the road police of the Moscow region. Specialists have discovered over a hundred files infected with various modifications of the virus.

The infection resulted in an almost complete shutdown of the regional video surveillance system on key highways and a financial loss estimated at 50 million rubles, since the systems remained offline for two weeks.
The analysis of the malware revealed that it was using a well-known technique – the virus periodically connected to a remote server and executed its commands.

Therefore, it is quite possible that data from these systems may have been sent over to the hackers’ server and we may be witnessing the use of the first spyware for road cameras in Russia.

In countries where digital technologies are more commonplace, many similar incidents have been recorded – from hacking digital locks in hotels to breaking into the software of coffee machines and even nuclear reactors. However, this particular case involving a virus attack on a federal video surveillance system is quite unique.

Authorities from the road police administration and the Ministry of Transportation are conducting an internal investigation and believe that the attack was the result of harsh competition between potential providers or system maintenance and support services.

Please bear in mind that spyware is not limited to viruses only. This category of software also includes legal and useful products of a similar kind.

For instance, if you want to know what your children are doing on their computers while you are away, you can use such software to collect detailed information about their activities and fend off many online threats.

All you need to do is to download Personal Monitor and install it on your computer. The program has a 3-day free unrestricted trial mode.

Free spyware: options

9 July 2013

Spyware can be used in various ways and for various purposes that are sometimes entirely opposite to each other.

For example, you can download a free trial version of the Personal Monitor, install it on your computer, and always know exactly what your kids have been doing while you were away. That way, you can ensure their safety. You can only install this software on your own computer.

However, judging by the news, spyware is often used for much more ignoble purposes.

Employees of the antivirus company Kaspersky Lab have confirmed a recent attack by the Lurk spyware on a number of popular information websites in the Russian segment of the Internet. The virus that was distributed that way, re-directed website users to a phishing site for the purpose of identity theft.

Websites of Vesti, Gazeta.ru, Vzglyad, Ura.ru and InterFax were all affected. The agencies’ employees have already cleared the websites from malicious code; however repeated infections of the resources have already been documented.

In order to cover up the presence of spyware on the websites, the intruders only added it at lunchtime (and for no longer than an hour and a half), and then deleted it. During that time the employees of the publications and antivirus companies could not detect the infection.

The Lurk virus is already known to the experts – it attacked the AdFox advertising system in March 2012 and a number of federal websites at the end of last year.

The purpose of these attacks is simple – profit. The infected computers become a part of the botnet and can be used in any way that its owner sees fit – from attacking other resources to stealing keys to client-banks and removing funds.

Computer and user monitoring software

9 July 2013

American journalists have discovered a video on YouTube that has never been intended for public viewing. It was uploaded back in 2010 for demonstration at the Federal Security Conference (that took place in April 2012), but it was never shown – the developers decided that the software was really not ready.

The author of the video and the software shown in it is the American defense company Raytheon, and the software is RIOT (Rapid Information Overlay Technology). The video can easily be found on YouTube by typing in the full name.

It is a computer and user monitoring software that uses a large number of data sources, including social networks (Facebook, Foursquare, Twitter, etc.). A data unit (personal file) is assigned to each user within the software, where information is gathered from all possible sources.

The monitoring software collects information on contacts, places visited, and typical routes. User’s photos are analyzed – the appearance is identified, EXIF tags are analyzed with the GPS data and times the pictures were taken. By analyzing the gathered information, the software predicts the future actions of the person.

Raytheon confirmed the authenticity of the video and stated that the software has not yet been sold to the client – the federal agency.

Development of monitoring software is a global trend that seems to have been around for a while, but is just beginning to gather steam.

Despite its formidable functionality, this software can be used in hundreds of peaceful and lawful ways.

refog-employee-monitor_51419

downloadFor example, if your children use your computer in your absence, information gathering about their activities can make life much simpler both for the children and for their parents – after all, you can avert many dangers of modern day Internet that way.

And you don’t have to sign a contract with a defense company to do it; you can simply download the Personal Monitor software and install it on your computer. For the first 3 days the software is free in the fully functional mode.

Update to version 7.2.0.1443

13 February 2012

In this program update there are not that many innovations, but it’s worth writing about it as well. It is made almost completely on the basis of joint work by programmers, the technical support department, and actual users of our programs.

In all the programs, we added the feature of capturing user’s messages in the VKontakte (vk.com) social network. Many users have asked me for this for a long time now.

The Ukrainian language was added to the programs’ interface. The translation was done by one of our users, so thank you very much to him.

The Ukrainian language

We are continuing to work on improving the encrypting system for logs in Employee Monitor and Terminal Monitor. In extremely rare cases, it works incorrectly and greatly slows down the work of the program.

Thanks to reports like this from our users, we were able to solve the problem. In the next versions of the programs, we will be able to get rid of it completely.

 

New online service from Refog. Track any device online. Just install the cell phone spy. And Information from your phones and computers will reflect in your online Hoverwatch account.

Updates and improvements, version 6.4.3.1164

8 August 2011

We did not announce any changes we made in our programs for a long time while we were releasing new versions. Therefore, today we decided to hold a slight review and recall everything.

One of the most important updates was the development of a module for protecting financial information. This is a special script that automatically searches for lines in the program’s logs that are similar to credit card numbers, and deletes them from the monitoring journal. Screenshots made at that moment are also deleted.

These protective mechanisms work only in cases when this is possible and do not guarantee protection in absolutely all cases. The script is gradually being improved to minimize false alarms and errors. It cannot be turned off since its very existence carries out legislative norms.

For the programs Employee Monitor and Terminal Monitor, due to many requests from the users, a feature was added of configuring log storage in a local or network folder specified by the user.

configuring log storage

A lot of work was done to improve the support of the latest versions of internet browsers (Opera, Firefox).

There was an improvement to message monitoring in Facebook, the social network.

The Turkish and Polish languages were added to the program interface.

 

New online service from Refog. Track any device online. Just install the tracker free. And Information from your phones and computers will reflect in your online Hoverwatch account.

Update to version 6.3.1.1129

21 December 2010

We’ve released an update for Refog Employee Monitor and Terminal Monitor 6.3.1.1129.

The update fixes minor bugs in the code of version 6.3.0 programs that occasionally occurred when opening monitoring logs. The program registration system has also been improved.

The main change, however, is a brand-new feature added after multiple requests we’ve received from users. The «Program Activity» table now has a button that generates a new program usage report for the selected user.

Employee Monitor

This report lists all the programs the user has worked in during the selected time period and the time spent in each of them. If you sort the table by the «Time used» column, for instance, you can instantly determine what programs were used most of all during the workday.

The collected data can be filtered in a number of ways and exported to a report in any of the supported formats (HTML, JPG, TXT, TIFF, Excel, PDF) by clicking the «Report» button.

As usual, the new versions are already available for download on our site. You can also update to them using the integrated program updater.

Update 6.2.4.1116

1 November 2010

We’ve released a regular update for Refog Personal Monitor and Refog Employee Monitor — 6.2.4.1116.

The latest version accommodates to the latest changes in Facebook chat. Previous versions are no longer supported due to recent changes in the social network.

Also there are minor user interface fixes and an updated web browser tracking module that supports the latest version of Google Chrome.

If you have automatic updates disabled you can download the update manually from our web site.

Update to version 6.2.2.1107

3 September 2010

A regular update version 6.2.2.1107 is available for Refog Personal Monitor and Employee Monitor.

The main change is added support for Google Chrome. As well as minor error fixed and user interface tweaks.

If you have automatic product updates disabled you can download the update right from our web site.

Refog Terminal Monitor Release

1 September 2010

Refog Terminal MonitorWe’re finishing up development of a new edition of Refog Employee Monitor designed specifically for terminal servers — Refog Terminal Monitor. Development had started in March 2010 and now we’re finally ready to unveil Terminal Monitor 6.2.0.1100.

Core features include:

  • full support of Windows and Citrix terminal servers;
  • storing all logs in a single encrypted storage;
  • strong 256-bit AES and SHA (HMAC) algorithms are used to protect your data;
  • ability to set log storage location;
  • access restrictions for particular user groups (e.g. allow log access only for network security administrators);
  • new log kinds and report formats including PDF, HTML and JPEG.

We’ve included all the features we had aimed for back in March. The software has passed thorough testing and is already available for purchase.