Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keystrokes recording software. Keylogger free trial
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

Men read others’ correspondence twice as often

13 September 2013

man-with-phoneThe results of a survey conducted among two thousand British citizens showed that men studied the contents of their girlfriends’ phones twice as often as women.

62% of male respondents admitted doing so as opposed to only 34% of women.

What were these men interested in their partners’ phones? It’s very simple – around a half of respondents were looking for SMS messages, while the other half were looking for social network posts.

In the majority of cases (89%), the purpose of these inspections was to find out if their partners had an affair.

The British believe that the lack of trust in couples can be a serious problem of the society as a whole on a global level.

France was secretly intercepting the British government correspondence

28 November 2011

During his speech at the McAfee Focus Event in London, David Blunkett, the former British Minister of Internal Affairs, provided some details about the 2000 negotiations with Nicolas Sarcozy (the French Minister of the Interior at that time), where the latter admitted that France had been intercepting electronic correspondence of the British embassy.

The future president of France thereby confirmed the fact of active hi-tech espionage on the state level. These days, virtually all government agencies use strong data encryption for all correspondence, especially for messages sent abroad.

During his address, Blunkett also raised the topic of “advanced persistent threats (APT’s), which usually target the IT systems of public organizations and government agencies.

One of the characteristics of APT’s is that hackers disguise their activities using the tools already present in the system being attacked, exploit commonly used ports, mask their activities as actions performed by standard applications or even hide their control communications in HTML comments, which allows them to capture highly-confidential and secret information for prolonged periods of time.