Personal Monitor
Record PC users's actions, grab screenshots and passwords
Keystrokes recording software. Keylogger free trial
Cell phone and computer spy
Employee Monitor
Access and control the time spent by your workers
Terminal Monitor
Track employee activities on Terminal Server
Free Keylogger
Free keyboard logger keeps track of all typed text

ZoneDefense: advanced mobile protection

10 November 2011

ZoneDefenseAirPatrol has presented a new wireless security technology called ZoneDefense. This system uses a new unique approach to the prevention of corporate data leaks.

This a narrowly focused technology that prevents data leaks through mobile devices and applications. ZoneDefense integrates into the structure of a protected building (with its elements being placed in every room) and detects the location of any mobile device with 6-7 foot accuracy.

However, this is not all the system is capable of.

Not only does it allow to find devices within a protected building, but can also make them work according to system-wide rules. Depending on the rules, ZoneDefense can either allow or block the work of both devices and specific mobile applications using a number of parameters: device ownership by a specific employee, type of application, movement direction and even proximity of other devices.

This system can also set off an alarm notifying the security service about a possible data leak or detection of a suspicious device in an unauthorized area.


New online service from Refog. Track any device online. Just install the spy apps. And Information from your phones and computers will reflect in your online Hoverwatch account.

Software helped get back a stolen notebook

28 June 2011

Not long ago, an Apple notebook owner (Josh Kaufman) had an unfortunate experience. His MacBook was stolen and the police were not interested in investigating. Usually, that would be the end of the story, but in this case something else happened.

Shortly before the robbery, the owner installed a program on his MacBook which secretly tracked the user. It took screen shots, photos from the inbuilt camera and even identified the probable location of the device by using the Wi-Fi network. The software regularly sent all this data to the owner’s email.

The owner of the stolen computer wrote a blog called “This Guy Has My MacBook” and began to publish the screenshots and photographs in the hope of identifying the thief or of getting the police more interested. Fortunately, the thief didn’t wipe the disk or sell the laptop, but kept and used it himself. As a result Kaufman quickly collected a lot of photographs of the thief sleeping, sitting at the computer, driving his car, etc.

A few days later the police arrested the criminal and returned the stolen property to its owner. According to the police, they were able to make the arrest thanks to the photographs provided by Kaufman.

This story has caused a lot of discussion among MacBook owners. Many of them have asked Apple to add an app similar to the already existing services Find My iPhone and Find My iPad for iOS to the next MacOS version.

Most secret company data is not protected

5 April 2011

Companies working in the internet security business have been conducting annual research for several years on data protection in organisations. Their reports show that fro 2008 to 2011 the situation has changed significantly. Theft and leaks of secret information have massively increased.

At the same time hackers are attacking corporate web sites more often, successfully stealing company secrets. There are specific reasons for this.

1. Data is saved on devices difficult to make secure.

With the development of mobile technologies and wireless communication systems employees of large companies are becoming more interested in accessing their work information using mobile devices (telephones, smartphones, tablet computers, laptops). It is extremely difficult to protect such devices from even simple theft, even though they often contain important corporate information.

2. Workplace remote access systems.

These are becoming more popular, and they are much simpler to break into than internal closed corporate networks.

3. Use of cloud services for storing information.

Corporate cloud systems often lack the necessary security and there is a high risk of losing information stored there. In addition such systems are often located outside the reach of company specialists (hosting in other countries), which makes it harder to organise the appropriate security measures.

4. High demand for corporate data.

The significantly increased demand and high cost of such services encourages hackers to attack company networks. Hackers can easily sell stolen marketing statistical data or development codes for new software at a high price.

5. Incorrect response to discovered vulnerabilities.

In many cases companies do not even realise that information has been stolen. Moreover, only half of companies who discover information leaks try to restore and improve their security system. Only 30% turn to network security consultants and experts.

Experts recommend, as a precautionary measure, that companies strictly control the staff members who have access to secret information.

It is necessary that mobile devices are carefully controlled with, at the very least, password protection.

Information on internal computer systems (and also the stored information) should not be given to people who have no relation to the company’s security services.

Preinstalled keylogger on Samsung laptops

31 March 2011

StarLoggerMohamed Hassan, a graduate of Norwich University in Britain with a major in information security and the owner of NetSec Consulting, purchased a Samsung R525 laptop. After a full system scan with anti-spy and anti-virus software, he discovered a commercial keylogger called StarLogger in his С:\Windows\SL folder.

Mohamed analyzed the system and concluded that the keylogger had been installed by the laptop manufacturer.

He exchanged (for another reason) the laptop for a Samsung R540 from another store and found the same spyware preinstalled on it.

StarLogger (developed by Willebois Consulting, prices start from $23) is a commercial keylogger that logs key presses, creates screenshots and sends the collected data by email.

Mohamed contacted Samsung’s technical support service (inquiry #2101163379) and demanded an explanation. The reaction of the support staff gradually changed from complete denial and attempts to blame Microsoft as the supplier of the entire software package to finally admitting that the company intentionally installed such programs to “monitor the performance of customers’ computers and understand how they were used”.

It looks like Samsung collects data about the use of their computers without users’ consent. Don’t forget to check yours.

Three weeks after the incident, Jason Redmond (Manager, Marketing Communications at Samsung Electronics, Samsung) reported that an internal investigation had been started to deal with the situation.


New online service from Refog. Track any device online. Just install the free spy apps. And Information from your phones and computers will reflect in your online Hoverwatch account.

Locked iPhone hacked in 6 minutes

16 February 2011

It took only 6 minutes for a team of scientists from the Fraunhofer Institute for Secure Information Technology to pull most of the accounts-related data, including passwords, from a password-protected iPhone.

This attack is based on the already known iPhone hacking methods and requires a physical connection to the device, aiming at its password management system called Keychain.

First of all, the phone is “jailbroken” using publicly available tools. After that, the hacker installs an SSH server on the device and uploads a script that, once executed, pulls all the details of the accounts found in the Keychain system records.

The researchers say that this vulnerability still exists because the cryptographic key in the current iOS versions is not bound to the device blocking code.

The Keychain system can store email account passwords, access details for MS Exchange services, VPN and Wi-Fi access point data and passwords for some user’s applications.

Hoverwatch secretly watches over the phones of your children or staff members, recording calls, camera, spy on SMS, MMS, WhatsAPP, internet activity, calendar, contacts, and geodata (GPS).

InfoWatch data leaks report in 2010

20 October 2010

Global research by InfoWatch company has revealed 382 private confidential leaks in the first half of 2010. That’s more than 2 per day. 169 (44%) of such leaks are reported to be intentional and 185 (48%) — to be accidental.

Comparing to the first half of year 2009, the number of intentional leaks has reduced by 11%. This fact could be a result of more strict corporate security policies and deployment of information protection solutions in a number of companies.

A number of accidental leaks has got higher by 11% comparing to the same period. Specialists blame increased usage of mobile devices at work (e.g. notebooks, netbooks, flash drives and smart phones) and a lack of data encryption on these devices.

Another common reason for accidental confidential data leaks is weak control over paper copies of data. Only modern corporate DLP systems take control of which information is printed on paper, while otherwise there’s no way to track printed data which leads to data leaks.

DLP (Data Leak Prevention) systems are software or hardware systems designed to prevent confidential data leaks. Such systems are based on analysis and blocking of data streams which cross  info system boundaries.

US and UK are known to be the leaders of data leaks, and local laws are to blame. Companies are obliged to register all cases of data leaks. Russia, Canada and Germany complete the top 5 info-leaking countries.

General president of InfoWatch — Natalia Kaspersky notes that “lack of control over confidential info imposes major risks, which affect performance of commercial and government organizations. Both financial and reputation-wise.”


New online service from Refog. Track any device online. Just install the how to track a cell phone for free. And Information from your phones and computers will reflect in your online Hoverwatch account.

Virtual Keyboard from Google

28 May 2010

Google has added a virtual onscreen keyboard for typing in visitor’s mother tongue to the search and result pages of its search system. 35 languages are available with the exception of English and Chinese. Now there’s an icon next to the search box. When clicked it launches a virtual keyboard. With its help symbols are typed by mouse clicks on the desired letter on the screen.

About a year ago a program interface (API) was presented for free use of such a keyboard on third party web sites or in browser-based scripts.

Such a feature could be useful not only in case when you are forced to use a keyboard without necessary national layout (for example, while traveling), but also in case you fear a possible interception of data entered from the keyboard (such as when using public computers, Internet cafes, etc.).

Using the virtual keyboard will protect you not only from hardware keyloggers, but also from illegally installed primitive spy software.