SlideShare a Scribd company logo
NewCo
Logo
Keystroke Guard
The technology that everybody needs October 15th, 2014
About us
 NBBI: Strategic Worldwide Marketing & Distribution Partner
 StrikeForce Technologies, Inc. (Edison, NJ)
 Founded in 2001
 CEO was former CIO at JP Morgan – 26 years
 CTO was Chief Scientist at Bell Labs, Bell Core, & CSC
 Chairman - Steve Cooper (1st - CIO of DHS)
 Products – Protecting over 70 Million Computers - 100 countries
 Own 5 key cyber security patents, three additional patents are pending:
– Multi-Factor Out-of-Band Authentication (OOBA)
– Keystroke Encryption for PCs & Macs
– Keystroke Encryption for Mobile Device Browsers (Apple & Android)
– Keystroke Encryption for Mobile Applications (Apple & Android)
The Digital War has Begun!
The global battle to
steal your secrets is
turning hackers
into arms dealers.
July, 2014
Hackers are Targeting:
• Banking Industry – Large Dollar Transactions
• Retailers – Large Quantities of Credit Cards
• Corporations – Intellectual Property
• Consumers – Identity Theft
• Government – Secrets & Espionage
• Healthcare – Personal Health Information
Recent Breaches
Target
The forensics report showed
that Target was breached
because a hacker sent an
infected email to Target’s
third-party HVAC vendor. The
infected email contained a
keylogger that stole the
vendor’s login credentials.
People familiar with the investigation said the
evidence gathered so far revealed that hackers
were able to make a significant foray into J.P.
Morgan's computer system. People with knowledge
of the probe said it appeared between two and five
U.S. financial institutions may have been affected.
The names of all targeted banks couldn't be
immediately determined.
J.P. Morgan and federal cyber investigators are in
discussions as they examine the apparent attack on
the bank's computer system, forensics revealed
that Malware was the cause.
"Companies of our size unfortunately experience
cyberattacks nearly every day," said Trish Wexler, a
J.P. Morgan spokeswoman said Wednesday. "We
have multiple layers of defense to counteract any
threats and constantly monitor fraud levels."
JP Morgan Chase
FBI probes hacking incident at
J.P. Morgan. Attack appears to
have been caused by
malicious computer code.
Home Depot
Forensics revealed that
keylogging malware was
found on employees’
computer systems.
Oregon Employment Dept.
Malware was used to
attack the company’s
computer systems.
Community Health
Systems
The APT Group used highly
sophisticated malware to
attack the company’s
computer systems.
Breach Commonalities
Malware was used to steal credentials and
remotely login or steal data.
Explosive Admission!
On May 7th, 2014, Symantec's senior vice president
for information security, Brian Dye, told the Wall Street
Journal that “anti-virus is dead".
He is leading Symantec towards a new approach that
focuses on spotting hackers within a system and
minimizing damage from them instead of trying to keep
them out. "We don't think of antivirus as a moneymaker
in any way," he told the Journal.
Our Computers are Under Attack!
• In the last 12 months, 401 million
viruses were introduced on Internet.
• Best Anti-Virus software has
20 million known viruses.
• 1.1 million viruses are added
per day.
• It takes an Anti-Virus software
company an average of 28-30 days
before it can address a known
virus it finds.
The New Battleground is the
Keyboard.
14
• 69% of all breaches contained malware.
• 98% of malware breaches used a keylogger.
• AV Software cannot stop a zero-day attack.
Successful keylogger breaches include:
Web
Server
SSL
Connection
Internet
Application Level
Browsers
Message Filter
Keyboard Driver
Normal data route
without Keystroke Guard
SSL
Connection
Messaging Service
Message Filter
How Does Keystroke Guard Work?
Web
Server
SSL
Connection
Internet
Application Level
Message Filter
Keyboard Driver
Normal data route
without Keystroke Guard
Keylogging
Vulnerability
Message Hooking
Message Filtering
Replacing Driver
SSL
Connection
Messaging Service
Message Filter
How Does Keystroke Guard Work?
Browsers
Web
Server
SSL
Connection
Internet
Application Level
Message Filter
Keyboard Driver
Normal data route
without Keystroke Guard
Keylogging
Vulnerability
Message Hooking
Message Filtering
Replacing Driver
SSL
Connection
Messaging Service
Message Filter
How Does Keystroke Guard Work?
“Out-of-Band” pathway
for encrypted keystrokes
circumventing 99.9%
of all keylogging
Browsers
Mobile Devices’ Vulnerabilities &
Limitations
• Downloaded apps & files fail to detect malware
• Doesn’t include an encrypted password vault
• Anti-Virus cannot scan the mobile device’s kernel
• Data dictionaries & keyboard cache files not
protected
By late 2014,
50% of all internet transactions will
be conducted on mobile devices.
AES 256 Bit
Encrypted
Password Vault
Encrypted
Keyboard
& Browser
User-Definable
Strong Password
Generator One-Time-
Password (OTP)
Generator
Conclusion
NBBI & StrikeForce are Industry leaders in developing and
marketing cyber security solutions for the prevention of data
breaches & identity theft.
Our Solutions Protect:
• The network from unwanted access
• The desktop from keylogging malware
• Mobile device browsers from keyloggers and data leakage
• Mobile applications from keyloggers and data leakage

More Related Content

What's hot

Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)EC-Council
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level AttacksEC-Council
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber AttacksRubal Sagwal
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Webdpd
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attackstechexpert2345
 
Client server security threats
Client server security threatsClient server security threats
Client server security threatsrahul kundu
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catchiYogi
 
this is test for today
this is test for todaythis is test for today
this is test for todayDreamMalar
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityPatty Ramsey
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanannewbie2019
 

What's hot (20)

Types of Malware (CEH v11)
Types of Malware (CEH v11)Types of Malware (CEH v11)
Types of Malware (CEH v11)
 
Security threats
Security threatsSecurity threats
Security threats
 
Most Common Application Level Attacks
Most Common Application Level AttacksMost Common Application Level Attacks
Most Common Application Level Attacks
 
Types of Cyber Attacks
Types of Cyber AttacksTypes of Cyber Attacks
Types of Cyber Attacks
 
Cyber attacks
Cyber attacks Cyber attacks
Cyber attacks
 
System-Security-acit-Institute
System-Security-acit-InstituteSystem-Security-acit-Institute
System-Security-acit-Institute
 
Tutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the WebTutorial 09 - Security on the Internet and the Web
Tutorial 09 - Security on the Internet and the Web
 
Types of Cyber-Attacks
Types of Cyber-AttacksTypes of Cyber-Attacks
Types of Cyber-Attacks
 
Internet security
Internet securityInternet security
Internet security
 
PACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of MalwarePACE-IT, Security+3.1: Types of Malware
PACE-IT, Security+3.1: Types of Malware
 
Client server security threats
Client server security threatsClient server security threats
Client server security threats
 
8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch8 threats that even antivirus cannot catch
8 threats that even antivirus cannot catch
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Network security
Network securityNetwork security
Network security
 
this is test for today
this is test for todaythis is test for today
this is test for today
 
New internet security
New internet securityNew internet security
New internet security
 
Chapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet SecurityChapter 3 Ensuring Internet Security
Chapter 3 Ensuring Internet Security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 
Ethical hacking course ppt
Ethical hacking course pptEthical hacking course ppt
Ethical hacking course ppt
 
Chapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamananChapter 2 konsep dasar keamanan
Chapter 2 konsep dasar keamanan
 

Similar to KeystrokeGuard_Presentation_20141024

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1Abdelfatah hegazy
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial SectorLIFARS
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threatsZscaler
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-bBbAOC
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Onlineevolutionaryit
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with aiBurhan Ahmed
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacksGFI Software
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bankshreemala1
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...Invincea, Inc.
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516Yasser Mohammed
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfSoo Chin Hock
 
Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.MRMaguire
 

Similar to KeystrokeGuard_Presentation_20141024 (20)

E security and payment 2013-1
E security  and payment 2013-1E security  and payment 2013-1
E security and payment 2013-1
 
APT in the Financial Sector
APT in the Financial SectorAPT in the Financial Sector
APT in the Financial Sector
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Module0&1 intro-foundations-b
Module0&1 intro-foundations-bModule0&1 intro-foundations-b
Module0&1 intro-foundations-b
 
Staying Safe and Secure Online
Staying Safe and Secure OnlineStaying Safe and Secure Online
Staying Safe and Secure Online
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Cyber security with ai
Cyber security with aiCyber security with ai
Cyber security with ai
 
Cybercriminals and security attacks
Cybercriminals and security attacksCybercriminals and security attacks
Cybercriminals and security attacks
 
Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015Current Trends in Cyber Crime 2015
Current Trends in Cyber Crime 2015
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Brooks18
Brooks18Brooks18
Brooks18
 
7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank7 mike-steenberg-carlos-lopera-us-bank
7 mike-steenberg-carlos-lopera-us-bank
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
White Paper :- Spear-phishing, watering hole and drive-by attacks :- The New ...
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
 
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.Introduction to MicroSolved, Inc.
Introduction to MicroSolved, Inc.
 

KeystrokeGuard_Presentation_20141024

  • 1. NewCo Logo Keystroke Guard The technology that everybody needs October 15th, 2014
  • 2. About us  NBBI: Strategic Worldwide Marketing & Distribution Partner  StrikeForce Technologies, Inc. (Edison, NJ)  Founded in 2001  CEO was former CIO at JP Morgan – 26 years  CTO was Chief Scientist at Bell Labs, Bell Core, & CSC  Chairman - Steve Cooper (1st - CIO of DHS)  Products – Protecting over 70 Million Computers - 100 countries  Own 5 key cyber security patents, three additional patents are pending: – Multi-Factor Out-of-Band Authentication (OOBA) – Keystroke Encryption for PCs & Macs – Keystroke Encryption for Mobile Device Browsers (Apple & Android) – Keystroke Encryption for Mobile Applications (Apple & Android)
  • 3. The Digital War has Begun! The global battle to steal your secrets is turning hackers into arms dealers. July, 2014
  • 4. Hackers are Targeting: • Banking Industry – Large Dollar Transactions • Retailers – Large Quantities of Credit Cards • Corporations – Intellectual Property • Consumers – Identity Theft • Government – Secrets & Espionage • Healthcare – Personal Health Information
  • 6. Target The forensics report showed that Target was breached because a hacker sent an infected email to Target’s third-party HVAC vendor. The infected email contained a keylogger that stole the vendor’s login credentials.
  • 7. People familiar with the investigation said the evidence gathered so far revealed that hackers were able to make a significant foray into J.P. Morgan's computer system. People with knowledge of the probe said it appeared between two and five U.S. financial institutions may have been affected. The names of all targeted banks couldn't be immediately determined. J.P. Morgan and federal cyber investigators are in discussions as they examine the apparent attack on the bank's computer system, forensics revealed that Malware was the cause. "Companies of our size unfortunately experience cyberattacks nearly every day," said Trish Wexler, a J.P. Morgan spokeswoman said Wednesday. "We have multiple layers of defense to counteract any threats and constantly monitor fraud levels." JP Morgan Chase FBI probes hacking incident at J.P. Morgan. Attack appears to have been caused by malicious computer code.
  • 8. Home Depot Forensics revealed that keylogging malware was found on employees’ computer systems.
  • 9. Oregon Employment Dept. Malware was used to attack the company’s computer systems.
  • 10. Community Health Systems The APT Group used highly sophisticated malware to attack the company’s computer systems.
  • 11. Breach Commonalities Malware was used to steal credentials and remotely login or steal data.
  • 12. Explosive Admission! On May 7th, 2014, Symantec's senior vice president for information security, Brian Dye, told the Wall Street Journal that “anti-virus is dead". He is leading Symantec towards a new approach that focuses on spotting hackers within a system and minimizing damage from them instead of trying to keep them out. "We don't think of antivirus as a moneymaker in any way," he told the Journal.
  • 13. Our Computers are Under Attack! • In the last 12 months, 401 million viruses were introduced on Internet. • Best Anti-Virus software has 20 million known viruses. • 1.1 million viruses are added per day. • It takes an Anti-Virus software company an average of 28-30 days before it can address a known virus it finds.
  • 14. The New Battleground is the Keyboard. 14 • 69% of all breaches contained malware. • 98% of malware breaches used a keylogger. • AV Software cannot stop a zero-day attack. Successful keylogger breaches include:
  • 15. Web Server SSL Connection Internet Application Level Browsers Message Filter Keyboard Driver Normal data route without Keystroke Guard SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work?
  • 16. Web Server SSL Connection Internet Application Level Message Filter Keyboard Driver Normal data route without Keystroke Guard Keylogging Vulnerability Message Hooking Message Filtering Replacing Driver SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work? Browsers
  • 17. Web Server SSL Connection Internet Application Level Message Filter Keyboard Driver Normal data route without Keystroke Guard Keylogging Vulnerability Message Hooking Message Filtering Replacing Driver SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work? “Out-of-Band” pathway for encrypted keystrokes circumventing 99.9% of all keylogging Browsers
  • 18. Mobile Devices’ Vulnerabilities & Limitations • Downloaded apps & files fail to detect malware • Doesn’t include an encrypted password vault • Anti-Virus cannot scan the mobile device’s kernel • Data dictionaries & keyboard cache files not protected
  • 19. By late 2014, 50% of all internet transactions will be conducted on mobile devices. AES 256 Bit Encrypted Password Vault Encrypted Keyboard & Browser User-Definable Strong Password Generator One-Time- Password (OTP) Generator
  • 20. Conclusion NBBI & StrikeForce are Industry leaders in developing and marketing cyber security solutions for the prevention of data breaches & identity theft. Our Solutions Protect: • The network from unwanted access • The desktop from keylogging malware • Mobile device browsers from keyloggers and data leakage • Mobile applications from keyloggers and data leakage