This document summarizes StrikeForce Technologies' Keystroke Guard cybersecurity product. It begins by introducing StrikeForce and its leadership team. It then discusses the growing threat of hackers targeting industries and individuals. Common methods of data breaches through malware and keyloggers are outlined. The document explains how Keystroke Guard uses an encrypted "out-of-band" pathway to protect against keylogging malware on computers and mobile devices. It concludes that StrikeForce is a leader in developing cybersecurity solutions to prevent data breaches and identity theft.
2. About us
NBBI: Strategic Worldwide Marketing & Distribution Partner
StrikeForce Technologies, Inc. (Edison, NJ)
Founded in 2001
CEO was former CIO at JP Morgan – 26 years
CTO was Chief Scientist at Bell Labs, Bell Core, & CSC
Chairman - Steve Cooper (1st - CIO of DHS)
Products – Protecting over 70 Million Computers - 100 countries
Own 5 key cyber security patents, three additional patents are pending:
– Multi-Factor Out-of-Band Authentication (OOBA)
– Keystroke Encryption for PCs & Macs
– Keystroke Encryption for Mobile Device Browsers (Apple & Android)
– Keystroke Encryption for Mobile Applications (Apple & Android)
3. The Digital War has Begun!
The global battle to
steal your secrets is
turning hackers
into arms dealers.
July, 2014
4. Hackers are Targeting:
• Banking Industry – Large Dollar Transactions
• Retailers – Large Quantities of Credit Cards
• Corporations – Intellectual Property
• Consumers – Identity Theft
• Government – Secrets & Espionage
• Healthcare – Personal Health Information
6. Target
The forensics report showed
that Target was breached
because a hacker sent an
infected email to Target’s
third-party HVAC vendor. The
infected email contained a
keylogger that stole the
vendor’s login credentials.
7. People familiar with the investigation said the
evidence gathered so far revealed that hackers
were able to make a significant foray into J.P.
Morgan's computer system. People with knowledge
of the probe said it appeared between two and five
U.S. financial institutions may have been affected.
The names of all targeted banks couldn't be
immediately determined.
J.P. Morgan and federal cyber investigators are in
discussions as they examine the apparent attack on
the bank's computer system, forensics revealed
that Malware was the cause.
"Companies of our size unfortunately experience
cyberattacks nearly every day," said Trish Wexler, a
J.P. Morgan spokeswoman said Wednesday. "We
have multiple layers of defense to counteract any
threats and constantly monitor fraud levels."
JP Morgan Chase
FBI probes hacking incident at
J.P. Morgan. Attack appears to
have been caused by
malicious computer code.
12. Explosive Admission!
On May 7th, 2014, Symantec's senior vice president
for information security, Brian Dye, told the Wall Street
Journal that “anti-virus is dead".
He is leading Symantec towards a new approach that
focuses on spotting hackers within a system and
minimizing damage from them instead of trying to keep
them out. "We don't think of antivirus as a moneymaker
in any way," he told the Journal.
13. Our Computers are Under Attack!
• In the last 12 months, 401 million
viruses were introduced on Internet.
• Best Anti-Virus software has
20 million known viruses.
• 1.1 million viruses are added
per day.
• It takes an Anti-Virus software
company an average of 28-30 days
before it can address a known
virus it finds.
14. The New Battleground is the
Keyboard.
14
• 69% of all breaches contained malware.
• 98% of malware breaches used a keylogger.
• AV Software cannot stop a zero-day attack.
Successful keylogger breaches include:
17. Web
Server
SSL
Connection
Internet
Application Level
Message Filter
Keyboard Driver
Normal data route
without Keystroke Guard
Keylogging
Vulnerability
Message Hooking
Message Filtering
Replacing Driver
SSL
Connection
Messaging Service
Message Filter
How Does Keystroke Guard Work?
“Out-of-Band” pathway
for encrypted keystrokes
circumventing 99.9%
of all keylogging
Browsers
18. Mobile Devices’ Vulnerabilities &
Limitations
• Downloaded apps & files fail to detect malware
• Doesn’t include an encrypted password vault
• Anti-Virus cannot scan the mobile device’s kernel
• Data dictionaries & keyboard cache files not
protected
19. By late 2014,
50% of all internet transactions will
be conducted on mobile devices.
AES 256 Bit
Encrypted
Password Vault
Encrypted
Keyboard
& Browser
User-Definable
Strong Password
Generator One-Time-
Password (OTP)
Generator
20. Conclusion
NBBI & StrikeForce are Industry leaders in developing and
marketing cyber security solutions for the prevention of data
breaches & identity theft.
Our Solutions Protect:
• The network from unwanted access
• The desktop from keylogging malware
• Mobile device browsers from keyloggers and data leakage
• Mobile applications from keyloggers and data leakage