Thursday, December 08, 2016 10:20:48 AM
I work in the financial district. If an attacker is logging your keystrokes you are already compromised to some extent. It means he made it thru your firewall (a breach in the companies "layered security" approach).
Now, keystroke encryption software would be very good to have in that scenario, but it would not protect you fully, because you already have someone on the inside of your network. There are other ways to steal credentials than "logging keystrokes". Printers, copiers, routers, switches, etc... to some extent all have credentials on them also. credentials can also be stolen using a LLMNR/NBT-NS poisoning attack which will capture user network hashes. You can then use limited hardware resurces to gain access to the domain.
In my experience with penetration testing, networking within my peers in the industry, and my own personal experiences. Poisoning attacks on a network, shoddy network domain configuration exploitation, and The lesser known devices like printers (that are networked) and copiers (again networked) are much easier to "hack" and steal some sort of network credentials from, than logging keystrokes on a computer.
FEATURED Cannabix Technologies Announces First Delivery of Marijuana Breath Test (MBT) to a Major Construction Client • Mar 19, 2026 12:45 PM
ECGI Building in Crypto's Top-Performing Sector as Tokenized Real-World Assets Surge Past $26 Billion • ECGI • Mar 19, 2026 8:30 AM
Advances in Domestic Heavy Rare Earth Minerals Production Essential for North American Defense Stockpiles • ALOY • Mar 18, 2026 9:00 AM
ECGI Advances $10M Mortgage Tokenization Pilot as SEC Interpretation Adds Clarity • ECGI • Mar 18, 2026 8:45 AM
ECGI Advances Mortgage Tokenization Pilot as Institutional Market Rails Continue to Develop • ECGI • Mar 17, 2026 8:30 AM
Record Gold Prices Reshape Economics of New Mine Development • SNWGF • Mar 16, 2026 10:46 AM
