B
Bill Sanderson MVP
http://www.microsoft.com/downloads/...d4-0e65-4133-85e7-44e666cc245a&displaylang=en
We will explore the technical methods employed by both hardware and
software-based key loggers, how keystroke loggers are integrated with
specific malware threats, the user experience associated with various
key loggers installed, and examine the social and legal appropriateness
of various use scenarios.
http://www.microsoft.com/downloads/...60-58da-40db-8785-689cf6a05c73&displaylang=en
This paper will provide examples of poignant social engineering
‘exploits’ over the past few years and attempt to construct a model,
using telemetry from Microsoft’s Windows Malicious Software Removal
Tool, that can predict the prevalence of a specific social engineering
threat based on its characteristics and appeal to the user.
--
We will explore the technical methods employed by both hardware and
software-based key loggers, how keystroke loggers are integrated with
specific malware threats, the user experience associated with various
key loggers installed, and examine the social and legal appropriateness
of various use scenarios.
http://www.microsoft.com/downloads/...60-58da-40db-8785-689cf6a05c73&displaylang=en
This paper will provide examples of poignant social engineering
‘exploits’ over the past few years and attempt to construct a model,
using telemetry from Microsoft’s Windows Malicious Software Removal
Tool, that can predict the prevalence of a specific social engineering
threat based on its characteristics and appeal to the user.
--