NewCo
Logo
Keystroke Guard
The technology that everybody needs October 15th, 2014
About us
 NBBI: Strategic Worldwide Marketing & Distribution Partner
 StrikeForce Technologies, Inc. (Edison, NJ)
 Founded in 2001
 CEO was former CIO at JP Morgan – 26 years
 CTO was Chief Scientist at Bell Labs, Bell Core, & CSC
 Chairman - Steve Cooper (1st - CIO of DHS)
 Products – Protecting over 70 Million Computers - 100 countries
 Own 5 key cyber security patents, three additional patents are pending:
– Multi-Factor Out-of-Band Authentication (OOBA)
– Keystroke Encryption for PCs & Macs
– Keystroke Encryption for Mobile Device Browsers (Apple & Android)
– Keystroke Encryption for Mobile Applications (Apple & Android)
The Digital War has Begun!
The global battle to
steal your secrets is
turning hackers
into arms dealers.
July, 2014
Hackers are Targeting:
• Banking Industry – Large Dollar Transactions
• Retailers – Large Quantities of Credit Cards
• Corporations – Intellectual Property
• Consumers – Identity Theft
• Government – Secrets & Espionage
• Healthcare – Personal Health Information
Recent Breaches
Target
The forensics report showed
that Target was breached
because a hacker sent an
infected email to Target’s
third-party HVAC vendor. The
infected email contained a
keylogger that stole the
vendor’s login credentials.
People familiar with the investigation said the
evidence gathered so far revealed that hackers
were able to make a significant foray into J.P.
Morgan's computer system. People with knowledge
of the probe said it appeared between two and five
U.S. financial institutions may have been affected.
The names of all targeted banks couldn't be
immediately determined.
J.P. Morgan and federal cyber investigators are in
discussions as they examine the apparent attack on
the bank's computer system, forensics revealed
that Malware was the cause.
"Companies of our size unfortunately experience
cyberattacks nearly every day," said Trish Wexler, a
J.P. Morgan spokeswoman said Wednesday. "We
have multiple layers of defense to counteract any
threats and constantly monitor fraud levels."
JP Morgan Chase
FBI probes hacking incident at
J.P. Morgan. Attack appears to
have been caused by
malicious computer code.
Home Depot
Forensics revealed that
keylogging malware was
found on employees’
computer systems.
Oregon Employment Dept.
Malware was used to
attack the company’s
computer systems.
Community Health
Systems
The APT Group used highly
sophisticated malware to
attack the company’s
computer systems.
Breach Commonalities
Malware was used to steal credentials and
remotely login or steal data.
Explosive Admission!
On May 7th, 2014, Symantec's senior vice president
for information security, Brian Dye, told the Wall Street
Journal that “anti-virus is dead".
He is leading Symantec towards a new approach that
focuses on spotting hackers within a system and
minimizing damage from them instead of trying to keep
them out. "We don't think of antivirus as a moneymaker
in any way," he told the Journal.
Our Computers are Under Attack!
• In the last 12 months, 401 million
viruses were introduced on Internet.
• Best Anti-Virus software has
20 million known viruses.
• 1.1 million viruses are added
per day.
• It takes an Anti-Virus software
company an average of 28-30 days
before it can address a known
virus it finds.
The New Battleground is the
Keyboard.
14
• 69% of all breaches contained malware.
• 98% of malware breaches used a keylogger.
• AV Software cannot stop a zero-day attack.
Successful keylogger breaches include:
Web
Server
SSL
Connection
Internet
Application Level
Browsers
Message Filter
Keyboard Driver
Normal data route
without Keystroke Guard
SSL
Connection
Messaging Service
Message Filter
How Does Keystroke Guard Work?
Web
Server
SSL
Connection
Internet
Application Level
Message Filter
Keyboard Driver
Normal data route
without Keystroke Guard
Keylogging
Vulnerability
Message Hooking
Message Filtering
Replacing Driver
SSL
Connection
Messaging Service
Message Filter
How Does Keystroke Guard Work?
Browsers
Web
Server
SSL
Connection
Internet
Application Level
Message Filter
Keyboard Driver
Normal data route
without Keystroke Guard
Keylogging
Vulnerability
Message Hooking
Message Filtering
Replacing Driver
SSL
Connection
Messaging Service
Message Filter
How Does Keystroke Guard Work?
“Out-of-Band” pathway
for encrypted keystrokes
circumventing 99.9%
of all keylogging
Browsers
Mobile Devices’ Vulnerabilities &
Limitations
• Downloaded apps & files fail to detect malware
• Doesn’t include an encrypted password vault
• Anti-Virus cannot scan the mobile device’s kernel
• Data dictionaries & keyboard cache files not
protected
By late 2014,
50% of all internet transactions will
be conducted on mobile devices.
AES 256 Bit
Encrypted
Password Vault
Encrypted
Keyboard
& Browser
User-Definable
Strong Password
Generator One-Time-
Password (OTP)
Generator
Conclusion
NBBI & StrikeForce are Industry leaders in developing and
marketing cyber security solutions for the prevention of data
breaches & identity theft.
Our Solutions Protect:
• The network from unwanted access
• The desktop from keylogging malware
• Mobile device browsers from keyloggers and data leakage
• Mobile applications from keyloggers and data leakage

More Related Content

PPT
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
PDF
8 Types of Cyber Attacks That Can Bother CISOs in 2020
PDF
Anatomy of a cyber attack
PPTX
What's new in​ CEHv11?
PPTX
Cyber Attacks
PPT
Ch03 Network and Computer Attacks
PPTX
Network Security for Employees
PDF
Anatomy of a cyber-attack
Watch Your Back: Let’s Talk Web Safety and Personal Identity Theft
8 Types of Cyber Attacks That Can Bother CISOs in 2020
Anatomy of a cyber attack
What's new in​ CEHv11?
Cyber Attacks
Ch03 Network and Computer Attacks
Network Security for Employees
Anatomy of a cyber-attack

What's hot (20)

PPTX
Types of Malware (CEH v11)
PPTX
Security threats
PPTX
Most Common Application Level Attacks
PPTX
Types of Cyber Attacks
PDF
Cyber attacks
PPT
System-Security-acit-Institute
PPT
Tutorial 09 - Security on the Internet and the Web
 
PPTX
Types of Cyber-Attacks
PPTX
Internet security
PPTX
PACE-IT, Security+3.1: Types of Malware
PPTX
Client server security threats
DOCX
8 threats that even antivirus cannot catch
PPT
Network security
PPT
this is test for today
PPT
New internet security
PPT
Chapter 3 Ensuring Internet Security
PPT
Network Security Threats and Solutions
PPTX
Ethical hacking course ppt
PDF
Chapter 2 konsep dasar keamanan
Types of Malware (CEH v11)
Security threats
Most Common Application Level Attacks
Types of Cyber Attacks
Cyber attacks
System-Security-acit-Institute
Tutorial 09 - Security on the Internet and the Web
 
Types of Cyber-Attacks
Internet security
PACE-IT, Security+3.1: Types of Malware
Client server security threats
8 threats that even antivirus cannot catch
Network security
this is test for today
New internet security
Chapter 3 Ensuring Internet Security
Network Security Threats and Solutions
Ethical hacking course ppt
Chapter 2 konsep dasar keamanan
Ad

Similar to KeystrokeGuard_Presentation_20141024 (20)

PPT
Safe Computing At Home And Work
PDF
The process of computer security
PPTX
Computer Security and Ethics
PDF
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
PDF
Week3-CyberSecurity 8th Semester important.pdf
PPTX
Internet security
PPTX
23 network security threats pkg
PDF
Getting users to care about security
PPT
091005 Internet Security
PPT
Direct infection: virus can infect files every time a user opens that specif...
PPT
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
cs0123.ppt
PPTX
Cyber-Security.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857 (1).ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt
PPT
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Safe Computing At Home And Work
The process of computer security
Computer Security and Ethics
Sophos Threatsaurus: The A-Z of Computer and Data Security Threats
Week3-CyberSecurity 8th Semester important.pdf
Internet security
23 network security threats pkg
Getting users to care about security
091005 Internet Security
Direct infection: virus can infect files every time a user opens that specif...
Cyber-Security]shhsjjsjsjdjdjjddjjdjh.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
cs0123.ppt
Cyber-Security.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857 (1).ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt
Cyber-Security-20211013105857.ppt HGJHHKJHJKHKH
Ad

KeystrokeGuard_Presentation_20141024

  • 1. NewCo Logo Keystroke Guard The technology that everybody needs October 15th, 2014
  • 2. About us  NBBI: Strategic Worldwide Marketing & Distribution Partner  StrikeForce Technologies, Inc. (Edison, NJ)  Founded in 2001  CEO was former CIO at JP Morgan – 26 years  CTO was Chief Scientist at Bell Labs, Bell Core, & CSC  Chairman - Steve Cooper (1st - CIO of DHS)  Products – Protecting over 70 Million Computers - 100 countries  Own 5 key cyber security patents, three additional patents are pending: – Multi-Factor Out-of-Band Authentication (OOBA) – Keystroke Encryption for PCs & Macs – Keystroke Encryption for Mobile Device Browsers (Apple & Android) – Keystroke Encryption for Mobile Applications (Apple & Android)
  • 3. The Digital War has Begun! The global battle to steal your secrets is turning hackers into arms dealers. July, 2014
  • 4. Hackers are Targeting: • Banking Industry – Large Dollar Transactions • Retailers – Large Quantities of Credit Cards • Corporations – Intellectual Property • Consumers – Identity Theft • Government – Secrets & Espionage • Healthcare – Personal Health Information
  • 6. Target The forensics report showed that Target was breached because a hacker sent an infected email to Target’s third-party HVAC vendor. The infected email contained a keylogger that stole the vendor’s login credentials.
  • 7. People familiar with the investigation said the evidence gathered so far revealed that hackers were able to make a significant foray into J.P. Morgan's computer system. People with knowledge of the probe said it appeared between two and five U.S. financial institutions may have been affected. The names of all targeted banks couldn't be immediately determined. J.P. Morgan and federal cyber investigators are in discussions as they examine the apparent attack on the bank's computer system, forensics revealed that Malware was the cause. "Companies of our size unfortunately experience cyberattacks nearly every day," said Trish Wexler, a J.P. Morgan spokeswoman said Wednesday. "We have multiple layers of defense to counteract any threats and constantly monitor fraud levels." JP Morgan Chase FBI probes hacking incident at J.P. Morgan. Attack appears to have been caused by malicious computer code.
  • 8. Home Depot Forensics revealed that keylogging malware was found on employees’ computer systems.
  • 9. Oregon Employment Dept. Malware was used to attack the company’s computer systems.
  • 10. Community Health Systems The APT Group used highly sophisticated malware to attack the company’s computer systems.
  • 11. Breach Commonalities Malware was used to steal credentials and remotely login or steal data.
  • 12. Explosive Admission! On May 7th, 2014, Symantec's senior vice president for information security, Brian Dye, told the Wall Street Journal that “anti-virus is dead". He is leading Symantec towards a new approach that focuses on spotting hackers within a system and minimizing damage from them instead of trying to keep them out. "We don't think of antivirus as a moneymaker in any way," he told the Journal.
  • 13. Our Computers are Under Attack! • In the last 12 months, 401 million viruses were introduced on Internet. • Best Anti-Virus software has 20 million known viruses. • 1.1 million viruses are added per day. • It takes an Anti-Virus software company an average of 28-30 days before it can address a known virus it finds.
  • 14. The New Battleground is the Keyboard. 14 • 69% of all breaches contained malware. • 98% of malware breaches used a keylogger. • AV Software cannot stop a zero-day attack. Successful keylogger breaches include:
  • 15. Web Server SSL Connection Internet Application Level Browsers Message Filter Keyboard Driver Normal data route without Keystroke Guard SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work?
  • 16. Web Server SSL Connection Internet Application Level Message Filter Keyboard Driver Normal data route without Keystroke Guard Keylogging Vulnerability Message Hooking Message Filtering Replacing Driver SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work? Browsers
  • 17. Web Server SSL Connection Internet Application Level Message Filter Keyboard Driver Normal data route without Keystroke Guard Keylogging Vulnerability Message Hooking Message Filtering Replacing Driver SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work? “Out-of-Band” pathway for encrypted keystrokes circumventing 99.9% of all keylogging Browsers
  • 18. Mobile Devices’ Vulnerabilities & Limitations • Downloaded apps & files fail to detect malware • Doesn’t include an encrypted password vault • Anti-Virus cannot scan the mobile device’s kernel • Data dictionaries & keyboard cache files not protected
  • 19. By late 2014, 50% of all internet transactions will be conducted on mobile devices. AES 256 Bit Encrypted Password Vault Encrypted Keyboard & Browser User-Definable Strong Password Generator One-Time- Password (OTP) Generator
  • 20. Conclusion NBBI & StrikeForce are Industry leaders in developing and marketing cyber security solutions for the prevention of data breaches & identity theft. Our Solutions Protect: • The network from unwanted access • The desktop from keylogging malware • Mobile device browsers from keyloggers and data leakage • Mobile applications from keyloggers and data leakage