Chinese Keyboard Developer Spies on User Through Built-in Keylogger

By Waqas

A Chinese mechanical keyboard manufacturer MantisTek has been caught in the

This is a post from HackRead.com Read the original post: Chinese Keyboard Developer Spies on User Through Built-in Keylogger

Continue reading Chinese Keyboard Developer Spies on User Through Built-in Keylogger

Built-in Keylogger Found in MantisTek GK2 Keyboards—Sends Data to China

“The right keyboard can make all the difference between a victory and a defeat in a video game battlefield.”

If you are a gamer, you can relate to the above quote.

But what if your winning weapon betrays you?

The popular 104-key Mantistek GK2 Mechanical Gaming Keyboard that costs around €49.66 has allegedly been caught silently recording everything you type on your keyboard and sending them

Continue reading Built-in Keylogger Found in MantisTek GK2 Keyboards—Sends Data to China

FormBook—Cheap Password Stealing Malware Used In Targeted Attacks

It seems sophisticated hackers have changed the way they conduct targeted cyber operations—instead of investing in zero-days and developing their malware; some hacking groups have now started using ready-made malware just like script kiddies.

Possibly, this could be a smart move for state-sponsored hackers to avoid being attributed easily.

Security researchers from multiple security firms,

Continue reading FormBook—Cheap Password Stealing Malware Used In Targeted Attacks

Disguised as Citrix Utility, Kedi RAT Exploits Gmail to Transfer Data

By Uzair Amir

A Remote Access Trojan (RAT) is one of the most used

This is a post from HackRead.com Read the original post: Disguised as Citrix Utility, Kedi RAT Exploits Gmail to Transfer Data

Continue reading Disguised as Citrix Utility, Kedi RAT Exploits Gmail to Transfer Data

Dangerous Mobile Banking Trojan Gets ‘Keylogger’ to Steal Everything

Cyber criminals are becoming more adept, innovative, and stealthy with each passing day. They have now shifted from traditional to more clandestine techniques that come with limitless attack vectors and are harder to detect.

Security researchers have … Continue reading Dangerous Mobile Banking Trojan Gets ‘Keylogger’ to Steal Everything