Presentation is loading. Please wait.

Presentation is loading. Please wait.

NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014.

Similar presentations


Presentation on theme: "NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014."— Presentation transcript:

1 NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014

2 About us  NBBI: Strategic Worldwide Marketing & Distribution Partner  StrikeForce Technologies, Inc. (Edison, NJ)  Founded in 2001  CEO was former CIO at JP Morgan – 26 years  CTO was Chief Scientist at Bell Labs, Bell Core, & CSC  Chairman - Steve Cooper (1st - CIO of DHS)  Products – Protecting over 70 Million Computers - 100 countries  Own 5 key cyber security patents, three additional patents are pending: –Multi-Factor Out-of-Band Authentication (OOBA) –Keystroke Encryption for PCs & Macs –Keystroke Encryption for Mobile Device Browsers (Apple & Android) –Keystroke Encryption for Mobile Applications (Apple & Android)

3 The Digital War has Begun! The global battle to steal your secrets is turning hackers into arms dealers. July, 2014

4 Hackers are Targeting: Banking Industry – Large Dollar Transactions Banking Industry – Large Dollar Transactions Retailers – Large Quantities of Credit Cards Retailers – Large Quantities of Credit Cards Corporations – Intellectual Property Corporations – Intellectual Property Consumers – Identity Theft Consumers – Identity Theft Government – Secrets & Espionage Government – Secrets & Espionage Healthcare – Personal Health Information Healthcare – Personal Health Information

5 Recent Breaches

6 Target The forensics report showed that Target was breached because a hacker sent an infected email to Target’s third-party HVAC vendor. The infected email contained a keylogger that stole the vendor’s login credentials.

7 People familiar with the investigation said the evidence gathered so far revealed that hackers were able to make a significant foray into J.P. Morgan's computer system. People with knowledge of the probe said it appeared between two and five U.S. financial institutions may have been affected. The names of all targeted banks couldn't be immediately determined. J.P. Morgan and federal cyber investigators are in discussions as they examine the apparent attack on the bank's computer system, forensics revealed that Malware was the cause. "Companies of our size unfortunately experience cyberattacks nearly every day," said Trish Wexler, a J.P. Morgan spokeswoman said Wednesday. "We have multiple layers of defense to counteract any threats and constantly monitor fraud levels." JP Morgan Chase FBI probes hacking incident at J.P. Morgan. Attack appears to have been caused by malicious computer code.

8 Home Depot Forensics revealed that keylogging malware was found on employees’ computer systems.

9 Oregon Employment Dept. Malware was used to attack the company’s computer systems.

10 Community Health Systems The APT Group used highly sophisticated malware to attack the company’s computer systems.

11 Breach Commonalities Malware was used to steal credentials and remotely login or steal data.

12 Explosive Admission! On May 7 th, 2014, Symantec's senior vice president for information security, Brian Dye, told the Wall Street Journal that “anti-virus is dead". He is leading Symantec towards a new approach that focuses on spotting hackers within a system and minimizing damage from them instead of trying to keep them out. "We don't think of antivirus as a moneymaker in any way," he told the Journal.

13 Our Computers are Under Attack! In the last 12 months, 401 million viruses were introduced on Internet. Best Anti-Virus software has 20 million known viruses. 1.1 million viruses are added per day. It takes an Anti-Virus software company an average of 28-30 days before it can address a known virus it finds.

14 The New Battleground is the Keyboard. 14 69% of all breaches contained malware. 69% of all breaches contained malware. 98% of malware breaches used a keylogger. 98% of malware breaches used a keylogger. AV Software cannot stop a zero-day attack. AV Software cannot stop a zero-day attack. Successful keylogger breaches include: Successful keylogger breaches include:

15 Web Server SSL Connection Internet Application Level Browsers Message Filter Keyboard Driver Normal data route without Keystroke Guard SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work?

16 Web Server SSL Connection Internet Application Level Message Filter Keyboard Driver Normal data route without Keystroke Guard Keylogging Vulnerability Message Hooking Message Filtering Replacing Driver SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work? Browsers

17 Web Server SSL Connection Internet Application Level Message Filter Keyboard Driver Normal data route without Keystroke Guard Keylogging Vulnerability Message Hooking Message Filtering Replacing Driver SSL Connection Messaging Service Message Filter How Does Keystroke Guard Work? “Out-of-Band” pathway for encrypted keystrokes circumventing 99.9% of all keylogging Browsers

18 Mobile Devices’ Vulnerabilities & Limitations Downloaded apps & files fail to detect malware Downloaded apps & files fail to detect malware Doesn’t include an encrypted password vault Doesn’t include an encrypted password vault Anti-Virus cannot scan the mobile device’s kernel Anti-Virus cannot scan the mobile device’s kernel Data dictionaries & keyboard cache files not Data dictionaries & keyboard cache files notprotected

19 By late 2014, 50% of all internet transactions will be conducted on mobile devices. AES 256 Bit Encrypted Password Vault Encrypted Keyboard & Browser User-Definable Strong Password Generator One-Time- Password (OTP) Generator

20 Conclusion NBBI & StrikeForce are Industry leaders in developing and marketing cyber security solutions for the prevention of data breaches & identity theft. Our Solutions Protect: The network from unwanted access The network from unwanted access The desktop from keylogging malware The desktop from keylogging malware Mobile device browsers from keyloggers and data leakage Mobile device browsers from keyloggers and data leakage Mobile applications from keyloggers and data leakage Mobile applications from keyloggers and data leakage


Download ppt "NewCo Logo Keystroke Guard The technology that everybody needs October 15 th, 2014."

Similar presentations


Ads by Google