KeystrokeGuard_Presentation_20141024

20
NewCo Logo Keystroke Guard The technology that everybody needs October 15 th , 2014

Transcript of KeystrokeGuard_Presentation_20141024

Page 1: KeystrokeGuard_Presentation_20141024

NewCoLogo

Keystroke GuardThe technology that everybody needs October 15th, 2014

Page 2: KeystrokeGuard_Presentation_20141024

About us

NBBI: Strategic Worldwide Marketing & Distribution Partner StrikeForce Technologies, Inc. (Edison, NJ) Founded in 2001 CEO was former CIO at JP Morgan – 26 years CTO was Chief Scientist at Bell Labs, Bell Core, & CSC Chairman - Steve Cooper (1st - CIO of DHS) Products – Protecting over 70 Million Computers - 100 countries Own 5 key cyber security patents, three additional patents are

pending: – Multi-Factor Out-of-Band Authentication (OOBA)

– Keystroke Encryption for PCs & Macs

– Keystroke Encryption for Mobile Device Browsers (Apple & Android)

– Keystroke Encryption for Mobile Applications (Apple & Android)

Page 4: KeystrokeGuard_Presentation_20141024

Hackers are Targeting:

• Banking Industry – Large Dollar Transactions

• Retailers – Large Quantities of Credit Cards

• Corporations – Intellectual Property

• Consumers – Identity Theft

• Government – Secrets & Espionage

• Healthcare – Personal Health Information

Page 5: KeystrokeGuard_Presentation_20141024

Recent Breaches

Page 6: KeystrokeGuard_Presentation_20141024

Target

The forensics report showedthat Target was breached because a hacker sent an infected email to Target’s third-party HVAC vendor. The infected email contained a keylogger that stole the vendor’s login credentials.

Page 7: KeystrokeGuard_Presentation_20141024

People familiar with the investigation said the evidence gathered so far revealed that hackers were able to make a significant foray into J.P. Morgan's computer system. People with knowledge of the probe said it appeared between two and five U.S. financial institutions may have been affected. The names of all targeted banks couldn't be immediately determined.

J.P. Morgan and federal cyber investigators are in discussions as they examine the apparent attack on the bank's computer system, forensics revealed that Malware was the cause.

"Companies of our size unfortunately experience cyberattacks nearly every day," said Trish Wexler, a J.P. Morgan spokeswoman said Wednesday. "We have multiple layers of defense to counteract any threats and constantly monitor fraud levels."

JP Morgan Chase

FBI probes hacking incident atJ.P. Morgan. Attack appears tohave been caused by malicious computer code.

Page 8: KeystrokeGuard_Presentation_20141024

Home Depot

Forensics revealed that keylogging malware was found on employees’ computer systems.

Page 9: KeystrokeGuard_Presentation_20141024

Oregon Employment Dept.

Malware was used toattack the company’scomputer systems.

Page 10: KeystrokeGuard_Presentation_20141024

Community Health Systems

The APT Group used highlysophisticated malware toattack the company’scomputer systems.

Page 11: KeystrokeGuard_Presentation_20141024

Breach Commonalities

Malware was used to steal credentials and remotely login or

steal data.

Page 12: KeystrokeGuard_Presentation_20141024

Explosive Admission!

On May 7th, 2014, Symantec's senior vice presidentfor information security, Brian Dye, told the Wall StreetJournal that “anti-virus is dead".

He is leading Symantec towards a new approach that focuses on spotting hackers within a system and minimizing damage from them instead of trying to keep them out. "We don't think of antivirus as a moneymaker in any way," he told the Journal.

Page 13: KeystrokeGuard_Presentation_20141024

Our Computers are Under Attack!

• In the last 12 months, 401 million viruses were introduced on Internet.

• Best Anti-Virus software has 20 million known viruses. 

• 1.1 million viruses are added per day.

• It takes an Anti-Virus software company an average of 28-30 days before it can address a known virus it finds.

Page 15: KeystrokeGuard_Presentation_20141024

Web Server

SSL Connection

Internet

Application Level

Browsers

Message Filter

Keyboard Driver

Normal data route without Keystroke Guard

SSL Connection

Messaging Service

Message Filter

How Does Keystroke Guard Work?

Page 16: KeystrokeGuard_Presentation_20141024

Web Server

SSL Connection

Internet

Application Level

Message Filter

Keyboard Driver

Normal data route without Keystroke Guard

Key

log

gin

g

Vu

lner

abil

ity

Message Hooking

Message Filtering

Replacing Driver

SSL Connection

Messaging Service

Message Filter

How Does Keystroke Guard Work?

Browsers

Page 17: KeystrokeGuard_Presentation_20141024

Web Server

SSL Connection

Internet

Application Level

Message Filter

Keyboard Driver

Normal data route without Keystroke Guard

Key

log

gin

g

Vu

lner

abil

ity

Message Hooking

Message Filtering

Replacing Driver

SSL Connection

Messaging Service

Message Filter

How Does Keystroke Guard Work?

“Out-of-Band” pathway for encrypted keystrokes

circumventing 99.9% of all keylogging

Browsers

Page 18: KeystrokeGuard_Presentation_20141024

Mobile Devices’ Vulnerabilities & Limitations

• Downloaded apps & files fail to detect malware

• Doesn’t include an encrypted password vault

• Anti-Virus cannot scan the mobile device’s kernel

• Data dictionaries & keyboard cache files not protected

Page 19: KeystrokeGuard_Presentation_20141024

By late 2014, 50% of all internet transactions will be conducted on mobile devices.

AES 256 Bit Encrypted

Password Vault

Encrypted Keyboard & Browser

User-Definable Strong Password

Generator One-Time-Password (OTP)

Generator

Page 20: KeystrokeGuard_Presentation_20141024

Conclusion

NBBI & StrikeForce are Industry leaders in developing and marketing cyber security solutions for the prevention of data breaches & identity theft.

Our Solutions Protect:• The network from unwanted access• The desktop from keylogging malware• Mobile device browsers from keyloggers and data leakage• Mobile applications from keyloggers and data leakage