The Hidden Data Thieves

Covert technologies for data theft are cheaper, smaller and more available than ever.






Not Only Q Does Covert



Click to Steal Clients



Hide Files Online






Spy Pen




The Zippo Cam



Ear to the Wall




Eavesdropping Illegal but Available





Reading Your Keystrokes




Somebody’s Watching Me


www.anti-keyloggers.com

www.sysinternals.com/utilities/autoruns.html



The Impossible Dream?







John Mallery is a managing consultant for BKD, LLP, one of the 10 largest accounting firms in the United States. He works in the Forensics and Dispute Consulting unit and specializes in computer forensics. He is also a co-author of Hardening Network Security, published by McGraw-Hill. He can be reached at jmallery@bkd.com.