Feeds

FTC slaps down commercial keylogger firm

No more sneaky stuff, mister

Internet Security Threat Report 2014

CyberSpy Software, which markets the controversial RemoteSpy commercial keylogging application, has agreed to rewrite the software and clean up its business practices to settle a case brought by the US Federal Trade Commission.

RemoteSpy was marketed as a “100 per cent undetectable” app that might be used to “Spy on Anyone. From Anywhere”. CyberSpy helpfully provided instructions on how the software might be sent to potential victims disguised as an innocuous application or supposed image in an email attachment.

Following a lawsuit brought by the FTC, CyberSpy is now banned from providing its clients with the means to disguise the product as an innocent file or email attachment. CyberSpy was also ordered by a US district court in Florida to warn potential buyers that misuse of the software may violate wiretapping laws and to remove legacy versions of its software from computers.

RemoteSpy is capable of logging chat conversations, website history, documents opened and keystrokes. RemoteSpy clients would log onto a web site to access harvested information.

Many commercial anti-malware vendors, such as Sunbelt Software, have labelled the application as spyware since it first arrived on the interweb around five years ago. The technology is marketed as "especially perfect for those who want to monitor their employees or children, while away from home or work" although suspicious spouses checking up on partners, unscrupulous private eyes or stalkers might also find the technology useful.

The court order and a statement in the case against CyberSpy can be found on the FTC site here. The ruling comes two years after the US consumer watchdog first launched suit against the Florida-based software developer. ®

Intelligent flash storage arrays

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Shellshock over SMTP attacks mean you can now ignore your email
'But boss, the Internet Storm Centre says it's dangerous for me to reply to you'
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.