Thursday, November 19, 2015

Bypass Key logging Malware

With the use of icons as password, we add protection from keystroke-stealing malware. Entering iconic password on your icon board provides no detection for key loggers. Source: https://www.authicon.com/index/features!

No comments:

Post a Comment