Trusted Knight’s patented Protector™ solution is the only security product
stops Crimeware trojan attacks without being reliant on detection
Prevents data stealing, even if already infected
Protector™ stops Crimeware from stealing data, and prevents the theft of your customer's sensitive information even if their system is already infected with Crimeware. Protector™ effectively “breaks” Crimeware so it can’t harvest user-entered data.
Every major data breach over the past several years has been instigated by Crimeware attacking web browsers to gain credential information and enhanced access to high-value systems. Protector™ is effective for all major browsers: Internet Explorer, Firefox, Chrome, Safari and Opera.
Anti-Virus technologies cannot detect all trojans reliably, especially advanced Crimeware that is specifically designed to evade detection. Trusted Knight Protector™ provides reliable and effective protection against these types of threats.
case studiesTogether, we learn from the past and then we adapt
Attacks against retailer
point-of-sale (pos) systems
In recent years, a number of large retailers have suered the compromise of customers’ credit card data from point-of-sale (PoS) systems. In 2013 and 2014, Target and Home Depot became two of the more high-profile victims of this type of breach. It is likely that both intrusions were the work of the same criminal group...
Internal Data Theft
at JP Morgan Chase
In July of 2014, J.P. Morgan Chase discovered a month-long breach of their corporate network that exposed personal information of about 76 million households and more than 7 million small businesses. Attackers leveraged their initial entry to eventually gain access to over 90 servers across the enterprise. ...
Keylogger Theft of Consumer
On December 26, 2014, a group of criminals claiming aliation with Anonymous released a file of more than 13,000 credentials for sites including Walmart, Amazon, Playstation Live, and Hulu Plus. These were clearly obtained from keylogging botnets and almost certainly represent only a portion of the credentials captured from the compromised computers as the attackers likely kept the higher-value data for themselves...