How to View through Keynotes

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

It’s the first day on the job and there’s a new script! This is going to be the best day ever!
Photo by SHVETS production, please support by following @pexel.com

It’s your first day on the job. You walk in and sit down to mentally prepare yourself for the laundry list of tasks ahead. While seated at your keyboard, you notice there is a camera installed in the corner of the room pointing at you.

Feeling a little unsettled you look back at your computer keyboard and before you begin to type. You get this eerie feeling of something or someone watching you from all devices.

The camera, the webcam, and even the keyboard feels like they’re watching, and you are not too sure if what you are feeling is real. Let me script for you how this may be your reality.

Timmy: Z-Daddy says we’re being watched by the big boss.
Tom: We’re not interesting enough to spy on. He’s just trying to wig us out.
Photo by Fox, please support by following @pexel.com

Local Private Eyes

You understand how the camera and webcam could be the ones watching your every move. At some point or another, it’s been reported in the news, but to spout that your keyboard can be watching as well, now that might be a thing of nonsense.

You could say one is being unreasonably paranoid. Let me introduce you to a device called a “keylogger”. You may have heard it go by other names such as keystroke logger or keygrabber.

Keyloggers are tools used to capture all your interactions with the keyboard. This means everything you type is recorded and stored for later evaluation. This includes all the questionable websites you visited during the duration of your shift. We’re all looking at you nudemidgetcowgirlsfromouterspace.com.

Henry: See, I told you they were visiting Scriptingthewhy during working hours.
Shaw: well, it is a semi-informative site with some humor but you’re right they’re supposed to be working.
Photo by AlphaTradeZone, please support by following @pexel.com

For Good, Bad, and the Dark-net

The use of keyloggers has been used for both good intentions and malicious ones. For good intentions, this involves things like parents installing a keylogger to monitor their child’s screen time. Although I don’t know of any parents doing that nowadays since we’re just happy to not hear them crying about anything. A silent and preoccupied child makes a happy parent.

Another good intention, though questionable, is companies have been known to use keyloggers to monitor employee productivity, as you would have imagined, yes, the overlords may watch you to ensure that you are in fact working. And finally, IT (Information Technology) departments can use keyloggers for troubleshooting problems with a device.

So, with all of these “good intentions” (minus the company part depending on how you look at it), you may be wondering what the bad or malicious ones are. Unauthorized personnel will use keyloggers to, not only be like Sting from the Police watching every move you make but later sell your information on the dark web or hijack your life if they want.

Again, you’re a somebody and that means every person on the dark net doesn’t mind being you. Whether you choose to believe it or not your information has value.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

Eric: You read the latest script? Nice, big boss wants to see you by the way. Don’t worry bro, your computer is safe with me.
Bob: I don’t think I should just leave it with you like that.
Eric: Nah bro, you can trust me.
Photo by Helena Lopes, please support by following @pexel.com

Connection via Co-worker

So how would something like this work? This is usually done by social engineering but you’re going to be highly disappointed to know that the installation of such a device is as simple as inserting a USB (Universal Serial Bus) thumb drive.

An example of this might be you’re in your office and Eric from accounting comes in to let you know that the big boss wants a word with you, so you head out to the big boss. If for some reason or other, you leave Eric in the office he can then go to your computer, hook up a device to the plugin slot for your keyboard, and connect your keyboard plugin to the keylogger device.

Photo of keygrabber device.
Photo by keelog,@https://www.keelog.com/usb-keylogger/

From there, all the information is ready to be recorded. There are other means outside of using this tactic. The use of web page scripts provides you with an infected link leading you to a malicious website where the software will download to your computer for the keylogger.

Phishing offers the same tactic, but it is delivered to your email instead, this could be where you see an email featuring the classic “click on the link if you want to marry your Russian princess” or prince. Just so you know, Z-Daddy doesn’t judge, love is love.

And finally, unidentified software is downloaded, this may also be known as “drive-by downloading”, again it’s not what you think, computer nerds aren’t driving around firing malicious code from the side of the car as they go by. This occurs when you visit a website like nudemidgetcowgirlsfromouterspace.com and a file is downloaded without your consent.

Sean: Watching out for people is tough.
Amber: Watching over people is tougher, it’s a good thing we have Z-Daddy.
Photo by KoolShooters, please support by following @pexel.com

Watching Overall

Now while keylogging has some good and bad use cases, let’s be honest, no one likes to be watched without their consent. There may be a niche few who don’t mind because they feel as though they have nothing to hide. However, having this knowledge is important in protecting or simply figuring out if “Big Brother” or another interested party is viewing what you do.

A few ways of confirming are; if your browser is operating sluggishly or slower than normal, if there is a lag in keystrokes or cursor movements, or if your cursor disappears randomly during movement.

Physically, you could inspect your plugins by unplugging them and checking if a questionable device is seated in any of the USB slots. For digital or online protection, avoid visiting or downloading software from unknown trusted sources, if you receive an email from Eric with an attachment saying, “Good times are to be had here, click and download for more,” keep a close eye for grammatical or spelling errors and crosscheck with Eric as that may not have been him.

Always keep an understanding that your personal information is extremely valuable to an attacker. If you have massive debt, it’s not a problem, they’ll get you more and if you have no debt, that’s also not a problem, they’ll find you some.

Julia: Ben, since we subscribed and stayed informed, look at how much we’ve avoided.
Photo by Mikhail Nilov, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you feel like there is something I may have missed with keyloggers? Script a comment below.

A Stealthy My Little Pony

Consider following on social media!

Quick note: if you’re viewing this via email, come to the site for better viewing. Enjoy!

webcam sat on top of monitor.
Not all webcams are set to record but it doesn’t hurt to double check.
Photo by Matheus Bertelli, please support by following @pexel.com

It’s 8:35 AM on a Monday morning and you know what time it is. Time to start your daily routine of shoveling through your email and what could possibly be considered PUMs (Potentially Unwanted Messages).

While skimming through the mass emails of bills, spam that didn’t get caught in the filter, and mail-order brides offers, have you ever had a creepy, eerie vibe that something is a bit off?

You look into the blackness of your webcam and have the feeling that something or someone is on the other side peering back at you.

Have you never had that experience? Okay, it’s just me then. Well, whether you had the feeling that someone was Sam Rockwelling you or not, let me make you aware of the possibility that something could be spying on your every move the next time you log in.

senior man sat across from computer.
Tom: So…am I to talk to it or?
Director: Tom, shut up, we’re trying to take a picture.
Photo by Ron Lach, please support by following @pexel.com

Watching Eyes & London

On the internet of yesteryear, before you had to watch your back online as you did on the dark cold mist-fog streets of London. Don’t ask me how I know, I’ve never been to London but that’s always the setup in movies dealing with the Great Brit.

Life was simple, you could log in, veg out, and log off without worry of passively downloading spyware leading you to feel like Sam Rockwell and asking every five minutes; “Who’s watching me?” What spyware could have you feeling like this? It’s Pegasus, the cute horse with wings based on Greek mythology that every daughter would beg their father to have, it seems harmless, but your safe space will result in a 404 error. This is an error code (for those who don’t know) results when a web page cannot be found.

Pegasus was created by an Israeli cyber-arms company NSO (Niv, Shalev, and Omri: the names of the company founders) Group. NSO created Pegasus to collect important and sensitive information mainly on cellphones but why stop there when the capability of installing it on other devices could be added?

The installation of Pegasus would be triggered via what’s called a “zero-click”- meaning the software could be downloaded without interaction of the individual. So to translate this, this is like the activation of a tripwire, or for all of you Yu-Gi-Oh card game players out there, you’ve activated my trap card and now I can watch every move you make like the Police from the 80s.

a woman walking ahead of a man.
Maria: You didn’t subscribe so it’s over and I don’t know you, Eric. STRANGER DANGER!
Eric: BUT YOU JUST SAID MY NAME!
Photo by RODNAE Productions, please support by following @pexel.com

Followed Faithfully

Now that we have addressed your stalker, how or what is being done while you are unaware of the spyware present? Well, as mentioned earlier, once the tripwire or trap card is activated, this could happen in several ways such as opening an email or text or instant message and like your ideal date that’s withholding a slew of mental health issues, it’s in.

Pegasus is designed to read texts, and emails, monitor your application usage, collect user information (names and passwords), and gain access to your microphone and camera. You may be amazed and wondering, “Wow, what else can it do?” Well, to top all these features off, Pegasus can gain access to your GPS (Global Positioning System) and report back your whereabouts.

Earlier versions of Pegasus were installed on smartphones via weaknesses in commonly used apps or a cyber-attack technique called “spear-phishing”- this is sending a malicious link directly to an intended target for infection. Calling this spyware Pegasus seems like a one-off name, but it’s fitting as its ability to “fly through the air” from infected smartphone to smartphone and from infected device to device.

Enjoy the read so far? Why don’t you consider subscribing so you can keep up to date?

electronic devices on top of a table
“I don’t need virus protection.” Every device can come with virus included.
Photo by Pixabay, please support by following @pexel.com

Good Intentions, Bad Market

The NSO Group created Pegasus with the claim that it would be only for use by “authorized” governments in the pursuit of preventing and fighting terror and crime however, this is an opinion; if it’s on the web, the dark web has it, and interested parties have it as well. Again, money is the kind of thing that makes the world go round.

At this junction, you may be wondering; “What devices are on the menu for Pegasus to peg?” Pegasus can peg Android, Blackberry, and iOS. Yes, Apple users, your coveted ecosystem prized Steve Jobs possessions aren’t safe from infiltration by viruses.

However, ironically the device to first discover the Pegasus spyware was through a failed attempt on an iPhone of a human rights activist that led to an investigation on the spyware back in 2016.  

men in black and red miliary uniform in a line.
Hey…what’s that virus doing over there?
Photo by Pixabay, please support by following @pexel.com

Active Protection

Right now, you’re probably wondering,” How can I detect or prevent this spyware from tracking me?” In most cases you would have some tell-tale signs that you may have an infection on your device however, this is not the case with Pegasus.

Though it may seem bleak, there are actions you can take to ensure you, your information, and your devices are safe. Following common best practices of keeping your OS (Operating System) up to date, not downloading any suspicious files from unknown sources, and not clicking on any links sent from someone you trust unless you’ve verified with them that they sent it.

Friendly confirmation can stop friendly fire.

man standing out in a field with a rifle.
To all those who read this and haven’t subscribed…I’m coming to collect. Z-Daddy is going to get his numbers.
Photo by Lukas, please support by following @pexel.com

Made it this far and found this to be entertaining? Then a big thanks to you and please show your support by cracking a like, sharing this with whomever, scripting a comment, or plug-in to follow.

Would like to give sincere thanks to current followers and subscribers, your support and actions mean a lot and has a play in the creation of each script.

Do you have any information to add on Pegasus? Script a comment below.