+ What is Zemana AntiLogger?
In a nutshell, the AntiLogger is a lightweight app that keeps track of who is doing
what on your computer. Instead of identifying malware based on its signature fingerprint,
like all malware products with scan functionality, the AntiLogger catches malware
at the moment it attacks your computer. It will then prompt you if an illegal program
is trying to record your keystrokes, capture your screen, gain access to your clipboard,
microphone and webcam, or inject itself into your computer’s sensitive areas.
The AntiLogger features our unique SSL Intrusion Protection technology that guards
you against advanced forms of Financial Malware. The AntiLogger is one of the very
few products on the market today able to detect these dangerous and complex threats.
Zemana AntiLogger is not designed to replace your installed antivirus software --
it's made to detect serious threats that are outside of their scope. It adds an
extra layer of essential protection to whatever anti-malware or anti-virus software
you're currently using.
+ Why you need Zemana
The AntiLogger is your reliable line of defense against:
- The 60.000+ new pieces of malware that hit the internet every day
- Dangerous financial malware and spyware designed specifically to bypass or remain
undetected by traditional security products
- Niche and custom-built malicious programs designed to steal or identity or invade
The AntiLogger closes dangerous security loopholes present in signature-based anti-virus
and anti-malware products. It is much more reliable and adds a number of essential
functions when compared to encryption-based anti keylogger products.
+ Can Zemana AntiLogger
protect me against ID theft?
Certainly; and in a very reliable way. ID theft happens when someone steals your
personal information, such as credit card details, social security number and online
banking login credentials, etc.
The AntiLogger effectively locks all channels from which your personal information
may be stolen. It is one of the most efficient anti-ID theft tools on the market.
+ How does the AntiLogger
compare to other privacy and ID theft prevention products?
Among the vast majority of the ID theft products on the market today, there are
two types of technologies used: keystroke encryption and browser lockdown.
Encryption, aka key scrambling, can be very reliable in protecting your keystrokes,
as long as you have chosen a quality product. It is essential that the encryption
process takes place at the kernel level in your computer, so that no malware can
bypass it. Most encryption-based products are application specific, for example
they will guard your browser, but not your text editor, messaging tool, VPN tools,
With encryption-based products, you are vulnerable to man-in-the-browser attacks,
an advanced attack method used by sophisticated financial malware. Browser lockdown
products, often recommended by banks, still rely on keystroke encryption but take
your protection a step further and guard against man-in-the-browser attacks. However,
these only protect your browser.
The problem with any encryption-based product is that you are in the blind. Even
if your PC is infected, there is no way for you to know and to take action. Encryption
products are not designed to detect malware, but merely make your data illegible
for the criminals. So what happens if the encryption algorithm of your product gets
Malware has many ways in which it can steal your personal information or invade
your privacy. It can take sceenshots, observe what you copy and paste, turn on your
microphone and webcam. Keystroke encryption products safeguard your keyboard only.
The AntiLogger uses next generation technology. It is able to detect and stop information
theft malware based upon how it behaves in your computer. It guards your system
as a whole, i.e. all channels that can be used to steal your information and all
applications you are running on your PC. The AntiLogger will prompt you with what
malware it detects and will stop it.
+ Why is an anti-virus
program not enough?
This is because there are weak spots in traditional security solutions of which
criminals are very well aware. These vulnerabilities are in the concept on which
anti-virus products are based.
Traditional security products use a reactive approach. They rely on huge databases
of malicious file fingerprints to detect malware running on your computer. Before
a malicious file is recognized as such by your traditional security product, it
is isolated and analyzed by the malware labs of your product vendor. Then you receive
the updates and you are protected.
There are three major problems with this. First, the process of isolating, analyzing
and spreading updates takes upon average a couple of days, a time during which your
security product is useless against this threat and you are vulnerable.
Second, new and advanced forms of malware, including Financial Malware, are designed
to change their fingerprint every few hours, effectively bypassing the traditional
Third, if an attack is very niche, it may even go unnoticed by the various security
labs, and you will never even suspect that your PC may be infected.
+ Do I still need
anti-virus and other malware protection products?
Yes. The AntiLogger is designed to be an element in your protection arsenal. With
the sophistication, breadth and depth of internet threats today, there is no single
product that is able to protect you against everything. The AntiLogger guards against
information theft malware.
We recommend using the AntiLogger in tandem with good anti-virus and firewall software
to ensure all-round protection of your PC.
+ What is Financial
Financial malware is the new generation of malware; it is an illusive yet very real
threat. It is developed as a money making tool, and, as such, is developed with
great complexity, various functionalities and immaculate attention to detail.
Arguably the most wide-spread piece of financial malware is the infamous ZeuS. Isolated
for the first time in 2007, it is still a major threat, estimated to have infected
over 13 million machines worldwide, causing damages of in excess of $500 million.
ZeuS is a very profound and complex piece of software, featuring over 600 subroutines.
There is no doubt that ZeuS was developed by extremely capable IT professionals,
who have in-depth knowledge of how anti-virus solutions work.
ZeuS has a wide range of capabilities, reaching far beyond sending your credit card
number to criminals. It is capable of diverting your bank transfers to third party
bank accounts, changing the amount of the transfer and then even changing the remaining
balance you will see after the transaction so it remains undetected. Numerous test
reports show that even up-to-date antivirus programs are effective in intercepting
ZeuS only 20 – 25% of the time. One of the reasons for this is its ability to change
its fingerprint every few hours.
Watch Video: BBC
Click’s ZeuS Special Investigation
+ Financial malware
went out in open source mode; what does this mean?
For years ZeuS, the infamous financial malware, was available to cybercriminals
as a major investment, fetching tens of thousands dollars on the black market. Then,
in April 2011, its source code was leaked and became available for anyone who knew
where to look. This shifted the online fraud industry into a whole new level.
By September 2011 ZeuS had shot to the number two spot in the malware charts. This
was quickly counteracted by the security industry, as all major anti-virus solutions
were updated to detect this specific version of ZeuS.
Following this, existing information theft malware was further developed to include
features of ZeuS into their own arsenals. Ramnit and Spyeye demonstrated this by
adopting attack vectors typical for ZeuS. By the end of September 2011, at least
three known forms of malware had adopted ZeuS features.
But most worrying of all, ZeuS is expected to serve as a base and inspiration for
new forms of malware. In their 2012 Security Trends Report, VeriSign states: “The
release of the Zeus source code effectively converted the Zeus banking Trojan from
a proprietary, pay-per-use crime kit into an open-source crime kit. … new malware
families (will) emerge that not only augment themselves with components of Zeus
but also augment Zeus with new functionality specific to each new variant family.”
The report concludes “the release of the Zeus source code is going to have a dramatic
impact on the production of new, dangerous banking Trojans in 2012 and beyond.”
+ My anti-virus has
a heuristics module for detecting 0-day malware. Does the AntiLogger have the same
No. In vastly simplified terms, your heuristics module inspects the static code
of a file and tries to guess what that code does, and/or checks it for similarities
with already known malware to detect new variants. In any case, its functionality
is related to inspecting file signatures and predicting how sophisticated malware
will change over time.
The AntiLogger is a behavior blocker. It monitors the ACTIONS performed by a program
in real-time, and blocks it when it detects potentially malicious behavior.
+ Can password management
products protect me?
This depends upon the product. Some of the products in this category are designed
merely to offer you extra convenience, and do not feature any special protection
layers. Others feature basic protection.
Watch out! There is widely known vulnerability related to the first time you enter
your password in any password management software. If you have an active keylogger
on your system, your passwords will be compromised.
We would advise you to determine whether the password management product you are
using offers advanced security features and what they are.
The AntiLogger guards your passwords even if they are entered automatically as directly
by password management products.
+ What is SSL and
is it safe?
SSL stands for Secure Sockets Layer and is a cryptic internet connection often used
by banks, shopping sites and web-based email sites, etc. You can ascertain if a
certain website uses SSL protocol by its URL: it will start with https instead of
SSL protects the information while it is transmitted over the internet and is very
safe. However, vulnerabilities do exist within your computer. Advanced information
theft malware is able to record your data before it gets encrypted.
The AntiLogger is one of the very few products on the market able to prevent this.
can download a third party test that proves this.