Defeating Image-Based Virtual Keyboards and Phishing Banks Anthony Pell 1 min read Nov 28, 2006 Recently, I stumbled upon this which nicely showed how a Trojan horse can, utilizing a key stroke capture and screenshot capture, grab a userThe link for this article located at SecuriTeam is no longer available. Prev: Hashing for fun and profit: Demystifying encryption for PCI DSS Next: PKI Gets Shot In The Arm From HSPD-12