Keyloggers Explained: What You Need to Know

Venustus

Level 59
Thread author
Verified
Honorary Member
Top Poster
Content Creator
Well-known
Dec 30, 2012
4,809
A keylogger is a piece of software — or, even scarier, a hardware device — that logs every key you press on your keyboard. It can capture personal messages, passwords, credit card numbers, and everything else you type.
Keyloggers are generally installed by malware, but they may also be installed by protective parents, jealous spouses, or employers who want to monitor their employees. Hardware keyloggers are perfect for corporate espionage.

How a Keylogger Would Get On Your Computer
Most keyloggers on average computers arrive as malware. If your computer becomes compromised, the malware may include a keylogger or function as a Trojan that downloads the keylogger along with other harmful software. Keyloggers are a popular form of malware because they allow criminals to steal credit card numbers, passwords, and other sensitive data.

Keystroke-logging software may also be installed by someone close to you. A protective parent might go beyond typical parental controls and install software that includes a keylogger, allowing them to see everything their child types. A jealous spouse concerned about their husband or wife cheating might install a keylogger on their computer to keep tabs on them — it’s not necessarily a good thing, but it happens.

Some employers might install keystroke loggers on their employees’ computers to monitor everything they do, or just to investigate employees they’re suspicious about. Laws vary about when this is legal from jurisdiction to jurisdiction.

650x472xsample-keylogger.png.pagespeed.ic.08dTAaeczy.png


Read More
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top