So firewall is not optimum solution although it may prevent the data breach but will not detect the infection occuredOf course it can, but there's easier ways like tunneling.
You can detect them through Windows Defender ATP, and AV isn't supposed to let it run in first place.So firewall is not optimum solution although it may prevent the data breach but will not detect the infection occured
Has keyloggers has some symptoms which may trigger certain AV module ?? And if which part ??
none of what you posted here is correctYou can detect them through Windows Defender ATP, and AV isn't supposed to let it run in first place.
Keylogger needs elevated privileges or a known exploit to remain undetected, unless we talking Linux due to the fact everyone believes they don't need AV, nor they pack firewall by default, you can code one in seconds for it (with no need for elevated privileges), already done this multiple times in the past for science reasons.
Thanks a lot for the links @ichito i will take a look on them to gain more understandingYou can look at some examples of below...a lot of info about malware
This report provides an overview of different types of keyloggers, gives examples of losses caused by keyloggers, and provides recommendations on how to protect against them.securelist.comWhat is a keylogger: It is a Malicious program for recording computer user keystrokes to steal passwords and other sensitive information.enterprise.comodo.combut about legal apliacation alsoKeylogger is a malicious type of monitoring software. Learn how to check for keystroke loggers, and how to remove a keylogger if your scanner/scan shows your system is infected with keylogger spyware.www.malwarebytes.com
Read detailed independent comparison and reviews about the top of world-famous keyloggers. Choose undetectable hidden keylogger (keystroke logger) and download it for free! With a keylogger, you'll find who is using your PC and what for!www.keyloggers.com