Overview

Keyloggers are often used by attackers to steal passwords, credit card numbers, and other sensitive information. They can be implemented as software (malware) or as physical devices plugged into a computer's USB port.

How it Works

The keylogger records each key pressed and either stores it in a hidden file or sends it to a remote server controlled by the attacker.

Prevention

  • Software Keyloggers: Use antivirus software and keep your OS patched.
  • Hardware Keyloggers: Physically inspect computers in public or sensitive areas.
  • Virtual Keyboards: Using an on-screen keyboard can sometimes bypass simple keyloggers.

Related Terms