Keyloggers

What is a Keylogger ?

Most sources defines it as a tool designed to secretly monitor and log all keystrokes in a small file, which is either accedded later or automatically emailed to the person monitoring your actions.

Is it a malicious program?

Yes, but unlike other types of malicious programs, keyloggers present no threat to the system itself. Nevertheless, they can pose a serious threat to users, as they can be used to intercept confidential information entered via the keyboard.

Is there any other form of keyloggers?

a keylogger doesn’t have to be a software, it can also be a hardware device. Keylogging devices are much rarer than keylogging software:
  • Keyboard hardware keyloggers
  • Hidden camera keyloggers
  • USB disk-loaded keyloggers

How does keyloggers spread?

It spreads in much the same way that other malicious programs. It can be installed:
  • When a user opens a file attached to an email
  • When a file is launched from an open-access
  • Directory on a P2P network
  • Automatically launched when a user visits an infected site
  • By another malicious program already present on the victim machine

Is using keyloggers always illegal?

    Keyloggers can be legal in some cases:
  • Parent control
  • Company security: tracking the use of computers for non-work-related purposes
  • Law enforcement to analyze and track incidents linked to the use of personal computer

How to protect yourself?

    Keyloggers can be legal in some cases:
  • Always stay cautious
  • Use a two-step authentication
  • Use key encryption software
  • Keep your accounts, your OS, and your devices as updated and secure as possible