Know what a keylogger is? No, it’s not a lead lumberjack position. It’s a type of surveillance software or spyware that monitors and records all keystrokes made on a computer keyboard. It can record your emails, tweets on Twitter, posts to Facebook, instant messages, and more importantly your sign-on credentials.
Here’s a definition from Webopedia.com.
There are two uses of keylogging: one is as a surveillance tool for companies to monitor their employees’ activities on company-owned computers. The other is to record your keystrokes in order to spy on your computer and Internet use. The former use is an accepted practice in many corporate computer security organizations. The latter is used by cyber criminals to gain access to your sign-on credentials to Internet websites and applications. The objective is to steal your personal information, and more importantly, your online banking credentials.
When used by cyber crooks, keylogging is usually used as part of a malware attack and usually has the capability to transmit the log of keystrokes made on your computer to a criminal-controlled computer. It’s then processed for further analysis and extraction of information that can be used to steal your identity, empty your bank accounts, impersonate you on the Internet to make purchases, take out credit accounts, and generally make your life miserable.
Here are some instructions on how to find keylogger spyware hidden on your computer from ehow.com.
Be very careful…it’s dangerous out there.
Please comment on this article; we all learn from each other when our views and opinions are shared.
I hope you found this article of interest. If you enter your email address in the Email Subscriptions box on the right column of this page, I’ll send you an email when a new article is posted. I don’t share your email address with anyone…no one; I hate spam too. Please share my site with your friends and family. Thanks.
Remember, personal computing is a blast…keep it productive and enjoyable.
I’m also on Twitter, @PaulsInternet.
Images courtesy of FreeDigitalPhotos.net and FreeByte.com