Keylogger: A Definition

Security Binary DataKnow what a keylogger is? No, it’s not a lead lumberjack position. It’s a type of surveillance software or spyware that monitors and records all keystrokes made on a computer keyboard. It can record your emails, tweets on Twitter, posts to Facebook, instant messages, and more importantly your sign-on credentials.

Here’s a definition from

There are two uses of keylogging: one is  as a surveillance tool for companies to monitor their employees’ activities on company-owned computers. The other is to record your keystrokes in order to spy on your computer and Internet use. The former use is an accepted practice in many corporate computer security organizations. The latter is used by cyber criminals to gain access to your sign-on credentials to Internet websites and applications. The objective is to steal your personal information, and more importantly, your online banking credentials.

When used by cyber crooks, keylogging is usually used as part of a malware attack and usually has the capability to transmit the log of keystrokes made on your computer to a criminal-controlled computer. It’s then processed for further analysis and extraction of information that can be used to steal your identity, empty your bank accounts, impersonate you on the Internet to make purchases, take out credit accounts, and generally make your life miserable.

Here are some instructions on how to find keylogger spyware hidden on your computer from

Be very careful…it’s dangerous out there.

Please comment on this article; we all learn from each other when our views and opinions are shared.

I hope you found this article of interest. If you enter your email address in the Email Subscriptions box on the right column of this page, I’ll send you an email when a new article is posted. I don’t share your email address with anyone…no one; I hate spam too. Please share my site with your friends and family. Thanks.

Remember, personal computing is a blast…keep it productive and enjoyable.

Best regards,



I’m also on Twitter, @PaulsInternet.

Images courtesy of and


Filed under Cybercrime, Internet Security, malware, Warning

2 responses to “Keylogger: A Definition

  1. Advanced users should use antirootkit tools like GMER, it is very effective to detect hidden kernel keyloggers

What do you think?

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s