keystroke logger


Also found in: Dictionary, Thesaurus, Medical, Wikipedia.

keystroke logger

A program or hardware device that captures every key depression on the computer. Also known as "Keystroke Cops," they are used to monitor an employee's activities by recording every keystroke the user makes, including typos, backspacing and retyping.

A software-based keystroke logger can also be a Trojan that was installed clandestinely with the intent to steal passwords and confidential information. See snoopware and Trojan.


The KeyGhost Keystroke Logger
This unassuming device is attached between the keyboard cable and the socket on the back of the computer. It captures 500,000 bytes of whatever comes across the wire and requires no software on the computer it is monitoring. The contents are retrieved when connected to another computer. (Image courtesy of KeyGhost Ltd., www.keyghost.com)
References in periodicals archive ?
Digital certificates from certificate authorities which are used like tokens or passports to access Internet signature servers, thus obviating passwords and counteracting the increasingly crippling effect of keystroke loggers.
95 application looks for the presence of spyware such as advertising software, keystroke loggers, and other wares that interfere with the performance of PCs or compromise the user's privacy.
Cybercriminals are increasingly using HTTP, HTTPS or FTP as an attack vector to infect corporate networks with various payloads, such as spyware, viruses, trojans, keystroke loggers, phishing, and other malicious threats.
ID Vault delivers instant, secure access to users' online accounts with a single PIN to provide automatic protection against phishing, pharming, spyware, keystroke loggers and other online threats.
Trusteer's Rapport product enables us to offer our customers a free and transparent security mechanism that protects them and the bank from a myriad of internet crime schemes including keystroke loggers as well as phishing and pharming attacks.
It would prohibit keystroke loggers, and make it illegal to use a "zombie" computer to damage another computer.
Out-of-band authentication is one of the layers needed when financial services firms are encountering keystroke loggers and man in the middle exploits.
Even worse, visiting these illegitimate sites can sometimes launch the installation of viruses, keystroke loggers and other malicious code onto users' computers.
ID Vault automatically signs consumers into their online accounts without typing, so they're protected against keystroke loggers and other spyware.
ID Vault(R) automatically signs consumers into their online accounts without typing, so they're protected against keystroke loggers and other spyware.
WholeSecurity provides customers with endpoint security that protects against zero-day attacks from a range of crimeware including worms, Trojan horses, keystroke loggers, and phishing attacks.
When the card is swiped, their card data and user data is automatically entered into the e-merchant's web page without the need to type, and without any concerns that their sensitive personal data can be stolen via keystroke loggers or other viruses which may be lurking on their computer.