keystroke logger

(redirected from Key logger)
Also found in: Acronyms.

keystroke logger

A program or hardware device that captures every key depression on the computer. Also known as "Keystroke Cops," they are used to monitor an employee's activities by recording every keystroke the user makes, including typos, backspacing and retyping.

A software-based keystroke logger can also be a Trojan that was installed clandestinely with the intent to steal passwords and confidential information. See snoopware, Trojan and cyberveillance.


KeyGrabber Forensic Keylogger
This unassuming device from Keelog plugs into the USB port of the computer that the keyboard plugs into. The logger stores up to 16MB of keystrokes passing through it. (Image courtesy of Keelog, www.keelog.com)
Copyright © 1981-2019 by The Computer Language Company Inc. All Rights reserved. THIS DEFINITION IS FOR PERSONAL USE ONLY. All other reproduction is strictly prohibited without permission from the publisher.
References in periodicals archive ?
If the hacker has installed a key logger on your Smartphone and you access your bank account either using an application or visiting the webpage of the bank, the key logger may record each key stroke and instantly share it with the hacker who at his or her convenience may access your bank account using the stolen credentials.
Although it may be technologically possible to use key logger programs on smartphone devices, it may not be legal under federal and state wiretap laws.
Comparisons between respondent data and statewide averages for key logger metrics (e.g., production volume, source of timber harvested by ownership group, tenure in the logging business) suggested survey respondents were not substantially different from the state's logging community as a whole (Jaakko Poyry Consulting, Inc.
One common type of Trojan is a "key logger," which can track and transmit every keystroke one makes to another computer, giving the other computer access to user passwords, social security numbers and personal information.
During its 1999 investigation, the FBI obtained a search warrant to secretly install a "key logger device" on the computer the younger Scarfo used at his Belleville, New Jersey, business, Merchant Services of Essex County.
As such, passwords, even though belong to such category, are highly vulnerable to Phishing, Key logger malware etc.
Real-time encryption can hide the input, defeating browser based key loggers, as well as ensure systems and information remain safe.
"It's basically a malicious software with the intent to gain unauthorized access and that could include viruses, spyware," he explains, "and more recently, we've see ransomware where they'll lock down your system and essentially say 'we have your data, if you want it back you're going to pay a ransom and we'll let you gain access back to your information.'" Caracciolo added that there are also Trojan horses and key loggers that track keystrokes to gain access to passwords or gain access to your system.
UAV Total Security for Windows and UAV Mobile Security for Android are end user applications that protects from viruses, key loggers, rootkits, and spyware!