keystroke logger


Also found in: Dictionary, Thesaurus, Medical.

keystroke logger

A program or hardware device that captures every key depression on the computer. Also known as "Keystroke Cops," they are used to monitor an employee's activities by recording every keystroke the user makes, including typos, backspacing and retyping.

A software-based keystroke logger can also be a Trojan that was installed clandestinely with the intent to steal passwords and confidential information. See snoopware and Trojan.


The KeyGhost Keystroke Logger
This unassuming device is attached between the keyboard cable and the socket on the back of the computer. It captures 500,000 bytes of whatever comes across the wire and requires no software on the computer it is monitoring. The contents are retrieved when connected to another computer. (Image courtesy of KeyGhost Ltd., www.keyghost.com)
References in periodicals archive ?
A limitation of software keystroke loggers is the availability of several different keyloggers that are specific for research purposes and can be used online.
Scarfo, the FBI placed a keystroke logger on a computer to help crack a password-protected file, and the government successfully argued that only data sent through the modem and across the Internet was considered an electronic communication, and that something that was simply being typed--for example, a word-processing document not being transmitted across the Internet--was not.
Others are far more dangerous, unleashing keystroke loggers that allow the hackers who sent the mail to capture your passwords and online banking and credit card information.
Some spreaders of viruses, worms and keystroke loggers use email to sneak dangerous software onto victims' computers.
New forms of surveillance such as those involving mobile devices, keystroke loggers, GPS vehicle trackers, and social networks as well as traditional approaches like trash runs are covered here as well.
In a warning issued earlier this week,it said the latest trend by cybercriminals is to get employee login credentials, using spam and phishing emails, keystroke loggers, and Remote Access Trojans (RAT).
The authentication call is out-of-band, offering protection from man-in-the-middle attacks and keystroke loggers.
As with downloading e mail attachments from unknown senders, this can be dangerous, giving cybercriminals an chance to secrete malicious programmes such as keystroke loggers and password and information phishing recorders.
The miniaturization of recording and data storage devices does not just increase the chances that an employee or trusted agent of a facility may bring valuable data out of the facility, it also allows someone with vindictive intent to transport harmful data, such as viruses, malicious software, keystroke loggers or hacking programs, into a secure facility.
But the smaller attacks, which are on the rise, have actually become the greater threat because they are used to steal valuable data, such as credit-card or other sensitive customer information; and, Turner says, as these infections download crime-ware like keystroke loggers and stealthily spread to other machines and networks, "they become category three and four threats after the fact.
According to Trend Micro, HouseCall Server Edition helps fight threats such as viruses, spyware and keystroke loggers, and extends support to Linux and Solaris-based operating systems and Firefox and Mozilla-based browsers.
More sinister types of spyware, such as keystroke loggers, can capture everything a person types, including passwords, financial information, and the contents of e-mail messages.