keystroke logger


Also found in: Dictionary, Thesaurus, Medical.

keystroke logger

A program or hardware device that captures every key depression on the computer. Also known as "Keystroke Cops," they are used to monitor an employee's activities by recording every keystroke the user makes, including typos, backspacing and retyping.

A software-based keystroke logger can also be a Trojan that was installed clandestinely with the intent to steal passwords and confidential information. See snoopware, Trojan and cyberveillance.


KeyGrabber Forensic Keylogger
This unassuming device from Keelog plugs into the USB port of the computer that the keyboard plugs into. The logger stores up to 16MB of keystrokes passing through it. (Image courtesy of Keelog, www.keelog.com)
References in periodicals archive ?
Scarfo, the FBI placed a keystroke logger on a computer to help crack a password-protected file, and the government successfully argued that only data sent through the modem and across the Internet was considered an electronic communication, and that something that was simply being typed--for example, a word-processing document not being transmitted across the Internet--was not.
Keystroke loggers are one way to obtain this type of data, but other options are available.
In a warning issued earlier this week,it said the latest trend by cybercriminals is to get employee login credentials, using spam and phishing emails, keystroke loggers, and Remote Access Trojans (RAT).
Use comprehensive security software and keep it up to date to avoid keyloggers (keystroke loggers) and other malware.
Without daily updates to perimeter security such as anti-spyware software, malicious third-party software such as keystroke loggers could be unleashed and go undetected for an extended time period.
The authentication call is out-of-band, offering protection from man-in-the-middle attacks and keystroke loggers. The voiceprint solution adds a third factor verification, the others being the calls and passphrases.
For home office users, small businesses and students, Computrace LoJack for Laptops offers theft recovery and identity protection through remote data delete capabilities backed by a Service Guarantee of up to $1,000.2 Absolute has also developed a powerful set of theft recovery tools, which include capabilities such as keystroke loggers, cameras, location tracking (Wi-Fi, GPS), remote access terminals, etc., that enable the Absolute Theft Recovery Team to augment their investigation.
As with downloading e mail attachments from unknown senders, this can be dangerous, giving cybercriminals an chance to secrete malicious programmes such as keystroke loggers and password and information phishing recorders.
The miniaturization of recording and data storage devices does not just increase the chances that an employee or trusted agent of a facility may bring valuable data out of the facility, it also allows someone with vindictive intent to transport harmful data, such as viruses, malicious software, keystroke loggers or hacking programs, into a secure facility.
But the smaller attacks, which are on the rise, have actually become the greater threat because they are used to steal valuable data, such as credit-card or other sensitive customer information; and, Turner says, as these infections download crime-ware like keystroke loggers and stealthily spread to other machines and networks, "they become category three and four threats after the fact." On the other hand, Netsky, a widespread worm, came in like a lion at category four but was downgraded to level two within two months as antivirus companies quickly rolled out updates and companies corrected vulnerabilities that allowed it to succeed.
According to Trend Micro, HouseCall Server Edition helps fight threats such as viruses, spyware and keystroke loggers, and extends support to Linux and Solaris-based operating systems and Firefox and Mozilla-based browsers.