Knowledge is one of the best forms of defense. It’s why security awareness is so important. If we all take a pro-active stance against online fraudsters, we can seriously hamper their malicious activities.
Know what keystroke logging is all about.
Keylogging is the fraudulent technique used by hackers to obtain your personal information by tracking the keys on your computer keyboard. You can imagine the severity of the situation if they gain access to usernames, passwords, credit card details and other financial information.
There are two types of keyloggers - software and hardware. Their purpose is to log all the keystrokes entered on a particular computer. The keystrokes are then retrieved by the attacker and used for their own purposes.
A software keylogger, once installed on your computer, makes a copy of all your keystrokes. Details of the keystrokes are saved to a file on your computer's hard drive where they can be retrieved by the attacker. In some cases the keylogger will send the file to the attacker's anonymous email address.
Hardware keyloggers are units that are usually installed between your keyboard and the computer. There are certain Hardware keyloggers that fit within your keyboard and difficult to detect. They also log your keystrokes and store them within the hardware keylogger device. The attacker will retrieve the keylogger device to access the keystrokes stored in it.
Hardware keyloggers can look similar to common computer equipment. Be especially cautious when you see new peripherals or cables attached to your keyboard.
Example of a hardware keylogger
PC before a "keylogger" is installed
PC after a "keylogger" is installed
How are they installed?
The attacker needs physical access to your computer so that they can replace your keyboard and cable with one containing the keystroke logger.
Tips to prevent keystroke logging
With the necessary precautions, we can reduce fraudulent activity together.
Click here for information relating to online security.