Whether it is passwords, documents, e-mail or instant messaging, much of today’s private information is entered via keyboards. If not protected, keystrokes can be used by malicious entities for accessing data or identity theft. The potential destructive use of keylogging technology makes it a subject that should not be taken lightly.
Data inserted by a keyboard can be recorded in multiple ways and for varying purposes, using software or hardware. The technology may be used as part of a police or private investigation involving criminal activities or as a surveillance tool for monitoring the activities of a spouse or child. Keylogging may also be used as a method of backing up important data.
One example of a software attack would be a malicious user installing a Trojan on a computer that would record all keyboard activities and send the information to a remote host. In a method employing hardware, an investigator might choose to plug a hardware ‘bug’ between the computer and the keyboard.Read Full Story