Skip to main content

Keylogger

Hello Friends ....

Today we learn about What is Keylogger...?

So let's Start....


A keylogger (keystroke logging) is a type of surveillance software that once installed on a system, has the capability to record every keystrokemade on that system. The Recording is saved in a log file, usually encrypted.
Image result for keylogger

A keylogger can record instant messages, email, and capture any information you type at any time using your keyboard, including usernames, passwords and other personally identifiable information (pii). The log file created by the keylogger can then be sent to a specified receiver. Some keylogger programs will also record any email addresses you use and the URLs of any websites you visit.

Who Uses Keyloggers?

Keyloggers, as a surveillance tool, are often used by employers to ensure employees use work computers for business purposes only. There's also a growing market of parents who want to use keyloggers to stay informed about a child's online activities. Unfortunately, keyloggers can also be embedded in spyware allowing your personal information to be transmitted to an unknown third party.

How to Tell if a Keystroke Logger is Installed

Usually an anti-virus or spyware program will detect and report any keystroke logging software on the system. Also, you can view the Task Manager (list of current programs) on a Windows PC by ctrl+alt+delin Windows.  Any program names in the list that you're unfamiliar with can be researched online to determine the type of program.

How Keylogger are threat ?
Keyloggers are a serious threat to users and the users' data, as they track the keystrokes to intercept passwords and other sensitive information typed in through the keyboard. This gives hackers the benefit of access to PIN codes and account numbers, passwords to online shopping sites, email ids, email logins, and other confidential information, etc.  

Image result for keylogger

When the hackers get access to the users' private and sensitive information, they can take advantage of the extracted data to perform online money transaction the user's account. Keyloggers can sometimes be used as a spying tool to compromise business and state-owned company's data. The main objective of keyloggers is to interfere in the chain of events that happen when a key is pressed and when the data is displayed on the monitor as a result of a keystroke. A keylogger can be done by introducing a wiring or a hardware bug in the keyboard, to achieve video surveillance; terminating input and/or output; or by also implementing the use of a filter driver in the keyboard stack; and demanding data from the user's keyboard using generalized documented methods. There are two other rootkit methods used by hackers: masking in kernel mode and masking in user mode.

How keyloggers spread ?

  • Keyloggers can be installed when a user clicks on a link or opens an attachment/file from a phishing mail
  • Keyloggers can be installed through webpage script. This is done by exploiting a vulnerable browser and the keylogger is launched when the user visits the malicious website.
  • a keylogger can be installed when a user opens a file attached to an email
  • a keylogger can be installed via a web page script which exploits a browser vulnerability. The program will automatically be launched when a user visits an infected site
  • a keylogger can exploit an infected system and is sometimes capable to download and install other malware to the system.

How Hackers Install a Keylogger ?

A hacker employs a Trojan virus as a delivery tool to install a keylogger. But way before one is downloaded onto your system, a hacker will use two different methods to get it into your computer. And both ways involve your participation.The first method involves phishing. Phishing is the act of faking an email from a legitimate company to fish for passwords and credit card numbers. Sometimes, these emails contain attachments which download programs stealthily into your computer once you click on them.
For the second method, the hacker researches on his intended victim beforehand in order to find a weakness in her or his online habits. Let's say a hacker finds out the victim habitually visits porn sites, the hacker might craft an email with a fake coupon for a membership into an exclusive erotic website. Since this method targets a particular fondness of the victim, there's a large chance of success that the he or she will download the fake attachment, unknowingly installing the keylogger.

How to protect yourself from keyloggers

Take caution when opening attachments: Keyloggers can be present in files received through email, chats, P2P networks, text messages or even social networks. If someone sends you an email out of the cold or the contents of the email are asking for your personal information, chances are there's a keylogger in there somewhere.

Implement Two Factor Authentication
 implementation of Two-factor authentication through one time passwords would help users protect their sensitive credentials, as one-time password is momentary and the hackers cannot use the same detected password the next time.
Use of Virtual Keyboard
Virtual Keyboard helps to avoid personal data interception by the hackers. It is a software used to allow the users to input characters without the actual need for physical keys.
Image result for keylogger
THANK YOU FOR READING .

HOPE YOU LIKE IT


AND SHARE WITH YOUR FRIENDS TO ENJOY .....

Comments

Popular posts from this blog

What is Cheat Codes in Video Games...?

Hello Friends .... Today we learn about  What is Cheat Codes in Video Games...? So let's Start.... Cheating in video games involves a video game player using non-standard methods to create an advantage or disadvantage beyond normal gameplay, in order to make the game easier or harder. Cheats may be activated from within the game itself (a cheat code implemented by the original game developers), or created by third-party software (a game trainer) or hardware (a cheat cartridge). They can also be realized by exploiting software bugs; this may or may not be considered cheating based on whether the bug is considered common knowledge. Cheat codes originated in the play testing phase of video game development where the creators want to test certain portions of the game. So there's codes intentionally put in to make that process easier, such as having a near-infinite amount of lives to progress through a difficult (even for its creators) game like Contra. Who finds the ch...

How Mobile Phones get Slower....?

Hello Friends .... Today we learn about   How Mobile Phones get Slower....? So let's Start.... If you’ve had your Android device for a while, you’ve probably started to notice some lag that wasn’t there before. Apps load a bit slower, menus take a bit longer to show up. This is actually (and unfortunately) normal—here’s why. This problem isn’t unique to Android, either—try using an older iPad with a new version of iOS and feel how slow it’s become. But the solutions are slightly different for each platform, so let’s talk about why this happens on Android—and how to fix it. Operating System Updates and Heavier Apps Require More Resources Your Android phone doesn’t have the same software it had a year ago (it shouldn’t, at least). If you’ve received Android operating system updates, they may not be as nicely optimized for your device and may have slowed it down. Or, your carrier or manufacturer may have added additional bloatware apps in an update, which run in the ba...

How Light Gun Works..? Duck Hunt Game Explained..!!

Hello Friends .... Today we learn about How Light Gun Works..? Duck Hunt Game Explained..!! So let's Start.... A light gun is a pointing device for computers and a control device for arcade and video games, typically shaped to resemble a pistol. In aviation and shipping, it can also be a directional signal lamp. Modern screen-based light guns work by building an optical sensor into the gun, which receives its input from the light emitted by on-screen target(s). The first device of this type, the light pen, was used on the MIT Whirlwind computer. The light gun and its ancestor the light pen are now rarely used as pointing devices due largely to the popularity of the mouseand changes in monitor display technology—conventional light guns work only with CRT monitors For many children of the '80s, a good portion of your childhood probably revolved around sitting too close to the TV, clutching a plastic safety cone-colored hand gun and blasting waterfowl out of a pi...