What is a Keylogger | Free Antivirus

Many PC users have heard of such a phenomenon as a "keylogger", but not everyone knows what it is. A keylogger is any software or hardware tool whose main purpose is to read information from a computer keyboard. The keylogger records all keystrokes on the keyboard and then saves them to a file on the same computer, or transmits them over the Internet to the attacker's remote computer. However, a keylogger is not always used by hackers - sometimes it is used by the heads of large companies to spy on their employees, and various types of keyloggers are quite popular in law enforcement agencies (to monitor the correspondence of a suspect). Use our computer subscription service.

Keylogger

Types of Keyloggers

In general, all keyloggers or, as they are also called, "keyloggers" are divided into two main types: software or hardware. Software keyloggers can be part of the code of a disguised malware, or they can be embedded directly into the kernel of the operating system. In the latter case, spyware is extremely difficult to detect, even with special software tools.

Hardware keyloggers are special electronic reading devices that are manually installed on the victim's computer. Most often, a hardware keylogger is disguised as a USB or PS2 keyboard adapter. Also, sometimes a keylogger is installed directly inside the keyboard case, and there are times when keyloggers were built right into the motherboard BIOS.

Since hardware keyloggers require direct access to the computer on which the bug is to be installed, they are used quite rarely - the victims are most often those who store important information on the computer of economic or any other value. But software keyloggers are much more popular, especially among hackers and Internet scammers. For example, by infecting a potential victim's computer with malware with a keylogger, an attacker can easily get hold of information about the computer's owner's electronic and bank accounts, and with the help of this information withdraw cash from the account or even issue a loan in the victim's name.

Penetration Methods of Software Keyloggers

Most often, a software keylogger enters the victim's computer along with unlicensed software (just like most viruses). Also, keyloggers are often located on certain sites, when visiting which there is a hidden download and installation of spyware. And in rare cases, a keylogger can be embedded even in completely legal applications.

How Not to Get Infected With a Keylogger

In order not to become a victim of any cybercriminal or fraudster, you must follow the basic safety rules when using the Internet:

  • Never download or install software on your computer from sources you do not trust. Small file-sharing sites often contain on their pages not only a lot of intrusive ads but also various viruses, among which a keylogger may well be found.
  • Avoid visiting sites with questionable content.
  • Under no circumstances open a file sent to you by an unknown addressee (the same applies to files attached to advertising letters).
  • Install reliable antivirus software on your computer.

How to Detect and Remove a Keylogger

If for some reason you suspect that your computer has a keylogger, do not rush to reinstall the operating system. In most cases, a keylogger program can be detected. The first thing you need to do is to check the system for malicious code using an antivirus or free antivirus scanner. In addition, there is a specialized software designed to detect and eliminate keyloggers. The most famous of these programs is the Anti-Keylogger utility... And if you urgently need to do something on your computer and do not have time to wait for the virus scan results, you can use the on-screen keyboard. This utility is standard for all operating systems of the Windows family, and it is located at the following address: Start Menu> All Programs> Accessories> Accessibility> On-Screen Keyboard.

Comments