Thursday, May 7, 2020

Word of the Day: keylogger

 
Word of the Day WhatIs.com
Daily updates on the latest technology terms | May 7, 2020

keylogger

A keylogger is a surveillance technology used to record each keystroke in a log as it is entered on a keyboard. Keyloggers can be hardware-based or software-based.


Hardware keyloggers resemble ordinary USB adaptors and are installed manually at the end of a keyboard's cable. This type of keylogger has its own internal memory as well as the ability to connect to a wireless access point and send log reports. The person who installed the keylogger will also have the ability to connect remotely and view the log at any time.

 

In contrast, software keyloggers are downloaded and installed on the actual computing device that the keyboard connects to. This type of keylogger, which runs silently in the background, can also capture screen shots, video and sound from the host device.

 

In the United States, keyloggers are legal. It is not legal, however, for the person who installed the keylogger to use the logs to steal personally identifiable information (PII), account information or intellectual property (IP).


Legitimate use cases for installing keyloggers include:

  • Parents who want to monitor their children's smartphone, laptop or desktop use.
  • Law enforcement personnel who want to analyze and track incidents on a suspect's mobile or desktop device.
  • Employers who want to monitor employees online activity. Continue reading...

Today's Takeaway

 

"The true danger posed by keyloggers is their ability to bypass encryption controls and gather sensitive data directly from the user. All the encryption in the world will not secure your data if a hacker watches you type your encryption key." --
Mike Chapple

Buzzword Alert

 

spyware

Spyware is a type of malware that steals sensitive information from unknowing users. Keyloggers are a popular type of spyware.

 

keylogger detection

Many of the tricks that rootkits use to hide on computers are also used by keyloggers -- and keyloggers are often incorporated into rootkits.

 

mobile keyloggers

A keylogger installed on a mobile device can't simply record the keystrokes entered by the user; the attacker must also capture x and y coordinates from the screen the user is touching.

 

data security

This comprehensive guide explains how to construct a proactive security strategy that is strengthened by best practices.

Do You Speak Security?

 

Which security strategy assumes that all users, devices and transactions have already been compromised?

a. zero trust

b. cognitive security
Answer

Stay in Touch

 

Thank you for reading! For feedback about any of our definitions or to suggest a new definition (or learning resource) please contact us at: editor@whatIs.com

FOLLOW US

TwitterRSS
About This E-Newsletter
The Word of the Day is published by TechTarget, Inc., 275 Grove Street, Newton, Massachusetts, 02466 US.

Click to: Unsubscribe.

You are receiving this email because you are a member of TechTarget. When you access content from this email, your information may be shared with the sponsors or future sponsors of that content and with our Partners, see up-to-date Partners List, as described in our Privacy Policy. For additional information, please contact: webmaster@techtarget.com.

© 2020 TechTarget, Inc. all rights reserved. Designated trademarks, brands, logos, and service marks are the property of their respective owners.

Privacy Policy | Partners List
TechTarget

No comments: