Author Box
Articles Categories
All Categories
Articles Resources

Keyloggers and How to Defend Yourself

April 22, 2012 | Comments: 0 | Views: 231

This article will discuss the negative impact of keyloggers. While there are many positive uses of this software, I will focus on the negative side, since I am a security consultant.

Keyloggers are simple programs that record keystrokes made on a keyboard. They have legitimate uses, such as parental controls and employee monitoring. But they can also be used for malicious activities, like recording keystrokes from someone logging into their bank account. This particular form of hacking is becoming widespread, and is now considered to be the number one way information is stolen. Keyloggers can be installed virtually undetected. Many perpetrators are using them in ads, so that when a person clicks on the ad, the software installs itself. Another popular way to install a key logger is through email. The email can be worded so enticing that the receiver will open the attachment, thus installing the software unnoticed.

How can a person protect themselves from this software being used for malicious purposes? Education and reinforcement of safety measures can help reduce key logger crimes. Most anti-virus software now comes with signatures for known keyloggers, so scanning the email before opening it is very important. Companies can educate their employees by reinforcing the need to be careful when using email, and to run a virus check on any attachments before opening. The following list provides some safety measures anyone can use to protect themselves:

  • Do not click OK on pop-up windows without first reading them thoroughly
  • Never open spam e-mail
  • You should pay for software instead of opting for the free, advertising supported version; never click on links in e-mail you receive from an unknown source
  • Type the URL into your Web browser
  • Do not open e-mail attachments from an unknown source
  • Use a firewall to help prevent any unauthorized computer activity
  • Run a weekly, full system anti-virus computer scan

If you are not sure whether a key logger is installed on your machine, you can use the virtual keyboard that comes with the Windows system. A virtual keyboard is a program that shows a keyboard on the screen, and the keys can be pressed by using a mouse. This can help keep the keystrokes from being noticed by the software. It is not a guarantee, but can be helpful. Another method that can help secure your account would be to use a one-time password. Using a one-time password can help minimize losses if the password is intercepted because the password generated can be used only one time. The period of time a password can be used is limited, so even if a one-time password is intercepted, the thief will not be able to use it to gain access.

As explained earlier, keyloggers do have some good uses, I just focused on the negative. I would advise everyone to check their anti-virus program to see if it searches for keyloggers.

Source: EzineArticles
Was this Helpful ?

Rate this Article

Article Tags:








Windows 8 will change the way you work and play, says Microsoft and we agree. Nearly all of the previous iterations of the Windows OS have been evolutionary but Windows 8 is set to change all that.

By: Sakshi Sharma l Computers & Technology > Mobile Computing l April 03, 2013 lViews: 659

Many antivirus programs available today have various features but it entirely depends on the user to make the best choice from among these different computer virus protection programs online. Before

By: Alex l Computers & Technology > Software l December 28, 2012 lViews: 369

You can add a new color to your entertainment life with iskysoft video converter for mac & iskysoft dvd creator for mac and make your Christmas holidays all the more special. iskysoft video

By: Zaithyn Galter l Computers & Technology > Software l December 23, 2012 lViews: 1070

The choices you make regarding the type of recruiting software you choose to use are important. Being an informed consumer is essential to getting a system or components that complement systems of

By: Maria Warne l Computers & Technology > Software l December 14, 2012 lViews: 305

The Cisco certification has become the most popular IT training in recent days and it offers three different levels of these certifications include as: associate, professional and expert-level.

By: sandidas chakma l Computers & Technology > Certification Tests l December 11, 2012 lViews: 236

Millions of prospective 12th standard students are gearing up their preparations for the Joint Entrance Exam for engineering seats. From 2013, it has been decided by the IITs, CBSE, JEE organizing

By: Sarkariexam l Computers & Technology > Certification Tests l December 07, 2012 lViews: 632

By some estimates there are 1800 to 3000 Russian Spies in the US today, but if you asked the average citizen about this, they wouldn't have a clue. Now don't get me wrong there are plenty of spies

By: Lance Winslowl Computers & Technology > Spyware and Virusesl April 25, 2012 lViews: 215

Tablet security has become a widely acquired solution to ensuring total protection of personal and business assets. The continuing diverse usage of mobile computing has brought about numerous

By: Cody Faldynl Computers & Technology > Spyware and Virusesl April 20, 2012 lViews: 205

The recent Apple malware attack on numerous Mac OS X systems has hypothetically become known as the "attack heard around the IT world." Although many IT specialists and experts around the world are

By: Cody Faldynl Computers & Technology > Spyware and Virusesl April 20, 2012 lViews: 248

The full name is Sophos Anti-Virus For Mac Home Edition and this is an antivirus utility from Sophos who also supplies business strength solutions and represents that they are including the same

By: Daniel Dreifusl Computers & Technology > Spyware and Virusesl April 20, 2012 lViews: 229

Has your computer developed a mind of its own? Is your PC sluggish? Think your computer might be infected with spyware?

By: Christopher Heckerl Computers & Technology > Spyware and Virusesl April 18, 2012 lViews: 214

Email archiving solutions organize your files and important messages. Implementing these services help speed up your processes and keep your workflow in order. Find expert companies offering quality

By: Mae D O'Connelll Computers & Technology > Spyware and Virusesl April 16, 2012 lViews: 183

Discuss this Article

comments powered by Disqus