T: 833-COMP DOC

  • Facebook Social Icon
  • Twitter Social Icon
  • Google Places Social Icon
  • Facebook Social Icon
  • Twitter Social Icon
  • Google Places Social Icon
  • LinkedIn Social Icon

 

© 2011-2019 by Triangle CompuDocs

#1Keyloggers

Updated: Jan 15


Did You Know? There are 7 major types of malware. Malware type 1: Keyloggers. The term ‘keylogger’ itself is neutral, and the word describes the program’s function. Most sources define a keylogger as a software program designed to secretly monitor and log all keystrokes. This definition is not altogether correct, since a keylogger doesn’t have to be software – it can also be a device. Keylogging devices are much rarer than keylogging software, but it is important to keep their existence in mind when thinking about information security.



Legitimate programs may have a keylogging function which can be used to call certain program functions using “hotkeys,” or to toggle between keyboard layouts (e.g. Keyboard Ninja). There is a lot of legitimate software which is designed to allow administrators to track what employees do throughout the day, or to allow users to track the activity of third parties on their computers. However, the ethical boundary between justified monitoring and espionage is a fine line. Legitimate software is often used deliberately to steal confidential user information such as passwords. #trianglecompudocs #didyouknow #keylogger #malware


Does this make you nervous? It should. The world is changing. Hackers and criminals are getting more advanced. Protecting your valuable information is of utmost importance. If you need assistance monitoring and protecting your devices, visit our Services page to learn how we can help you. Click the Book Now button above for a free consultation.