February 22, 2016

Keylogger, or keystroke logger, is one of the most feared computer security threats in the present times. It is a type of software program that attempts to intercept a user’s personal information by tracking the input from the keyboard. The data stolen can either be stored locally on the user’s computer or sent out the hacker’s system through a remote server. Most keyloggers have rootkit functionality, i.e. they are able to remain undetected in the computer system, working in the same way as Trojan programs. They can be used for various purposes, such as to steal confidential financial details and passwords or simply to monitor the online activity of the employees.

How Does Keyloggers Infect A Computer System?

Keylogger software can be installed on a computer through a number of ways. It can either come as a part of an application downloaded from a malicious source or website scripts that exploit browser vulnerabilities. Attachments in emails, text messages, IMs, social networking websites or peer-to-peer networks can also infect your system. Hardware based keyloggers can be installed by a hacker who has physical access to the target computer.

Keylogger Prevention Tips

  • Be Cautious While Opening Attachments: Files received through emails, IMs or social network should be opened cautiously. More importantly, you should not view or download any attachment received from an unknown sender. These may be embedded with malicious software comprising a keylogger.
  • Install Antivirus Software: Make sure you install and constantly update anti-virus software on your computer system. These applications identify most of the keyloggers as a threat and ensure complete protection against them.
  • Use A Firewall Always: In order to steal information, a keylogger needs to transmit information from the computer to the hacker. The bandwidth used in this process is usually undetectable in the network usage. Installing a firewall is a great line of defense against most keyloggers as it closely monitors your computer’s activity. If any program attempts to send out information, it will either display an alert or ask for your permission to do the same.
  • Use Virtual Keyboard: As far as possible, you should use a virtual keyboard for all the sensitive information you need to enter, such as credit card numbers, bank account details, passwords etc.
  • Change Passwords Frequently: Changing your passwords at frequent intervals will help to minimize the occurrence of a keylogger attack. With this, the information stolen will no longer be useful to the hacker.

For more tips on preventing keylogger attacks, feel free to contact Centex Technologies at (855) 375 – 9654.