What is 'Keyboard Logger'

A keyboard logger is hardware or software that records every keystroke on a computer, usually for nefarious purposes and without the user’s knowledge. Keyboard loggers can be used to collect all kinds of sensitive information, including personally identifiable information (PII), passwords, intellectual property, and trade secrets. They can also be used to record email messages, online chats, usernames and passwords.

BREAKING DOWN 'Keyboard Logger'

Keyboard loggers are often used for criminal purposes, like stealing passwords or credit card information from the device users. However, some companies may use keyboard loggers for legitimate IT purposes, such as trying to prevent sensitive company information from being leaked. They can by organizations to troubleshoot technical problems with computers and business networks; they can also be used by a business to monitor the network usage of people without their direct knowledge; and they can also be used by families as part of parental controls.

Keyboard Logger Capabilities 

When installed on a device, keyboard loggers can:

  • save any passwords entered by users on the device
  • take screenshots of the device periodically over time
  • capture logs of all instant messaging conversations and sent emails 
  • save a copy of the computer user's web search history 
  • save a copy of the list of the applications used
  • automatically send the reports containing stored logs and emails 

Examples of Keyboard Logger Attacks

A hardware keylogger can be a barely noticeable device that connects the hard drive’s USB port to the keyboard’s USB cord. This type of keyboard logger was used to commit a serious crime in 2013. A county sheriff installed a keylogger on his ex-wife’s work computer because he wanted to capture her information. If he got caught – and he did – his action would have been a problem regardless of where she worked, but since she worked for the state supreme court, he was found guilty of a federal wiretapping charge.

Another example of a hard-to-detect keyboard logger came out in 2014. KeySweeper is a $10 device that looks like a typical USB phone charger but can pick up keystrokes from the radio signals transmitted by wireless Microsoft keyboards and transmit that data via cellular network. The logger doesn’t interact with the computer itself, making it difficult to detect. A wireless keyboard would have to encrypt the data transmitted between itself and the computer to prevent this type of sniffing attack. A keyboard that uses the Advanced Encryption Standard (AES) would be protected against this type of threat. While AES keyboards are not foolproof, they help deter data theft by using firmware that blocks access to the keyboard’s secret encryption key as well as random data generators and unique transmission identifiers.

Example of Using Keyboard Logger Positively 

Windows 10 has a feature that some news outlets have erroneously reported as a keylogger. It’s a setting that is enabled by default but that users can turn off in their privacy settings. It says “Send Microsoft info about how I write to help us improve typing and writing in the future.” Further in the “speech, inking, & typing” section of Windows 10’s privacy settings, there is an option to allow or disallow Windows and Cortana to “get to know your voice and writing to make better suggestions for you,” which includes collecting your typing history. Microsoft says these features are used to improve consumers’ experience with using Windows. It is not designed to collect personal information or to use it for malicious purposes but to improve product development. Microsoft uses safeguards to protect users’ information collected through these means.

That being said, accidental disclosure of collected information is possible, and users who are concerned can easily opt out. Nefarious keyboard loggers do not tell users about their existence or allow them to opt out.

RELATED TERMS
  1. Data Loss

    Data loss occurs when valuable and/or sensitive information on ...
  2. Encryption

    Encryption is a means of securing digital date using an algorithm ...
  3. Cloud Computing

    Cloud computing is a model for delivering information technology ...
  4. Computer Crime Insurance

    Computer crime insurance is an insurance policy that provides ...
  5. Two-Factor Authentication (2FA)

    Two-factor authentication (2FA) is a second layer of security, ...
  6. Blockchain Wallet

    A blockchain wallet is a digital wallet that enables users to ...
Related Articles
  1. Investing

    BlackBerry: Keyboard Phone Not for Sale In India

    The last BlackBerry device to have a built-in keyboard won't be available for sale in India.
  2. Tech

    Cybersecurity Steps Everyone Should Take

    Anyone using a device connected to the internet should employ these cybersecurity practices.
  3. Investing

    Top 10 Biggest Mobile Apps of 2016

    These 10 useful mobile applications allow users to perform business- and personal-related tasks from anywhere at any time
  4. Investing

    Microsoft Updates Privacy Policy for Windows 10

    Microsoft is gearing up to share more information about the data it collects from Windows 10 users.
  5. Trading

    What Is A Trader's Worst Nightmare?

    A little preparation will make sure you protect your trading space from everyday
  6. Tech

    Passwords Are Obsolete, Get With the Blockchain

    Blockchain technology could provide a better alternative to memorizing long, confusing, and easily forgotten passwords.
  7. Tech

    7 Cybersecurity Tips to Protect Your Finances

    These seven cybersecurity tips will help protect your finances from online fraud and hacking.
  8. Investing

    Microsoft Blocks Latest Windows 10 Update

    Microsoft is running into trouble with the latest version, prompted MSFT to block its own update.
RELATED FAQS
  1. How do Internet companies profit if they give away their services for free?

    Learn how companies in the Internet sector make a profit when service, content and user applications are offered at no cost ... Read Answer >>
  2. Why Did Microsoft Face Antitrust Charges in 1998?

    Discover why the Department of Justice filed antitrust charges against Microsoft in 1998 over alleged monopolistic actions ... Read Answer >>
  3. Why is Average Collection Period important to a company?

    Discover why the average collection period can be a particularly important accounting ratio for a company that relies heavily ... Read Answer >>
  4. What are the advantages of paying with Bitcoin?

    Learn how payments made with Bitcoins offer certain advantages over standard currency, including user anonymity, no taxation ... Read Answer >>
Trading Center