Keylogging is another way identity thieves can steal your personal information. This technique involves the adversary, without your knowledge (sometimes via malware), installing software on your device that captures the information and keystrokes you enter on your device and sends them to the adversary. Needless to say, in no time they will have the usernames and passphrases for a number of your accounts.
Top Tip – Some employers use keylogging software to monitor their employees. In addition, computer forensic experts are trained to install keyloggers as part of investigations, including in advance of a device being seized, in order to capture as much information as possible, including account passphrases.
There are also hardware keyloggers which can avoid detection by anti-malware apps. Hardware keyloggers can take many forms. They can be a small device secretly installed between the end of your keyboard cord and its port at the back of your desktop computer. Keyloggers can also be a separate device that looks similar to a small USB memory stick plugged into one of your available USB ports.
Top Tip – See examples of what keylogging devices can look like.
You can thwart the risk posed by keyloggers with a number of tools, including SpyShelter (14-day free trial). It detects if any keylogging software or any keylogging type activities are present on your device and will purge them for you.
Related:
- What is Phishing and Spoofing; How to Protect Yourself
- Be Aware of WiFi Security when using Wireless Internet Hotspots
- How to Shop Safely Online
- Credit Reports and Data Brokers
- Identity Theft Checklist (Financial Fraud Prevention)