About Keyloggers

“Keystroke logging, often referred to as Keylogging or Keyboard Capturing, is the

action of recording (or logging) the keys struck on a keyboard, typically in a covert manner so that the

person using the keyboard is unaware that their actions are being monitored.”
— Definition of Keylogger

Where does a Keylogger come from?

Keyloggers can be placed on a Personal Computer or Laptop through many different means.  They can be physically placed on a device directly or remotely installed by someone, or inadvertently downloaded through any website or email containing Malware by an unsuspecting user.  Something as small and unassuming as an icon on a website or email can contain Malware.

Malware is often found on Personal Computers and Laptops.  This Malware can contain any number of harmful qualities, including Trojans.  Trojans are a well-known threat to PC users, and many Trojans contain Keyloggers. Keyloggers are potentially dangerous programs that can be used to track the user’s activities and potentially steal personal information from their systems. They are invisible programs that run silently without the user’s knowledge.


How can a Keylogger hurt me?

Keyloggers don’t just capture” keystrokes.  They create logs of keystrokes.  These logs contain information about where, when and how the keystrokes were used. For instance, were the keystrokes part of a login sequence, and captured a username and password?  If so, what website are they associated with? Were the keystrokes part of a credit card number, or akin to the structure of a social security number, driver license number, or other common form of identification?  This information is compiled, and the logs sent out via different types of conveyances.  Who they go to, or where they end up, is impossible to tell for certain.  One thing that is for certain is that you have just lost important private information to an unknown entity, and what they will do with that information is also unknown.  Here are just a few of the things that this information could be used to do: 

  • Steal your identity.  
  • Steal funds from your bank account(s). 
  • Use your credit card number(s) to make purchases
  • Login to private sites or applications
  • Login to your private email accounts
  • Login to your Social Networks and impersonate you or steal personal information
  • Login to your favorite Online Game and steal everything from your account.

How do I get rid of Keyloggers on my computer?

Keep your Firewall turned on. Use a good Antivirus software. Most importanly, install SE – Online Protection/Scanner.

SE-OPS will check your memory for any Keyloggers every time you open a browser. It will scan continually for new, incoming Keyloggers, and will scan for new Keyloggers manually, or regularly if scheduled to do so.  SE-OPS Scans your system for known Keyloggers, Detects any abnormal keystroke capturing, and Removes any and all Keyloggers that are found. No Firewall or Antivirus software can do all of that.

Courtney • 14 mins