Keystroke logging (often called keylogging) is the practice of noting (or logging) the keys struck on a keyboard. There are currently two types of keylogging methods, hardware and software based.

Hardware key loggers are commercially available devices which come in three types: inline devices that are attached to the keyboard cable, devices which can be installed inside standard keyboards, and actual replacement keyboards that contain the key logger already built-in.

When used covertly inline devices are easily detected by a glance at the keyboard connector plugged into the computer. Of the three types, the most difficult to install is also the most difficult to detect. The device that installs inside a keyboard (presumably the keyboard the target has been using all along) requires soldering skills and extended access to the keyboard to be modified. However, once in place, this type of device is virtually undetectable unless specifically looked for.

Remote Access software Keyloggers are local software keyloggers programmed with an added feature to transmit recorded data out of the target computer and make the data available to the monitor at a remote location. Remote communication is facilitated by one of four methods:
  • Data is uploaded to a website or an ftp account.
  • Data is periodically emailed to a pre-defined email address.
  • Data is wirelessly transmitted by means of an attached hardware system.
  • It allows the monitor to log into the local machine via the internet or ethernet and access the logs stored on the target machine.

How Can You Detect Keyloggers?

Download SpyHunter’s Detection Scanner
to Detect Keyloggers.
* SpyHunter's scanner is only for malware detection. If SpyHunter detects malware on your PC, you will need to purchase SpyHunter's malware removal tool to remove the malware threats. Read more on SpyHunter. If you no longer wish to have SpyHunter installed on your computer, follow these steps to uninstall SpyHunter.

There are 78 articles listed on keyloggers.

Name Threat Level Detection Count Date
123Keylogger 88/10 11 May 13, 2009
AceSpy 66/10 38 May 15, 2009
Actual Spy May 15, 2009
ACXInstall 77/10 60 May 15, 2009
AGM65s Keylog trojan March 28, 2012
Application.Actual_Keylogger August 5, 2010
Application.Family_Keylogger 88/10 11 March 28, 2011
Application.WinSpy_Stealth_Monitor August 12, 2010
Application.WinSpy_Stealth_Monitor Virus June 21, 2011
Ardamax Keylogger 88/10 137 August 17, 2012
Boolosoft Keylogger 88/10 33 May 13, 2009
CheaterChecker 88/10 93 May 13, 2009
Cyber Snoop August 4, 2009
Enfiltrator Black Box 88/10 17 April 12, 2012
Fade.exe May 28, 2015
FamilyKeyLogger 88/10 274 September 29, 2009
Force Keylogger May 15, 2009
FreeKeylogger 88/10 9,451 May 13, 2009
Gen.Variant.MSILKrypt March 2, 2011
Generic 99/10 2,888 April 1, 2011
Generic.dx!nug March 25, 2011
Golden Keylogger 1010/10 11 October 26, 2015
H@tKeysH@@k January 30, 2014
Hack99 88/10 552 August 17, 2012
HawkEye Keylogger 88/10 218 September 7, 2016

1 2 3 4
Search by Letter: A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  0  1  2  3  4  5  6  7  8  9  
Home | SpyHunter Risk Assessment Model | Privacy Policy | EULA | Additional Terms and Conditions
Copyright 2003-2017. Enigma Software Group USA, LLC. All Rights Reserved.