Skip to main content

Questions tagged [keyloggers]

A software (and sometimes hardware) module which perform keystroke logging (more often called keylogging or "keyloggers"), which is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.

2 votes
1 answer
193 views

Is it possibile to capture unlock pin of smartphone(android/ios) using usb cable?

For example, bad USB cable( charging devices) loaded with script to record the unlock code of an android phone which is current being charged. so basically, the bad usb cable and the usb charger is ...
Maxfield's user avatar
  • 157
1 vote
0 answers
76 views

How vulnerable is my Veracrypt-protected data to key logging attack via Windows?

Objective I've come into possession of some data that I'd like to protect. If an attacker destroys or corrupts my data, I can tolerate that; Plenty of backups exist. But I can't tolerate an outsider ...
Frizzle McGrindnose's user avatar
1 vote
1 answer
106 views

Can Firejails protect against malicious links?

I would like to ask, if Firejails on Linux, protects when clicking a malicious link in the browser e.g. from downloading a keylogger or a trojan.
Dion's user avatar
  • 121
0 votes
0 answers
84 views

Surreptitiously surveil a logged out laptop AD workstation's keyboard with temporary physical access?

I can think of multiple ways to surveil a logged out computer with temporary physical access. The first is installing a hardware keylogger which would enable one to get all the keystrokes from it; ...
Seci Pedia's user avatar
1 vote
1 answer
276 views

What are the risks of reusing the same passphrase for FDE, user account, and password manager?

Consider a home user who runs Linux on a laptop with full-disk encryption and uses a cloud-based password manager. Assume the laptop is firewall-protected with no SSH access. It seems reasonable to ...
jth's user avatar
  • 123
0 votes
0 answers
161 views

Can a Remote Desktop software prevent windows 10 keylogger from accessing what is typed on client computer during a session to a remote computer?

The “improve inking and typing” setting in Windows 10 allows Microsoft to send themselves processed samples of what is typed on a machine (not sure if it is processed to remove details as it’s typed ...
AndroidUser558's user avatar
0 votes
1 answer
176 views

Keylogging virtual machine from host

Can a keylogger in a host machine capture keystrokes in virtual OS? I'd like to get into cryptocurrencies but I don't know if my machine (mac) is secure. So I thought I could create a VM for it but I ...
user277849's user avatar
0 votes
0 answers
110 views

Most Secure ways to to authorize clients on their devices that are remotely connected by (AnyDesk, TeamViewer, etc...) without knowing the password

My case is I'm designing an app based on chromium browser powered by Electron . And I need sometimes to log the clients in with some web apps. The password is only visible as dots in browsers by ...
a.badawi's user avatar
1 vote
1 answer
306 views

Is it safe to use a Dell knock-off keyboard? [duplicate]

Purchased a Dell wired keyboard scanned its QR code to check authenticity. The URL was http://dell.vt9999.com/fw.aspx?c=1670918927095916 and it says the product is authentic but link looks suspicious ...
Nilesh Yadav's user avatar
0 votes
0 answers
40 views

Is it possible to be infected without installing anything like said at the beginning of the video? [duplicate]

It seems like a 'crazy' claim that John McAfee makes at the very beginning of this video, is it true? "Over half of all smartphones, both iOS and Android are infected with keystroke logging ...
stackexchanged's user avatar
2 votes
1 answer
2k views

How seriously should we take this commentary from John McAfee? If it's serious, what do we do? [closed]

This question refers to this YouTube video of John McAfee Because videos can disappear, I've provided a screenshot and transcript (transcribed by me, so please forgive errors) What John is saying ...
Stewart's user avatar
  • 343
1 vote
2 answers
142 views

Using Chrome on non-trusted macOS computer

So I'm using an untrusted computer but on a trusted network (my home). The operating-system + hardware are trusted but the Profiles, certificates & software installed in the system are not trusted....
Luca Matteis's user avatar
0 votes
0 answers
48 views

Wondering if a USB dongle for gaming controller could have malware installed [duplicate]

I purchased a usb gaming controller used. It has a usb dongle that plugs into the PC and a I assume its bluetooth. Is it possible for the USB dongle to contain a keylogger that starts up when I plug ...
Eric Anderson's user avatar
0 votes
2 answers
240 views

Is there a type of login security that is keylog and screen capture proof that doesnt require a 2nd device?

I am looking for a login security measure where it is keylog and screen capture proof. Is there some type of login security like a 2FA without the need of a second device, but remembering a pattern or ...
Patoshi パトシ's user avatar
2 votes
1 answer
1k views

Bitwarden and gamecontrollerd on OsX Big Sur

Recently, I came across an issue concerning a daemon named gamecontrollerd in OsX Big Sur. On my laptop I'm running ReiKey (from Objective-See), which aims at identifying possible Key Loggers that ...
FancyPants's user avatar

15 30 50 per page
1
2 3 4 5
15