Skip to main content

Questions tagged [keyloggers]

A software (and sometimes hardware) module which perform keystroke logging (more often called keylogging or "keyloggers"), which is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.

1 vote
0 answers
1k views

What data is bitmoji keyboard collecting about me?

Bitmoji is a virtual keyboard for iOS and Android to create personalized emojis (very paraphrased). I've found a few blogs looking at the permissions it requests and the privacy policy that it shares ...
Mike Ounsworth's user avatar
0 votes
2 answers
2k views

Refurbished laptop computer - any advice?

I just recently bought a refurbished laptop. I have seen stories of refurbished phones being sold with spyware, trojans etc installed on them. My question is, what steps should I take (outside of ...
DBroncos1558's user avatar
1 vote
2 answers
1k views

How to analyze malware to find out where keylogger sent data?

Recently my antivirus detected some keyloggers that infected my network. I have those malware files and I want to analyze them. How can I do this analysis? It is important to find out details like ...
R1W's user avatar
  • 1,627
0 votes
1 answer
2k views

How can I check if my second hand Apple wireless keyboard contains a keylogger?

I just got a cheap second-hand magic keyboard (Apple). Is there any way to check if it's been key logged? I cannot see any screws or openings other than the one for the battery pack.
Ana-Maria's user avatar
3 votes
0 answers
229 views

Need Security advice on virtualization and windows security

I have a little doubt about the security of my virtual machine and Windows. Can anyone please point me in right direction? Below is my what, how and why I made my virtual machine. Let me tell you what ...
user3526312's user avatar
3 votes
1 answer
2k views

Do pre-boot software keyloggers exist?

Let's sat for example that I have a laptop with just one hard drive running Windows 10. The Laptop's C:\ (boot) drive is encrypted using Bitlocker, and it set up to ask for a PIN on start to decrypt ...
Digital Lightcraft's user avatar
6 votes
1 answer
339 views

Healthcare company uses keyloggers for security purposes. Is this normal?

I just attended a recruitment session for a major healthcare provider in the United States. The presenter, a high-ranking member of one of their IT divisions (not security specifically) mentioned that ...
ndm13's user avatar
  • 235
13 votes
1 answer
18k views

Does karabiner elements on Mac OSX contain, or potentially contain, malware?

I'm using Karabiner elements, an open-source program to remap the keys on my MacBook Air (running the latest Mac OSX High Sierra) and my apple wireless keyboard. It works very nicely. However, I am ...
xdavidliu's user avatar
  • 233
4 votes
1 answer
1k views

Is it risky to use an untrusted keyboard?

Suppose you're buying a new keyboard (say USB-wired, but consider Bluetooth connected as well) from Ebay. Is it risky to use that keyboard in a sense that it could be more than just a keyboard? ...
a_guest's user avatar
  • 141
1 vote
1 answer
7k views

Teamviewer logging remote keystroke events

I'm connecting to a remote machine via Teamviewer, let's assume it's trusted. Is it possible for a MITM or virus on my local (client) machine to detect keys I enter using my remote machine's on-...
user5654's user avatar
0 votes
2 answers
446 views

Would using a QWERTY keyboard with DVORAK output cause keylogger to log DVORAK?

I have QWERT keyboard, but I have set the keyboard settings in Windows to DVORAK. So if I type "test" it comes out as "y.oy". Would the key logger log "test" or "y.oy" in its records?
A.L. Verminburger's user avatar
1 vote
1 answer
205 views

Generating a secret on a compromised computer

Suppose we are on a compromised computer (for example infested with trojans logging key presses or taking screenshots) and for some reason we have to generate a number that's supposed to be secret for ...
lunr's user avatar
  • 111
5 votes
3 answers
1k views

Keyboard vs clipboard password manager threat models

A password manager (like KeePass) offers you the option to copy and paste your password (the clipboard is cleared after pasting/timeout) or to emulate a keyboard and "type" the password for the user. ...
lanterlog's user avatar
4 votes
1 answer
268 views

iframe Checkout Procedure

I'm working for a company that wants to allow anyone to embed an iframe in which users can buy products on potentially any site. So it would be a typical use case for users to enter in their credit ...
clarkatron's user avatar
3 votes
1 answer
8k views

Can keyloggers intercept passwords when a password manager autofills a field? [duplicate]

I know that keyloggers primarily work by logging key presses, either through software or hardware. And some will also check for clipboard contents. But can a keylogger (or some other malware) ...
William Kelley's user avatar

15 30 50 per page
1 2 3
4
5
15