Skip to main content

Questions tagged [keyloggers]

A software (and sometimes hardware) module which perform keystroke logging (more often called keylogging or "keyloggers"), which is the action of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored. There are numerous keylogging methods, ranging from hardware and software-based approaches to electromagnetic and acoustic analysis.

1 vote
2 answers
284 views

What information can mouse recorders get?

In comparison to keyloggers, mouse recorders do not seem to be able to obtain much sensitive information. For example, passwords, credit card numbers, email addresses, names, passport numbers, etc. ...
2 votes
1 answer
1k views

Bitwarden and gamecontrollerd on OsX Big Sur

Recently, I came across an issue concerning a daemon named gamecontrollerd in OsX Big Sur. On my laptop I'm running ReiKey (from Objective-See), which aims at identifying possible Key Loggers that ...
2 votes
1 answer
207 views

Is it possibile to capture unlock pin of smartphone(android/ios) using usb cable?

For example, bad USB cable( charging devices) loaded with script to record the unlock code of an android phone which is current being charged. so basically, the bad usb cable and the usb charger is ...
0 votes
2 answers
515 views

iCloud Security Concern: browser session authentication storage after 2-factor?

Does anyone know how Safari or Chrome stores a www.icloud.com session authentication after logging in and passing 2-factor authentication? Is it stored in an encrypted cookie? My concern is, if ...
0 votes
2 answers
240 views

Is there a type of login security that is keylog and screen capture proof that doesnt require a 2nd device?

I am looking for a login security measure where it is keylog and screen capture proof. Is there some type of login security like a 2FA without the need of a second device, but remembering a pattern or ...
1 vote
0 answers
78 views

How vulnerable is my Veracrypt-protected data to key logging attack via Windows?

Objective I've come into possession of some data that I'd like to protect. If an attacker destroys or corrupts my data, I can tolerate that; Plenty of backups exist. But I can't tolerate an outsider ...
20 votes
1 answer
1k views

Keyboard firmware hack - Linux vulnerable?

I see that Apple patched OS X to mitigate against K. Chen's famous Apple keyboard firmware hack. However: Apple keyboards can be used with computers running other operating systems; and in any case, ...
1 vote
1 answer
109 views

Can Firejails protect against malicious links?

I would like to ask, if Firejails on Linux, protects when clicking a malicious link in the browser e.g. from downloading a keylogger or a trojan.
0 votes
0 answers
84 views

Surreptitiously surveil a logged out laptop AD workstation's keyboard with temporary physical access?

I can think of multiple ways to surveil a logged out computer with temporary physical access. The first is installing a hardware keylogger which would enable one to get all the keystrokes from it; ...
1 vote
1 answer
278 views

What are the risks of reusing the same passphrase for FDE, user account, and password manager?

Consider a home user who runs Linux on a laptop with full-disk encryption and uses a cloud-based password manager. Assume the laptop is firewall-protected with no SSH access. It seems reasonable to ...
14 votes
2 answers
619 views

Profiling hackers with keystroke dynamics

I am writing a research paper on tracking hackers and how to include keystroke timings to create a profile of hackers. I want to combine the keystroke timings that I capture in ttylog with other data ...
1 vote
1 answer
2k views

Found KeyLogger in Windows 10 OS?

I was Running Yara, The pattern matching swiss knife for malware researchers on the Windows 10. I ran a scan using rules from Yara Rules from YARA Rules Github and MalwareConfig rules. I stumbled ...
5 votes
5 answers
2k views

What's the safest way to enter information on a website?

On-screen keyboard you have to work with a mouse? Copy and paste? Type a string of random characters and then delete the extraneous ones? Something else?
0 votes
0 answers
161 views

Can a Remote Desktop software prevent windows 10 keylogger from accessing what is typed on client computer during a session to a remote computer?

The “improve inking and typing” setting in Windows 10 allows Microsoft to send themselves processed samples of what is typed on a machine (not sure if it is processed to remove details as it’s typed ...
2 votes
4 answers
1k views

What security mechanisms are in place for iOS' custom keyboards?

Apple has just announced iOS 8. The new version appears to be more extensible than previous versions, and one of the new possiblities is to allow developers to develop custom keyboards, different than ...

15 30 50 per page
1
2 3 4 5
15