Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically...
46 KB (5,285 words) - 22:50, 26 July 2025
Keyboard technology (section Keystroke logging)
have this vulnerability. Keystroke logging (often called keylogging) is a method of capturing and recording user keystrokes. While it can be used legally...
33 KB (3,986 words) - 01:39, 9 August 2025
Computer keyboard (section Keystroke logging)
purpose of logging keys typed by the user. Microsoft wireless keyboards 2011 and earlier are documented to have this vulnerability. Keystroke logging (often...
69 KB (8,223 words) - 18:30, 9 August 2025
Network eavesdropping (section Keystroke logging)
keystroke logging systems do not explain reasons for pauses or deletion of texts, it allows attackers to analyze text information. Keystroke logging can...
31 KB (3,860 words) - 13:18, 5 August 2025
Hardware keyloggers are used for keystroke logging, a method of capturing and recording computer users' keystrokes, including sensitive passwords. They...
7 KB (852 words) - 07:15, 28 April 2025
between a legitimate keystroke-logging program and an illegitimate keystroke-logging program (such as malware); all keystroke-logging programs are flagged...
8 KB (1,016 words) - 04:13, 6 November 2024
Backdoor Trojan horse Virus Worm Spyware Ransomware Logic bomb Botnet Keystroke logging HIDS Web shell RCE Infostealer Computer security Application security...
6 KB (567 words) - 21:05, 16 June 2025
Backdoor Trojan horse Virus Worm Spyware Ransomware Logic bomb Botnet Keystroke logging HIDS Web shell RCE Infostealer Computer security Application security...
18 KB (1,870 words) - 03:36, 6 June 2025
Magic Lantern is keystroke logging software created by the United States' Federal Bureau of Investigation (FBI). Magic Lantern was first reported in a...
13 KB (1,226 words) - 17:49, 11 August 2024
monitoring tool launched by the owners of Staff.com in 2012. It includes keystroke logging, screenshot and internet usage tracking features. A multi-functional...
3 KB (250 words) - 11:41, 3 March 2025
Clifford Stoll, a scientist working as a system administrator, found ways to log the attacks and to trace them back (with the help of many others). 23, a...
41 KB (4,311 words) - 01:11, 24 June 2025
activities on the remote computer. Examples of its capabilities: Keystroke logging Keystroke injection Screen captures Program launching File browsing Shutting...
6 KB (641 words) - 10:59, 17 October 2024
is often used to steal banking information by man-in-the-browser keystroke logging and form grabbing. Zeus is spread mainly through drive-by downloads...
13 KB (1,157 words) - 20:08, 31 July 2025
library, describes the function of cURL as "cURL groks URLs". The keystroke logging software used by the NSA for its remote intelligence gathering operations...
19 KB (2,203 words) - 14:09, 18 July 2025
Explorer on Microsoft Windows operating systems. This malware uses keystroke logging and form grabbing to steal user credentials for malicious use. SpyEye...
8 KB (923 words) - 23:13, 1 July 2025
surveillance disclosures (2013–present) Katz v. United States (1967) Keystroke logging Listening station Magic (cryptography) Man-in-the-middle attack Mass...
7 KB (682 words) - 02:44, 11 June 2025
describe any self-propagating program. Keystroke logging A keylogger is a tool designed to record ("log") every keystroke on an affected machine for later retrieval...
55 KB (5,962 words) - 03:26, 11 June 2025
for other purposes.[vague] Key logging, or keystroke logging, is a process that records a user's typing. Key logging software may also capture screenshots...
15 KB (1,718 words) - 18:18, 25 July 2025
Backdoor Trojan horse Virus Worm Spyware Ransomware Logic bomb Botnet Keystroke logging HIDS Web shell RCE Infostealer Computer security Application security...
77 KB (7,664 words) - 18:17, 6 August 2025
iPhone and 3G iPads were "logging where the user visits". Apple released a statement saying that the iPad and iPhone were only logging the towers that the phone...
13 KB (1,505 words) - 10:22, 6 August 2025
Typing (section Keystroke dynamics)
recognition. Data needed to analyze keystroke dynamics is obtained by keystroke logging. The behavioral biometric of Keystroke Dynamics uses the manner and rhythm...
31 KB (3,401 words) - 09:56, 9 August 2025
Backdoor Trojan horse Virus Worm Spyware Ransomware Logic bomb Botnet Keystroke logging HIDS Web shell RCE Infostealer Computer security Application security...
37 KB (3,239 words) - 18:55, 7 August 2025
surveillance software Employee monitoring software Email tracking Chat log Keystroke logging Parental controls Spyware Mobile phone tracking Website tracking...
368 bytes (64 words) - 23:56, 10 November 2020
Backdoor Trojan horse Virus Worm Spyware Ransomware Logic bomb Botnet Keystroke logging HIDS Web shell RCE Infostealer Computer security Application security...
19 KB (1,868 words) - 01:46, 8 August 2025
Spyware Backdoor (computing) Computer virus Computer worm Macro virus Keystroke logging Trojan horse Hardware Trojan Eavesdropping Zombie Botnets Advanced...
18 KB (1,725 words) - 16:02, 28 July 2025
Backdoor Trojan horse Virus Worm Spyware Ransomware Logic bomb Botnet Keystroke logging HIDS Web shell RCE Infostealer Computer security Application security...
6 KB (566 words) - 13:08, 9 August 2025
information, “BlackEnergy Lite” jn.dll — Parasitic infector ki.dll — Keystroke Logging ps.dll — Password stealer ss.dll — Screenshots vs.dll — Network discovery...
7 KB (760 words) - 18:20, 8 November 2024
for amounts as low as US$10. Buyers of these stolen credentials usually log in to assess their value, particularly looking for credentials associated...
20 KB (2,278 words) - 05:43, 8 August 2025
trojan that targets Microsoft Windows to steal banking information by keystroke logging. February 17: Mocmex is a trojan, which was found in a digital photo...
71 KB (7,760 words) - 09:59, 30 July 2025
Backdoor Trojan horse Virus Worm Spyware Ransomware Logic bomb Botnet Keystroke logging HIDS Web shell RCE Infostealer Computer security Application security...
36 KB (4,519 words) - 22:07, 29 July 2025