keylogging


Also found in: Wikipedia.

keylogging

(ˈkiːˌlɒɡɪŋ)
n
(Computer Science) the practice of covertly recording and monitoring keystrokes made on a remote computer, typically using a dedicated software application or piece of implanted hardware
ˈkeyˌlogger n
References in periodicals archive ?
The good news is that you can turn off the keylogging.
Keylogging malware is successful in stealing keystrokes 98% of the time;
Chthonic is capable of stealing saved passwords in different applications, keylogging in applications or on web pages, form grabbing, recording video and sound, injecting code in web pages opened in browsers, and providing remote access via VNC to the infected computer for making transactions in online banking systems.
NCIC officials said a Dallas-based team checked in as guests of hotels using stolen credit cards and then used the properties' business centres for inserting keylogging malware on public PCs.
Once the communication is in place with the SSL to the CNC server, the Trojan downloads other malicious modules from the CNC server and they include keylogging, a screen recorder, and a smart card reader.
Disturbingly, other malware hosted on the main domain used as C&C by Nitol was capable of performing just about every nasty in the malware criminal's armoury, including keylogging, controlling webcams, and changing search settings.
The fraudster, or an accomplice, plugged a keylogging hardware device into the target computer.
When clicked, these 'poisoned' links can automatically put viruses, keylogging programmes (where criminals can monitor everything you type), and other infected software on your smartphone, computer or tablet that can cause endless days of trouble.
Coreflood infected people's computers by installing a keylogging program.
CYBER-criminals have developed a strain of keylogging malware 'Trojan-PWSNslog' - software designed to infiltrate a computer system and record computer keystrokes that saves website passwords on Firefox browsers.
Since Stuxnet first appeared, four new Windows Shell exploits have been discovered: the Dulkis and Vobfus worms, Chymin keylogging software, as well as a variant of the Zeus financial malware.
Keylogging software captures a user's keystrokes to gain access to account and password information and subsequently, their online accounts.