Keyloggers and How to Defend YourselfThis article will discuss the negative impact of keyloggers. While there are many positive uses of this software, I will focus on the negative side, since I am a security consultant.
Keyloggers are simple programs that record keystrokes made on a keyboard. They have legitimate uses, such as parental controls and employee monitoring. But they can also be used for malicious activities, like recording keystrokes from someone logging into their bank account. This particular form of hacking is becoming widespread, and is now considered to be the number one way information is stolen. Keyloggers can be installed virtually undetected. Many perpetrators are using them in ads, so that when a person clicks on the ad, the software installs itself. Another popular way to install a key logger is through email. The email can be worded so enticing that the receiver will open the attachment, thus installing the software unnoticed.
How can a person protect themselves from this software being used for malicious purposes? Education and reinforcement of safety measures can help reduce key logger crimes. Most anti-virus software now comes with signatures for known keyloggers, so scanning the email before opening it is very important. Companies can educate their employees by reinforcing the need to be careful when using email, and to run a virus check on any attachments before opening. The following list provides some safety measures anyone can use to protect themselves:
- Do not click OK on pop-up windows without first reading them thoroughly
- Never open spam e-mail
- You should pay for software instead of opting for the free, advertising supported version; never click on links in e-mail you receive from an unknown source
- Type the URL into your Web browser
- Do not open e-mail attachments from an unknown source
- Use a firewall to help prevent any unauthorized computer activity
- Run a weekly, full system anti-virus computer scan