0
5.8kviews
Keyloggers and Spywares
1 Answer
1
333views

Keystroke logging, often called keylogging, is the practice of noting (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that such actions are being monitored.

Keystroke logger or keylogger is quicker and easier way of capturing the passwords and monitoring the victims' IT savvy behavior. It can be classified as software keylogger and hardware keylogger.

1. Software Keyloggers

Software keyloggers are software programs installed on the computer systems which usually are located between the OS and the keyboard hardware, and every keystroke is recorded. Software keyloggers are installed on a computer system by Trojans or viruses without the knowledge of the user. Cybercriminals always install such tools on the insecure computer systems available in public places and can obtain the required information about the victim very easily. A keylogger usually consists of two files that get installed in the same directory: a dynamic link library (DLL) file and an EXEcutable (EXE) file that installs the DLL file and triggers it to work. DLL does all the recording of keystrokes.

2. Hardware Keyloggers

To install these keylogers, physical access to the computer system is required. Hardware keyloggers are small hardware devices. These are connected to the PC and/or to the keyboard and save every keystroke into a file or in the memory of the hardware device. Cybercriminals install such devices on ATM machines to capture ATM Cards'PINs. Each keypress on the keyboard of the ATM gets registered by these keyloggers These keyloggers look like an integrated part of such systems; hence, bank customers are unaware of their presence.

3. Antikeylogger

Antikeylogger is a tool that can detect the keylogger installed on the computer system and also can remove the tool.

Advantages of using antikeylogger are as follows:

  • Firewalls cannot detect the installations of keyloggers on the systems; hence, antikeyloggers can detect installations of keylogger.
  • This software does not require regular updates of signature bases to work effectively such as other antivirus and antispy programs if not updated, it does not serve the purpose, which makes the users at risk.
  • Prevents Internet banking frauds. Passwords can be easily gained with the help of installing keyloggers.
  • It prevents ID theft
  • It secures E-Mail and instant messaging/chatting.

4. Spywares

Spyware is a type of malware, that is installed on computers which collects information about users without their knowledge. The presence of Spyware is typically hidden, from the user, it is secretly installed on the user's personal computer. Sometimes, however, Spywares such as keyloggers are installed by the owner of a shared, corporate or public computer on purpose to secretly monitor other users.

It is clearly understood from the term Spyware that it secretly monitors the user. The features and functions of such Spywares are beyond simple monitoring. Spyware programs collect personal information about the victim, such as the Internet surfing habits/patterns and websites visited. The Spyware can also redirect Internet surfing activities by installing another stealth utility on the users' computer system. Spyware may also have an ability to change computer settings, which may result in slowing of the Internet connection speeds and slowing of response time that may result into user complaining about the Internet speed connection with Internet Service Providers (ISP).

To overcome the emergence of Spywares that proved to be troublesome for the normal user, anti-Spyware softwares are available in the market. Installation of anti-Spyware has become a common element nowadays from computer security practices perspective.

Please log in to add an answer.