What's the best way to check for keyloggers?

aiden

I may be paranoid, but like the old saying, just because you're paranoid doesn't mean that they aren't watching you.

Topic: Security
Answer this Question

Answers

4 total
jimlynch
Vote Up (15)

This page has a list of key logger detection tools:

http://download.cnet.com/1770-20_4-0.html?query=keylogger+detector&searc...

StillADotcommer
Vote Up (13)

Most people thing of keyloggers as malicious software, but don't forget about hardware keyloggers that can be plugged into a USB port. Obviously these are easy to detect on a laptop, but on a desktop they could potentially go unnoticed for months. 

 

Beyond checking to make sure nothing unwanted is plugged in, you can choose from a number of free software options that detect keyloggers. Two of the better free choices, although pay versions are available for both are Zemana and SpyShelter. I would probably go with Zemana, but both are fine. I don't think SpyShelter will work with 64-bit systems, so depending on your machine, that could make the decision for you.

millerbell
Vote Up (9)

If you think your computer has been infected with a keylogger, there are some steps you can take to detect and remove it. First, install software that will detect malware such as keyloggers and viruses. Run a thorough scan. Depending on the software used, follow the steps to remove the keylogger.

 

millerbell
Vote Up (9)

A keylogger, also known as keystroke logging, is a program installed on your computer unbeknownst to you that logs all key strokes typed into your computer which is then viewed by Myjad Keylogger.

Keyloggers are also capable of taking screen captures. 

Ask a question

Join Now or Sign In to ask a question.
Revelations about U.S. secret surveillance programs have left China's Huawei Technologies exhausted on the public relations front, a top company executive said Wednesday.
Some Android apps thought to be vulnerable to the Heartbleed bug were spared because of a common coding error in the way they implemented their own native OpenSSL library.
The panic over the Heartbleed bug is proving to be a convenient distraction for hackers using standard techniques in a fresh wave of attacks targeting at least 18 U.S. universities, according to a computer security researcher.
Still responding to the National Security Agency surveillance revelations, Google is reportedly preparing to help users beef up Gmail security with end-to-end encryption. The search giant is working on a way to make Pretty Good Privacy (PGP) encryption easier to use for Gmail fans, according to a report by Venture Beat.
Cisco today announced Managed Threat Defense, a set of security services for the enterprise that Cisco is providing through two new operations centers to remotely support intrusion-detection, incident response and forensics, among other services.
Verizon today issued its annual data-breach investigations report, a study of what happened in 1,367 known cases across dozens of industries in 95 countries last year, and the most common form of attack was breaking in through Web applications.
A malware campaign of yet-to-be-determined origin is infecting jailbroken iPhones and iPads to steal Apple account credentials from SSL encrypted traffic.
NEC has launched a biometric security program that uses face recognition to unlock access to PCs.
Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations.
CloudFlare started a bug bounty program on Monday, joining a host of companies that are turning to independent security researchers to spot bugs in their network.

White Papers & Webcasts

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness