What's the best way to check for keyloggers?

aiden

I may be paranoid, but like the old saying, just because you're paranoid doesn't mean that they aren't watching you.

Topic: Security
Answer this Question

Answers

4 total
jimlynch
Vote Up (15)

This page has a list of key logger detection tools:

http://download.cnet.com/1770-20_4-0.html?query=keylogger+detector&searc...

StillADotcommer
Vote Up (13)

Most people thing of keyloggers as malicious software, but don't forget about hardware keyloggers that can be plugged into a USB port. Obviously these are easy to detect on a laptop, but on a desktop they could potentially go unnoticed for months. 

 

Beyond checking to make sure nothing unwanted is plugged in, you can choose from a number of free software options that detect keyloggers. Two of the better free choices, although pay versions are available for both are Zemana and SpyShelter. I would probably go with Zemana, but both are fine. I don't think SpyShelter will work with 64-bit systems, so depending on your machine, that could make the decision for you.

millerbell
Vote Up (9)

If you think your computer has been infected with a keylogger, there are some steps you can take to detect and remove it. First, install software that will detect malware such as keyloggers and viruses. Run a thorough scan. Depending on the software used, follow the steps to remove the keylogger.

 

millerbell
Vote Up (9)

A keylogger, also known as keystroke logging, is a program installed on your computer unbeknownst to you that logs all key strokes typed into your computer which is then viewed by Myjad Keylogger.

Keyloggers are also capable of taking screen captures. 

Ask a question

Join Now or Sign In to ask a question.
A new webmail service called Lavaboom promises to provide easy-to-use email encryption without ever learning its users' private encryption keys or message contents.
Oracle has issued a comprehensive list of its software that may or may not be affected by the OpenSSL (secure sockets layer) vulnerability known as Heartbleed, while warning that no fixes are yet available for some likely affected products.
It took just four days for German researchers to trick the Samsung Galaxy S5's fingerprint scanner into accepting a mold of a fingerprint instead of a real finger.
Telecom operator Telefónica has launched the first mobile ad-exchange platform to use the operator's customer demographics and real-time location data to serve targeted mobile ads, the company said on Wednesday.
International conflicts such as the current tensions over Ukraine could stand in the way of global cooperation on cybersecurity, according to the founder of Kaspersky Lab.
In the race to protect themselves from the Heartbleed vulnerability, enterprises could be opening themselves up to new attacks if they aren't careful.
Wireless carriers in the U.S., handset makers and the industry's lobbying group have made a significant concession on technology that could remotely disable stolen smartphones and tablets.
Google has issued a patch for an attack that could lead an Android user to a phishing site, according to security vendor FireEye.
VMware started patching its products against the critical Heartbleed flaw that puts encrypted communications at risk, and plans to have updates ready for all affected products by Saturday.
The source code of TrueCrypt, a popular disk encryption tool, is not the most polished work of programming, but it has no critical flaws or intentional backdoors, security testers concluded in a report released Monday.
randomness