What's the best way to check for keyloggers?

aiden

I may be paranoid, but like the old saying, just because you're paranoid doesn't mean that they aren't watching you.

Topic: Security
Answer this Question

Answers

4 total
jimlynch
Vote Up (19)

This page has a list of key logger detection tools:

http://download.cnet.com/1770-20_4-0.html?query=keylogger+detector&searc...

StillADotcommer
Vote Up (18)

Most people thing of keyloggers as malicious software, but don't forget about hardware keyloggers that can be plugged into a USB port. Obviously these are easy to detect on a laptop, but on a desktop they could potentially go unnoticed for months. 

 

Beyond checking to make sure nothing unwanted is plugged in, you can choose from a number of free software options that detect keyloggers. Two of the better free choices, although pay versions are available for both are Zemana and SpyShelter. I would probably go with Zemana, but both are fine. I don't think SpyShelter will work with 64-bit systems, so depending on your machine, that could make the decision for you.

millerbell
Vote Up (13)

A keylogger, also known as keystroke logging, is a program installed on your computer unbeknownst to you that logs all key strokes typed into your computer which is then viewed by Myjad Keylogger.

Keyloggers are also capable of taking screen captures. 

millerbell
Vote Up (11)

If you think your computer has been infected with a keylogger, there are some steps you can take to detect and remove it. First, install software that will detect malware such as keyloggers and viruses. Run a thorough scan. Depending on the software used, follow the steps to remove the keylogger.

 

Ask a question

Join Now or Sign In to ask a question.
Ping Identity has picked up another $35 million in venture funding to speed development of the next-generation of its identity and access management technology and expand the company's presence in Europe and Asia-Pacific.
Apple's new passcode-based encryption for the iPhone and iPad can be circumvented and provides only limited protection to data.
Google, Dropbox and the Open Technology Fund are supporting a new organization focused on making open-source security and privacy tools more user-friendly.
Among six major U.S. cities, CSOs are paid the most in San Francisco and New York, but factoring in the cost of living makes Denver and Chicago the best bang-for-the-buck places.
Apple's iOS 8 addresses a serious weakness that could allow attackers to hijack the wireless network authentication of Apple devices and gain access to enterprise networks.
Legislation introduced in the U.S. Senate on Thursday aims to place limits on access by U.S. law enforcement agencies to emails and other communications stored abroad.
Two online advertising networks, Google's DoubleClick and Zedo, have been delivering malicious advertisements that could install malware on a person's computer, according to the security vendor Malwarebytes.
Google is turning on data encryption by default in the next version of Android, a step that mirrors broad moves in the technology industry to ensure better data security.
CloudFlare said it has engineered a novel way to handle sensitive encryption keys that allows organizations such as financial institutions to still use its caching service to fend off cyberattacks.
Samsung on Thursday announced price reductions and updates for its Knox security and management software for IT shops and a free My Knox service that is directly available to professionals using ActiveSync.
randomness