What's the best way to check for keyloggers?

aiden

I may be paranoid, but like the old saying, just because you're paranoid doesn't mean that they aren't watching you.

Topic: Security
Answer this Question

Answers

4 total
jimlynch
Vote Up (18)

This page has a list of key logger detection tools:

http://download.cnet.com/1770-20_4-0.html?query=keylogger+detector&searc...

StillADotcommer
Vote Up (17)

Most people thing of keyloggers as malicious software, but don't forget about hardware keyloggers that can be plugged into a USB port. Obviously these are easy to detect on a laptop, but on a desktop they could potentially go unnoticed for months. 

 

Beyond checking to make sure nothing unwanted is plugged in, you can choose from a number of free software options that detect keyloggers. Two of the better free choices, although pay versions are available for both are Zemana and SpyShelter. I would probably go with Zemana, but both are fine. I don't think SpyShelter will work with 64-bit systems, so depending on your machine, that could make the decision for you.

millerbell
Vote Up (12)

A keylogger, also known as keystroke logging, is a program installed on your computer unbeknownst to you that logs all key strokes typed into your computer which is then viewed by Myjad Keylogger.

Keyloggers are also capable of taking screen captures. 

millerbell
Vote Up (11)

If you think your computer has been infected with a keylogger, there are some steps you can take to detect and remove it. First, install software that will detect malware such as keyloggers and viruses. Run a thorough scan. Depending on the software used, follow the steps to remove the keylogger.

 

Ask a question

Join Now or Sign In to ask a question.
In what could turn out to be another huge data breach, Home Depot on Tuesday confirmed that it is investigating a potential compromise of credit card and debit card data belonging to an unspecified number of customers.
Apple has issued a statement regarding the hacking of dozens of celebrities' cellphones that exploded over the weekend.
AlienVault Labs has discovered a watering hole attack that's using a framework developed for reconnaissance as the primary infection vector.
Home Depot said Tuesday it was investigating a possible breach of its systems holding customer payment information tied to credit and debit cards.
Better than 2013 but still not good enough.
That software-defined networking (SDN) is a coming reality is starting to gain traction in IT security circles, with some vendors arguing it could lead to a level of interoperability in security largely missing at present.
It's not ready for prime time yet, but the early builds of a new privacy-focused chat client are promising.
If photos were stolen during a cloud hack, enterprises may be more skittish over cloud use.
A targeted attack focused on user names, passwords and security questions of Apple accounts gave hackers access to nude photos of celebrities that were then leaked over the weekend on the Internet, the company said Tuesday.
Cybercriminals are increasingly infecting computers with malware that resides only in memory in order to make their attacks harder to detect.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+