What's the best way to check for keyloggers?

aiden

I may be paranoid, but like the old saying, just because you're paranoid doesn't mean that they aren't watching you.

Topic: Security
Answer this Question

Answers

4 total
jimlynch
Vote Up (17)

This page has a list of key logger detection tools:

http://download.cnet.com/1770-20_4-0.html?query=keylogger+detector&searc...

StillADotcommer
Vote Up (15)

Most people thing of keyloggers as malicious software, but don't forget about hardware keyloggers that can be plugged into a USB port. Obviously these are easy to detect on a laptop, but on a desktop they could potentially go unnoticed for months. 

 

Beyond checking to make sure nothing unwanted is plugged in, you can choose from a number of free software options that detect keyloggers. Two of the better free choices, although pay versions are available for both are Zemana and SpyShelter. I would probably go with Zemana, but both are fine. I don't think SpyShelter will work with 64-bit systems, so depending on your machine, that could make the decision for you.

millerbell
Vote Up (12)

A keylogger, also known as keystroke logging, is a program installed on your computer unbeknownst to you that logs all key strokes typed into your computer which is then viewed by Myjad Keylogger.

Keyloggers are also capable of taking screen captures. 

millerbell
Vote Up (10)

If you think your computer has been infected with a keylogger, there are some steps you can take to detect and remove it. First, install software that will detect malware such as keyloggers and viruses. Run a thorough scan. Depending on the software used, follow the steps to remove the keylogger.

 

Ask a question

Join Now or Sign In to ask a question.
The team at Mitro Labs, the developer of a password manager, is joining Twitter, and its software is being released under a free and open source license, Mitro said Thursday.
The latest release of a Microsoft security tool that's designed to stop exploits lets administrators control when third-party plugins are launched, a long favored route for attackers.
Some of those seeking to scrub their histories from the Web under Europe's "right to be forgotten" rule are being economical with the truth when making their requests, Google said Thursday.
Most USB devices have a fundamental security weakness that can be exploited to infect computers with malware in a way that cannot easily be prevented or detected, security researchers found.
A U.S. district court judge has ruled against Microsoft in the company's effort to oppose a U.S. government search warrant for emails stored in Ireland.
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
The number of government requests worldwide seeking Twitter users' data, or the removal of content, increased during the first half of 2014.
Despite greater security awareness, most C-suite executives continue to undervalue CISOs, survey shows.
Anonymity network hacked with sophisticated traffic correlation technique.
IBM has added to its security software portfolio with the purchase of Italian access control and identity management firm CrossIdeas for an undisclosed sum, the companies said Thursday.