How keylogging malware steals your information (includes video)

George Waller from StrikeForce Technologies demonstrations how this malicious software sneaks onto your computer and then steals your sensitive data

Keyloggers are a malicious form of software that can secretly install on your computer and then tracks personal and sensitive information, such as bank and credit account numbers, passwords and corporate data, as you type it into the keyboard. That information can then be used by the thief for fraud and identity theft.

Keyloggers are easily downloaded, and can infect machines simply through a visit to a site such as YouTube, social networking sites like Facebook, and other so-called "legitimate sites," said George Waller from StrikeForce Technologies.

"It happened two months ago to NBC," he explained. "The site was hacked, a Citadel Trojan keylogger was put on their site. So, everyone that went to the site for those few days was infected."

Phishing is another common way that computer users become infected with keylogger software.

Unfortunately, most antivirus programs do not detect keylogging software.

Waller demonstrates the dangers of keylogger malware, and how it works, in this short video.

[Related video: How a crimepack works]

Read more about data protection in CSOonline's Data Protection section.

Tags identity theftapplicationskeyloggingsoftwaredata protectionIdentity fraud / theftkeylogger malwareyoutubeFacebookprivacysecuritykeylogger

Comments

Comments are now closed

CSO Corporate Partners
  • f5
  • Webroot
  • Trend Micro
  • NetIQ
rhs_login_lockGet exclusive access to CSO, invitation only events, reports & analysis.
CSO Directory

Sophos Mobile Control

Data protection, policy compliance and device control for mobile devices

Latest Jobs
Security Awareness Tip
Security ABC Guides

Warning: Tips for secure mobile holiday shopping

I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.