What is Keylogger?
Malicious software or hardware that records every keystroke typed on a device, capturing passwords, messages, and sensitive information. Keyloggers can be installed through malware, physical access, or malicious browser extensions.
Also known as: Keystroke Logger, Keyboard Logger
A keylogger is the digital equivalent of someone watching over your shoulder as you type—except it records everything, sends it to attackers, and you never know it's there.
Types of Keyloggers
Software Keyloggers
- Malware installed on system
- Runs in background
- Can capture screenshots too
- Sends logs to attacker
Hardware Keyloggers
- Physical device between keyboard and computer
- USB dongle or internal device
- No software to detect
- Requires physical access
Browser-Based
- Malicious extensions
- JavaScript on compromised pages
- Captures form inputs
Kernel-Level
- Operates at OS level
- Very hard to detect
- Captures all input system-wide
What Keyloggers Capture
- Passwords (even if masked on screen)
- Credit card numbers
- Private messages
- Search queries
- Every single keystroke
Detection Methods
Software Signs
- Slow system performance
- Unknown processes running
- Unusual network activity
- Security software alerts
Physical Inspection
- Check USB ports for unknown devices
- Look inside keyboard connector
- Unusual hardware attached
Anti-Keylogger Tools
- Specialized detection software
- Virtual keyboards
- Clipboard encryption
Protection Strategies
Prevention
- Keep software updated
- Don't download from untrusted sources
- Use reputable antivirus
- Check browser extensions
Mitigation
- Use password managers (autofill, don't type)
- Enable 2FA (keylogger alone isn't enough)
- Virtual keyboards for sensitive input
- On-screen keyboards
For Physical Keyloggers
- Inspect equipment, especially on public computers
- Use your own keyboard
- Watch for tampering signs
Password Managers Help
Even with a keylogger:
- Password manager autofills—no keystrokes
- Master password captured once, but...
- 2FA blocks unauthorized access
- Each site has unique password
Related Terms
Malware
Malicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Malware includes viruses, ransomware, spyware, trojans, and worms—each with different infection methods and objectives.
Phishing
A social engineering attack where attackers impersonate legitimate entities through fake emails, websites, or messages to trick victims into revealing sensitive information like passwords, credit card numbers, or personal data.
Have more questions?
Use our guided flow to get the right next privacy step for Keylogger.
Open Guided Flow