News

Its job is to create keystroke-by-keystroke encryption, so that if anyone is running a keystroke logger or Trojan that captures your keystrokes, all they see is garbage.
Hackers exploit iOS keylogger vulnerability, embedding malicious keyboards in innocuous apps to spy on users' keystrokes, compromising private data.
A security researcher says an audio driver is recording every keystroke entered, accessible to any person or malware that knows where to look.
UPDATED: HP laptop users are urged to update their systems for patches that will help mitigate a keylogger risk with the integrated Synaptics Touchpad driver.
Microsoft's upcoming Internet Explorer 8 browser includes a keystroke-logging search suggestion tool like the one that Google tweaked on Monday amid privacy complaints from users.
After the HawkEye malware kit underwent an ownership change and new development, researchers are spotting the keylogger used in several malicious email campaigns.
Lisa Napoli recently wrote an interesting summary in The New York Times of a computer crime involving public workstations that were compromised using keystroke loggers.
A security researcher discovered that HP laptops come with hidden keylogger software that hackers can activate if they gain physical access to the target device. HP confirmed that the keylogger is ...
A University of Kansas student used a keystroke logger to gain access to professors’ computers, and then changed his grades.