Keyloggers are rootkit malware that record the keystrokes of the victim’s system and log it into the attacker’s system. It can be used to capture sensitive data like passwords, PINs, usernames, some kind of confidential messages shared between two entities etc. We would be explaining different types of keyloggers and their working. We have also explained the different applications and measures needed to avoid keylogging activities on your system.
CITATION STYLE
Tuscano, A., & Koshy, T. S. (2021). Types of Keyloggers Technologies – Survey. In Lecture Notes in Electrical Engineering (Vol. 698, pp. 11–22). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-981-15-7961-5_2
Mendeley helps you to discover research relevant for your work.