Keystroke logging is what identity thieves use to secretly track the keys on your computer keyboard as they are struck. Keystroke logging—also known as keylogging—might not be a big deal if your kid were typing a report on Spain, but it becomes more threatening if you’re typing in passwords, PINs, or other personal information thieves can then use to steal your identity.
How does keystroke logging theft occur?
Software programs that execute keystroke logging, and then transmit the data to identity thieves for storage, can be downloaded onto your computer through email attachments, links, or fraudulent websites without you knowing they’re there.
What can thieves do with your personal information?
Keylogging can lead to many different types of identity theft and identity fraud. This could include existing account takeover identity theft; medical identity theft; and tax identity theft.
If you become a victim, there are steps you can take to help recover from identity theft.
Editor’s note: This content was lightly edited and updated on March 30, 2018.