Keystroke logging is what identity thieves use to secretly track the keys on your computer keyboard as they are struck. Not a big deal if your daughter is typing a report on Spain, but much more so if you’re typing in passwords, PINs, or other personal information thieves can then use to steal your identity.
How Does Keystroke Logging Theft Occur?
Software programs that execute keystroke logging, and then transmit the data to identity thieves for storage, can be downloaded onto your computer through email attachments, links, or fraudulent websites without you knowing they’re there.
What Is the Cost of Keystroke Logging Theft?
In 2008, 76% of the confidential information threats used a keystroke-logging component to steal personal information from computers. 1
Information thieves can collect:
- Logon IDs
- Account information
What thieves can do with this information:
- Identity theft
- Bank fraud
- Other identity fraud
Keystroke Logging Statistics:
- 76% of information threats used a keystroke logging component in 2008.1
† Federal Trade Commission. “Consumer Sentinel Network Data Book For
January – December 2011.” February 2012.
† Javelin Strategy & Research. "2012 Identity Fraud Report: Social Media and Mobile Forming
the New Fraud Frontier." February 2012.