Keystroke Logging

Keystroke logging is what identity thieves use to secretly track the keys on your computer keyboard as they are struck. Not a big deal if your daughter is typing a report on Spain, but much more so if you’re typing in passwords, PINs, or other personal information thieves can then use to steal your identity.

How Does Keystroke Logging Theft Occur?

Software programs that execute keystroke logging, and then transmit the data to identity thieves for storage, can be downloaded onto your computer through email attachments, links, or fraudulent websites without you knowing they’re there.

Get LifeLock protection now.

What Is the Cost of Keystroke Logging Theft?

In 2008, 76% of the confidential information threats used a keystroke-logging component to steal personal information from computers. 1

Information thieves can collect:

  • Passwords
  • Logon IDs
  • Account information

What thieves can do with this information:

  • Identity theft
  • Bank fraud
  • Other identity fraud

Keystroke Logging Statistics:

  • 76% of information threats used a keystroke logging component in 2008.1


Federal Trade Commission. “Consumer Sentinel Network Data Book For
January – December 2011.” February 2012.

Javelin Strategy & Research. "2012 Identity Fraud Report: Social Media and Mobile Forming
the New Fraud Frontier." February 2012.

4 Million Members and Counting


"I would compare LifeLock to having that big older brother."- Casey S.


"All of my personal information, even my social security card, was taken".- Jamie A.

Sign up in minutes,
protection starts immediately.

Start Your Membership