Keystroke logging is what identity thieves use to secretly track the keys on your computer keyboard as they are struck. Keystroke logging—also known as keylogging—might not be a big deal if your kid were typing a report on Spain, but it becomes more threatening if you’re typing in passwords, PINs, or other personal information thieves can then use to steal your identity.
How does keystroke logging theft occur?
Software programs that execute keystroke logging, and then transmit the data to identity thieves for storage, can be downloaded onto your computer through email attachments, links, or fraudulent websites without you knowing they’re there.
What can thieves do with your personal information?
Keylogging can lead to many different types of identity theft and identity fraud. This could include existing account takeover identity theft; medical identity theft; and tax identity theft.
If you become a victim, there are steps you can take to help recover from identity theft.
Editor’s note: This content was lightly edited and updated on March 30, 2018.
Editorial note: Our articles provide educational information for you. Norton LifeLock offerings may not cover or protect against every type of crime, fraud, or threat we write about. Our goal is to increase awareness about cyber safety. Please review complete Terms during enrollment or setup. Remember that no one can prevent all identity theft or cybercrime, and that LifeLock does not monitor all transactions at all businesses.