Keystroke logging is what identity thieves use to secretly track the keys on your computer keyboard as they are struck. Keystroke logging—also known as keylogging—might not be a big deal if your kid were typing a report on Spain, but it becomes more threatening if you’re typing in passwords, PINs, or other personal information thieves can then use to steal your identity.
How does keystroke logging theft occur?
Software programs that execute keystroke logging, and then transmit the data to identity thieves for storage, can be downloaded onto your computer through email attachments, links, or fraudulent websites without you knowing they’re there.
What can thieves do with your personal information?
Keylogging can lead to many different types of identity theft and identity fraud. This could include existing account takeover identity theft; medical identity theft; and tax identity theft.
If you become a victim, there are steps you can take to help recover from identity theft.
Editor’s note: This content was lightly edited and updated on March 30, 2018.
Symantec Corporation, the world’s leading cyber security company, allows organizations, governments, and people to secure their most important data wherever it lives. More than 50 million people and families rely on Symantec’s Norton and LifeLock comprehensive digital safety platform to help protect their personal information, devices, home networks, and identities.