- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
Keylogger
A keylogger is a technology that tracks and records consecutive key strokes on a keyboard. Because sensitive information such as usernames and passwords are often entered on a keyboard, a keylogger can be a very dangerous technology. Keyloggers are often part of malware, spyware or an external virus.
There are many different kinds of keyloggers based on diverse keylogging methods. These include hardware and software keyloggers. Software keyloggers can be built into rootkits or other less detectable forms, and can infiltrate a computer in various ways. Hardware keyloggers can be fitted into the line from a keyboard to a device. Other more esoteric forms of keyloggers are based on electromagnetic emanations from hardware, which are addressed by emissions security protocols.
While keylogging is an ever-present danger in many parts of the tech world, some new technologies are keylogger-resistant. The touch screen interfaces of mobile devices often render conventional keyloggers useless, and visual methods like drop-down box selections can also provide a foil to keyloggers, given a secure data entry method for these selections. In many cases, however, keylogging can be very effective, and is becoming a serious issue for the average technology user.