“ That’s the key… ”

I never really promote series but I think you all should check out “Spycraft” on Netflix, it’s a very interesting watch. I hope you learnt a lot from my last two blogs on laptops, but this week’s blog is on a technique that hackers can use to monitor and record our activities. It’s a very subtle technique called key-logging.

Fun Fact – Key-logging has been around since 1970 and has been used by Governments for secret operations

Key-logging is used to record what you type on your keyboard, however, it doesn’t just end there, it’s also used to steal personal information and login details. It’s basically a keyboard spy which allows a hacker to steal the passwords you have entered, record the websites you visit as well as screenshot emails and messages. 

Here is an even more interesting fact, it can be used legally by companies to monitor their employees or “troubleshoot network problems”, so y’all should watch your backs! But wait, hang on.. imagine your other half was running this on you…. because I’ll call mine right now you know.

Anyways, key-loggers can be hardware or software. Hardware key-loggers can be a small device connected to a keyboard or installed inside the keyboard itself, which makes it very hard to detect. However, the hacker would need access to your keyboard in order to carry out their skullduggery. 

Software key-loggers can be installed via malware* and it works behind the scenes and goes undetected; you wouldn’t have a scooby if it was running on your device. They can come via phishing emails or clicking on a dodgy attachment. There has been a debate whether iPhones can get infected by this, but one thing I know for sure is that Androids can definitely get them. Yes, my agenda is back (hehe)!

However, as bad as key-logging is, there are ways to protect yourself from it:

SolutionExplanation
Password ManagerThis will prevent you typing your password as your device will auto-fill it for you.
Two-Factor AuthenticationIf your password is stolen, two-factor authentication can prevent the hacker from accessing your profile as they will need the temporary pin to authenticate the log in.
Antivirus softwareInstall an antivirus software that has anti-keylogging protection to discover if there is key-logging software on your device.
*malicious software designed to exploit a device

This was an interesting topic to write about and I will definitely expand further on this. But I also have a couple ideas in the bank which should be a real fun read for you guys. Meanwhile, I have actually teamed up with Surfshark. Surfshark is a service that supplies VPNs and you know that I’ve been suggesting VPNs for the longest so it’s only right that I supply you with the best. Lately, I’ve been enjoying the American Netflix, so if you’re trying to watch the dark knight trilogy without any popups (this can cause key-loggers) then this is how you can grab that. Plus, it’s also super easy to set up on your devices! My discount code is en route but in the meantime, use the link below to get this exclusive offer.

https://surfshark.club/friend/jSbpkwcW

Love & Guidance

TT

4 thoughts on ““ That’s the key… ”

Leave a reply to Roland Cancel reply