v Keystroke Loggers (or Key loggers) intercept the Target’s keystrokes and either saves them in a file to be read later, or transmit them to a predetermined destination accessible to the Hacker.
v Since Keystroke logging programs record every keystroke typed in via the keyboard, they can capture a wide variety of confidential information, including passwords, credit card numbers, and private Email correspondence, names, addresses, and phone numbers.
v Hardware keylogger
v Software keylogger
Ø Actual Spy
Ø Perfect Keylogger
Ø Family Keylogger
Ø Home Keylogger
ü Always configure a Secondary Email Address for the recovery purpose.
ü Properly configure the Security Question and Answer in the Email Account.
ü Do Not Open Emails from strangers.
ü Do Not Use any other’s computer to check your Email.
ü Take Care of the Phishing Links.
ü Do not reveal your Passwords to your Friends or Mates.