{"id":14634,"date":"2023-11-15T10:00:00","date_gmt":"2023-11-15T10:00:00","guid":{"rendered":"https:\/\/businessyield.com\/tech\/?p=14634"},"modified":"2023-11-15T01:06:32","modified_gmt":"2023-11-15T01:06:32","slug":"what-is-keylogging-how-does-it-work","status":"publish","type":"post","link":"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/","title":{"rendered":"What Is Keylogging &amp; How Does It Work?","gt_translate_keys":[{"key":"rendered","format":"text"}]},"content":{"rendered":"\n<p>Keylogging (short for keystroke logging) is the practice of covertly recording input signals into a computer from a keyboard so the computer user is unaware. It can be accomplished using various methods &#8211; both software and hardware. These can range from low-level rootkits and operating system-level API-based programs to physical devices connected with a keyboard\u2019s connection to a computer and analysis of electromagnetic signals emitted by a target keyboard from up to 20 meters (66 feet) away.<\/p>\n\n\n\n<p>Keylogging capabilities are often added to various botnet malware (such as the Zeus Trojan) to steal personal or financial information.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-how-keylogging-works\"><span id=\"how-keylogging-works\"><strong>How Keylogging Works<\/strong><\/span><\/h2>\n\n\n\n<p>Keystroke logging is an act of tracking and recording every keystroke entry made on a computer, often without the permission or knowledge of the user. A \u201ckeystroke\u201d is just any interaction you make with a button on your keyboard.<\/p>\n\n\n\n<p>Keystrokes are how you \u201cspeak\u201d to your computers. Each keystroke transmits a signal that tells your computer programs what you want them to do.<\/p>\n\n\n\n<p>These commands may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Length of the key press<\/li>\n\n\n\n<li>Time of keypress<\/li>\n\n\n\n<li>Velocity of keypress<\/li>\n\n\n\n<li>Name of the key used<\/li>\n<\/ul>\n\n\n\n<p>When logged, all this information is like listening to a private conversation. You believe you\u2019re only \u201ctalking\u201d with your device, but another person is listening and writing down everything you said. With our increasingly digital lives, we share a lot of highly sensitive information on our devices.<\/p>\n\n\n\n<p>User behaviors and private data can easily be assembled from logged keystrokes. Everything from online banking access to social security numbers is entered into computers. Social media, email, websites visited, and even text messages sent can all be highly revealing.<\/p>\n\n\n\n<h2 id=\"what-is-a-keylogger\" class=\"wp-block-heading\"><strong>What is a keylogger?<\/strong><\/h2>\n\n\n\n<p>A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.<\/p>\n\n\n\n<p>Keyloggers are often used as spyware\u00a0tools by cybercriminals to steal\u00a0personally identifiable information\u00a0(PII), login credentials and sensitive enterprise data. However, some uses of keyloggers could be considered ethical or appropriate in varying degrees. Keylogger recorders may also be used by:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>employers to observe employees&#8217; computer activities;<\/li>\n\n\n\n<li>parents to supervise their children&#8217;s internet usage;<\/li>\n\n\n\n<li>device owners to track possible unauthorized activity on their devices; or<\/li>\n\n\n\n<li>law enforcement agencies to analyze incidents involving computer use.<\/li>\n<\/ul>\n\n\n\n<h2 id=\"what-does-a-keylogger-do\" class=\"wp-block-heading\"><strong>What does a keylogger do?<\/strong><\/h2>\n\n\n\n<p><strong>Keylogger tools<\/strong>&nbsp;can either be hardware or software meant to automate the process of keystroke logging. These tools record the data sent by every keystroke into a text file to be retrieved at a later time. Some tools can record everything on your copy-cut-paste clipboard, calls, GPS data, and even microphone or camera footage.<\/p>\n\n\n\n<p>Keyloggers are surveillance tools with legitimate uses for personal or professional IT monitoring. Some of these uses enter an ethically questionable grey area. However, other keylogger uses are explicitly criminal.<\/p>\n\n\n\n<p>Regardless of the use, keyloggers are often used without the user\u2019s fully aware consent and keyloggers are used under the assumption that users should behave as normal.<\/p>\n\n\n\n<h3 id=\"types-of-keyloggers\" class=\"wp-block-heading\"><strong>Types of keyloggers<\/strong><\/h3>\n\n\n\n<p>Keylogger tools are mostly constructed for the same purpose. But they\u2019ve got important distinctions in terms of the methods they use and their form factor.<\/p>\n\n\n\n<p>Here are the two forms of keyloggers:<\/p>\n\n\n\n<h4 id=\"hardware-keyloggers\" class=\"wp-block-heading\"><strong>Hardware keyloggers<\/strong><\/h4>\n\n\n\n<p>Hardware keyloggers are physical components built-in or connected to your device. Some hardware methods may be able to track keystrokes without even being connected to your device. For brevity, we\u2019ll include the keyloggers you are most likely to fend against:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Keyboard hardware keyloggers<\/strong>\u00a0can be placed in line with your keyboard\u2019s connection cable or built into the keyboard itself. This is the most direct form of interception of your typing signals.<\/li>\n\n\n\n<li><strong>USB disk-loaded keyloggers<\/strong>\u00a0can be a physical\u00a0<a href=\"https:\/\/www.kaspersky.com\/resource-center\/threats\/trojans\">Trojan<\/a>\u00a0horse that delivers the keystroke logger malware once connected to your device.<\/li>\n\n\n\n<li><strong>Hidden camera keyloggers<\/strong>\u00a0may be placed in public spaces like libraries to visually track keystrokes.<\/li>\n<\/ul>\n\n\n\n<h4 id=\"software-keyloggers\" class=\"wp-block-heading\"><strong>Software keyloggers<\/strong><\/h4>\n\n\n\n<p>Software keyloggers are computer programs that install onto your device\u2019s hard drive. Common keylogger software types may include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>API-based keyloggers<\/strong>\u00a0directly eavesdrop between the signals sent from each keypress to the program you\u2019re typing into. Application programming interfaces (APIs) allow software developers and hardware manufacturers to speak the same \u201clanguage\u201d and integrate. API keyloggers quietly intercept keyboard APIs, logging each keystroke in a system file.<\/li>\n\n\n\n<li><strong>\u201cForm grabbing\u201d-based keyloggers<\/strong>\u00a0eavesdrop all text entered into website forms once you send it to the server. Data is recorded locally before it is transmitted online to the web server.<\/li>\n\n\n\n<li>Kernel-based keyloggers\u00a0work their way into the system\u2019s core for admin-level permissions. These loggers can bypass and get unrestricted access to everything entered into your system.<\/li>\n<\/ul>\n\n\n\n<h2 id=\"how-keyloggers-work\" class=\"wp-block-heading\"><strong>How keyloggers work<\/strong><\/h2>\n\n\n\n<p>How a keylogger works depends on its type. Hardware and software keyloggers work differently due to their medium.<\/p>\n\n\n\n<p>Most workstation keyboards plug into the back of the computer, keeping the connections out of the user&#8217;s line of sight. A hardware keylogger may also come in the form of a module that is installed inside the keyboard itself. When the user types on the keyboard, the keylogger collects each keystroke and saves it as text in its own\u00a0hard drive, which may have a\u00a0<a href=\"https:\/\/www.techtarget.com\/searchstorage\/definition\/memory-card\">memory<\/a>\u00a0capacity up to several gigabytes. <\/p>\n\n\n\n<p>The person who installed the keylogger must later return and physically remove the device to access the gathered information. There are also wireless keylogger sniffers that can intercept and decrypt data packets transferred between a wireless keyboard and its receiver.<\/p>\n\n\n\n<p>A common software keylogger typically consists of two files that get installed in the same directory: a\u00a0dynamic link library (DLL)\u00a0file that does the recording and an\u00a0executable\u00a0file that installs the DLL file and triggers it. The keylogger program records each keystroke the user types and periodically uploads the information over the internet to whoever installed the program. <\/p>\n\n\n\n<p>Hackers can design keylogging software to use keyboard application program interfaces (APIs) for another application, malicious script injection or memory injection.<\/p>\n\n\n\n<h2 id=\"uses-for-keylogging\" class=\"wp-block-heading\"><strong>Uses for keylogging<\/strong><\/h2>\n\n\n\n<p>To explain the uses of keylogging, you\u2019ll have to consider: what is keylogger activity legally limited to? Four factors outline if keylogger use is legally acceptable, morally questionable, or criminal:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li><strong>Degree of consent<\/strong>. Is the keylogger used with 1) clear-and-direct consent, 2) permission hidden in obscure language in terms of service, or 3) no permission at all?<\/li>\n\n\n\n<li><strong>Goals of the keystroke logging<\/strong>.\u00a0Is the keylogger being used to steal a user\u2019s data for criminal uses, such as identity theft or stalking?<\/li>\n\n\n\n<li><strong>Ownership of the product being monitored<\/strong>. Is the keylogger being used by the device owner or product manufacturer to monitor its use?<\/li>\n\n\n\n<li><strong>Location-based laws on keylogger use<\/strong>. Is the keylogger being used with intent and consent per all governing laws?<\/li>\n<\/ol>\n\n\n\n<h3 id=\"legal-consensual-keylogging-uses\" class=\"wp-block-heading\"><strong>Legal consensual keylogging uses<\/strong><\/h3>\n\n\n\n<p><strong>Legal keylogger use<\/strong>&nbsp;requires the person or organization implementing it to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Involve no criminal use of data.<\/li>\n\n\n\n<li>Be the product owner, manufacturer, or legal guardian of a child owning the product.<\/li>\n\n\n\n<li>Use it per their location\u2019s governing laws.<\/li>\n<\/ul>\n\n\n\n<p>Consent is notably absent from this list. Keylogger users don\u2019t have to obtain consent unless laws in the area of use require them to. This is ethically questionable for uses where people are not made aware that they are being watched.<\/p>\n\n\n\n<p>In consensual cases, you may allow keystroke logging under clear language within terms of service or a contract. This includes any time you click \u201caccept\u201d to use public Wi-Fi or when you sign an employer\u2019s contract.<\/p>\n\n\n\n<p>Here are some common legitimate uses for keyloggers:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>IT troubleshooting<\/strong>\u00a0\u2014 to collect details on user problems and resolve them accurately.<\/li>\n\n\n\n<li><strong>Computer product development<\/strong>&nbsp;\u2014 to gather user feedback and improve products.<\/li>\n\n\n\n<li><strong>Business server monitoring<\/strong>&nbsp;\u2014 to watch for unauthorized user activity on web servers.<\/li>\n\n\n\n<li><strong>Employee surveillance<\/strong>\u00a0\u2014 to supervise the safe use of company property on the clock.<\/li>\n<\/ul>\n\n\n\n<p>You might find legal keyloggers are in your daily life more than you realize. Fortunately, the power to control your data is often in your hands if the monitoring party has asked for access. Outside of employment, you can simply decline permission to the keyloggers if you so choose.<\/p>\n\n\n\n<h3 id=\"legal-ethically-ambiguous-keylogging-uses\" class=\"wp-block-heading\"><strong>Legal ethically ambiguous keylogging uses<\/strong><\/h3>\n\n\n\n<p>Non-consensual legal use of keylogging\u00a0is more questionable. While it violates the trust and privacy of those being watched, this type of use likely operates in the bounds of the laws in your area.<\/p>\n\n\n\n<p>In other words, a keylogger user can monitor computer products they own or make. They can even monitor their children\u2019s devices legally. But they cannot surveil devices outside of their ownership. This leaves a bit of a grey area that can cause problems for all involved.<\/p>\n\n\n\n<p>Without consent, people and organizations can use keyloggers for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Parental supervision of kids<\/strong>\u00a0\u2014 to protect their children in their online and social activities.<\/li>\n\n\n\n<li><strong>Tracking of a spouse<\/strong>&nbsp;\u2014 to collect activity on a device the user owns for proof of cheating.<\/li>\n\n\n\n<li><strong>Employee productivity monitoring<\/strong>\u00a0\u2014 to watchdog employees&#8217; use of company time.<\/li>\n<\/ul>\n\n\n\n<p>Even consent that has been buried under legal jargon within a contract or terms of service can be questionable. However, this does not explicitly cross the line of legality either.<\/p>\n\n\n\n<h3 id=\"criminal-keylogging-uses\" class=\"wp-block-heading\"><strong>Criminal keylogging uses<\/strong><\/h3>\n\n\n\n<p>Illegal keylogger use\u00a0completely disregards consent, laws, and product ownership in favor of nefarious uses. Cybersecurity experts usually refer to this use case when discussing keyloggers.<\/p>\n\n\n\n<p>When used for criminal purposes, keyloggers serve as malicious spyware meant to capture sensitive information. Keyloggers record data like passwords or financial information, which is then sent to third parties for criminal exploitation.<\/p>\n\n\n\n<p>Criminal intent can apply in cases where keyloggers are used to:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Stalk a non-consenting person<\/strong>&nbsp;\u2014 such as an ex-partner, friend, or other individual.<\/li>\n\n\n\n<li><strong>Steal a spouse\u2019s online account info<\/strong>&nbsp;\u2014 to spy on social media activity or emails.<\/li>\n\n\n\n<li><strong>Intercept and steal personal info<\/strong>&nbsp;\u2014 such as credit card numbers and more.<\/li>\n<\/ul>\n\n\n\n<p>Once the line has been crossed into criminal territory, keyloggers are regarded as malware. Security products account for the entire user case spectrum, so they may not label discovered keyloggers as immediate threats. Similarly to\u00a0adware, the intent can be completely ambiguous.<\/p>\n\n\n\n<h2 id=\"why-keylogging-can-be-a-threat\" class=\"wp-block-heading\"><strong>Why keylogging can be a threat<\/strong><\/h2>\n\n\n\n<p>Threats of keyloggers can come from many issues around the collection of sensitive data. When you are unaware that everything you type onto your computer keyboard is being recorded, you may inadvertently expose your:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Passwords.<\/li>\n\n\n\n<li>Credit card numbers.<\/li>\n\n\n\n<li>Communications.<\/li>\n\n\n\n<li>Financial account numbers.<\/li>\n<\/ul>\n\n\n\n<p>Sensitive information like this is highly valuable to third parties, including advertisers and criminals. Once collected and stored, this data then becomes an easy target for theft.<\/p>\n\n\n\n<p>Data breaches\u00a0can expose saved keystroke logs, even in legitimate use cases. This data can easily be leaked inadvertently via an unsecured or unsupervised device or through a\u00a0phishing attack. More common leaks can occur by a direct criminal attack with malware or other means. Organizations collecting mass keylogging data can be prime targets for a breach.<\/p>\n\n\n\n<p>Criminal use of keyloggers\u00a0can collect and exploit your information just as easily. Once they\u2019ve infected you with malware via\u00a0drive-by download\u00a0or other means, time is of the essence. They can access your accounts before you even know that your sensitive data has been compromised.<\/p>\n\n\n\n<h2 id=\"keylogging-detection-and-removal\" class=\"wp-block-heading\"><strong>Keylogging detection and removal<\/strong><\/h2>\n\n\n\n<p>Due to the variety of keyloggers that use different techniques, no single detection or removal method is considered the most effective. Since keyloggers can manipulate an operating system kernel, examining a computer&#8217;s Task Manager isn&#8217;t necessarily enough to detect a keylogger.<\/p>\n\n\n\n<p>Security software, such as an anti-keylogger software program, is designed specifically to scan for software-based keyloggers by comparing the files on a computer against a keylogger signature base or a checklist of common keylogger attributes. Using an anti-keylogger can be more effective than an antivirus or antispyware program. The latter may accidentally identify a keylogger as a\u00a0legitimate program instead of spyware.<\/p>\n\n\n\n<p>Depending on the technique an antispyware application uses, it may be able to locate and disable keylogger software with lower privileges than it has. Using a network monitor will ensure the user is notified each time an application tries to make a network connection, allowing a security team to stop any possible keylogger activity.<\/p>\n\n\n\n<h2 id=\"protection-against-keylogging\" class=\"wp-block-heading\"><strong>Protection against keylogging<\/strong><\/h2>\n\n\n\n<p>While visual inspection can identify hardware keyloggers, it is impractical and time-consuming to implement on a large scale. Instead, individuals can use a firewall to help protect against a keylogger. Since keyloggers transmit data back and forth from the victim to the attacker, the firewall could discover and prevent that data transfer.<\/p>\n\n\n\n<p>Password managers that automatically fill in username and password fields may also help protect against keyloggers.\u00a0Monitoring software\u00a0and antivirus software can also keep track of a system&#8217;s health and prevent keyloggers.<\/p>\n\n\n\n<p>System cages that prevent access to or tamper with USB and PS\/2 ports can be added to the user&#8217;s desktop setup. Extra precautions include using a\u00a0security token\u00a0as part of\u00a0two-factor authentication (2FA)\u00a0to ensure an attacker cannot use a stolen password alone to log in to a user&#8217;s account, or using an\u00a0onscreen keyboard\u00a0and\u00a0voice-to-text\u00a0software to circumvent using a physical keyboard.<\/p>\n\n\n\n<p>Application allowlisting\u00a0can also be used to allow only documented, authorized programs to run on a system. It is also always a good idea to keep any system up to date.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-recommended-articles\"><span id=\"recommended-articles\"><strong>Recommended Articles <\/strong><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/fraud-score-what-is-it-how-does-it-work\/\">Fraud Score: What Is It &amp; How Does It Work?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/security-architecture-what-is-it-what-are-the-benefits\/\">Security Architecture: What Is It &amp; What Are the Benefits?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/digital-pathology-what-it-is-benefits-all-to-know\/\">Digital Pathology: What It Is, Benefits &amp; All to Know<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/what-do-data-scientists-do-all-to-know-about-data-scientists\/\">What Do Data Scientists Do: All To Know About Data Scientists<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/data-migration-meaning-strategies-best-practices\/\">Data Migration: Meaning, Strategies &amp; Best Practices<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/businessyield.com\/tech\/technology\/network-performance-monitoring-what-it-is-all-to-know\/\">Network Performance Monitoring: What It Is &amp; All to Know<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"h-references\"><span id=\"references\"><strong>References<\/strong><\/span><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/www.kaspersky.com\/resource-center\" target=\"_blank\" rel=\"noreferrer noopener\">Kaspersky<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">TechTarget<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.radware.com\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Radware<\/a><\/li>\n<\/ul>\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"excerpt":{"rendered":"Keylogging (short for keystroke logging) is the practice of covertly recording input signals into a computer from a&hellip;\n","protected":false,"gt_translate_keys":[{"key":"rendered","format":"html"}]},"author":290,"featured_media":14635,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[35],"tags":[],"class_list":{"0":"post-14634","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-technology"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Is Keylogging &amp; How Does It Work? - Business Yield Technology<\/title>\n<meta name=\"description\" content=\"Keylogging is the practice of covertly recording input signals into a computer from a keyboard so the computer user is unaware.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is Keylogging &amp; How Does It Work? - Business Yield Technology\" \/>\n<meta property=\"og:description\" content=\"Keylogging is the practice of covertly recording input signals into a computer from a keyboard so the computer user is unaware.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Business Yield Technology\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/Jay.Arnis\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-15T10:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Keylogging.jpeg?fit=1024%2C512&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jimmy Anisulowo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/forlahjay\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jimmy Anisulowo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/\",\"url\":\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/\",\"name\":\"What Is Keylogging &amp; How Does It Work? - Business Yield Technology\",\"isPartOf\":{\"@id\":\"https:\/\/businessyield.com\/tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Keylogging.jpeg?fit=1024%2C512&ssl=1\",\"datePublished\":\"2023-11-15T10:00:00+00:00\",\"author\":{\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff\"},\"description\":\"Keylogging is the practice of covertly recording input signals into a computer from a keyboard so the computer user is unaware.\",\"breadcrumb\":{\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Keylogging.jpeg?fit=1024%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Keylogging.jpeg?fit=1024%2C512&ssl=1\",\"width\":1024,\"height\":512,\"caption\":\"Image credits: Cyber Chasse\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/businessyield.com\/tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is Keylogging &amp; How Does It Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/businessyield.com\/tech\/#website\",\"url\":\"https:\/\/businessyield.com\/tech\/\",\"name\":\"Business Yield Technology\",\"description\":\"Best Tech Reviews, Apps, Phones, &amp; Gaming\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/businessyield.com\/tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff\",\"name\":\"Jimmy Anisulowo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/businessyield.com\/tech\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g\",\"caption\":\"Jimmy Anisulowo\"},\"description\":\"Jimmy generally lives his life by one dogma: steady improvement. This has taken him on a relentless pursuit of knowledge in diverse fields such as business, tech, insurance, health and many others. With a background in content creation and digital marketing plus over ten years of writing and research experience, he implements an expert's view to help his audiences gain valuable insight. He is also an avid reader, gamer, drummer, full-blown metalhead, and all-round fun gi.\",\"sameAs\":[\"https:\/\/www.facebook.com\/Jay.Arnis\",\"https:\/\/www.instagram.com\/forlahjay\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/forlahjay\"],\"url\":\"https:\/\/businessyield.com\/tech\/author\/jimmy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is Keylogging &amp; How Does It Work? - Business Yield Technology","description":"Keylogging is the practice of covertly recording input signals into a computer from a keyboard so the computer user is unaware.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/","og_locale":"en_US","og_type":"article","og_title":"What Is Keylogging &amp; How Does It Work? - Business Yield Technology","og_description":"Keylogging is the practice of covertly recording input signals into a computer from a keyboard so the computer user is unaware.","og_url":"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/","og_site_name":"Business Yield Technology","article_author":"https:\/\/www.facebook.com\/Jay.Arnis","article_published_time":"2023-11-15T10:00:00+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Keylogging.jpeg?fit=1024%2C512&ssl=1","type":"image\/jpeg"}],"author":"Jimmy Anisulowo","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/forlahjay","twitter_misc":{"Written by":"Jimmy Anisulowo","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/","url":"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/","name":"What Is Keylogging &amp; How Does It Work? - Business Yield Technology","isPartOf":{"@id":"https:\/\/businessyield.com\/tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/#primaryimage"},"image":{"@id":"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Keylogging.jpeg?fit=1024%2C512&ssl=1","datePublished":"2023-11-15T10:00:00+00:00","author":{"@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff"},"description":"Keylogging is the practice of covertly recording input signals into a computer from a keyboard so the computer user is unaware.","breadcrumb":{"@id":"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/#primaryimage","url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Keylogging.jpeg?fit=1024%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Keylogging.jpeg?fit=1024%2C512&ssl=1","width":1024,"height":512,"caption":"Image credits: Cyber Chasse"},{"@type":"BreadcrumbList","@id":"https:\/\/businessyield.com\/tech\/technology\/what-is-keylogging-how-does-it-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/businessyield.com\/tech\/"},{"@type":"ListItem","position":2,"name":"What Is Keylogging &amp; How Does It Work?"}]},{"@type":"WebSite","@id":"https:\/\/businessyield.com\/tech\/#website","url":"https:\/\/businessyield.com\/tech\/","name":"Business Yield Technology","description":"Best Tech Reviews, Apps, Phones, &amp; Gaming","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/businessyield.com\/tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/0f5b3b62b69726a967e6d217a4d242ff","name":"Jimmy Anisulowo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/businessyield.com\/tech\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b20d2d093f1362590dc5b5f8b8cfb36e53decf98e57d0121be53eb533dc1f2a7?s=96&d=mm&r=g","caption":"Jimmy Anisulowo"},"description":"Jimmy generally lives his life by one dogma: steady improvement. This has taken him on a relentless pursuit of knowledge in diverse fields such as business, tech, insurance, health and many others. With a background in content creation and digital marketing plus over ten years of writing and research experience, he implements an expert's view to help his audiences gain valuable insight. He is also an avid reader, gamer, drummer, full-blown metalhead, and all-round fun gi.","sameAs":["https:\/\/www.facebook.com\/Jay.Arnis","https:\/\/www.instagram.com\/forlahjay\/","https:\/\/x.com\/https:\/\/twitter.com\/forlahjay"],"url":"https:\/\/businessyield.com\/tech\/author\/jimmy\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/businessyield.com\/tech\/wp-content\/uploads\/sites\/2\/2023\/11\/Keylogging.jpeg?fit=1024%2C512&ssl=1","jetpack_sharing_enabled":true,"gt_translate_keys":[{"key":"link","format":"url"}],"_links":{"self":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14634","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/users\/290"}],"replies":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/comments?post=14634"}],"version-history":[{"count":1,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14634\/revisions"}],"predecessor-version":[{"id":14636,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/posts\/14634\/revisions\/14636"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media\/14635"}],"wp:attachment":[{"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/media?parent=14634"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/categories?post=14634"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/businessyield.com\/tech\/wp-json\/wp\/v2\/tags?post=14634"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}