When you purchase through links on our site, we may earn an affiliate commission.Heres how it works.
What is keylogging?
Every time you press a button on your keyboard, youre sending a keystroke to your setup.
This sends a signal to your gear, which its operating system records and acts upon.
Theres two different but related concepts at play here.
These are the actual methods that someone uses to record your keystrokes.
While keyloggers are often used as spyware for malicious purposes, they can also have legitimate applications.
How does keylogging work?
There are two different types of keyloggers youll encounter.
First, lets go over software-based keyloggers.
Software-based keyloggers can be installed remotely without directly accessing the rig they’re downloaded on.
Once installed, they use sophisticated malware techniques to run without the victim’s knowledge or permission.
Hardware-based keyloggers, on the other hand, require physical access to your rig.
These devices are typically inserted between the keyboard and the computer to intercept signals.
This means its much harder for a computer system to automatically detect a hardware keylogger.
Thankfully, youre most likely not going to encounter a hardware keylogger in your home.
If anywhere, theyre going to be installed in a public place or potentially installed on a work computer.
If youre worried about hardware keyloggers specifically, I recommend using an OS-based virtual keyboard.
However, this isn’t a fool-proof defense from all keyloggers.
How can I avoid keylogging software?
You should take the same approach to avoiding keylogging software as all other malware.
Rule number one: dont tap on unknown or suspicious links, especially in unsolicited emails or messages.
You also shouldnt download software unless youre sure its from a trusted vendor.
Its pretty tiresome being suspicious of every single thing being sent to your inbox, though.