{"id":141,"date":"2021-02-05T10:50:00","date_gmt":"2021-02-05T05:20:00","guid":{"rendered":"http:\/\/blog.secureitlab.com\/?p=141"},"modified":"2021-03-06T11:42:53","modified_gmt":"2021-03-06T06:12:53","slug":"do-you-know-how-they-hacked-your-account-part-five-keylogging","status":"publish","type":"post","link":"https:\/\/www.tikaj.com\/blog\/do-you-know-how-they-hacked-your-account-part-five-keylogging\/","title":{"rendered":"Do you know how they hacked your account? Part five: Keylogging"},"content":{"rendered":"
Keylogging<\/strong>\u00a0<\/strong> (also called keystroke logging) is a method that cyber criminals use to record (or log) the keys you strike on your keyboard in order to get confidential information about you.<\/span> Keylogging\u00a0 (also called keystroke logging) is a method that cyber criminals use to record (or log) the keys you strike on your […]<\/p>\n","protected":false},"author":120,"featured_media":2663,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[534,131,535],"tags":[],"class_list":["post-141","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-keylogging","category-malware","category-trojan"],"_links":{"self":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/141","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/users\/120"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":2,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/141\/revisions"}],"predecessor-version":[{"id":2686,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/posts\/141\/revisions\/2686"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media\/2663"}],"wp:attachment":[{"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/media?parent=141"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/categories?post=141"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tikaj.com\/wp-json\/wp\/v2\/tags?post=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}
\nOf course they do this in a concealed manner, so that you won\u2019t know you are being monitored while typing passwords, addresses and other secret data on your keyboard as usual.
\n
\nHOW YOU CAN GET INFECTED:<\/strong>\u00a0<\/strong>
\nKeyloggers are usually used with malicious intentions, to steal passwords or credit card information.
\nAlthough many anti-spyware applications can detect some software based keyloggers and quarantine, disable or cleanse them, there is no solution that can claim to be 100% effective against this type of threat.<\/p>\n","protected":false},"excerpt":{"rendered":"