Article001 ] Article002 ] Article003 ] Article004 ] Article005 ] Article006 ] Article007 ] Article008 ] Article009 ] Article010 ] Article011 ] Article012 ] Article013 ] Article014 ] Article015 ] Article016 ] Article017 ] Article018 ] Article019 - Internet Fraud ] Article020 - Debit orders ] Article021 - From the horse's mouth ] Article022  - Highjacking tips ] Article023 - 5 Myths with Community Policing ] [ Article024 - Cybercrime - Keystroke Logging ] Article025 - Bullies and Bullying ] Article026 - Drugs ] Article027 - Cybercrime ] Article028 Fraudulent Banking Email ] Article029  -  Partnership in Crime Prevention ] Article030 Gated Communities ] Article031 - Identity Theft Prevention ] Article 032 Unconfirmed Rumours ] Article033 - False Alarms ] Article034 - Guard Huts ]
 

 WESTVILLE COMMUNITY POLICING FORUM 
Article024 - Cybercrime - Keystroke Logging
Article supplied by Norton Internet Security  

Home
Brochures
Recent Updates
Editorial
Emergency Numbers
Crime Trends
Projects
Articles
News
Links
Good News
Contact Us
Search
Table of contents
Downloads
Missing persons
Wanted

web page hit counter
 

 

2nd June 2010
The following question with answer is a unique and simple way to minimise the risk of hackers getting to know your passwords and other personal data


Q. I've heard that hackers might install keystroke logging software on my computer via the Internet. What is it? And how can I stop it?

A. Keystroke logging software is just what it sounds like: It keeps track of everything you type on your computer keyboard. It is used by cybercriminals and regular people alike. Parents use it to spy on children, spouses spy on each other, and employers monitor employees. And yes, hackers may try to install keystroke logging software on a personal computer if they can gain access.

A firewall and up-to-date anti-malware software offer some protection, and you can get anti-keystroke logging software as well.

You can also keep hackers from finding what they're looking for; passwords and credit card numbers you enter at e-commerce sites. There is software that stores passwords and credit-card numbers and enters them automatically. Or, take advantage of the fact that keystroke loggers don't track your mouse. For instance, enter the first three letters of your password, then enter three incorrect letters, then use your mouse to highlight/select those and type the correct ones over them (without pressing "delete"). This causes your password to appear three characters longer than it really is and be invalid if they use it. 

There are many more Cybercrime Questions with Answers from Norton at the following link:

http://cybercrimenews.norton.com/nortonretail/in/expertqa/archive/index.html

 

Article001 ] Article002 ] Article003 ] Article004 ] Article005 ] Article006 ] Article007 ] Article008 ] Article009 ] Article010 ] Article011 ] Article012 ] Article013 ] Article014 ] Article015 ] Article016 ] Article017 ] Article018 ] Article019 - Internet Fraud ] Article020 - Debit orders ] Article021 - From the horse's mouth ] Article022  - Highjacking tips ] Article023 - 5 Myths with Community Policing ] [ Article024 - Cybercrime - Keystroke Logging ] Article025 - Bullies and Bullying ] Article026 - Drugs ] Article027 - Cybercrime ] Article028 Fraudulent Banking Email ] Article029  -  Partnership in Crime Prevention ] Article030 Gated Communities ] Article031 - Identity Theft Prevention ] Article 032 Unconfirmed Rumours ] Article033 - False Alarms ] Article034 - Guard Huts ]