Keyloggers are one of the very most well-known and feared security threats on computers today. They're feared because they're generally hard to detect, and since the damage they do is often meant to extend beyond the infected computer. keylogger usually are programs, specifically spyware programs, installed in your PC through internet. You might have downloaded a record from torrent, and from your realization and notification, they get installed in your system. However, the question is, are Key loggers harmful? These programs record every stroke that's made on the keyboard of a computer, where it has been installed. So, it is now easy to achieve the data like passwords, usernames, bank details, charge card number and other such data from the computer. Now, the question is how do these keyloggers get installed on your pc?
As said earlier, keyloggers could possibly get downloaded, in the event that you download a record especially with torrent clients. Moreover, the social networking sites are one of many easiest and regular targets of malware developers, like the keylogger, and it is simple to get into the trap set by these sites. One of your friends, who may or may not be a prey of keylogger attack, sends you a link on the social networking site. As you trust your friend, you only will go through the link, and bingo!! The keylogger gets installed.
You will find cases where public computers like libraries and other such places have been attacked by the keyloggers and the data of the users of these computers have been stolen and employed for various purposes. Among the chief purposes of stealing your individual data is for financial transactions.
There are many ways to safeguard against keyloggers, however, and make sure that you don't become a prey of identity theft or must handle any lesser hassle, such as a hijacked World of Warcraft account. While no defense is ideal, these steps improve your chances.
- Use A Firewall
In most instances, a keylogger has to transmit its information to a third party in order for it to accomplish any harm. What this means is sending information from the computer via the Internet. Although an extremely close examination of your network usage might reveal a keylogger, you can't rely on that as a way of monitoring for them. The bandwidth taken up by recorded keystrokes is virtually undetectable in a broadband world. A firewall is a superb defense against keyloggers because it'll monitor your computer's activity more closely than you ever could. Upon detecting that a program is trying to send data out, the firewall will request permission or display a warning. Some firewall software, such as for example ZoneAlarm, provides you with the option of shutting down all inbound and outbound data completely. The utilization of a firewall can't guarantee protection, but it's an essential type of defense that will catch most threats.
- Install A Password Manager
Keyloggers work nicely because they're simple. They only take raw information - keystrokes - and ship them from the computer to a third party. The data they send doesn't have to occupy much bandwidth, and it can be logged quickly without the apparent performance impact on the target PC. Most users infected with a keylogger won't ever know it unless an account or charge card is hijacked keylogger.
One weakness of keyloggers, however, is the fact that you can't keylog what isn't typed. That's where automatic form filling becomes useful. If a password is filled in automatically by your PC, without the keystrokes, the password will simply be vunerable to keyloggers the 1st time you type it.
All the major web browsers have this feature baked in and will ask to store your password information the first time you type it. Some computers ship with software that offers this functionality through the entire operating system.
- Keep Your Software Updated
Being proactive about your computer's security is always a good idea, and the main section of a proactive defense is keeping software updated. Keyloggers, like most variants of modern malware, can exploit software vulnerabilities to inject themselves into one's body without you, and sometimes your antivirus, being any the wiser. Adobe Flash, as an example, has already established problems with remote code execution exploits in the past. A malicious website can use this kind of exploit to install a keylogger on your own PC.
Exploits are now being found in software all of the time. Even Microsoft Windows and Mac OS X are routinely patched to look after critical exploits. If you don't update one's body you is likely to be leaving it ready to accept a variety of attacks that can otherwise have been avoided. Yes, making sure all your software is updated could be a pain, but consider the alternative. This is a simple, proactive remedy that may stop most attacks before they can start.
- Change Your Passwords Frequently
For some users, the measures above will give you enough protection to ward off any keylogger woes, but there always seems to be people who have their passwords stolen even though they did everything right.
This probably could be the fault of exploits that have yet to be identified or patched, and it may also sometimes occur due to social engineering - it's not unusual for a Twitter account to be hacked and begin tweeting out links to malicious sites and files. Every smart geek is vigilant, but nobody is perfect.
Changing your passwords frequently may help minimize the potential damage of a keylogging attack. Your password might be stolen, however it could be uncommon because of it to be stolen and used immediately, unless that keylogger was targeted directly at you (in which case you could have bigger problems than keylogging!). If you change your password every two weeks, your stolen information will no longer be useful.
- User-education
User education goes a considerable ways toward the prevention of keyloggers and other spyware. Like - creating a policy of only downloading software and applications from trusted sources will go a considerable ways toward minimizing risk.
Also, when possible - look for a web-based software solution that lets you avoid downloading and installing unnecessary programs or software from companies you aren't certain you can trust.
- Use a virtual machine
Using a virtual machine or virtual operating system allows you to install software that could be suspect in a virtual section of your personal computer to split up them, and the threat of a keylogger, from the trusted parts of your computer.
When installed and configured properly, the closed environment provided by a virtual machine keeps threats completely separate from your primary, and protected, operating system.
- Utilizing the on-screen keyboard to type sensitive information
Among the limitations of keyloggers is that they simply capture certain information. Among the things they do not capture are clicks made on Windows' on-screen keyboard. The on-screen keyboard isn't very well-known by nearly all Windows users, however it could be a good way to be sure sensitive account numbers and passwords are not captured.
Yes, the process of clicking passwords and account numbers does take time, and you most likely don't desire to utilize the on-screen keyboard for everything, but it's certainly a choice that may be used as part of a thorough approach. It may also be used when you're on someone else's computer and aren't certain of its security.
- Use Sandboxie
Sandboxie is another great program to help you protect your personal computer against harmful keyloggers and spywares. Sandboxie runs your personal computer in a isolated space which prevents your program from making permanent changes to other programs in your computer. At any time you receive a record that looks suspicious, just run the program with Sandboxie to ensure that, you can test it without the danger of creating permanent changes to your computer.
To run a program in Sandboxie, follow the steps as mentioned below:
- Open the Sandboxie tool and select sandbox menu on the top.
- Now head to Default sandbox.
- Then select run any program.
- Now select the file you wish to perform in sandboxie and click open.
- Keyscrambler
Keyscrambler is one of the best program that offers protection against keyloggers. It is just a small program which encrypts your keystrokes to ensure that, even when your personal computer features a keylogger installed onto it, only the encrypted keystrokes are captured by the keylogger and not the specific ones.
The free version of Keyscrambler currently supports Firefox, IE and a few other applications. However its premium version supports a lot more than 160 applications
- Cover your webcam
There are many computer viruses are developed in the form of keylogger that can spy for you so here best option is to cover up your webcam to secure yourself from these types of attacks. You can cover it with any bandage or a color tape or anything you wish.
These methods may help force away keylogger by decreasing their opportunity to infect your PC and decreasing the information they can steal if one does happen to be installed. Although you can never protect yourself 100%, taking these steps will decrease your risk.
No comments:
Post a Comment