Synonyms
Introduction
Keystroke capture (KC) tracks a computer or mobile device users’ keyboard activity using hardware or software. KC is used by businesses to keep employees from misusing company technology, in families to monitor the use possible misuse of family computers, and by computer hackers who seek gain through secretly possessing an individual’s personal information and account passwords. KC software can be purchased for use on a device or may be placed maliciously without the user’s knowledge through contact with untrusted websites or e-mail attachments. KC hardware can also be purchased and is disguised to look like computer cords and accessories. KC detection can be difficult because software and hardware are designed to avoid detection by anti-KC programs. KC can be avoided by using security software as well as through careful computing practices. KC affects individual computer users as well as small, medium,...
Further Readings
Adhikary, N., Shrivastava, R., Kumar, A., Verma, S., Bag, M., & Singh, V. (2012). Battering keyloggers and screen recording software by fabricating passwords. International Journal of Computer Network & Information Security, 4(5), 13–21.
Aron, J. (2011). Smartphone jiggles reveal your private data. New Scientist, 211(2825), 21.
Beierly, I. (2010). They’ll be watching you. Retrieved from http://www.hospitalityupgrade.com/_files/File_Articles/HUSum10_Beierly_Keylogging.pdf
Button, K. (2013). Wire and online banking fraud continues to spike for businesses. Retrieved from http://www.americanbanker.com/issues/178_194/wire-and-online-banking-fraud-continues-to-spike-for-businesses-1062666-1.html
Credit Union Times. (2014). Hotel business centers hacked. Credit Union Times, 25(29), 11.
IMD: International Institute for Management Development. (2014). Cybercrime buster speaks at IMD. Retrieved from http://www.imd.org/news/Cybercrime-buster-speaks-at-IMD.cfm
International Business Times. (2011). Carrier iq spyware: Company’s Android app logging the keystrokes of millions. Retrieved from http://www.ibtimes.com/carrier-iq-spyware-companys-android-app-logs-keystrokes-millions-video-377244
Krebs, B. (2009). Data breach highlights role of ‘money mules’. Retrieved from http://voices.washingtonpost.com/securityfix/2009/09/money_mules_carry_loot_for_org.html
Kulish, N., & Homola, V. (2014). Germans condemn police use of spyware. Retrieved from http://www.nytimes.com/2011/10/15/world/europe/uproar-in-germany-on-police-use-of-surveillance-software.html?_r=0
Kumar, S. (2009). Handling malicious hackers & assessing risk in real time. Siliconindia, 12(4), 32–33.
Lyons, K. (2014). Is your computer already infected with dangerous Gameover Zeus software? Virus could be lying dormant in thousands of Australian computers. Retrieved from http://www.dailymail.co.uk/news/article-2648038/Gameover-Zeus-lying-dormant-thousands-Australian-computers-without-knowing.html#ixzz3AmHLKlZ9
NCSL: National Conference of State Legislatures. (2015). State spyware laws. Retrieved from http://www.ncsl.org/research/telecommunications-and-information-technology/state-spyware-laws.aspx
Shachtman, N. (2011). Exclusive: Computer virus hits US drone fleet. Retrieved from http://www.wired.com/2011/10/virus-hits-drone-fleet/
Vancouver Sun. (2013). Police seize computers linked to large cybercrime operation: Malware Responsible for over $500 million in losses has affected more than five million people globally. Retrieved from http://www.vancouversun.com/news/Police+seize+computers+linked+large+cybercrime+operation/8881243/story.html#ixzz3Ale1G13s
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this entry
Cite this entry
Alley-Young, G. (2017). Keystroke Capture. In: Schintler, L., McNeely, C. (eds) Encyclopedia of Big Data. Springer, Cham. https://doi.org/10.1007/978-3-319-32001-4_125-1
Download citation
DOI: https://doi.org/10.1007/978-3-319-32001-4_125-1
Received:
Accepted:
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-32001-4
Online ISBN: 978-3-319-32001-4
eBook Packages: Springer Reference Business and ManagementReference Module Humanities and Social SciencesReference Module Business, Economics and Social Sciences