top of page

Key Logging

Who Hiding In Your Computer



The Image shows the tech cyber blog logo. With the color purple, green, blue and white.



By: Intelligence Officer Markeith Price PLY | 03-23-2022 | Move Progress Production | Social Media @markeithprice | www.moveprogresspro.com


Every time you type a word someone is watching. True or false. Well, let’s be honest, this actually could be happening to you without you even knowing. You might have given a key logger permit to monitor you.


This is scary to know. The reality is at some point in time we all are being monitored. This is a good thing some of the time. We are being monitored for our safety. That doesn't mean every action you take on the internet is being recorded, or monitored with an eagle eye. Your actions are most likely falling into the everlasting web of the internet.


Even with your firewall and protection up, and deterrence that’s been created, someone that is seeking you out will try.


Well, what is key logging. Key logging is when malware gets installed on your computer, or smart device. Then when that malware gets installed your moves are being tracked.


Key logging is a process where hackers can track your keystrokes as well as your activity such as what you are searching for and what you are watching. Even though key logging can be designed in low code it definitely can do damage.


Once the malware has tracked enough, a hacker can use what data has been collected, and now they can use that information to break into your accounts. A hacker can even impersonate you, and just create another account based on your. Which can be a problem.


As key logging continues to grow deterrence, and defense is a must.


Move Progress Production


Tech Cyber Blog



Recent Posts

See All

Comments


bottom of page