Skip to content
  • User Awareness Training
  • Penetration Testing
  • CISO Consultancy
Attack Anatomy

Attack Anatomy – Keyloggers

Posted on February 26, 2020February 26, 2020 by Graham

Keyloggers refer to malware installed on your computer and used to capture keystrokes from the keyboard. The information is sent to the hacker’s server who will extract passwords and other credentials.

This entry was posted in Attack Anatomy. Bookmark the permalink.
Graham

Attack Anatomy – Session Hijacking
Attack Anatomy – Domain Spoofing
About this blog

Full of information and facts about information security.

Latest Posts
  • 16
    Feb
    Unpatched Android App with 1 Billion Downloads Threatens Spying, Malware
  • 18
    Nov
    Zoom increases its security controls
  • 11
    Mar
    How to protect ‘smart’ security cameras and baby monitors from cyber attack.
  • 04
    Mar
    WordPress Plugin Flaws Are Exploitable
  • 04
    Mar
    GhostCat Vulnerability Affects Apache Tomcat Servers (Important to Act Now)
Categories
  • Attack Anatomy (4)
  • Cyber Security Incidents (5)
  • Information Security (6)
  • User Awareness Training (2)
  • Vulnerabilities (3)
Archives
  • February 2021 (1)
  • November 2020 (1)
  • March 2020 (5)
  • February 2020 (12)
  • January 2020 (1)
About us

Middlewave.co.uk is a trading name of Intrepid Turtle Ltd.
Company Number: 10825339

Latest News
  • 16
    Feb
    Unpatched Android App with 1 Billion Downloads Threatens Spying, Malware
  • 18
    Nov
    Zoom increases its security controls
  • 11
    Mar
    How to protect ‘smart’ security cameras and baby monitors from cyber attack.
  • 04
    Mar
    WordPress Plugin Flaws Are Exploitable
Copyright 2022 © Middlewave.co.uk
  • User Awareness Training
  • Penetration Testing
  • CISO Consultancy

Login

Lost your password?