IsThisAScam
InicioBlogPreciosAcerca deHistoryAPIExtension
Upgrade
ES
Sign in
Sign in
IsThisAScam

Independent scam & phishing analysis. Free for individuals. APIs for developers.

Operated by Zeplik, Inc.
Producto
  • Home
  • Blog
  • Pricing
  • Acerca de
  • History
  • Chrome Extension
Resources
  • Developers
  • Docs de API
  • Phishing brief
  • Romance scams
  • Tech support
  • Crypto scams
  • Apple scams
  • PayPal scams
Legal
  • Política de Privacidad
  • Términos de Servicio
  • product@zeplik.com

© 2026 Zeplik, Inc. Todos los derechos reservados.

Built for the calm, the cautious, and the careful.

Home/Glossary/Keylogger
Glossary · Technical Concept

What Is a Keylogger?

Software or hardware that secretly records every keystroke made on a computer or mobile device, capturing passwords, credit card numbers, messages, and other sensitive information as it is typed.

Quick Definition

Software or hardware that secretly records every keystroke made on a computer or mobile device, capturing passwords, credit card numbers, messages, and other sensitive information as it is typed.

Think you've been targeted?

Paste the suspicious content here for an instant analysis.

No signup · 6 detection layers · Results in seconds · Cmd+Enter

01Keylogger explained.

Keyloggers are surveillance tools that record everything you type. While they have legitimate uses in parental monitoring and corporate security, they are most commonly associated with cybercrime — silently capturing passwords, credit card numbers, and private messages.

Software keyloggers are the most common type, often installed as part of trojan malware. They run invisibly in the background, logging keystrokes and periodically sending the captured data to the attacker. Some advanced variants can also capture screenshots and clipboard contents.

Hardware keyloggers are physical devices placed between a keyboard and computer. They're nearly impossible to detect with software and can store months of keystrokes. They're used in targeted attacks on specific computers.

02How it works.

01The keylogger is installed via malware, physical access, or bundled with other software
02It runs silently in the background, invisible to the user
03Every keystroke is recorded, including passwords, credit card numbers, and messages
04Captured data is stored locally or sent to the attacker via the internet
05The attacker extracts credentials and uses them for account takeover or financial theft

03Real-world example.

In 2017, HP laptops were discovered to have a keylogger accidentally left in an audio driver by the manufacturer. While not malicious in intent, it demonstrated how keylogger code can exist on systems without users' knowledge, recording every keystroke to a file on the hard drive.

04How to protect yourself.

01Use a password manager to auto-fill credentials instead of typing them
02Keep antivirus software updated — it detects most software keyloggers
03Use two-factor authentication so passwords alone are insufficient for account access
04Check for unknown USB devices connected between your keyboard and computer
05Use virtual keyboards for highly sensitive inputs like banking passwords
Related Terms
MalwareTrojanSpywareIdentity Theft
Explore Scam Types
phishingromancecryptoinvestmenttech supportdelivery
Suspect Something?

Run a scan on the message you received.

Run a scan →