A keylogger is a program that records every keystroke made by users. They are primarily used by cybercriminals to intercept the submission of sensitive information like passwords and credit card numbers.
What is a Keylogger?
Key takeaways
- Keyloggers can be used legally and illegally. Examples of legal uses of keyloggers include law enforcement monitoring for criminal activity and company's monitoring for internal threats on their devices.
- There are two categories of keyloggers - hardware and software.
- Kernel keyloggers are the most complex type of keylogger. Anti-rootkit software is required to detect them because they're designed to hide behind legitimate computer processes.
Reviewed by
No items found.



See UpGuard In Action
Book a free, personalized onboarding call with one of our cybersecurity experts.
More from our blog
Learn more about the latest issues in cybersecurity.
Sign up to our newsletter
Get the latest curated cybersecurity news, breaches, events and updates in your inbox every week.
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities